why is it not allowed to ip whitelist a devops agent(in the same region) on a storage account?

Yael Goede 25 Reputation points
2023-03-20T13:12:14.5033333+00:00

Terraform uses a storage account to store it's state. when using an azure pipelines agent you wanna JIT(just in time) allow that devops agent to read the terraform state. however the storage account firewall cannot give ip access to devops agents from the same region as the storage account. for other azure solutions like keyvault this approach works perfectly, yet storage accounts treat this differently. Why is this and is this intended behavior? will this change in the future? I know a solution is to provision private agents but this seems like alot of overhead just to access a storage account behind a firewall.

thank you in advance

Azure Storage Accounts
Azure Storage Accounts
Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
2,721 questions
{count} votes

Accepted answer
  1. SaiKishor-MSFT 17,201 Reputation points
    2023-03-20T21:09:19.53+00:00

    @Yael Goede

    Yes, please refer to the following as per doc- https://learn.microsoft.com/en-us/azure/storage/common/storage-network-security?tabs=azure-portal

    User's image

    Does that help? Please do let me know if you have any further questions. Thank you!

    Remember:

    Please accept an answer if correct. Original posters help the community find answers faster by identifying the correct answer. Here is how.

    Want a reminder to come back and check responses? Here is how to subscribe to a notification.


0 additional answers

Sort by: Most helpful