Skip to content

Commit 785fa23

Browse files
committed
1 parent 4181330 commit 785fa23

2 files changed

Lines changed: 29 additions & 0 deletions

File tree

main.tf

Lines changed: 8 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -118,6 +118,14 @@ resource "azurerm_kubernetes_cluster" "main" {
118118
}
119119
}
120120

121+
dynamic "key_vault_secrets_provider" {
122+
for_each = var.key_vault_secrets_provider_enabled ? ["key_vault_secrets_provider"] : []
123+
content {
124+
secret_rotation_enabled = var.secret_rotation_enabled
125+
secret_rotation_interval = var.secret_rotation_interval
126+
}
127+
}
128+
121129
role_based_access_control_enabled = var.enable_role_based_access_control
122130

123131
dynamic "azure_active_directory_role_based_access_control" {

variables.tf

Lines changed: 21 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -362,3 +362,24 @@ variable "only_critical_addons_enabled" {
362362
type = bool
363363
default = null
364364
}
365+
366+
variable "key_vault_secrets_provider_enabled" {
367+
description = "(Optional) Whether to use the Azure Key Vault Provider for Secrets Store CSI Driver in an AKS cluster. For more details: https://docs.microsoft.com/en-us/azure/aks/csi-secrets-store-driver"
368+
type = bool
369+
default = false
370+
nullable = false
371+
}
372+
373+
variable "secret_rotation_enabled" {
374+
description = "Is secret rotation enabled? This variable is only used when enable_key_vault_secrets_provider is true and defaults to false"
375+
type = bool
376+
default = false
377+
nullable = false
378+
}
379+
380+
variable "secret_rotation_interval" {
381+
description = "The interval to poll for secret rotation. This attribute is only set when secret_rotation is true and defaults to 2m"
382+
type = string
383+
default = "2m"
384+
nullable = false
385+
}

0 commit comments

Comments
 (0)