I am creating a terraform infrastructure with a linux service app in dotnet an azure sql server databaseI want to use user assigned identity to access my database from my api.For this I try to add rights to my user but I take a timeout. I launch terraform from azure devops.
I would be in a private area so no direct access to the BDD
resource "azurerm_user_assigned_identity" "sql_server_managed_identity" { name = "sql-server-${local.domain}-managed-identity" location = azurerm_resource_group.app_resource_group.location resource_group_name = azurerm_resource_group.app_resource_group.name}resource "azurerm_mssql_server" "sql_server" { name = "sql-${local.domain}-business" resource_group_name = azurerm_resource_group.app_resource_group.name location = azurerm_resource_group.app_resource_group.location version = "12.0" minimum_tls_version = "1.2" azuread_administrator { azuread_authentication_only = false login_username = azurerm_user_assigned_identity.sql_server_managed_identity.name object_id = azurerm_user_assigned_identity.sql_server_managed_identity.principal_id }}resource "azurerm_mssql_database" "sql_database_test" { depends_on = [azurerm_mssql_server.sql_server] name = "sqldb-${local.domain}-test" server_id = azurerm_mssql_server.sql_server.id collation = "SQL_Latin1_General_CP1_CI_AI" read_scale = false ledger_enabled = false sku_name = "S3" zone_redundant = false tags = local.app_tags}resource "mssql_user" "web" { server { host = azurerm_mssql_server.sql_server.fully_qualified_domain_name azuread_managed_identity_auth { user_id = azurerm_user_assigned_identity.sql_server_managed_identity.id } } database = azurerm_mssql_database.sql_database_test.name username = azurerm_user_assigned_identity.sql_server_managed_identity.name object_id = azurerm_user_assigned_identity.sql_server_managed_identity.client_id roles = ["db_datareader", "db_datawriter"] timeouts { default = "2m" }}