Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Enable storage account infrastructure encryption #4139

Conversation

jonnyry
Copy link
Collaborator

@jonnyry jonnyry commented Nov 15, 2024

Resolves #4001

What is being addressed

Enable storage account infrastructure encryption.

Since storage account infrastructure encryption can only be turned on when a storage account is first created (unless you allow terraform to destroy the storage account and recreate it), this change is only applied on first deployment of a TRE (or a template component). Storage accounts that exist within an existing TRE deployment will not be affected.

The terraform pattern used to acheive this behaviour is as follows:

resource "azurerm_storage_account" "stg" {

  ... existing attributes ...

  # changing this value is destructive, hence attribute is in lifecycle.ignore_changes block below
  infrastructure_encryption_enabled = true

  lifecycle { ignore_changes = [infrastructure_encryption_enabled ] }
}

Copy link
Collaborator

@tim-p-allen tim-p-allen left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

Copy link

github-actions bot commented Nov 15, 2024

Unit Test Results

0 tests   0 ✅  0s ⏱️
0 suites  0 💤
0 files    0 ❌

Results for commit 2200ac9.

♻️ This comment has been updated with latest results.

Copy link
Collaborator

@tamirkamara tamirkamara left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

We have a CMK contribution coming in too. Are the two compatible with each other?
@yuvalyaron

@yuvalyaron
Copy link
Collaborator

@tamirkamara yes, they are compatible

@tamirkamara tamirkamara self-requested a review November 17, 2024 13:13
@jonnyry
Copy link
Collaborator Author

jonnyry commented Nov 27, 2024

Hey @tamirkamara do you have any more outstanding thoughts or feedback with your review? Thanks

@tim-p-allen
Copy link
Collaborator

/test 019a1b4

Copy link

🤖 pr-bot 🤖

🏃 Running tests: https://github.com/microsoft/AzureTRE/actions/runs/12082072675 (with refid 6913b829)

(in response to this comment from @tim-allen-ck)

@jonnyry
Copy link
Collaborator Author

jonnyry commented Nov 29, 2024

@tim-allen-ck this ok to merge now? thanks

@tim-p-allen tim-p-allen enabled auto-merge (squash) November 29, 2024 22:07
@tim-p-allen
Copy link
Collaborator

/test 2200ac9

Copy link

github-actions bot commented Dec 1, 2024

🤖 pr-bot 🤖

🏃 Running tests: https://github.com/microsoft/AzureTRE/actions/runs/12100436162 (with refid 6913b829)

(in response to this comment from @tim-allen-ck)

@tim-p-allen tim-p-allen merged commit 90274e5 into microsoft:main Dec 1, 2024
12 checks passed
@jonnyry jonnyry deleted the jr/upstream-main/73-enable-sa-infrastructure-encryption branch December 1, 2024 13:46
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
external PR from an external contributor
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Storage accounts should use infrastructure encryption
4 participants