-
Notifications
You must be signed in to change notification settings - Fork 3
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Test example "afd_private_link_service_to_LB" in module "avm-res-cdn-profile" fail #37
Comments
Thanks for submitting the issue @zhangjiale-64 Please feel free to connect internally |
The settings in the configuration have not changed. |
@zhangjiale-64 I will test at my end and will reach out to you offline for sync on this. |
From the screenshot shared, it looks like the error is while applying NSG rules to the subnet. The example code doesnt apply any NSG rules. Looks like the issue due to some organizational policies applied at the subscription level automatically when new subnets are created. The issue is not reproducible at our end with the default configuration. |
@jongio Any ideas? |
I'm asking... |
@jongio greetings! were you able to identify the policy impacting the deployment ? We discussed with the AVM core team and have agreed that this issue is related to a subscription policy and not related to the module. If this policy is related to the Azure landing zone , do let us know and we will reach out to the ALZ team for review. |
I did ask around, but we aren't able to determine the cause of this based on the data we have. Yes, any help would be appreciated. |
Opened an internal group chat to discuss further. We need access to the Azure SDK Developer Playground subscription to review the policies. |
As discussed internally since the failure the is due to NSGs getting deployed through a DINE policy, this is not a module issue. As per terraforms official article for azurerm_subnet , NSGs are not supported for Private link services https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/subnet . Please work internally to get necessary exceptions to the resource groups on these policies. |
Describe the issue:
Test the example
avm-res-cdn-profile_example_afd_private_link_service_to_LB
, there is an error occurs when we open the created resource in azure portal. The subnet/frontend subnet creation fails, because it attempt to enable network policy for the Private Link service on the subnet.The error as follow:
Repro Steps:
todo-python-mongo-terraform
.output.tf
file in terraform.az login
,azd auth login
.azd provision
.Module Version : 0.1.0
Expected behavior:
All resources can be created successfully, there is no error in azure portal.
@didayal-msft , @Poven795909 and @jongio for notification.
The text was updated successfully, but these errors were encountered: