The overall flow for this module is pretty simple:
- Create Azure storage account to store Terraform state
- Create Azure AKS Platform configuration in a modular manner
- Deploy the infrastructure incrementally using GitHub Actions
The following security controls can be met through configuration of this template:
- TBD
- Create terraform.tfvars based on example template provider.
Note: You will need to add a client secret and grant admin consent to
k8s_velero_${prefix}
service principal in Azure AD.
- Ensure you have exported the
ARM_ACCESS_KEY
for the Terraform backend storage account.
export ARM_ACCESS_KEY=<secret>
- Initialize and set the Terraform backend configuration parameters for the AzureRM provider.
terraform init\
-backend-config="storage_account_name=terraformkubernetes" \
-backend-config="container_name=k8s-tfstate" \
-backend-config="key=${prefix}-aks-platform.terraform.tfstate"
- Create an execution plan and save the generated plan to a file.
terraform plan -out plan
- Apply the changes required to reach desired state.
terraform apply plan
Note: You might have to run terraform plan and apply a few times due to dependency issues.
Date | Release | Change |
---|---|---|
20190909 | 20190909.1 | 1st release |