quiet-hairdresser-18834
01/12/2022, 5:32 PMrich-businessperson-35436
01/15/2022, 9:06 PMrich-businessperson-35436
01/15/2022, 9:06 PMbulky-oil-97030
01/17/2022, 12:04 PMaz ad app list
gives me the application I want with:
{
"acceptMappedClaims": null,
"addIns": [],
"allowGuestsSignIn": null,
"allowPassthroughUsers": null,
"appId": "0b89550a-4c40-4d95-91a3-753d8a823564",
"appLogoUrl": null,
"appPermissions": null,
"appRoles": [],
"applicationTemplateId": null,
"availableToOtherTenants": true,
"deletionTimestamp": null,
"displayName": "analyticsapi",
.....
"objectId": "8366522d-204a-41b4-ba30-ef01c99c9fdf",
"objectType": "Application",
"odata.type": "Microsoft.DirectoryServices.Application",
....
}
However the import
$ pulumi import azuread:index/application:Application analyticsapi 8366522d-204a-41b4-ba30-ef01c99c9fdf
comes back empty with:
Previewing import (qa):
Type Name Plan Info
pulumi:pulumi:Stack iam-import-qa 1 error
= └─ azuread:index:Application analyticsapi import 1 error
Diagnostics:
pulumi:pulumi:Stack (iam-import-qa):
error: preview failed
azuread:index:Application (analyticsapi):
error: Preview failed: resource '8366522d-204a-41b4-ba30-ef01c99c9fdf' does not exist
What am I doing wrong?bulky-oil-97030
01/17/2022, 3:12 PM[secret]
e.g.:
Outputs:
....
+ graphApiApplicationSecretFull : {
+ applicationObjectId: "<the-app-id>"
+ displayName : "User Onboarding Secret"
+ endDate : "2024-01-17T14:33:11Z"
+ id : "<the-pw-id>"
+ keyId : "<the-key-id>"
+ startDate : "2022-01-17T14:33:11Z"
+ urn : "urn:pulumi:qa::ti-iam-tenant-auth::azuread:index/applicationPassword:ApplicationPassword::graphApiAplicationSecret"
+ value : "[secret]"
}
....
What am I doing wrong?abundant-potato-97520
01/20/2022, 2:31 PMretrieving Key Vault "xxxxx-xxx-xx" (Resource Group "xxxxxx-xxxxx-xx"): keyvault.VaultsClient#Get: Failure responding to request: StatusCode=404 -- Original Error: autorest/azure: Service returned an error. Status=404 Code="ResourceGroupNotFound" Message="Resource group 'xxxxxx-xxxxx-xx' could not be found."
anyone an ideas why this is?high-leather-15669
01/21/2022, 12:50 PMcannot check existence of resource '/subscriptions/xxx/resourceGroups/%2Fsubscriptions%xx%2FresourceGroups%2Fxxx/providers/Microsoft.Compute/diskEncryptionSets/des-xxx': status code 400, {"error":{"code":"InvalidApiVersionParameter","message":"The api-version '2020-12-01' is invalid. The supported versions are '2021-04-01,2021-01-01,2020-10-01,2020-09-01,2020-08-01,2020-07-01,2020-06-01,2020-05-01,2020-01-01,2019-11-01,2019-10-01,2019-09-01,2019-08-01,2019-07-01,2019-06-01,2019-05-10,2019-05-01,2019-03-01,2018-11-01,2018-09-01,2018-08-01,2018-07-01,2018-06-01,2018-05-01,2018-02-01,2018-01-01,2017-12-01,2017-08-01,2017-06-01,2017-05-10,2017-05-01,2017-03-01,2016-09-01,2016-07-01,2016-06-01,2016-02-01,2015-11-01,2015-01-01,2014-04-01-preview,2014-04-01,2014-01-01,2013-03-01,2014-02-26,2014-04'."}}
Any idea why?big-sugar-92932
01/21/2022, 8:26 PMbig-sugar-92932
01/23/2022, 9:23 PMwet-noon-14291
01/24/2022, 1:26 PMrefined-sugar-8079
01/26/2022, 1:28 PMcannot create already existing resource '/subscriptions/xxx/resourceGroups/xxx/providers/Microsoft.Storage/storageAccounts/xxx/blobServices/default/containers/container42/immutabilityPolicies/default
The only alternative I've found was to use Local Command to execute az using CLI, but that is not really an ideal solutiongreat-manchester-70568
01/27/2022, 7:45 AMclean-alarm-24426
01/27/2022, 2:23 PMquiet-hairdresser-18834
01/29/2022, 4:10 PMswift-hamburger-98290
01/31/2022, 9:07 AMRoleAssignment
(https://www.pulumi.com/registry/packages/azure-native/api-docs/authorization/roleassignment/)? We run into the following problem:
1. Create KeyVault and a secret;
2. Create WebApp;
3. Give Key Vault Secrets User
to WebApp on the KeyVault;
