Skip to content

Commit 5df4274

Browse files
committed
removed deprecated attribute public_network_access_enabled
1 parent c754503 commit 5df4274

8 files changed

Lines changed: 19 additions & 33 deletions

File tree

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -364,7 +364,6 @@ No modules.
364364
| <a name="input_private_cluster_enabled"></a> [private\_cluster\_enabled](#input\_private\_cluster\_enabled) | If true cluster API server will be exposed only on internal IP address and available only in cluster vnet. | `bool` | `false` | no |
365365
| <a name="input_private_cluster_public_fqdn_enabled"></a> [private\_cluster\_public\_fqdn\_enabled](#input\_private\_cluster\_public\_fqdn\_enabled) | (Optional) Specifies whether a Public FQDN for this Private Cluster should be added. Defaults to `false`. | `bool` | `false` | no |
366366
| <a name="input_private_dns_zone_id"></a> [private\_dns\_zone\_id](#input\_private\_dns\_zone\_id) | (Optional) Either the ID of Private DNS Zone which should be delegated to this Cluster, `System` to have AKS manage this or `None`. In case of `None` you will need to bring your own DNS server and set up resolving, otherwise cluster will have issues after provisioning. Changing this forces a new resource to be created. | `string` | `null` | no |
367-
| <a name="input_public_network_access_enabled"></a> [public\_network\_access\_enabled](#input\_public\_network\_access\_enabled) | (Optional) Whether public network access is allowed for this Kubernetes Cluster. Defaults to `true`. Changing this forces a new resource to be created. | `bool` | `true` | no |
368367
| <a name="input_public_ssh_key"></a> [public\_ssh\_key](#input\_public\_ssh\_key) | A custom ssh key to control access to the AKS cluster. Changing this forces a new resource to be created. | `string` | `""` | no |
369368
| <a name="input_rbac_aad"></a> [rbac\_aad](#input\_rbac\_aad) | (Optional) Is Azure Active Directory integration enabled? | `bool` | `true` | no |
370369
| <a name="input_rbac_aad_admin_group_object_ids"></a> [rbac\_aad\_admin\_group\_object\_ids](#input\_rbac\_aad\_admin\_group\_object\_ids) | Object ID of groups with admin access. | `list(string)` | `null` | no |

examples/multiple_node_pools/main.tf

Lines changed: 7 additions & 8 deletions
Original file line numberDiff line numberDiff line change
@@ -45,12 +45,11 @@ locals {
4545
module "aks" {
4646
source = "../.."
4747

48-
prefix = "prefix-${random_id.prefix.hex}"
49-
resource_group_name = local.resource_group.name
50-
os_disk_size_gb = 60
51-
public_network_access_enabled = false
52-
sku_tier = "Standard"
53-
rbac_aad = false
54-
vnet_subnet_id = azurerm_subnet.test.id
55-
node_pools = local.nodes
48+
prefix = "prefix-${random_id.prefix.hex}"
49+
resource_group_name = local.resource_group.name
50+
os_disk_size_gb = 60
51+
sku_tier = "Standard"
52+
rbac_aad = false
53+
vnet_subnet_id = azurerm_subnet.test.id
54+
node_pools = local.nodes
5655
}

examples/named_cluster/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,6 @@ module "aks_cluster_name" {
6969
cluster_log_analytics_workspace_name = "test-cluster"
7070
cluster_name = "test-cluster"
7171
disk_encryption_set_id = azurerm_disk_encryption_set.des.id
72-
public_network_access_enabled = false
7372
identity_ids = [azurerm_user_assigned_identity.test.id]
7473
identity_type = "UserAssigned"
7574
log_analytics_solution = {

examples/startup/main.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -105,7 +105,6 @@ module "aks" {
105105
node_os_channel_upgrade = "NodeImage"
106106
os_disk_size_gb = 60
107107
private_cluster_enabled = true
108-
public_network_access_enabled = false
109108
rbac_aad = true
110109
rbac_aad_managed = true
111110
role_based_access_control_enabled = true

examples/with_acr/main.tf

Lines changed: 6 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -60,11 +60,10 @@ module "aks" {
6060
attached_acr_id_map = {
6161
example = azurerm_container_registry.example.id
6262
}
63-
public_network_access_enabled = false
64-
network_plugin = "azure"
65-
network_policy = "azure"
66-
os_disk_size_gb = 60
67-
sku_tier = "Standard"
68-
rbac_aad = false
69-
vnet_subnet_id = azurerm_subnet.test.id
63+
network_plugin = "azure"
64+
network_policy = "azure"
65+
os_disk_size_gb = 60
66+
sku_tier = "Standard"
67+
rbac_aad = false
68+
vnet_subnet_id = azurerm_subnet.test.id
7069
}

examples/without_monitor/main.tf

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -39,12 +39,11 @@ resource "azurerm_dns_zone" "aks_web_app_routing" {
3939
module "aks_without_monitor" {
4040
source = "../.."
4141

42-
prefix = "prefix2-${random_id.prefix.hex}"
43-
resource_group_name = local.resource_group.name
44-
admin_username = null
45-
azure_policy_enabled = true
46-
disk_encryption_set_id = azurerm_disk_encryption_set.des.id
47-
public_network_access_enabled = false
42+
prefix = "prefix2-${random_id.prefix.hex}"
43+
resource_group_name = local.resource_group.name
44+
admin_username = null
45+
azure_policy_enabled = true
46+
disk_encryption_set_id = azurerm_disk_encryption_set.des.id
4847
#checkov:skip=CKV_AZURE_4:The logging is turn off for demo purpose. DO NOT DO THIS IN PRODUCTION ENVIRONMENT!
4948
log_analytics_workspace_enabled = false
5049
net_profile_pod_cidr = "10.1.0.0/16"

main.tf

Lines changed: 1 addition & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,7 +34,6 @@ resource "azurerm_kubernetes_cluster" "main" {
3434
private_cluster_enabled = var.private_cluster_enabled
3535
private_cluster_public_fqdn_enabled = var.private_cluster_public_fqdn_enabled
3636
private_dns_zone_id = var.private_dns_zone_id
37-
public_network_access_enabled = var.public_network_access_enabled
3837
role_based_access_control_enabled = var.role_based_access_control_enabled
3938
run_command_enabled = var.run_command_enabled
4039
sku_tier = var.sku_tier
@@ -572,7 +571,7 @@ resource "azurerm_kubernetes_cluster" "main" {
572571
error_message = "When `kubelet_identity` is enabled - The `type` field in the `identity` block must be set to `UserAssigned` and `identity_ids` must be set."
573572
}
574573
precondition {
575-
condition = var.enable_auto_scaling && var.agents_type == "VirtualMachineScaleSets"
574+
condition = var.enable_auto_scaling && var.agents_type == "VirtualMachineScaleSets"
576575
error_message = "Autoscaling on default node pools is only supported when the Kubernetes Cluster is using Virtual Machine Scale Sets type nodes."
577576
}
578577
}

variables.tf

Lines changed: 0 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -1083,13 +1083,6 @@ variable "private_dns_zone_id" {
10831083
description = "(Optional) Either the ID of Private DNS Zone which should be delegated to this Cluster, `System` to have AKS manage this or `None`. In case of `None` you will need to bring your own DNS server and set up resolving, otherwise cluster will have issues after provisioning. Changing this forces a new resource to be created."
10841084
}
10851085

1086-
variable "public_network_access_enabled" {
1087-
type = bool
1088-
default = true
1089-
description = "(Optional) Whether public network access is allowed for this Kubernetes Cluster. Defaults to `true`. Changing this forces a new resource to be created."
1090-
nullable = false
1091-
}
1092-
10931086
variable "public_ssh_key" {
10941087
type = string
10951088
default = ""

0 commit comments

Comments
 (0)