You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
it would be great if one could use azurerm_kubernetes_cluster resources as a source to provide login information for the kubernetes provider. Then something like this would be possible:
As a workaround, I am exerimenting with a null_resource using a local_exec provisionar that calls az aks get-credentials. However, this seems not to be reliable.
The text was updated successfully, but these errors were encountered:
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues.
If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks!
ghost
locked and limited conversation to collaborators
Mar 31, 2020
Sign up for freeto subscribe to this conversation on GitHub.
Already have an account?
Sign in.
Hi,
it would be great if one could use azurerm_kubernetes_cluster resources as a source to provide login information for the kubernetes provider. Then something like this would be possible:
Terraform Configuration Files
Note that I made up the
login
field.As a workaround, I am exerimenting with a
null_resource
using alocal_exec
provisionar that callsaz aks get-credentials
. However, this seems not to be reliable.The text was updated successfully, but these errors were encountered: