Skip to content

Commit 6c53cde

Browse files
authored
configure default_outbound_access_enabled property for upcoming azure changes in March 2026 (#4757)
1 parent 5cc2058 commit 6c53cde

File tree

14 files changed

+60
-41
lines changed

14 files changed

+60
-41
lines changed

CHANGELOG.md

Lines changed: 2 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,8 @@
11
<!-- markdownlint-disable MD041 -->
22
## (Unreleased)
33

4-
* _No changes yet_
4+
ENHANCEMENTS:
5+
* Specify default_outbound_access_enabled = false setting for all subnets ([#4757](https://github.com/microsoft/AzureTRE/pull/4757))
56

67
## (0.28.0) (March 2, 2026)
78
**BREAKING CHANGES**

core/terraform/network/network.tf

Lines changed: 19 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -7,15 +7,17 @@ resource "azurerm_virtual_network" "core" {
77
lifecycle { ignore_changes = [tags] }
88

99
subnet {
10-
name = "AzureBastionSubnet"
11-
address_prefixes = [local.bastion_subnet_address_prefix]
12-
security_group = azurerm_network_security_group.bastion.id
10+
name = "AzureBastionSubnet"
11+
address_prefixes = [local.bastion_subnet_address_prefix]
12+
security_group = azurerm_network_security_group.bastion.id
13+
default_outbound_access_enabled = false
1314
}
1415

1516
subnet {
16-
name = "AzureFirewallSubnet"
17-
address_prefixes = [local.firewall_subnet_address_space]
18-
route_table_id = var.firewall_force_tunnel_ip != "" ? azurerm_route_table.fw_tunnel_rt[0].id : null
17+
name = "AzureFirewallSubnet"
18+
address_prefixes = [local.firewall_subnet_address_space]
19+
route_table_id = var.firewall_force_tunnel_ip != "" ? azurerm_route_table.fw_tunnel_rt[0].id : null
20+
default_outbound_access_enabled = false
1921
}
2022

2123
subnet {
@@ -24,6 +26,7 @@ resource "azurerm_virtual_network" "core" {
2426
private_endpoint_network_policies = "Disabled"
2527
private_link_service_network_policies_enabled = true
2628
security_group = azurerm_network_security_group.app_gw.id
29+
default_outbound_access_enabled = false
2730
}
2831

2932
subnet {
@@ -33,6 +36,7 @@ resource "azurerm_virtual_network" "core" {
3336
private_link_service_network_policies_enabled = true
3437
security_group = azurerm_network_security_group.default_rules.id
3538
route_table_id = azurerm_route_table.rt.id
39+
default_outbound_access_enabled = false
3640

3741
delegation {
3842
name = "delegation"
@@ -50,6 +54,7 @@ resource "azurerm_virtual_network" "core" {
5054
private_endpoint_network_policies = "Disabled"
5155
security_group = azurerm_network_security_group.default_rules.id
5256
route_table_id = azurerm_route_table.rt.id
57+
default_outbound_access_enabled = false
5358
}
5459

5560
subnet {
@@ -58,6 +63,7 @@ resource "azurerm_virtual_network" "core" {
5863
private_endpoint_network_policies = "Disabled"
5964
security_group = azurerm_network_security_group.default_rules.id
6065
route_table_id = azurerm_route_table.rt.id
66+
default_outbound_access_enabled = false
6167
}
6268

6369
subnet {
@@ -66,6 +72,7 @@ resource "azurerm_virtual_network" "core" {
6672
private_endpoint_network_policies = "Disabled"
6773
security_group = azurerm_network_security_group.default_rules.id
6874
route_table_id = azurerm_route_table.rt.id
75+
default_outbound_access_enabled = false
6976

7077
delegation {
7178
name = "delegation"
@@ -84,7 +91,7 @@ resource "azurerm_virtual_network" "core" {
8491
address_prefixes = [local.airlock_notifications_subnet_address_prefix]
8592
private_endpoint_network_policies = "Disabled"
8693
security_group = azurerm_network_security_group.default_rules.id
87-
94+
default_outbound_access_enabled = false
8895
delegation {
8996
name = "delegation"
9097

@@ -102,6 +109,7 @@ resource "azurerm_virtual_network" "core" {
102109
private_endpoint_network_policies = "Disabled"
103110
security_group = azurerm_network_security_group.default_rules.id
104111
route_table_id = azurerm_route_table.rt.id
112+
default_outbound_access_enabled = false
105113
}
106114

107115
subnet {
@@ -110,13 +118,15 @@ resource "azurerm_virtual_network" "core" {
110118
private_endpoint_network_policies = "Disabled"
111119
security_group = azurerm_network_security_group.default_rules.id
112120
route_table_id = azurerm_route_table.rt.id
121+
default_outbound_access_enabled = false
113122

114123
service_endpoints = ["Microsoft.ServiceBus"]
115124
}
116125

117126
subnet {
118-
name = "AzureFirewallManagementSubnet"
119-
address_prefixes = [local.firewall_management_subnet_address_prefix]
127+
name = "AzureFirewallManagementSubnet"
128+
address_prefixes = [local.firewall_management_subnet_address_prefix]
129+
default_outbound_access_enabled = false
120130
}
121131
}
122132

core/version.txt

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
__version__ = "0.16.15"
1+
__version__ = "0.16.16"

templates/shared_services/databricks-auth/terraform/network.tf

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -9,10 +9,11 @@ resource "azurerm_virtual_network" "ws" {
99
}
1010

