Putting the *Key* back into Azure KeyVault with Terraform!

Putting the *Key* back into Azure KeyVault with Terraform!

3.633 Lượt nghe
Putting the *Key* back into Azure KeyVault with Terraform!
EPISODE 3 Configure a KeyVault and access policy for the Terraform identity. Learn how to setup an SSH key using Terraform and store it's public and private key into KeyVault for secure and easy access when connecting to Virtual Machines. Wire up Azure Monitor to your new KeyVault to keep an audit trail using the observability stack we created in Episode 1. Keep the knowledge flowing! https://www.buymeacoffee.com/azterraformer Source Code: https://github.com/markti/azure-terraformer/tree/main/episodes/003 Azure ARM Resources Provider https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs v3.41.0 https://registry.terraform.io/providers/hashicorp/azurerm/3.41.0/docs Additional Providers: - Random Provider (https://registry.terraform.io/providers/hashicorp/random/latest) - Local (https://registry.terraform.io/providers/hashicorp/local/latest) - TLS (https://registry.terraform.io/providers/hashicorp/tls/latest) Terraform Resource List: - random_string - azurerm_resource_group - azurerm_key_vault - azurerm_client_config - azurerm_key_vault_access_policy - azurerm_storage_account - azurerm_log_analytics_workspace - azurerm_monitor_diagnostic_setting - tls_private_key - azurerm_key_vault_secret Azure Resource Naming Conventions https://learn.microsoft.com/en-us/azure/cloud-adoption-framework/ready/azure-best-practices/resource-abbreviations