Kevin Rowlandson

Results 178 comments of Kevin Rowlandson

Tagging [hashicorp/terraform-provider-azurerm/issues/10401](https://github.com/hashicorp/terraform-provider-azurerm/issues/10401) as this is now the active issue for this feature request on the provider.

Now unblocked with [release v2.90.0](https://github.com/hashicorp/terraform-provider-azurerm/blob/v2.90.0/CHANGELOG.md) of the Azure provider, but adding to `v2.0.0` release milestone until we determine whether this will require a breaking change on templates.

Hi Stephen. Thank you for this question. I'm not completely clear on what your ask is, so please bear with me whilst I clarify a few points. > I want...

> In the above statement, I'm not sure that was working as the role assignment was empty? See screen grab [here](https://drive.google.com/file/d/1-BQgkXNFbtkCdG6xjfhArocZ9inLDtTA/view?usp=sharing). This is actually a Portal "issue" as the Portal...

@bigfishinnet I've managed to dig out another issue I commented on previously in the provider repository which provides additional information relating to this, and which you may find useful. Please...

Comment pulled from #310 To create the Role Assignments, we have to determine the Role Definition(s) required by the Policy Definition(s) being assigned. This is one of the steps already...

Hi @mlomat ... seems a relatively straightforward and sensible addition, and great that you've already thought this through with some pointers as to how it might be implemented, I'll discuss...

Considering the option to set these to "Audit" as default effect in the Terraform module. Does anyone have thoughts on how best to approach this? Also thinking this could be...