Skip to content

Conversation

@jonnyry
Copy link
Collaborator

@jonnyry jonnyry commented Nov 15, 2024

Resolves #4001

What is being addressed

Enable storage account infrastructure encryption.

Since storage account infrastructure encryption can only be turned on when a storage account is first created (unless you allow terraform to destroy the storage account and recreate it), this change is only applied on first deployment of a TRE (or a template component). Storage accounts that exist within an existing TRE deployment will not be affected.

The terraform pattern used to acheive this behaviour is as follows:

resource "azurerm_storage_account" "stg" {

  ... existing attributes ...

  # changing this value is destructive, hence attribute is in lifecycle.ignore_changes block below
  infrastructure_encryption_enabled = true

  lifecycle { ignore_changes = [infrastructure_encryption_enabled ] }
}

@github-actions github-actions bot added the external PR from an external contributor label Nov 15, 2024
Copy link

@tim-p-allen tim-p-allen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@github-actions
Copy link

github-actions bot commented Nov 15, 2024

Unit Test Results

0 tests   0 ✅  0s ⏱️
0 suites  0 💤
0 files    0 ❌

Results for commit 2200ac9.

♻️ This comment has been updated with latest results.

Copy link
Collaborator

@tamirkamara tamirkamara left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have a CMK contribution coming in too. Are the two compatible with each other?
@yuvalyaron

@yuvalyaron
Copy link
Collaborator

@tamirkamara yes, they are compatible

@tamirkamara tamirkamara self-requested a review November 17, 2024 13:13
@jonnyry
Copy link
Collaborator Author

jonnyry commented Nov 27, 2024

Hey @tamirkamara do you have any more outstanding thoughts or feedback with your review? Thanks

@tim-p-allen
Copy link

/test 019a1b4

@github-actions
Copy link

🤖 pr-bot 🤖

🏃 Running tests: https://github.com/microsoft/AzureTRE/actions/runs/12082072675 (with refid 6913b829)

(in response to this comment from @tim-allen-ck)

@jonnyry
Copy link
Collaborator Author

jonnyry commented Nov 29, 2024

@tim-allen-ck this ok to merge now? thanks

@tim-p-allen tim-p-allen enabled auto-merge (squash) November 29, 2024 22:07
@tim-p-allen
Copy link

/test 2200ac9

@github-actions
Copy link

github-actions bot commented Dec 1, 2024

🤖 pr-bot 🤖

🏃 Running tests: https://github.com/microsoft/AzureTRE/actions/runs/12100436162 (with refid 6913b829)

(in response to this comment from @tim-allen-ck)

@tim-p-allen tim-p-allen merged commit 90274e5 into microsoft:main Dec 1, 2024
12 checks passed
@jonnyry jonnyry deleted the jr/upstream-main/73-enable-sa-infrastructure-encryption branch December 1, 2024 13:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

external PR from an external contributor

Projects

None yet

Development

Successfully merging this pull request may close these issues.

Storage accounts should use infrastructure encryption

4 participants