-
Notifications
You must be signed in to change notification settings - Fork 755
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Azure Recovery Services Vault: Failure to attach identities when using SystemAssigned and UserAssigned. #9662
Comments
Can you share the bicep code you are using to reproduce? |
Seems similar to #7496. I'm assuming this part of they payload is handled by the RP and we don't touch it, but the fact that you can do this directly with the API is surprising. |
@alex-frankel We discovered this during our test runs with CARML. We are also quite certain this might be an RP issue, but we didn't have any point of contact to open a ticket/raise the issue with them directly. We were not sure if this is 100% on the RP side, thus this issue in this repo just to be sure. |
@fblix -- sorry about the delay on this. I played around with the repro steps and was able to successfully deploy with both variants ('SystemAssigned, UserAssigned' and 'systemassigned,userassigned'), but in neither case did the assignment actually happened. If you haven't already, can you open up a support ticket or ICM against this resource type? |
hi @alex-frankel will open a support ticket on this case, thanks! |
Bicep version
0.13.1
Describe the bug
When trying to create a recovery services vault via bicep and setting both a systemassigned and a userassigned identity both identities get created (serviceprincipal for the systemassigned, managedidentity resource for the userassigned) but none of the get attached to the Azure Recovery Services Vault. However, when calling the REST API directly with the following code:
the creation and the assignment succeed.
Upon running the same code but with
the creation succeeds but the assignment fails.
When running the equivalent code in bicep the assignment never happens, no matter the configuration.
The chosen API-Version does not seem to impact this behavior.
A clear and concise description of what the bug is vs what you expected to happen
To Reproduce
Additional context
This is especially troublesome since you are no longer able to delete the rogue system-assigned identity (which is a service principal) without a support ticket.
cc: @JPEasier
The text was updated successfully, but these errors were encountered: