How about using ServicePrincipal or Managed Identity ?
- Create the Service Principal
- Grant Permissions
- Configure the terraform to use that ClientID & ClientSecret in Azure provider block
This browser is no longer supported.
Upgrade to Microsoft Edge to take advantage of the latest features, security updates, and technical support.
Hello,
We have build AKS with Active directory and kubernetes RBAC enabled. The moment we disable the local admin account deployment of any object is impossible with terraform.
I don't want anyone to use --admin flag with az aks get-credentials. Any suggestion how to deploy kubernetes object in AKS using terraform without local account enabled.
How about using ServicePrincipal or Managed Identity ?