remote-backend
avinor/remote-backend/azurerm
Terraform module to deploy a remote backend storage for Azure
Remote backend Terraform module to deploy a remote backend storage with Key Vault to manage SAS Token and key rotation. To access the remote state retrieve the SAS Token from Key Vault, do not use the access keys on storage account. SAS Token retrieved from Key Vault grants 1 day access, after that it will have to be refreshed. The access keys on storage account will automatically rotate on a 30 day schedule, this can be adjusted with the input variable key_rotation_days. Each backend creates a new storage account and Key Vault. The Key Vault can also be used for storing other secrets related to terraform. Use the access_policies variable to define users that should have access. It is recommended to read Secure access to a key vault documentation for which policies to apply. Terraform has
| Name | Type | Description | Default |
|---|---|---|---|
| resource_group_name | string | Name of resource group to deploy resources in. | required |
| location | string | Azure location where resources should be deployed. | required |
| name | string | Name of backend storage account. | required |
| enable_advanced_threat_protection | bool | Boolean flag which controls if advanced threat protection is enabled. | false |
| key_rotation_days | number | Number of days between key rotations on storage account | 30 |
| log_analytics_workspace_id | string | Specifies the ID of a Log Analytics Workspace where Diagnostics Data should be s | null |
| tags | map(string) | Tags to apply to all resources created. | {} |
| access_policies | list(object({ object_id | Map of access policies for an object_id (user, service principal, security group | [] |
| network_rules | object({ bypass = set(st | Network rules to apply to storage account. | null |
vault_id — Vault id for the remote state key vault.Azure landing zones Terraform module
Terraform supermodule for the Terraform platform engineering for Azure
Terraform module to deploy landing zone subscriptions (and much more) in Azure
Terraform Module to define a consistent naming convention by (namespace, stage,