Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
Any Azure IP's to be whitelisted in Github Default runners to fix this issue
Can someone Please suggest
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hello Team,
I have Management & Spoke subscriptions & Stored terraform state file in Azure storage account in Management subscription and also, I have created one storage account in Spoke subscription using terraform. After I have disabled public acess & Key acess for storage accounts. while running Github actions pipeline with OIDC authentication (Github Runners). Its giving error like unable to acess the storage account. How to fix this issue.
Thanks & Regards
Satish
Globally unique resources that provide access to data management services and serve as the parent namespace for the services.
Any Azure IP's to be whitelisted in Github Default runners to fix this issue
Can someone Please suggest
When you disable public access and key access for your Azure storage accounts, you need to ensure that your GitHub Actions pipeline can authenticate and access the storage account using the appropriate method. Since you are using OIDC authentication with GitHub runners, here are some steps to troubleshoot and resolve the issue:
Storage Blob Data Contributor role to the service principal for the storage account.By following these steps, you should be able to diagnose and resolve the access issue with your Azure storage account when using GitHub Actions with OIDC authentication.