3
3
4
4
# Reference: https://registry.terraform.io/providers/hashicorp/azurerm/latest/docs/resources/kubernetes_cluster
5
5
resource "azurerm_kubernetes_cluster" "aks" {
6
- name = var. aks_cluster_name
7
- location = var. aks_cluster_location
8
- resource_group_name = var. aks_cluster_rg
9
- dns_prefix = var. aks_private_cluster == false || var. aks_cluster_private_dns_zone_id == " " ? var. aks_cluster_dns_prefix : null
10
- dns_prefix_private_cluster = var. aks_private_cluster && var. aks_cluster_private_dns_zone_id != " " ? var. aks_cluster_dns_prefix : null
11
-
12
- sku_tier = var. aks_cluster_sku_tier
13
- role_based_access_control_enabled = true
14
- http_application_routing_enabled = false
15
-
6
+ name = var. aks_cluster_name
7
+ location = var. aks_cluster_location
8
+ resource_group_name = var. aks_cluster_rg
9
+ dns_prefix = var. aks_private_cluster == false || var. aks_cluster_private_dns_zone_id == " " ? var. aks_cluster_dns_prefix : null
10
+ dns_prefix_private_cluster = var. aks_private_cluster && var. aks_cluster_private_dns_zone_id != " " ? var. aks_cluster_dns_prefix : null
11
+
12
+ sku_tier = var. aks_cluster_sku_tier
13
+ role_based_access_control_enabled = true
14
+ http_application_routing_enabled = false
15
+
16
16
# https://docs.microsoft.com/en-us/azure/aks/supported-kubernetes-versions
17
17
# az aks get-versions --location eastus -o table
18
- kubernetes_version = var. kubernetes_version
19
- api_server_authorized_ip_ranges = var. aks_cluster_endpoint_public_access_cidrs
20
- private_cluster_enabled = var. aks_private_cluster
21
- private_dns_zone_id = var. aks_private_cluster && var. aks_cluster_private_dns_zone_id != " " ? var. aks_cluster_private_dns_zone_id : (var. aks_private_cluster ? " System" : null )
18
+ kubernetes_version = var. kubernetes_version
19
+ api_server_authorized_ip_ranges = var. aks_cluster_endpoint_public_access_cidrs
20
+ private_cluster_enabled = var. aks_private_cluster
21
+ private_dns_zone_id = var. aks_private_cluster && var. aks_cluster_private_dns_zone_id != " " ? var. aks_cluster_private_dns_zone_id : (var. aks_private_cluster ? " System" : null )
22
22
23
23
network_profile {
24
24
network_plugin = var. aks_network_plugin
@@ -45,7 +45,7 @@ resource "azurerm_kubernetes_cluster" "aks" {
45
45
content {
46
46
admin_username = var. aks_cluster_node_admin
47
47
ssh_key {
48
- key_data = var. aks_cluster_ssh_public_key
48
+ key_data = var. aks_cluster_ssh_public_key
49
49
}
50
50
}
51
51
}
@@ -80,7 +80,7 @@ resource "azurerm_kubernetes_cluster" "aks" {
80
80
dynamic "identity" {
81
81
for_each = var. aks_uai_id == null ? [] : [1 ]
82
82
content {
83
- type = " UserAssigned"
83
+ type = " UserAssigned"
84
84
identity_ids = [var . aks_uai_id ]
85
85
}
86
86
}
@@ -108,8 +108,8 @@ resource "azurerm_kubernetes_cluster" "aks" {
108
108
109
109
}
110
110
111
- data "azurerm_public_ip" "cluster_public_ip" {
112
- count = var. cluster_egress_type == " loadBalancer" ? 1 : 0
111
+ data "azurerm_public_ip" "cluster_public_ip" {
112
+ count = var. cluster_egress_type == " loadBalancer" ? 1 : 0
113
113
114
114
# effective_outbound_ips is a set of strings, that needs to be converted to a list type
115
115
name = split (" /" , tolist (azurerm_kubernetes_cluster. aks . network_profile [0 ]. load_balancer_profile [0 ]. effective_outbound_ips )[0 ])[8 ]
0 commit comments