Skip to content

Commit f6b7573

Browse files
github-actions[bot]lonegunmanb
authored andcommitted
fix issues
1 parent 7f16f80 commit f6b7573

File tree

8 files changed

+7
-16
lines changed

8 files changed

+7
-16
lines changed

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -386,7 +386,6 @@ No modules.
386386
| <a name="input_net_profile_pod_cidr"></a> [net\_profile\_pod\_cidr](#input\_net\_profile\_pod\_cidr) | (Optional) The CIDR to use for pod IP addresses. This field can only be set when network\_plugin is set to kubenet or network\_plugin is set to azure and network\_plugin\_mode is set to overlay. Changing this forces a new resource to be created. | `string` | `null` | no |
387387
| <a name="input_net_profile_service_cidr"></a> [net\_profile\_service\_cidr](#input\_net\_profile\_service\_cidr) | (Optional) The Network Range used by the Kubernetes service. Changing this forces a new resource to be created. | `string` | `null` | no |
388388
| <a name="input_network_contributor_role_assigned_subnet_ids"></a> [network\_contributor\_role\_assigned\_subnet\_ids](#input\_network\_contributor\_role\_assigned\_subnet\_ids) | Create role assignments for the AKS Service Principal to be a Network Contributor on the subnets used for the AKS Cluster, key should be static string, value should be subnet's id | `map(string)` | `{}` | no |
389-
| <a name="input_network_data_plane"></a> [network\_data\_plane](#input\_network\_data\_plane) | (Optional) Specifies the data plane used for building the Kubernetes network. Possible values are `azure` and `cilium`. Defaults to `azure`. Disabling this forces a new resource to be created. | `string` | `null` | no |
390389
| <a name="input_network_plugin"></a> [network\_plugin](#input\_network\_plugin) | Network plugin to use for networking. | `string` | `"kubenet"` | no |
391390
| <a name="input_network_plugin_mode"></a> [network\_plugin\_mode](#input\_network\_plugin\_mode) | (Optional) Specifies the network plugin mode used for building the Kubernetes network. Possible value is `overlay`. Changing this forces a new resource to be created. | `string` | `null` | no |
392391
| <a name="input_network_policy"></a> [network\_policy](#input\_network\_policy) | (Optional) Sets up network policy to be used with Azure CNI. Network policy allows us to control the traffic flow between pods. Currently supported values are calico and azure. Changing this forces a new resource to be created. | `string` | `null` | no |

examples/application_gateway_ingress/main.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -184,7 +184,7 @@ module "aks" {
184184
os_disk_size_gb = 60
185185
private_cluster_enabled = false
186186
role_based_access_control_enabled = true
187-
rbac_aad = true
187+
rbac_aad_tenant_id = data.azurerm_client_config.this.tenant_id
188188
sku_tier = "Standard"
189189
vnet_subnet = var.bring_your_own_vnet ? {
190190
id = azurerm_subnet.test[0].id

examples/multiple_node_pools/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -66,7 +66,6 @@ module "aks" {
6666
resource_group_name = local.resource_group.name
6767
location = local.resource_group.location
6868
os_disk_size_gb = 60
69-
rbac_aad = true
7069
sku_tier = "Standard"
7170
private_cluster_enabled = false
7271
vnet_subnet = {

examples/named_cluster/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -90,7 +90,6 @@ module "aks_cluster_name" {
9090
}
9191
net_profile_pod_cidr = "10.1.0.0/16"
9292
private_cluster_enabled = true
93-
rbac_aad = true
9493
role_based_access_control_enabled = true
9594
rbac_aad_tenant_id = data.azurerm_client_config.current.tenant_id
9695

examples/startup/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -106,7 +106,6 @@ module "aks" {
106106
node_os_channel_upgrade = "NodeImage"
107107
os_disk_size_gb = 60
108108
private_cluster_enabled = true
109-
rbac_aad = true
110109
role_based_access_control_enabled = true
111110
sku_tier = "Standard"
112111
vnet_subnet = {

examples/uai_and_assign_role_on_subnet/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -34,6 +34,7 @@ module "aks" {
3434
resource_group_name = azurerm_resource_group.rg.name
3535
identity_ids = [azurerm_user_assigned_identity.main.id]
3636
identity_type = "UserAssigned"
37+
rbac_aad_tenant_id = data.azurerm_client_config.this.tenant_id
3738
vnet_subnet = {
3839
id = azurerm_subnet.subnet.id
3940
}

examples/with_acr/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -55,11 +55,11 @@ module "aks" {
5555
attached_acr_id_map = {
5656
example = azurerm_container_registry.example.id
5757
}
58-
network_plugin = "azure"
59-
network_policy = "azure"
60-
os_disk_size_gb = 60
61-
rbac_aad = false
62-
sku_tier = "Standard"
58+
network_plugin = "azure"
59+
network_policy = "azure"
60+
os_disk_size_gb = 60
61+
rbac_aad_tenant_id = data.azurerm_client_config.this.tenant_id
62+
sku_tier = "Standard"
6363
vnet_subnet = {
6464
id = azurerm_subnet.test.id
6565
}

variables.tf

Lines changed: 0 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -1002,12 +1002,6 @@ variable "network_contributor_role_assigned_subnet_ids" {
10021002
nullable = false
10031003
}
10041004

1005-
variable "network_data_plane" {
1006-
type = string
1007-
default = null
1008-
description = "(Optional) Specifies the data plane used for building the Kubernetes network. Possible values are `azure` and `cilium`. Defaults to `azure`. Disabling this forces a new resource to be created."
1009-
}
1010-
10111005
variable "network_plugin" {
10121006
type = string
10131007
default = "kubenet"

0 commit comments

Comments
 (0)