Skip to content

Commit 717e3e8

Browse files
committed
fix format issue
1 parent 430aedf commit 717e3e8

4 files changed

Lines changed: 18 additions & 19 deletions

File tree

README.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -370,7 +370,6 @@ No modules.
370370
| <a name="input_private_cluster_enabled"></a> [private\_cluster\_enabled](#input\_private\_cluster\_enabled) | If true cluster API server will be exposed only on internal IP address and available only in cluster vnet. | `bool` | `false` | no |
371371
| <a name="input_private_cluster_public_fqdn_enabled"></a> [private\_cluster\_public\_fqdn\_enabled](#input\_private\_cluster\_public\_fqdn\_enabled) | (Optional) Specifies whether a Public FQDN for this Private Cluster should be added. Defaults to `false`. | `bool` | `false` | no |
372372
| <a name="input_private_dns_zone_id"></a> [private\_dns\_zone\_id](#input\_private\_dns\_zone\_id) | (Optional) Either the ID of Private DNS Zone which should be delegated to this Cluster, `System` to have AKS manage this or `None`. In case of `None` you will need to bring your own DNS server and set up resolving, otherwise cluster will have issues after provisioning. Changing this forces a new resource to be created. | `string` | `null` | no |
373-
| <a name="input_public_network_access_enabled"></a> [public\_network\_access\_enabled](#input\_public\_network\_access\_enabled) | (Optional) Whether public network access is allowed for this Kubernetes Cluster. Defaults to `true`. Changing this forces a new resource to be created. | `bool` | `true` | no |
374373
| <a name="input_public_ssh_key"></a> [public\_ssh\_key](#input\_public\_ssh\_key) | A custom ssh key to control access to the AKS cluster. Changing this forces a new resource to be created. | `string` | `""` | no |
375374
| <a name="input_rbac_aad"></a> [rbac\_aad](#input\_rbac\_aad) | (Optional) Is Azure Active Directory integration enabled? | `bool` | `true` | no |
376375
| <a name="input_rbac_aad_admin_group_object_ids"></a> [rbac\_aad\_admin\_group\_object\_ids](#input\_rbac\_aad\_admin\_group\_object\_ids) | Object ID of groups with admin access. | `list(string)` | `null` | no |

examples/multiple_node_pools/main.tf

Lines changed: 7 additions & 7 deletions
Original file line numberDiff line numberDiff line change
@@ -45,11 +45,11 @@ locals {
4545
module "aks" {
4646
source = "../.."
4747

48-
prefix = "prefix-${random_id.prefix.hex}"
49-
resource_group_name = local.resource_group.name
50-
os_disk_size_gb = 60
51-
sku_tier = "Standard"
52-
rbac_aad = false
53-
vnet_subnet_id = azurerm_subnet.test.id
54-
node_pools = local.nodes
48+
prefix = "prefix-${random_id.prefix.hex}"
49+
resource_group_name = local.resource_group.name
50+
os_disk_size_gb = 60
51+
sku_tier = "Standard"
52+
rbac_aad = false
53+
vnet_subnet_id = azurerm_subnet.test.id
54+
node_pools = local.nodes
5555
}

examples/with_acr/main.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -60,10 +60,10 @@ module "aks" {
6060
attached_acr_id_map = {
6161
example = azurerm_container_registry.example.id
6262
}
63-
network_plugin = "azure"
64-
network_policy = "azure"
65-
os_disk_size_gb = 60
66-
sku_tier = "Standard"
67-
rbac_aad = false
68-
vnet_subnet_id = azurerm_subnet.test.id
63+
network_plugin = "azure"
64+
network_policy = "azure"
65+
os_disk_size_gb = 60
66+
sku_tier = "Standard"
67+
rbac_aad = false
68+
vnet_subnet_id = azurerm_subnet.test.id
6969
}

examples/without_monitor/main.tf

Lines changed: 5 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -39,11 +39,11 @@ resource "azurerm_dns_zone" "aks_web_app_routing" {
3939
module "aks_without_monitor" {
4040
source = "../.."
4141

42-
prefix = "prefix2-${random_id.prefix.hex}"
43-
resource_group_name = local.resource_group.name
44-
admin_username = null
45-
azure_policy_enabled = true
46-
disk_encryption_set_id = azurerm_disk_encryption_set.des.id
42+
prefix = "prefix2-${random_id.prefix.hex}"
43+
resource_group_name = local.resource_group.name
44+
admin_username = null
45+
azure_policy_enabled = true
46+
disk_encryption_set_id = azurerm_disk_encryption_set.des.id
4747
#checkov:skip=CKV_AZURE_4:The logging is turn off for demo purpose. DO NOT DO THIS IN PRODUCTION ENVIRONMENT!
4848
log_analytics_workspace_enabled = false
4949
net_profile_pod_cidr = "10.1.0.0/16"

0 commit comments

Comments
 (0)