Azure Storage Disks Pool
This page shows how to write Terraform for Storage Disks Pool and write them securely.
azurerm_storage_disks_pool (Terraform)
The Disks Pool in Storage can be configured in Terraform with the resource name azurerm_storage_disks_pool
. The following sections describe how to use the resource and its parameters.
Example Usage from GitHub
An example could not be found in GitHub.
Parameters
The following arguments are supported:
name
- (Required) The name of the Disks Pool. The name must begin with a letter or number, end with a letter, number or underscore, and may contain only letters, numbers, underscores, periods, or hyphens, and length should be in the range [7 - 30]. Changing this forces a new Disks Pool to be created.resource_group_name
- (Required) The name of the Resource Group where the Disks Pool should exist. Changing this forces a new Disks Pool to be created.location
- (Required) The Azure Region where the Disks Pool should exist. Changing this forces a new Disks Pool to be created.availability_zones
- (Required) Specifies a list of logical zone (e.g.["1"]
). Changing this forces a new Disks Pool to be created.sku_name
- (Required) The sku name of the Disk Pool. Possible values are "Basic_B1", "Standard_S1" and "Premium_P1".subnet_id
- (Required) The ID of the Subnet for the Disk Pool. Changing this forces a new Disks Pool to be created.
tags
- (Optional) A mapping of tags which should be assigned to the Disks Pool.
In addition to the Arguments listed above - the following Attributes are exported:
id
- The Resource ID of the Disks Pool.
Explanation in Terraform Registry
Manages a Disks Pool.
Tips: Best Practices for The Other Azure Storage Resources
In addition to the azurerm_storage_account, Azure Storage has the other resources that should be configured for security reasons. Please check some examples of those resources and precautions.
azurerm_storage_account
Ensure to use HTTPS connections
It is better to use HTTPS instead of HTTP, which could be vulnerable to person-in-the-middle attacks.
azurerm_storage_account_network_rules
Ensure to allow Trusted Microsoft Services to bypass
It is better to allow Trusted Microsoft Services to bypass. They are not able to access storage account unless rules are set to allow them explicitly.
Azure Resource Manager Example
Azure Resource Manager code does not have the related resource.