Skip to content

Commit 57c5c41

Browse files
Merge pull request #311314 from netapp-manishc/patch-811517
Patch 811517
2 parents 097a258 + 05c0d97 commit 57c5c41

2 files changed

Lines changed: 8 additions & 4 deletions

File tree

articles/azure-netapp-files/configure-customer-managed-keys.md

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -322,7 +322,7 @@ Azure NetApp Files supports the ability to move existing volumes using platform-
322322
### Transition volumes
323323
324324
>[!NOTE]
325-
>When you transition volumes to use customer-managed keys, you must perform the transition for every virtual network where your Azure NetApp Files account has volumes.
325+
>When you transition volumes to use customer-managed keys, you must perform the transition for every virtual network where your Azure NetApp Files account has volumes. If you manage your Azure resources using Terraform, you should update all [Terraform-managed Azure resources](terraform-manage-volume.md) for all volumes that were modified out-of-band.
326326
327327
1. Ensure you [configured your Azure NetApp Files account to use customer-managed keys](#configure-a-netapp-account-to-use-customer-managed-keys).
328328
1. In the Azure portal, navigate to **Encryption**.
@@ -416,4 +416,4 @@ Making changes to the Azure Private Endpoint after creating a customer-managed k
416416
* [Azure NetApp Files API](https://github.com/Azure/azure-rest-api-specs/tree/master/specification/netapp/resource-manager/Microsoft.NetApp/stable/2019-11-01)
417417
* [Configure customer-managed keys with managed Hardware Security Module](configure-customer-managed-keys-hardware.md)
418418
* [Configure cross-tenant customer-managed keys](customer-managed-keys-cross-tenant.md)
419-
* [Understand data encryption in Azure NetApp Files](understand-data-encryption.md)
419+
* [Understand data encryption in Azure NetApp Files](understand-data-encryption.md)

articles/azure-netapp-files/terraform-manage-volume.md

Lines changed: 6 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -6,7 +6,7 @@ author: b-ahibbard
66
ms.service: azure-netapp-files
77
ms.custom: devx-track-terraform
88
ms.topic: how-to
9-
ms.date: 08/10/2025
9+
ms.date: 02/04/2026
1010
ms.author: anfdocs
1111
# Customer intent: As a cloud engineer, I want to update Terraform-managed Azure resources safely, so that I can prevent data loss while modifying essential features outside of Terraform.
1212
---
@@ -44,7 +44,11 @@ The following instructions are a high-level overview of the steps required to up
4444
1. Run `terraform plan` to confirm that no changes will be made to your volume. The CLI output should display: `No changes. Your infrastructure matches the configuration.`
4545
>[!NOTE]
4646
> The `terraform plan` command creates a plan file with the changes to the remote resource, allowing you to ensure the safety of your resource before applying any changes.
47-
1. Run `terraform apply` to apply the changes. You should see the same CLI output as in the previous step.
47+
1. Run `terraform apply` to apply the changes. You should see the same CLI output as in the previous step.
48+
49+
>[!NOTE]
50+
> To re-establish the state, you should update the Terraform module's configuration file to reflect the changes made outside of Terraform. This change should be made to all Terraform-managed ANF resource that were modified out-of-band.
51+
4852
4953
## Next steps
5054

0 commit comments

Comments
 (0)