-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ingress_application_gateway
AKS addon should export managed identity properties
#11564
Comments
@Flektoma I'll see if I can file a PR for this, I'll keep you posted! |
I have the same problem. |
Almost there 😅 |
@aristosvo Thank you for addressing this! :) |
This has been released in version 2.59.0 of the provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. As an example: provider "azurerm" {
version = "~> 2.59.0"
}
# ... other configuration ... |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Hi all.
Recently, new version of provider has been released that finally allows to install appgw ingress controller as AKS addon via terraform. Sadly, compared to
az aks enable-addons -n AKS_NAME -g RG_NAME -a ingress-appgw --appgw-id APPGW_ID
command, it does not configure access for ingress controller addon to access appgw objects.What does it mean? When addon is installed via terraform, managed identity for ingress appgw controller is created in the same resource group where cluster exists, but no role is assigned to it. As a result, ingress controller running in the cluster is not able to configure appgw and is useless. Also, its properties are not exported to terraform code, thus I am unable to retrieve identity ID and assign role by myself in terraform.
I can see only option how to make this addon work and that is by assigning role manually.
Suggestions:
identity
properties of managed identity that was created (similar tooms_agent_identity
) so it can be reference in terraform code and assigned some roleuser_assigned_identity_id
attribute as optional foraddon_profile.ingress_application_gateway
resource so it can be provided externally (probably more work)Relevant code in
az cli
: https://github.com/Azure/azure-cli/blob/561240abe913d98d861453c29640501965614890/src/azure-cli/azure/cli/command_modules/acs/custom.py#L1737Community Note
Terraform (and AzureRM Provider) Version
terraform:
v0.14.9
azurerm provider:
v2.57.0
Affected Resource(s)
azurerm_kubernetes_cluster
Specifically its part:
Related to: #11376
The text was updated successfully, but these errors were encountered: