-
Notifications
You must be signed in to change notification settings - Fork 4.6k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature Request: Deployment Credentials for AKS #934
Comments
Here is an example workaround for ACS in the TF guides repo: https://github.com/hashicorp/terraform-guides/blob/master/infrastructure-as-code/k8s-cluster-acs/main.tf#L74 |
I think the other issue with this is the resource currently only gets the public SSH key data, not the private key, so we'd have to add that in order to connect to the machine I think? Perhaps this should just be like a separate data source to pull these credentials? |
I would love it if the new azurerm_kubernetes_cluster did return the credentials (3 keys/certs) the way the GKE equivalent does. The code you referred to to work around is by me. :) |
Support for this shipped in v1.5.0 and can be found in the |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Chatting internally about using the
azurerm_kubernetes_cluster
resource - we should look into returning the Kubernetes credentials, which are needed to connect to the cluster and could be used in other resources/provisioners.We return this information in the equivalent resource in Google Cloud - and it appears to be available in the Azure CLI too although it is via connecting to the box and using secure copy.
The text was updated successfully, but these errors were encountered: