简体   繁体   English

如何使用 Terraform 批准 Blob 存储 ADLS Gen2 上的托管专用端点?

[英]How to use Terraform to approve a Managed Private Endpoint on a Blob Storage ADLS Gen2?

I have created several managed private endpoints on a Synapse Analytics workspace using Terraform. Now I do not know how to "Approve" them since I cannot seem to find the right resource to perform this action.我使用 Terraform 在 Synapse Analytics 工作区上创建了几个托管私有端点。现在我不知道如何“批准”它们,因为我似乎找不到合适的资源来执行此操作。

To do it manually I need to go to the Storage account -> Networks -> Private Endpoints, selected the ones to be "Approved" and press Approve.要手动执行此操作,我需要将 go 转到存储帐户 -> 网络 -> 专用端点,选择要“批准”的那些,然后按批准。

If you're still interested, I've done this in Terraform like so:如果您仍然感兴趣,我已经在 Terraform 中这样做了:

resource "null_resource" "endpoint_approval" {
  depends_on = [module.sql_managed_endpoint, module.storage_managed_endpoint]
  provisioner "local-exec" {
    command     = <<-EOT
          $sql_id = $(az network private-endpoint-connection list --id ${module.mssql_server.id} --query "[?contains(properties.privateEndpoint.id, 'vnet')].id" -o json) | ConvertFrom-Json
          $storage_id = $(az network private-endpoint-connection list --id ${module.storage_account.storage_account_id} --query "[?contains(properties.privateEndpoint.id, 'vnet')].id" -o json) | ConvertFrom-Json
          az network private-endpoint-connection approve --id $sql_id --description "Approved in Terraform"
          az network private-endpoint-connection approve --id $storage_id --description "Approved in Terraform"
        EOT
    interpreter = ["pwsh", "-Command"]
  }
}

As of today, you can't approve a Managed Private Endpoint using Terraform.从今天开始,您无法使用 Terraform 批准托管专用端点。

You may checkout the Synapse Managed Private Endpoint - auto_approval option which has already asked in the hashicorp.您可以查看已在 hashicorp 中询问的Synapse Managed Private Endpoint - auto_approval 选项

Note: Azure PowerShell and Azure CLI are the preferred methods for managing Private Endpoint connections on Microsoft Partner Services or customer owned services.注意: Azure PowerShellAzure CLI是管理 Microsoft 合作伙伴服务或客户拥有的服务上的专用终结点连接的首选方法。

For more details, refer to Manage Private Endpoint connections on a customer/partner owned Private Link service .有关详细信息,请参阅管理客户/合作伙伴拥有的专用链接服务上的专用终结点连接

暂无
暂无

声明:本站的技术帖子网页,遵循CC BY-SA 4.0协议,如果您需要转载,请注明本站网址或者原文地址。任何问题请咨询:yoyou2525@163.com.

相关问题 备份 ADLS gen2 - Backup ADLS gen2 在 Azure Databricks 和 Terraform 中安装带有 AAD 直通的 ADLS gen2 - Mounting ADLS gen2 with AAD passthrough in Azure Databricks with Terraform ADLS Gen2 --> 文件夹级别的 ACL - ADLS Gen2 --> ACL on a folder level 如何使用 dbt 将镶木地板文件从 Azure Data Lake Gen2/Azure Blob 存储加载到专用池? - How to load parquet files from Azure Data Lake Gen2/Azure Blob Storage to Dedicated pool using dbt? “KeyVaultAuthenticationFailure”当存储帐户尝试使用专用端点访问 Key Vault 中的客户托管密钥时(使用 Terraform) - "KeyVaultAuthenticationFailure" when Storage Account attempts to Access Customer Managed Key in Key Vault with Private Endpoint (Using Terraform) 从 ADLS gen2 上的增量表流式传输时出现 AzureBlobFileSystem FileNotFoundException - AzureBlobFileSystem FileNotFoundException when streaming from a Delta table on ADLS gen2 Azure Data Lake Gen2 存储帐户 blob 与 adf 选择 - Azure Data Lake Gen2 Storage Account blob vs adf choice 复制活动(从 Cosmos SQL api 到 ADLS gen2)在 Synapse 中失败 - Copy activitiy (from Cosmos SQL api to ADLS gen2) getting failed in Synapse 即使在增量优化后,ADLS Gen2 位置中的小文件也可用 - Small files available in ADLS Gen2 location even after delta optimization SAS 令牌使用 Azure java 目录级别的 ADLS Gen2 AD 服务原则 - SAS token using Azure AD Service Principle for ADLS Gen2 at directory level in java
 
粤ICP备18138465号  © 2020-2024 STACKOOM.COM