1111
resource "azurerm_subnet" "host" {
12-
name = local.host_subnet_name
13-
resource_group_name = local.resource_group_name
14-
virtual_network_name = azurerm_virtual_network.ws.name
15-
address_prefixes = [local.host_subnet_address_space]
12+
name = local.host_subnet_name
13+
resource_group_name = local.resource_group_name
14+
virtual_network_name = azurerm_virtual_network.ws.name
15+
address_prefixes = [local.host_subnet_address_space]
16+
default_outbound_access_enabled = false
1617

1718
delegation {
1819
name = "db-host-vnet-integration"
@@ -29,10 +30,11 @@ resource "azurerm_subnet" "host" {
2930
}
3031

3132
resource "azurerm_subnet" "container" {
32-
name = local.container_subnet_name
33-
resource_group_name = local.resource_group_name
34-
virtual_network_name = azurerm_virtual_network.ws.name
35-
address_prefixes = [local.container_subnet_address_space]
33+
name = local.container_subnet_name
34+
resource_group_name = local.resource_group_name
35+
virtual_network_name = azurerm_virtual_network.ws.name
36+
address_prefixes = [local.container_subnet_address_space]
37+
default_outbound_access_enabled = false
3638

3739
delegation {
3840
name = "db-container-vnet-integration"

templates/workspace_services/azureml/porter.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
schemaVersion: 1.0.0
33
name: tre-service-azureml
4-
version: 1.1.3
4+
version: 1.1.4
55
description: "An Azure TRE service for Azure Machine Learning"
66
registry: azuretre
77
dockerfile: Dockerfile.tmpl

templates/workspace_services/azureml/terraform/network.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -61,10 +61,11 @@ resource "azapi_resource" "aml_service_endpoint_policy" {
6161
}
6262

6363
resource "azurerm_subnet" "aml" {
64-
name = "AMLSubnet${local.short_service_id}"
65-
virtual_network_name = data.azurerm_virtual_network.ws.name
66-
resource_group_name = data.azurerm_virtual_network.ws.resource_group_name
67-
address_prefixes = [var.address_space]
64+
name = "AMLSubnet${local.short_service_id}"
65+
virtual_network_name = data.azurerm_virtual_network.ws.name
66+
resource_group_name = data.azurerm_virtual_network.ws.resource_group_name
67+
address_prefixes = [var.address_space]
68+
default_outbound_access_enabled = false
6869

6970
# need to be disabled for AML private compute
7071
private_endpoint_network_policies = "Disabled"

templates/workspace_services/databricks/porter.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
schemaVersion: 1.0.0
33
name: tre-service-databricks
4-
version: 1.0.15
4+
version: 1.0.16
55
description: "An Azure TRE service for Azure Databricks."
66
registry: azuretre
77
dockerfile: Dockerfile.tmpl

templates/workspace_services/databricks/terraform/network.tf

Lines changed: 10 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -88,10 +88,11 @@ resource "azurerm_network_security_group" "nsg" {
8888
}
8989

9090
resource "azurerm_subnet" "host" {
91-
name = local.host_subnet_name
92-
resource_group_name = data.azurerm_resource_group.ws.name
93-
virtual_network_name = data.azurerm_virtual_network.ws.name
94-
address_prefixes = [local.host_subnet_address_space]
91+
name = local.host_subnet_name
92+
resource_group_name = data.azurerm_resource_group.ws.name
93+
virtual_network_name = data.azurerm_virtual_network.ws.name
94+
address_prefixes = [local.host_subnet_address_space]
95+
default_outbound_access_enabled = false
9596

9697
delegation {
9798
name = "db-host-vnet-integration"
@@ -108,10 +109,11 @@ resource "azurerm_subnet" "host" {
108109
}
109110

110111
resource "azurerm_subnet" "container" {
111-
name = local.container_subnet_name
112-
resource_group_name = data.azurerm_resource_group.ws.name
113-
virtual_network_name = data.azurerm_virtual_network.ws.name
114-
address_prefixes = [local.container_subnet_address_space]
112+
name = local.container_subnet_name
113+
resource_group_name = data.azurerm_resource_group.ws.name
114+
virtual_network_name = data.azurerm_virtual_network.ws.name
115+
address_prefixes = [local.container_subnet_address_space]
116+
default_outbound_access_enabled = false
115117

116118
delegation {
117119
name = "db-container-vnet-integration"

templates/workspace_services/ohdsi/porter.yaml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1,7 +1,7 @@
11
---
22
schemaVersion: 1.0.0
33
name: tre-workspace-service-ohdsi
4-
version: 0.3.6
4+
version: 0.3.7
55
description: "An OHDSI workspace service"
66
registry: azuretre
77
dockerfile: Dockerfile.tmpl

templates/workspace_services/ohdsi/terraform/atlas_database.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -100,10 +100,11 @@ resource "azurerm_network_security_group" "postgres" {
100100
}
101101

102102
resource "azurerm_subnet" "postgres" {
103-
name = "PostgreSQLSubnet${local.short_service_id}"
104-
virtual_network_name = data.azurerm_virtual_network.ws.name
105-
resource_group_name = data.azurerm_resource_group.ws.name
106-
address_prefixes = [var.address_space]
103+
name = "PostgreSQLSubnet${local.short_service_id}"
104+
virtual_network_name = data.azurerm_virtual_network.ws.name
105+
resource_group_name = data.azurerm_resource_group.ws.name
106+
address_prefixes = [var.address_space]
107+
default_outbound_access_enabled = false
107108

108109
delegation {
109110
name = "psql-delegation"

0 commit comments

Comments
 (0)