Releases: Azure/terraform-azurerm-aks
Add variable `identity_type` and `user_assigned_identity_id`
Add variable identity_type and user_assigned_identity_id
Add variable `cluster_name` and `cluster_log_analytics_workspace_name`
Add variable cluster_name to enable customization of cluster name and cluster_log_analytics_workspace_name to customize log analytics workspace name
Fix `nonsensitive(azurerm_kubernetes_cluster.main.kube_config_raw)` breaks the 0.14 users
Fix nonsensitive(azurerm_kubernetes_cluster.main.kube_config_raw) breaks the 0.14 users
Fix to mark kube_config_raw output as non-sensitive
Fix to mark kube_config_raw output as non-sensitive in terraform 0.15 to avoid error message in output
Fix disabling `enable_log_analytics_workspace` returns error
Fix the problem when we try to disable enable_log_analytics_workspace, it returns error Error: waiting for update of Managed Kubernetes Cluster "<cluster_name>" (Resource Group "<rg_name>"): Code="GetLogAnalyticsWorkspaceError" Message="Unable to get log analytics workspace info. Resource ID: /subscriptions/<subscription_id>/resourcegroups/<rg_name>/providers/microsoft.operationalinsights/workspaces/<log_analytics_workspace_id>. Details: autorest/azure: Service returned an error. Status=404 Code=\"ResourceNotFound\" Message=\"The Resource 'Microsoft.OperationalInsights/workspaces/<log_analytics_workspace_id>' under resource group '<rg_name>' was not found. For more details please go to https://aka.ms/ARMResourceNotFoundFix\". For more details about how to create and use log analytics workspace, please refer to: https://aka.ms/new-log-analytics". Because removing block oms_agent will not disable the enable_log_analytics_workspace.
Support for output for `kube_admin_config`
Support for output for kube_admin_config:
admin_client_key,
admin_client_certificate,
admin_cluster_ca_certificate,
admin_host,
admin_username,
admin_password
Version Constraint Fix
Change Version Constraint to allow for minor Azurerm Provider releases
New Enhancement
Support for new variables network_policy,net_profile_dns_service_ip, net_profile_docker_bridge_cidr, net_profile_outbound_type (defaults to loadBalancer), net_profile_pod_cidr, net_profile_service_cidr, agents_pool_name (defaults to nodepool), enable_node_public_ip (defaults to false), agents_availability_zones, agents_labels , agents_type (defaults to VirtualMachineScaleSets), agents_tags , agents_max_pods.
New Enhancement
- Added
tagstoazurerm_log_analytics_solution, which requests the minimal Azurerm Versionv2.34.0 - Supports for new variable
sku_tier, defaults toFree - Expose a new variable
kubelet_identityforazurerm_kubernetes_cluster.main.kubelet_identity - Supports for new variable
enable_kube_dashboard, defaults tonull - Supports for new variable
network_plugin, defaults tokubenet
Support for RBAC
New variables enable_role_based_access_control (bool), rbac_aad_managed (bool), rbac_aad_admin_group_object_ids (list of string), rbac_aad_client_app_id (string), rbac_aad_server_app_id (string) and rbac_aad_server_app_secret (string) are supported for role based access control by AAD group or AAD server and client application.
The usage example can be found in README.