1. Packages
  2. Azure Classic
  3. API Docs
  4. compute
  5. DiskEncryptionSet

We recommend using Azure Native.

Viewing docs for Azure v4.42.0 (Older version)
published on Monday, Mar 9, 2026 by Pulumi
azure logo

We recommend using Azure Native.

Viewing docs for Azure v4.42.0 (Older version)
published on Monday, Mar 9, 2026 by Pulumi

    Manages a Disk Encryption Set.

    NOTE: At this time the Key Vault used to store the Active Key for this Disk Encryption Set must have both Soft Delete & Purge Protection enabled - which are not yet supported by this provider.

    Example Usage

    using Pulumi;
    using Azure = Pulumi.Azure;
    
    class MyStack : Stack
    {
        public MyStack()
        {
            var current = Output.Create(Azure.Core.GetClientConfig.InvokeAsync());
            var exampleResourceGroup = new Azure.Core.ResourceGroup("exampleResourceGroup", new Azure.Core.ResourceGroupArgs
            {
                Location = "West Europe",
            });
            var exampleKeyVault = new Azure.KeyVault.KeyVault("exampleKeyVault", new Azure.KeyVault.KeyVaultArgs
            {
                Location = exampleResourceGroup.Location,
                ResourceGroupName = exampleResourceGroup.Name,
                TenantId = current.Apply(current => current.TenantId),
                SkuName = "premium",
                EnabledForDiskEncryption = true,
                SoftDeleteEnabled = true,
                PurgeProtectionEnabled = true,
            });
            var example_user = new Azure.KeyVault.AccessPolicy("example-user", new Azure.KeyVault.AccessPolicyArgs
            {
                KeyVaultId = exampleKeyVault.Id,
                TenantId = current.Apply(current => current.TenantId),
                ObjectId = current.Apply(current => current.ObjectId),
                KeyPermissions = 
                {
                    "get",
                    "create",
                    "delete",
                },
            });
            var exampleKey = new Azure.KeyVault.Key("exampleKey", new Azure.KeyVault.KeyArgs
            {
                KeyVaultId = exampleKeyVault.Id,
                KeyType = "RSA",
                KeySize = 2048,
                KeyOpts = 
                {
                    "decrypt",
                    "encrypt",
                    "sign",
                    "unwrapKey",
                    "verify",
                    "wrapKey",
                },
            }, new CustomResourceOptions
            {
                DependsOn = 
                {
                    example_user,
                },
            });
            var exampleDiskEncryptionSet = new Azure.Compute.DiskEncryptionSet("exampleDiskEncryptionSet", new Azure.Compute.DiskEncryptionSetArgs
            {
                ResourceGroupName = exampleResourceGroup.Name,
                Location = exampleResourceGroup.Location,
                KeyVaultKeyId = exampleKey.Id,
                Identity = new Azure.Compute.Inputs.DiskEncryptionSetIdentityArgs
                {
                    Type = "SystemAssigned",
                },
            });
            var example_disk = new Azure.KeyVault.AccessPolicy("example-disk", new Azure.KeyVault.AccessPolicyArgs
            {
                KeyVaultId = exampleKeyVault.Id,
                TenantId = exampleDiskEncryptionSet.Identity.Apply(identity => identity.TenantId),
                ObjectId = exampleDiskEncryptionSet.Identity.Apply(identity => identity.PrincipalId),
                KeyPermissions = 
                {
                    "Get",
                    "WrapKey",
                    "UnwrapKey",
                },
            });
        }
    
    }
    
    package main
    
    import (
    	"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/compute"
    	"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/core"
    	"github.com/pulumi/pulumi-azure/sdk/v4/go/azure/keyvault"
    	"github.com/pulumi/pulumi/sdk/v3/go/pulumi"
    )
    
    func main() {
    	pulumi.Run(func(ctx *pulumi.Context) error {
    		current, err := core.GetClientConfig(ctx, nil, nil)
    		if err != nil {
    			return err
    		}
    		exampleResourceGroup, err := core.NewResourceGroup(ctx, "exampleResourceGroup", &core.ResourceGroupArgs{
    			Location: pulumi.String("West Europe"),
    		})
    		if err != nil {
    			return err
    		}
    		exampleKeyVault, err := keyvault.NewKeyVault(ctx, "exampleKeyVault", &keyvault.KeyVaultArgs{
    			Location:                 exampleResourceGroup.Location,
    			ResourceGroupName:        exampleResourceGroup.Name,
    			TenantId:                 pulumi.String(current.TenantId),
    			SkuName:                  pulumi.String("premium"),
    			EnabledForDiskEncryption: pulumi.Bool(true),
    			SoftDeleteEnabled:        pulumi.Bool(true),
    			PurgeProtectionEnabled:   pulumi.Bool(true),
    		})
    		if err != nil {
    			return err
    		}
    		_, err = keyvault.NewAccessPolicy(ctx, "example-user", &keyvault.AccessPolicyArgs{
    			KeyVaultId: exampleKeyVault.ID(),
    			TenantId:   pulumi.String(current.TenantId),
    			ObjectId:   pulumi.String(current.ObjectId),
    			KeyPermissions: pulumi.StringArray{
    				pulumi.String("get"),
    				pulumi.String("create"),
    				pulumi.String("delete"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		exampleKey, err := keyvault.NewKey(ctx, "exampleKey", &keyvault.KeyArgs{
    			KeyVaultId: exampleKeyVault.ID(),
    			KeyType:    pulumi.String("RSA"),
    			KeySize:    pulumi.Int(2048),
    			KeyOpts: pulumi.StringArray{
    				pulumi.String("decrypt"),
    				pulumi.String("encrypt"),
    				pulumi.String("sign"),
    				pulumi.String("unwrapKey"),
    				pulumi.String("verify"),
    				pulumi.String("wrapKey"),
    			},
    		}, pulumi.DependsOn([]pulumi.Resource{
    			example_user,
    		}))
    		if err != nil {
    			return err
    		}
    		exampleDiskEncryptionSet, err := compute.NewDiskEncryptionSet(ctx, "exampleDiskEncryptionSet", &compute.DiskEncryptionSetArgs{
    			ResourceGroupName: exampleResourceGroup.Name,
    			Location:          exampleResourceGroup.Location,
    			KeyVaultKeyId:     exampleKey.ID(),
    			Identity: &compute.DiskEncryptionSetIdentityArgs{
    				Type: pulumi.String("SystemAssigned"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		_, err = keyvault.NewAccessPolicy(ctx, "example-disk", &keyvault.AccessPolicyArgs{
    			KeyVaultId: exampleKeyVault.ID(),
    			TenantId: exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (string, error) {
    				return identity.TenantId, nil
    			}).(pulumi.StringOutput),
    			ObjectId: exampleDiskEncryptionSet.Identity.ApplyT(func(identity compute.DiskEncryptionSetIdentity) (string, error) {
    				return identity.PrincipalId, nil
    			}).(pulumi.StringOutput),
    			KeyPermissions: pulumi.StringArray{
    				pulumi.String("Get"),
    				pulumi.String("WrapKey"),
    				pulumi.String("UnwrapKey"),
    			},
    		})
    		if err != nil {
    			return err
    		}
    		return nil
    	})
    }
    

    Example coming soon!

    import * as pulumi from "@pulumi/pulumi";
    import * as azure from "@pulumi/azure";
    
    const current = azure.core.getClientConfig({});
    const exampleResourceGroup = new azure.core.ResourceGroup("exampleResourceGroup", {location: "West Europe"});
    const exampleKeyVault = new azure.keyvault.KeyVault("exampleKeyVault", {
        location: exampleResourceGroup.location,
        resourceGroupName: exampleResourceGroup.name,
        tenantId: current.then(current => current.tenantId),
        skuName: "premium",
        enabledForDiskEncryption: true,
        softDeleteEnabled: true,
        purgeProtectionEnabled: true,
    });
    const example_user = new azure.keyvault.AccessPolicy("example-user", {
        keyVaultId: exampleKeyVault.id,
        tenantId: current.then(current => current.tenantId),
        objectId: current.then(current => current.objectId),
        keyPermissions: [
            "get",
            "create",
            "delete",
        ],
    });
    const exampleKey = new azure.keyvault.Key("exampleKey", {
        keyVaultId: exampleKeyVault.id,
        keyType: "RSA",
        keySize: 2048,
        keyOpts: [
            "decrypt",
            "encrypt",
            "sign",
            "unwrapKey",
            "verify",
            "wrapKey",
        ],
    }, {
        dependsOn: [example_user],
    });
    const exampleDiskEncryptionSet = new azure.compute.DiskEncryptionSet("exampleDiskEncryptionSet", {
        resourceGroupName: exampleResourceGroup.name,
        location: exampleResourceGroup.location,
        keyVaultKeyId: exampleKey.id,
        identity: {
            type: "SystemAssigned",
        },
    });
    const example_disk = new azure.keyvault.AccessPolicy("example-disk", {
        keyVaultId: exampleKeyVault.id,
        tenantId: exampleDiskEncryptionSet.identity.apply(identity => identity.tenantId),
        objectId: exampleDiskEncryptionSet.identity.apply(identity => identity.principalId),
        keyPermissions: [
            "Get",
            "WrapKey",
            "UnwrapKey",
        ],
    });
    
