Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow RBAC for K8s Service Accounts with out the need for AzureAD #137

Closed
manoatsas opened this issue Jan 13, 2022 · 2 comments
Closed

Allow RBAC for K8s Service Accounts with out the need for AzureAD #137

manoatsas opened this issue Jan 13, 2022 · 2 comments

Comments

@manoatsas
Copy link

Allow Kubernetes RBAC to be enabled to use Kubernetes Service Accounts with out the need for AzureAD integration per docs

However, when enable_role_based_access_control = true and with default rbac_aad_managed=false currently it fails with the error

│ Error: You must specify client_app_id and server_app_id and server_app_secret when using managed aad rbac (managed = false)
│ 
│   with module.aks.azurerm_kubernetes_cluster.main,
│   on .terraform/modules/aks/main.tf line 10, in resource "azurerm_kubernetes_cluster" "main":
│   10: resource "azurerm_kubernetes_cluster" "main" {
@zioproto
Copy link
Collaborator

The role_based_access_control block is deprecated in favour of the role_based_access_control_enabled property and the azure_active_directory_role_based_access_control block.

@manoatsas I struggle to understand the configuration you would like to see in the module.

Can you provide a working example of the resulting azurerm_kubernetes_cluster resource that would like the module to produce ?

thanks

@lonegunmanb
Copy link
Member

I'm closing this issue since no response from the user, please feel free to reopen it if you have any further question @manoatsas.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

3 participants