Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 8 additions & 0 deletions main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -118,6 +118,14 @@ resource "azurerm_kubernetes_cluster" "main" {
}
}

dynamic "key_vault_secrets_provider" {
for_each = var.key_vault_secrets_provider_enabled ? ["key_vault_secrets_provider"] : []
content {
secret_rotation_enabled = var.secret_rotation_enabled
secret_rotation_interval = var.secret_rotation_interval
}
}

role_based_access_control_enabled = var.enable_role_based_access_control

dynamic "azure_active_directory_role_based_access_control" {
Expand Down
21 changes: 21 additions & 0 deletions variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -362,3 +362,24 @@ variable "only_critical_addons_enabled" {
type = bool
default = null
}

variable "key_vault_secrets_provider_enabled" {
description = "(Optional) Whether to use the Azure Key Vault Provider for Secrets Store CSI Driver in an AKS cluster. For more details: https://docs.microsoft.com/en-us/azure/aks/csi-secrets-store-driver"
type = bool
default = false
nullable = false
}

variable "secret_rotation_enabled" {
description = "Is secret rotation enabled? This variable is only used when enable_key_vault_secrets_provider is true and defaults to false"
type = bool
default = false
nullable = false
}

variable "secret_rotation_interval" {
description = "The interval to poll for secret rotation. This attribute is only set when secret_rotation is true and defaults to 2m"
type = string
default = "2m"
nullable = false
}