4. WebApp crashes because it starts without having the permission yet.
Is there a way to solve this?millions-journalist-34868
01/31/2022, 10:54 PMCREATE USER [<identity-name>] FROM EXTERNAL PROVIDER;
ALTER ROLE db_datareader ADD MEMBER [<identity-name>];
ALTER ROLE db_datawriter ADD MEMBER [<identity-name>];
GO
I have seen there is a new Command package in Pulumi, could this be a good idea to use that? What are the other options? Dynamic provider?ancient-eve-13947
02/03/2022, 11:23 AMancient-eve-13947
02/04/2022, 9:26 AMancient-eve-13947
02/04/2022, 10:37 AMhigh-leather-15669
02/04/2022, 5:04 PMazure_native.migrate.MoveResource
but it seems that it is only used if you want to move resources from one region to another? Is there any suggest approach to do this with pulumi?millions-journalist-34868
02/06/2022, 9:00 AMshy-leather-86285
02/06/2022, 6:32 PMI0206 18:48:08.909918 11014 provider_plugin.go:796] Provider[azure-native, 0xc000523860].Create(urn:pulumi:dev::aro-test::azure-native:redhatopenshift:OpenShiftCluster::aro2) success: id=/subscriptions/<subscription>/resourceGroups/aro2-test/providers/Microsoft.RedHatOpenShift/openShiftClusters/aro2; #outs=14
I0206 18:48:08.909956 11014 eventsink.go:86] eventSink::Error(<{%reset%}>1 error occurred:
* Code="InternalServerError" Message="Internal server error."
straight-sunset-92336
02/08/2022, 12:00 PMmysterious-australia-14256
02/09/2022, 4:34 PMmysterious-australia-14256
02/10/2022, 11:59 AM"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus:Subscription$azure-native:servicebus/v20210101preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus:Subscription$azure-native:servicebus/v20210601preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus:Subscription$azure-native:servicebus/v20211101:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20140901:Subscription$azure-native:servicebus:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20140901:Subscription$azure-native:servicebus/v20170401:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20140901:Subscription$azure-native:servicebus/v20180101preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20140901:Subscription$azure-native:servicebus/v20210101preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20140901:Subscription$azure-native:servicebus/v20210601preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20140901:Subscription$azure-native:servicebus/v20211101:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20150801:Subscription$azure-native:servicebus:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20150801:Subscription$azure-native:servicebus/v20170401:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20150801:Subscription$azure-native:servicebus/v20180101preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20150801:Subscription$azure-native:servicebus/v20210101preview:Rule::<rulename>",
"urn:pulumi:<stack>::<project>::azure-native:resources/v20190701:ResourceGroup$azure-native:servicebus/v20150801:Namespace$azure-native:servicebus:Topic$azure-native:servicebus/v20150801:Subscription$azure-native:servicebus/v20210601preview:Rule::<rulename>",
How can I clean this up and prevent it from happening?
Thanks
Alanorange-whale-70892
02/10/2022, 4:08 PMorange-whale-70892
02/10/2022, 4:10 PMvictorious-exabyte-70545
02/10/2022, 8:19 PMvictorious-exabyte-70545
02/10/2022, 8:19 PM# Download the update script
$baseUri="<https://raw.githubusercontent.com/DataDog/datadog-aas-extension/master/management-scripts/extension>"; Invoke-WebRequest -Uri "$baseUri/update-all-site-extensions.ps1" -OutFile "update-all-site-extensions.ps1"; Invoke-WebRequest -Uri "$baseUri/install-latest-extension.ps1" -OutFile "install-latest-extension.ps1"
Run the following command. All arguments are required.
# Run
.\update-all-site-extensions.ps1 -SubscriptionId <SUBSCRIPTION_ID> -ResourceGroup <RESOURCE_GROUP_NAME> -Username <USERNAME> -Password <PASSWORD>
victorious-exabyte-70545
02/10/2022, 8:20 PMvictorious-exabyte-70545
02/10/2022, 8:20 PM