Some Microsoft services that interact with storage accounts operate from networks that can’t be granted access through network rules. To help this type of service work as intended, allow the set of trusted Microsoft services to bypass the network rules, and those services use strong authentication to access the storage account. Turning on firewall rules for storage accounts blocks access to incoming requests for data, including from other Azure services that include using the portal, writing logs, etc. One can re-enable access to services like Monitor, Networking, Hubs, and Event Grid by enabling Trusted Microsoft Services through exceptions.
resource "azurerm_storage_account" "recommended" {
...
bypass = ["AzureServices"]
}
}