@@ -19,14 +19,13 @@ locals {
19
19
#
20
20
# tfsec:ignore:azure-container-logging tfsec:ignore:azure-container-limit-authorized-ips
21
21
resource "azurerm_kubernetes_cluster" "k8s" {
22
- name = local. cluster_name
23
- location = var. location
24
- resource_group_name = var. resource_group
25
- tags = var. tags
26
- dns_prefix = var. dns_prefix == " NONE" ? local. cluster_name : var. dns_prefix
27
- sku_tier = var. sku_tier
28
- kubernetes_version = var. kubernetes_version
29
- api_server_authorized_ip_ranges = var. api_server_ip_ranges
22
+ name = local. cluster_name
23
+ location = var. location
24
+ resource_group_name = var. resource_group
25
+ tags = var. tags
26
+ dns_prefix = var. dns_prefix == " NONE" ? local. cluster_name : var. dns_prefix
27
+ sku_tier = var. sku_tier
28
+ kubernetes_version = var. kubernetes_version
30
29
31
30
default_node_pool {
32
31
name = var. default_node_pool_name
@@ -40,9 +39,12 @@ resource "azurerm_kubernetes_cluster" "k8s" {
40
39
zones = var. availability_zones
41
40
}
42
41
43
- service_principal {
44
- client_id = var. client_id
45
- client_secret = var. client_secret
42
+ api_server_access_profile {
43
+ authorized_ip_ranges = var. api_server_ip_ranges
44
+ }
45
+
46
+ identity {
47
+ type = " SystemAssigned"
46
48
}
47
49
48
50
role_based_access_control_enabled = var. rbac_enabled
@@ -55,7 +57,7 @@ resource "azurerm_kubernetes_cluster" "k8s" {
55
57
network_profile {
56
58
network_plugin = " azure"
57
59
network_policy = var. network_policy
58
- load_balancer_sku = length (var. node_pools ) > 0 ? " Standard " : var. load_balancer_sku
60
+ load_balancer_sku = length (var. node_pools ) > 0 ? " standard " : var. load_balancer_sku
59
61
dynamic "load_balancer_profile" {
60
62
for_each = azurerm_public_ip. public-ip-outbound
61
63
content {
0 commit comments