    import pulumi
    import pulumi_azure as azure
    
    current = azure.core.get_client_config()
    example_resource_group = azure.core.ResourceGroup("exampleResourceGroup", location="West Europe")
    example_key_vault = azure.keyvault.KeyVault("exampleKeyVault",
        location=example_resource_group.location,
        resource_group_name=example_resource_group.name,
        tenant_id=current.tenant_id,
        sku_name="premium",
        enabled_for_disk_encryption=True,
        soft_delete_enabled=True,
        purge_protection_enabled=True)
    example_user = azure.keyvault.AccessPolicy("example-user",
        key_vault_id=example_key_vault.id,
        tenant_id=current.tenant_id,
        object_id=current.object_id,
        key_permissions=[
            "get",
            "create",
            "delete",
        ])
    example_key = azure.keyvault.Key("exampleKey",
        key_vault_id=example_key_vault.id,
        key_type="RSA",
        key_size=2048,
        key_opts=[
            "decrypt",
            "encrypt",
            "sign",
            "unwrapKey",
            "verify",
            "wrapKey",
        ],
        opts=pulumi.ResourceOptions(depends_on=[example_user]))
    example_disk_encryption_set = azure.compute.DiskEncryptionSet("exampleDiskEncryptionSet",
        resource_group_name=example_resource_group.name,
        location=example_resource_group.location,
        key_vault_key_id=example_key.id,
        identity=azure.compute.DiskEncryptionSetIdentityArgs(
            type="SystemAssigned",
        ))
    example_disk = azure.keyvault.AccessPolicy("example-disk",
        key_vault_id=example_key_vault.id,
        tenant_id=example_disk_encryption_set.identity.tenant_id,
        object_id=example_disk_encryption_set.identity.principal_id,
        key_permissions=[
            "Get",
            "WrapKey",
            "UnwrapKey",
        ])
    

    Example coming soon!

    Create DiskEncryptionSet Resource

    Resources are created with functions called constructors. To learn more about declaring and configuring resources, see Resources.

    Constructor syntax

    new DiskEncryptionSet(name: string, args: DiskEncryptionSetArgs, opts?: CustomResourceOptions);
    @overload
    def DiskEncryptionSet(resource_name: str,
                          args: DiskEncryptionSetArgs,
                          opts: Optional[ResourceOptions] = None)
    
    @overload
    def DiskEncryptionSet(resource_name: str,
                          opts: Optional[ResourceOptions] = None,
                          identity: Optional[DiskEncryptionSetIdentityArgs] = None,
                          key_vault_key_id: Optional[str] = None,
                          resource_group_name: Optional[str] = None,
                          auto_key_rotation_enabled: Optional[bool] = None,
                          encryption_type: Optional[str] = None,
                          location: Optional[str] = None,
                          name: Optional[str] = None,
                          tags: Optional[Mapping[str, str]] = None)
    func NewDiskEncryptionSet(ctx *Context, name string, args DiskEncryptionSetArgs, opts ...ResourceOption) (*DiskEncryptionSet, error)
    public DiskEncryptionSet(string name, DiskEncryptionSetArgs args, CustomResourceOptions? opts = null)
    public DiskEncryptionSet(String name, DiskEncryptionSetArgs args)
    public DiskEncryptionSet(String name, DiskEncryptionSetArgs args, CustomResourceOptions options)
    
    type: azure:compute:DiskEncryptionSet
    properties: # The arguments to resource properties.
    options: # Bag of options to control resource's behavior.
    
    

    Parameters

    name string
    The unique name of the resource.
    args DiskEncryptionSetArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    resource_name str
    The unique name of the resource.
    args DiskEncryptionSetArgs
    The arguments to resource properties.
    opts ResourceOptions
    Bag of options to control resource's behavior.
    ctx Context
    Context object for the current deployment.
    name string
    The unique name of the resource.
    args DiskEncryptionSetArgs
    The arguments to resource properties.
    opts ResourceOption
    Bag of options to control resource's behavior.
    name string
    The unique name of the resource.
    args DiskEncryptionSetArgs
    The arguments to resource properties.
    opts CustomResourceOptions
    Bag of options to control resource's behavior.
    name String
    The unique name of the resource.
    args DiskEncryptionSetArgs
    The arguments to resource properties.
    options CustomResourceOptions
    Bag of options to control resource's behavior.

    Constructor example

    The following reference example uses placeholder values for all input properties.

    var diskEncryptionSetResource = new Azure.Compute.DiskEncryptionSet("diskEncryptionSetResource", new()
    {
        Identity = new Azure.Compute.Inputs.DiskEncryptionSetIdentityArgs
        {
            Type = "string",
            PrincipalId = "string",
            TenantId = "string",
        },
        KeyVaultKeyId = "string",
        ResourceGroupName = "string",
        AutoKeyRotationEnabled = false,
        EncryptionType = "string",
        Location = "string",
        Name = "string",
        Tags = 
        {
            { "string", "string" },
        },
    });
    
    example, err := compute.NewDiskEncryptionSet(ctx, "diskEncryptionSetResource", &compute.DiskEncryptionSetArgs{
    	Identity: &compute.DiskEncryptionSetIdentityArgs{
    		Type:        pulumi.String("string"),
    		PrincipalId: pulumi.String("string"),
    		TenantId:    pulumi.String("string"),
    	},
    	KeyVaultKeyId:          pulumi.String("string"),
    	ResourceGroupName:      pulumi.String("string"),
    	AutoKeyRotationEnabled: pulumi.Bool(false),
    	EncryptionType:         pulumi.String("string"),
    	Location:               pulumi.String("string"),
    	Name:                   pulumi.String("string"),
    	Tags: pulumi.StringMap{
    		"string": pulumi.String("string"),
    	},
    })
    
    var diskEncryptionSetResource = new DiskEncryptionSet("diskEncryptionSetResource", DiskEncryptionSetArgs.builder()
        .identity(DiskEncryptionSetIdentityArgs.builder()
            .type("string")
            .principalId("string")
            .tenantId("string")
            .build())
        .keyVaultKeyId("string")
        .resourceGroupName("string")
        .autoKeyRotationEnabled(false)
        .encryptionType("string")
        .location("string")
        .name("string")
        .tags(Map.of("string", "string"))
        .build());
    
    disk_encryption_set_resource = azure.compute.DiskEncryptionSet("diskEncryptionSetResource",
        identity={
            "type": "string",
            "principal_id": "string",
            "tenant_id": "string",
        },
        key_vault_key_id="string",
        resource_group_name="string",
        auto_key_rotation_enabled=False,
        encryption_type="string",
        location="string",
        name="string",
        tags={
            "string": "string",
        })
    
    const diskEncryptionSetResource = new azure.compute.DiskEncryptionSet("diskEncryptionSetResource", {
        identity: {
            type: "string",
            principalId: "string",
            tenantId: "string",
        },
        keyVaultKeyId: "string",
        resourceGroupName: "string",
        autoKeyRotationEnabled: false,
        encryptionType: "string",
        location: "string",
        name: "string",
        tags: {
            string: "string",
        },
    });
    
    type: azure:compute:DiskEncryptionSet
    properties:
        autoKeyRotationEnabled: false
        encryptionType: string
        identity:
            principalId: string
            tenantId: string
            type: string
        keyVaultKeyId: string
        location: string
        name: string
        resourceGroupName: string
        tags:
            string: string
    

    DiskEncryptionSet Resource Properties

    To learn more about resource properties and how to use them, see Inputs and Outputs in the Architecture and Concepts docs.

    Inputs

    In Python, inputs that are objects can be passed either as argument classes or as dictionary literals.

    The DiskEncryptionSet resource accepts the following input properties:

    Identity DiskEncryptionSetIdentity
    An identity block as defined below.
    KeyVaultKeyId string
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    ResourceGroupName string
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    AutoKeyRotationEnabled bool
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    EncryptionType string
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    Location string
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    Name string
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    Tags Dictionary<string, string>
    A mapping of tags to assign to the Disk Encryption Set.
    Identity DiskEncryptionSetIdentityArgs
    An identity block as defined below.
    KeyVaultKeyId string
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    ResourceGroupName string
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    AutoKeyRotationEnabled bool
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    EncryptionType string
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    Location string
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    Name string
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    Tags map[string]string
    A mapping of tags to assign to the Disk Encryption Set.
    identity DiskEncryptionSetIdentity
    An identity block as defined below.
    keyVaultKeyId String
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    resourceGroupName String
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    autoKeyRotationEnabled Boolean
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryptionType String
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    location String
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name String
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    tags Map<String,String>
    A mapping of tags to assign to the Disk Encryption Set.
    identity DiskEncryptionSetIdentity
    An identity block as defined below.
    keyVaultKeyId string
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    resourceGroupName string
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    autoKeyRotationEnabled boolean
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryptionType string
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    location string
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name string
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    tags {[key: string]: string}
    A mapping of tags to assign to the Disk Encryption Set.
    identity DiskEncryptionSetIdentityArgs
    An identity block as defined below.
    key_vault_key_id str
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    resource_group_name str
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    auto_key_rotation_enabled bool
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryption_type str
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    location str
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name str
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    tags Mapping[str, str]
    A mapping of tags to assign to the Disk Encryption Set.
    identity Property Map
    An identity block as defined below.
    keyVaultKeyId String
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    resourceGroupName String
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    autoKeyRotationEnabled Boolean
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryptionType String
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    location String
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name String
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    tags Map<String>
    A mapping of tags to assign to the Disk Encryption Set.

    Outputs

    All input properties are implicitly available as output properties. Additionally, the DiskEncryptionSet resource produces the following output properties:

    Id string
    The provider-assigned unique ID for this managed resource.
    Id string
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.
    id string
    The provider-assigned unique ID for this managed resource.
    id str
    The provider-assigned unique ID for this managed resource.
    id String
    The provider-assigned unique ID for this managed resource.

    Look up Existing DiskEncryptionSet Resource

    Get an existing DiskEncryptionSet resource’s state with the given name, ID, and optional extra properties used to qualify the lookup.

    public static get(name: string, id: Input<ID>, state?: DiskEncryptionSetState, opts?: CustomResourceOptions): DiskEncryptionSet
    @staticmethod
    def get(resource_name: str,
            id: str,
            opts: Optional[ResourceOptions] = None,
            auto_key_rotation_enabled: Optional[bool] = None,
            encryption_type: Optional[str] = None,
            identity: Optional[DiskEncryptionSetIdentityArgs] = None,
            key_vault_key_id: Optional[str] = None,
            location: Optional[str] = None,
            name: Optional[str] = None,
            resource_group_name: Optional[str] = None,
            tags: Optional[Mapping[str, str]] = None) -> DiskEncryptionSet
    func GetDiskEncryptionSet(ctx *Context, name string, id IDInput, state *DiskEncryptionSetState, opts ...ResourceOption) (*DiskEncryptionSet, error)
    public static DiskEncryptionSet Get(string name, Input<string> id, DiskEncryptionSetState? state, CustomResourceOptions? opts = null)
    public static DiskEncryptionSet get(String name, Output<String> id, DiskEncryptionSetState state, CustomResourceOptions options)
    resources:  _:    type: azure:compute:DiskEncryptionSet    get:      id: ${id}
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    resource_name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    name
    The unique name of the resulting resource.
    id
    The unique provider ID of the resource to lookup.
    state
    Any extra arguments used during the lookup.
    opts
    A bag of options that control this resource's behavior.
    The following state arguments are supported:
    AutoKeyRotationEnabled bool
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    EncryptionType string
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    Identity DiskEncryptionSetIdentity
    An identity block as defined below.
    KeyVaultKeyId string
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    Location string
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    Name string
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    ResourceGroupName string
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    Tags Dictionary<string, string>
    A mapping of tags to assign to the Disk Encryption Set.
    AutoKeyRotationEnabled bool
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    EncryptionType string
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    Identity DiskEncryptionSetIdentityArgs
    An identity block as defined below.
    KeyVaultKeyId string
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    Location string
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    Name string
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    ResourceGroupName string
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    Tags map[string]string
    A mapping of tags to assign to the Disk Encryption Set.
    autoKeyRotationEnabled Boolean
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryptionType String
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    identity DiskEncryptionSetIdentity
    An identity block as defined below.
    keyVaultKeyId String
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    location String
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name String
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    resourceGroupName String
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    tags Map<String,String>
    A mapping of tags to assign to the Disk Encryption Set.
    autoKeyRotationEnabled boolean
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryptionType string
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    identity DiskEncryptionSetIdentity
    An identity block as defined below.
    keyVaultKeyId string
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    location string
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name string
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    resourceGroupName string
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    tags {[key: string]: string}
    A mapping of tags to assign to the Disk Encryption Set.
    auto_key_rotation_enabled bool
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryption_type str
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    identity DiskEncryptionSetIdentityArgs
    An identity block as defined below.
    key_vault_key_id str
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    location str
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name str
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    resource_group_name str
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    tags Mapping[str, str]
    A mapping of tags to assign to the Disk Encryption Set.
    autoKeyRotationEnabled Boolean
    Boolean flag to specify whether Azure Disk Encryption Set automatically rotates encryption Key to latest version. Defaults to false.
    encryptionType String
    The type of key used to encrypt the data of the disk. Possible values are EncryptionAtRestWithCustomerKey and EncryptionAtRestWithPlatformAndCustomerKeys. Defaults to EncryptionAtRestWithCustomerKey.
    identity Property Map
    An identity block as defined below.
    keyVaultKeyId String
    Specifies the URL to a Key Vault Key (either from a Key Vault Key, or the Key URL for the Key Vault Secret).
    location String
    Specifies the Azure Region where the Disk Encryption Set exists. Changing this forces a new resource to be created.
    name String
    The name of the Disk Encryption Set. Changing this forces a new resource to be created.
    resourceGroupName String
    Specifies the name of the Resource Group where the Disk Encryption Set should exist. Changing this forces a new resource to be created.
    tags Map<String>
    A mapping of tags to assign to the Disk Encryption Set.

    Supporting Types

    DiskEncryptionSetIdentity, DiskEncryptionSetIdentityArgs

    Type string
    The Type of Identity which should be used for this Disk Encryption Set. At this time the only possible value is SystemAssigned.
    PrincipalId string
    The (Client) ID of the Service Principal.
    TenantId string
    The ID of the Tenant the Service Principal is assigned in.
    Type string
    The Type of Identity which should be used for this Disk Encryption Set. At this time the only possible value is SystemAssigned.
    PrincipalId string
    The (Client) ID of the Service Principal.
    TenantId string
    The ID of the Tenant the Service Principal is assigned in.
    type String
    The Type of Identity which should be used for this Disk Encryption Set. At this time the only possible value is SystemAssigned.
    principalId String
    The (Client) ID of the Service Principal.
    tenantId String
    The ID of the Tenant the Service Principal is assigned in.
    type string
    The Type of Identity which should be used for this Disk Encryption Set. At this time the only possible value is SystemAssigned.
    principalId string
    The (Client) ID of the Service Principal.
    tenantId string
    The ID of the Tenant the Service Principal is assigned in.
    type str
    The Type of Identity which should be used for this Disk Encryption Set. At this time the only possible value is SystemAssigned.
    principal_id str
    The (Client) ID of the Service Principal.
    tenant_id str
    The ID of the Tenant the Service Principal is assigned in.
    type String
    The Type of Identity which should be used for this Disk Encryption Set. At this time the only possible value is SystemAssigned.
    principalId String
    The (Client) ID of the Service Principal.
    tenantId String
    The ID of the Tenant the Service Principal is assigned in.

    Import

    Disk Encryption Sets can be imported using the resource id, e.g.

     $ pulumi import azure:compute/diskEncryptionSet:DiskEncryptionSet example /subscriptions/00000000-0000-0000-0000-000000000000/resourceGroups/group1/providers/Microsoft.Compute/diskEncryptionSets/encryptionSet1
    

    To learn more about importing existing cloud resources, see Importing resources.

    Package Details

    Repository
    Azure Classic pulumi/pulumi-azure
    License
    Apache-2.0
    Notes
    This Pulumi package is based on the azurerm Terraform Provider.
    azure logo

    We recommend using Azure Native.

    Viewing docs for Azure v4.42.0 (Older version)
    published on Monday, Mar 9, 2026 by Pulumi
      Try Pulumi Cloud free. Your team will thank you.