-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deploy Azure Keyvault with Private Endpoint using AzureRM Terraform in Gitlab Pipelines #24260
Comments
Hi @jakthar , This is by no means an
If you could logon to proxy server & you can try to resolve the
All in all it shouldn't be an issue with keyvault service alone but with many managed services Azure offers over private endpoints. |
Thank you for taking the time to raise this! We use Issues in this repository to track feature enhancements and bugs in the Azure Provider. So that we can maintain focus on that, we instead ask that broader questions are raised using one of the Community Resources, such as the Azure Provider forum. With that in mind, I'm going to close this issue. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Is there an existing issue for this?
Community Note
Terraform Version
1.5.7
AzureRM Provider Version
3.72.1
Affected Resource(s)/Data Source(s)
azurerm_key_vault
Terraform Configuration Files
Debug Output/Panic Output
Expected Behaviour
Deploy Azure KeyVault with Public Network Access Disabled
Create Private Endpoint for Azure Key Vault
Create Private Services Connection for Key Vault with the created Private EndPoint
Create Customer Managed Keys in the KeyVault
All above need to complete in single Pipeline execution.
Actual Behaviour
Attached the flow of the Steps to reproduce the error.
Terraform Apply with #1. GITLAB_SETTINGS_1. YAML(WITH PROXY) fails with Error "Status=403 Code="Forbidden" Message="Public network access is disabled and request is not from a trusted service nor via an approved private link."
Terraform Apply with #2. GITLAB_SETTINGS_2. YAML(WITH PROXY BYPASS to KV URL) "failed with Error "Key Vault Name: "kvtemp-test-99") to become available: connecting to "https://kvtemp-test-99.vault.azure.net/": Get "https://kvkvtemp-test-99.vault.azure.net/": dial tcp: lookup kv-dev-des-test-99.vault.azure.net on DNSIP:53: no such host"
Terraform Apply with #1 and #2 Running #1. GITLAB_SETTINGS_1. YAML (WITH PROXY) and after first error Running #2. GITLAB_SETTINGS_2. YAML(WITH PROXY BYPASS to KV URL) sequentially completes the pipeline and configuration successful and deploys the resources.
Steps to Reproduce
Attached the flow of the Steps to reproduce the error.
Terraform Apply with #1 ### GITLAB_SETTINGS_1. YAML(WITH PROXY) ### failed with Error "Status=403 Code="Forbidden" Message="Public network access is disabled and request is not from a trusted service nor via an approved private link."
Terraform Apply with #2 ### GITLAB_SETTINGS_2. YAML(WITH PROXY BYPASS to KV URL) ### failed with Error "Key Vault Name: "kvtemp-test-99") to become available: connecting to "https://kvtemp-test-99.vault.azure.net/": Get "https://kvkvtemp-test-99.vault.azure.net/": dial tcp: lookup kv-dev-des-test-99.vault.azure.net on DNSIP:53: no such host"
Terraform Apply Get successful running #1. GITLAB_SETTINGS_1. YAML and #2. GITLAB_SETTINGS_2. YAML completes the configuration successful.
Important Factoids
No response
References
The text was updated successfully, but these errors were encountered: