diff --git a/Terraform/main.tf b/Terraform/main.tf index 09fb7cf..d85c7e3 100644 --- a/Terraform/main.tf +++ b/Terraform/main.tf @@ -311,7 +311,7 @@ resource "azurerm_storage_account_network_rules" "firewall" { count = var.enable_private_endpoints == true ? 1 : 0 storage_account_id = azurerm_storage_account.datalake.id default_action = "Deny" - bypass = [ "AzureServices" ] + bypass = [ "None" ] private_link_access { endpoint_resource_id = "/subscriptions/${data.azurerm_client_config.current.subscription_id}/resourcegroups/${var.resource_group_name}/providers/Microsoft.Synapse/workspaces/*" diff --git a/deploySynapse.sh b/deploySynapse.sh index 2686545..d9a13dd 100644 --- a/deploySynapse.sh +++ b/deploySynapse.sh @@ -209,6 +209,7 @@ sqlcmd -U ${synapseAnalyticsSQLAdmin} -P ${synapseAnalyticsSQLAdminPassword} -S if [ "$privateEndpointsEnabled" == "true" ]; then echo "Restoring firewall rules..." az storage account update --name ${datalakeName} --resource-group ${resourceGroup} --default-action Deny --only-show-errors -o none + az resource update --name pocsynapseanalytics-7no --resource-group PoC-Synapse-Analytics-V2 --resource-type Microsoft.Synapse/workspaces --set Properties.publicNetworkAccess="Disabled" --only-show-errors -o none az synapse workspace firewall-rule delete --name AllowAllWindowsAzureIps --resource-group ${resourceGroup} --workspace-name ${synapseAnalyticsWorkspaceName} --only-show-errors -o none --yes fi