Dear all, we are trying to create an Azure Standard Logic App linked to a Virtual Network.
AzureRM provider used is the latest actual versione 3.84.0
This is our actual Script for reference:
resource “azurerm_logic_app_standard” “res-63” {
app_settings = {
WEBSITE_CONTENTOVERVNET = “1”,
WEBSITE_VNET_ROUTE_ALL = 1,
}
app_service_plan_id = azurerm_service_plan.res-56.id
https_only = true
location = “westeurope”
name = var.lapp
resource_group_name = var.rg
storage_account_access_key = azurerm_storage_account.res-31.primary_access_key
storage_account_name = var.storageAccount
version = “~4”
virtual_network_subnet_id = azurerm_subnet.res-4.id
site_config {
ftps_state = “FtpsOnly”
vnet_route_all_enabled = true
cors {
allowed_origins = [“https://portal.azure.com”]
}
ip_restriction {
priority = 1
ip_address = “4.232.64.222/32”
}
scm_ip_restriction {
priority = 1
ip_address = “4.232.64.222/32”
}
}
depends_on = [
azurerm_subnet.res-4,
azurerm_service_plan.res-56,
]
}
First question is how do we explicitate that the Logic App Access Restriction must be setset to public?
Judging from documentation the obvious public_network_access_enabled = true seems not to be supported, are there any other ways to enable Public Access Ingress from Terraform?
The aforementioned Script deploys Logic App with Public Access Disabled (take into account that, if you manually enable Public Access, actual ip and scm restriction rules are correctly listed).
If I manually enable it:
Htx for any support on the case.
C.