-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support for Local Account disabled for AKS #13248
Comments
Fixed in #12386, sorry for the confusion :) |
Reopened because the data source
|
This functionality has been released in v2.76.0 of the Terraform Provider. Please see the Terraform documentation on provider versioning or reach out if you need any assistance upgrading. For further feature requests or bug reports with this functionality, please create a new GitHub issue following the template. Thank you! |
I'm going to lock this issue because it has been closed for 30 days ⏳. This helps our maintainers find and focus on the active issues. |
Community Note
Description
To upgrade security for AKS significantly, we would like to have the option to disable local accounts implemented.
When this would be implemented, you are unable to get a working kubeconfig without AAD login. This removes the threat of misuse of the local kubeconfig file of an administrator.
Using the Kubernetes provider, kubectl provider or Helm provider would be done as shown below:
The configuration as shown below does not work when managed AAD is enabled, requiring a little fix.
New or Affected Resource(s)
d/azurerm_kubernetes_cluster
: Supportlocal_account_disabled
setup in data source #13260)Potential Terraform Configuration
References
The text was updated successfully, but these errors were encountered: