-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ability to terraform Azure Active Directory Apps for AKS #2460
Comments
hi @btai24 Thanks for opening this issue :) Support for managing Azure Active Directory applications is available in Terraform using the We have plans to split the AzureAD resources out into their own Provider to allow us to support additional functionality in the near future too - as part of which we're re-thinking the design of these resources such that they may be combined together. Since this is a question about Terraform Configuration rather than a bug in Terraform, I'm going to close this issue for the moment (but we'll continue responding 😄) Thanks! |
This may not be the right place for this, but I'll give it a go. @tombuildsstuff I'm hitting this same challenge, but I'm struggling to implement what is found https://docs.microsoft.com/en-us/azure/aks/aad-integration#create-server-application, as @btai24 mentioned, using the azurerm_azuread_application and azurerm_azuread_service_principal. I get the following error:
My Terraform looks like the following:
I found some information on system:anonymous in the [https://kubernetes.io/docs/reference/access-authn-authz/authentication/#anonymous-requests](K8s docs), but I'm struggling to understand how to apply this as a potential fix in Terraform with Azurerm. What do you think? |
@jpetitte unfortunately I'm unfamiliar with the requirements for configuring this with Kubernetes - but I'd suggest opening a ticket on the Kubernetes Provider :) |
@tombuildsstuff Yeah there could be something going on with the Kubernetes provider (I'm looking into that as well). In this case, I'd like to double check that I'm using the Azurerm provider correctly, specifically azurerm_azuread_application and it's related parts, to implement the guide found here to establish RBAC correctly in AKS. There are parts of the guide such as:
that don't have an obvious method of implementation using Azurerm. This may be because they need to somehow be implemented using the Kubernetes provider, but I haven't been able to weed out if that's the case. There are quite a number of moving parts that go into all this, so understanding what part of the RBAC configuration is in the scope of each provider is proving difficult for me. Maybe it's all in Azurerm scope, and I've set it up correctly, which would be great. I'm just hoping someone can confirm that. I think the original poster of this issue is struggling with the same thing. |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. If you feel this issue should be reopened, we encourage creating a new issue linking back to this one for added context. If you feel I made an error 🤖 🙉 , please reach out to my human friends 👉 [email protected]. Thanks! |
Community Note
Description
Currently the only way to use AKS with RBAC enabled is integrating with Azure Active Directory (AAD). You can do this by following the steps in this link: https://docs.microsoft.com/en-us/azure/aks/aad-integration
However, I am not sure if we are currently able to terraform what is necessary in AAD for the integration with an RBAC-enabled AKS cluster. It would be nice to be able to terraform the two AAD apps needed (client, server) and their necessary configurations (generating server app secret, adding permissions).
New or Affected Resource(s)
The text was updated successfully, but these errors were encountered: