Skip to content

Chambras/azure-terraform-AKS

Repository files navigation

Azure Kubernetes Service - AKS

It creates:

  • A new Resource Group.
  • A VNet with 2 subnets.
  • An AKS Cluster.

Project Structure

This project has the following files which make them easy to reuse, add or remove.

.
├── LICENSE
├── README.md
├── aks.tf
├── helmExample
│   ├── main.tf
│   └── variables.tf
├── kubernetesExample
│   ├── main.tf
│   └── variables.tf
├── main.tf
├── networking.tf
├── outputs.tf
├── terraform.tfvars
└── variables.tf

Most common parameters are exposed as variables in variables.tf In order to get supported k8s versions by region you can use this command

az aks get-versions -l {{location}}

Pre-requisites

It is assumed that you have azure CLI and Terraform installed and configured. More information on this topic here. I recommend using a Service Principal with a certificate.

It also assumes you have kubectl installed and configured. More information on this topic here.

It is recommended to have helm installed as well. You can find more information here.

versions

  • Terraform >= 0.14.6
  • Azure provider 2.47.0
  • Helm Provider 2.0.2
  • Kubernetes Provider 2.0.2
  • Azure CLI 2.19.1
  • helm >= 3.0.0
  • kubectl >= 1.18.15

Service Principal

This demo has been updated to use a SystemAssigned identity, but AKS also gives you the option to use a service principal in order to manage the cluster. It is assumed that you already have a Service Principal already created and you can configure it using kubernetes_client_id and kubernetes_client_secret located in variables.tf.

You can create a Service Principal using the following command

az ad sp create-for-rbac --name {{SP_NAME}} --skip-assignment

More information about AKS Service Principal can be found here.

Warning: Sensitive Data

It is not recommended to store secrets in terraform scripts. Read more information about sensitive data.

Authentication

It uses key based authentication and it assumes you already have a key and you can configure the path using the sshKeyPath variable in variables.tf You can create one using this command:

ssh-keygen -t rsa -b 4096 -m PEM -C vm@mydomain.com -f ~/.ssh/vm_ssh

Usage

Just run these commands to initialize terraform, get a plan and approve it to apply it.

terraform fmt
terraform init
terraform validate
terraform plan
terraform apply

I also recommend using a remote state instead of a local one. You can change this configuration in main.tf You can create a free Terraform Cloud account here.

Once the cluster is up and running you can execute the following command in order to configure kubectl to connect to your cluster.

az aks get-credentials -g {{ResourceGroupName}} -n {{AKSClusterName}}

once executed you should be able to interact with the cluster using kubectl

kubectl get nodes

Alternatively you can use this command to get some tips on how to configure your kubectl using a custom file. This is sample output:

terraform output configure

<<EOT
Run the following commands to configure kubernetes client:
$ terraform output kube_config > ~/.kube/aksconfig
$ export KUBECONFIG=~/.kube/aksconfig
Test configuration using kubectl
$ kubectl get nodes

Clean resources

It will destroy everything that was created.

terraform destroy --force

Caution

Be aware that by running this script your account might get billed.

Authors

  • Marcelo Zambrana

About

No description, website, or topics provided.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

 
 
 

Languages