-
Notifications
You must be signed in to change notification settings - Fork 14
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Microsoft.Network/networkSecurityGroups #60
Comments
Hi @slavizh , do you mind checking if those security rules were added by Policy effects? We recently updated the What-If back-end to integrate changes made by Policy effects into What-If results, which should fix this sort of noise and will be deployed soon. |
@shenglol No, they are not added by policies. This deployment is from test environment where we do not have any policies. The rules are coming from configuration in the template. |
I see. However I could not reproduce the noise. I've also checked with REST API that |
Yes. Send it via private e-mail. |
Additionally this noisy also appears:
|
I was able to reproduce the noise with the template. This turned out to be a known limitation for What-If. The issue is that the In an ARM template, if you specify some security rules as child resources of a NSG but don't put them in the NSG's We have a general issue #78 to track this, and I've added this one there. The |
Thanks. Yes this is a common practice due to sometimes not being able to put the resources inside the main resource. In those case you add them as separate resource. The cases for that approach are often related solving some ARM template language restrictions or easier way to write code. |
@shenglol - Am I right that this is part of the same fix that we did for VNETs? So once w51 is rolled out we can close this? |
Not yet. The custom metadata need to be updated to set a flag to enable inline nested resource handling for NSG. We currently only turned it on for VNETs because we want to make sure it doesn't break things. Since it's been working without big issues I think we can enable it for more resource types now. This should be fixed with this week's metadata regeneration. |
The fix for this should be available. Closing. |
Describe the noise
Resource type (i.e. Microsoft.Storage/storageAccounts)
Microsoft.Network/networkSecurityGroups
apiVersion (i.e. 2019-04-01)
2019-11-01
Client (PowerShell, Azure CLI, or API)
PowerShell
Relevant ARM Template code (we only need the resource object for the above
resourceType
andapiVersion
, but if it's easier you can include the entire templateExpected response (i.e. "I expected no noise since the template has not been modified since the resources were deployed)
No change in securityRules proeprty
Current (noisy) response (either include a screenshot of the what-if output, or copy/paste the text)
Additional context
Add any other context about the problem here.
The text was updated successfully, but these errors were encountered: