You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Documentation for resource suggests that read_permissions can be a list containing any of the values agentconfig, aggregate, api, draft, extendqueries, search.
When specifying the read permissions value as ["search"] (as in the example above) I would expect the resource read_permissions would match.
If the read_permissions are left unchanged then the resource should not redeploy on subsequent terraform apply runs.
Note: : The behaviour I describe above IS seen if the read_permissions is set to ["agentconfig"].
Actual Behaviour
When the value provided for read_permissions in one, or any combination of, aggregate, api, draft, extendqueries, search then all are assigned. When the next terraform apply is run, the resource permissions do not match the state and this forces the resource to be recreated.
The only exception to the above is specifying the read_permissions as just ["agentconfig"]. In this instance, the resource does not recreate on subsequent terraform apply runs.
Steps to Reproduce
terraform apply
terraform apply
Important Factoids
References
#0000
The text was updated successfully, but these errors were encountered:
Since this issue has been reported a long time ago and relates to the version of provider we no longer support - I'm going to close it. Please open a new updated bug report on current versions of terraform and provider if this is still relevant. Thank you.
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you have found a problem that seems similar to this, please open a new issue and complete the issue template so we can capture all the details necessary to investigate further.
Community Note
Terraform (and AzureRM Provider) Version
Terraform v0.12.23
Affected Resource(s)
azurerm_application_insights_api_key
Terraform Configuration Files
Debug Output
Panic Output
Expected Behavior
Documentation for resource suggests that read_permissions can be a list containing any of the values
agentconfig
,aggregate
,api
,draft
,extendqueries
,search
.When specifying the read permissions value as ["search"] (as in the example above) I would expect the resource
read_permissions
would match.If the
read_permissions
are left unchanged then the resource should not redeploy on subsequent terraform apply runs.Note: : The behaviour I describe above IS seen if the read_permissions is set to
["agentconfig"]
.Actual Behaviour
When the value provided for read_permissions in one, or any combination of,
aggregate
,api
,draft
,extendqueries
,search
then all are assigned. When the next terraform apply is run, the resource permissions do not match the state and this forces the resource to be recreated.The only exception to the above is specifying the read_permissions as just ["agentconfig"]. In this instance, the resource does not recreate on subsequent terraform apply runs.
Steps to Reproduce
terraform apply
terraform apply
Important Factoids
References
The text was updated successfully, but these errors were encountered: