pub struct DiskEncryptionSetArgs {
pub auto_key_rotation_enabled: Output<Option<bool>>,
pub encryption_type: Output<Option<String>>,
pub federated_client_id: Output<Option<String>>,
pub identity: Output<DiskEncryptionSetIdentity>,
pub key_vault_key_id: Output<Option<String>>,
pub location: Output<Option<String>>,
pub managed_hsm_key_id: Output<Option<String>>,
pub name: Output<Option<String>>,
pub resource_group_name: Output<String>,
pub tags: Output<Option<HashMap<String, String>>>,
}
Fields§
§auto_key_rotation_enabled: Output<Option<bool>>
§encryption_type: Output<Option<String>>
The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey
, EncryptionAtRestWithPlatformAndCustomerKeys
and ConfidentialVmEncryptedWithCustomerKey
. Defaults to EncryptionAtRestWithCustomerKey
. Changing this forces a new resource to be created.
federated_client_id: Output<Option<String>>
Multi-tenant application client id to access key vault in a different tenant.
identity: Output<DiskEncryptionSetIdentity>
An identity
block as defined below.
key_vault_key_id: Output<Option<String>>
Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret). Exactly one of managed_hsm_key_id
, key_vault_key_id
must be specified.
NOTE Access to the KeyVault must be granted for this Disk Encryption Set, if you want to further use this Disk Encryption Set in a Managed Disk or Virtual Machine, or Virtual Machine Scale Set. For instructions, please refer to the doc of Server side encryption of Azure managed disks.
NOTE A KeyVault or Managed HSM using enable_rbac_authorization requires to use
azure.authorization.Assignment
to assign the roleKey Vault Crypto Service Encryption User
to this Disk Encryption Set. In this case,azure.keyvault.AccessPolicy
is not needed.
location: Output<Option<String>>
Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
managed_hsm_key_id: Output<Option<String>>
Key ID of a key in a managed HSM. Exactly one of managed_hsm_key_id
, key_vault_key_id
must be specified.
name: Output<Option<String>>
The name of the Disk Encryption Set. Changing this forces a new resource to be created.
resource_group_name: Output<String>
Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
A mapping of tags to assign to the Disk Encryption Set.
Implementations§
source§impl DiskEncryptionSetArgs
impl DiskEncryptionSetArgs
sourcepub fn builder() -> DiskEncryptionSetArgsBuilder
pub fn builder() -> DiskEncryptionSetArgsBuilder
Create an instance of DiskEncryptionSetArgs
using the builder syntax
Trait Implementations§
source§impl Clone for DiskEncryptionSetArgs
impl Clone for DiskEncryptionSetArgs
source§fn clone(&self) -> DiskEncryptionSetArgs
fn clone(&self) -> DiskEncryptionSetArgs
1.0.0 · source§fn clone_from(&mut self, source: &Self)
fn clone_from(&mut self, source: &Self)
source
. Read moreAuto Trait Implementations§
impl Freeze for DiskEncryptionSetArgs
impl RefUnwindSafe for DiskEncryptionSetArgs
impl Send for DiskEncryptionSetArgs
impl Sync for DiskEncryptionSetArgs
impl Unpin for DiskEncryptionSetArgs
impl UnwindSafe for DiskEncryptionSetArgs
Blanket Implementations§
source§impl<T> BorrowMut<T> for Twhere
T: ?Sized,
impl<T> BorrowMut<T> for Twhere
T: ?Sized,
source§fn borrow_mut(&mut self) -> &mut T
fn borrow_mut(&mut self) -> &mut T
source§impl<T> CloneToUninit for Twhere
T: Clone,
impl<T> CloneToUninit for Twhere
T: Clone,
source§unsafe fn clone_to_uninit(&self, dst: *mut T)
unsafe fn clone_to_uninit(&self, dst: *mut T)
clone_to_uninit
)