avm-res-compute-diskencryptionset
Azure/avm-res-compute-diskencryptionset/azurerm
AVM Terraform module for Disk Encryption Set
terraform-azurerm-avm-template This is a template repo for Terraform Azure Verified Modules. Things to do: 1. Set up a GitHub repo environment called test. 1. Configure environment protection rule to ensure that approval is required before deploying to this environment. 1. Create a user-assigned managed identity in your test subscription. 1. Create a role assignment for the managed identity on your test subscription, use the minimum required role. 1. Configure federated identity credentials on the user assigned managed identity. Use the GitHub environment. 1. Search and update TODOs within the code and remove the TODO comments once complete. > [!IMPORTANT] > As the overall AVM framework is not GA (generally available) yet - the CI framework and test automation is not fully functional and i
| Name | Type | Description | Default |
|---|---|---|---|
| location | string | Azure region where the resource should be deployed. | required |
| name | string | The name of the disk encryption set. | required |
| key_vault_key_id | string | The Key Vault Key ID used for encryption. | required |
| key_vault_resource_id | string | The resource ID of the Key Vault to associate with the disk encryption set. | required |
| resource_group_name | string | The name of the resource group in which to create the disk encryption set. | required |
| auto_key_rotation_enabled | bool | Whether or not auto key rotation is enabled for the encryption set. | false |
| enable_telemetry | bool | This variable controls whether or not telemetry is enabled for the module. For m | true |
| federated_client_id | string | Multi-tenant application client id to access key vault in a different tenant. | null |
| managed_hsm_key_id | string | The Managed HSM Key ID used for encryption. | null |
| tags | map(string) | (Optional) Tags of the resource. | null |
| encryption_type | string | The type of encryption to be used. Allowed Values are'EncryptionAtRestWithCustom | "EncryptionAtRestWithCustomerKey" |
| lock | object({ kind = string | Controls the Resource Lock configuration for this resource. The following proper | null |
| managed_identities | object({ system_assigned | Controls the Managed Identity configuration on this resource. The following prop | {} |
key_vault_key_url — The ID of the disk encryption set.resource — This is the full output for the resource.resource_id — The ID of the disk encryption set.