Proof of Concept for AKS Cluster
NOTE: Azure Pipelines (Azure DevOps) being used by template - https://github.com/alexbaptista/azuredevops-iac-template-pipeline
.
├── azure-pipelines.yaml
└── terraform
├── README.md
├── azurerm_client_config.tf
├── azurerm_key_vault.tf
├── azurerm_kubernetes_cluster.tf
├── azurerm_log_analytics_workspace.tf
├── azurerm_resource_group.tf
├── main.tf
├── outputs.tf
├── random_string.tf
└── variables.tf
- terraform/*: This folder contains Terraform files. The documentation can be accessed here
-
Azure Kubernetes Service: Kubernetes managed by Azure Cloud;
-
Azure KeyVault Service: To store ArgoCD admin password.
-
Get Access AKS: https://learn.microsoft.com/en-us/azure/aks/manage-azure-rbac#use-azure-rbac-for-kubernetes-authorization-with-kubectl
-
Run port forward to access ArgoCD: https://argo-cd.readthedocs.io/en/stable/getting_started/#port-forwarding
After Terraform done, is necessary to give permission to appropriate users for Keyvault.
Initially, the access is only granted for tenant user used to run Terraform
How to do: https://learn.microsoft.com/en-us/azure/key-vault/general/assign-access-policy?tabs=azure-portal