You can not select more than 25 topics Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
azure/providers.tf

37 lines
1.9 KiB

# Configure the Microsoft Azure Provider
provider "azurerm" {
skip_provider_registration = "true"
features {}
}
provider "kubernetes" {
alias = "privatek8s"
host = azurerm_kubernetes_cluster.privatek8s.kube_config.0.host
client_certificate = base64decode(azurerm_kubernetes_cluster.privatek8s.kube_config.0.client_certificate)
client_key = base64decode(azurerm_kubernetes_cluster.privatek8s.kube_config.0.client_key)
cluster_ca_certificate = base64decode(azurerm_kubernetes_cluster.privatek8s.kube_config.0.cluster_ca_certificate)
}
provider "kubernetes" {
alias = "publick8s"
host = azurerm_kubernetes_cluster.publick8s.kube_config.0.host
client_certificate = base64decode(azurerm_kubernetes_cluster.publick8s.kube_config.0.client_certificate)
client_key = base64decode(azurerm_kubernetes_cluster.publick8s.kube_config.0.client_key)
cluster_ca_certificate = base64decode(azurerm_kubernetes_cluster.publick8s.kube_config.0.cluster_ca_certificate)
}
# provider "postgresql" {
# /**
# Important: terraform must be allowed to reach this instance through the network. Check the followings:
# - If running in Jenkins, ensure that the subnet of the agents is peered to the subnet of this pgsql instance
# * Don't forget to also check the network security group rules
# - If running locally, ensure that:
# * your /etc/hosts defines an entry with <azurerm_postgresql_flexible_server.public.fqdn> to 127.0.0.1
# * you've opened an SSH tunnel such as `ssh -L 5432:<azurerm_postgresql_flexible_server.public.fqdn>:5432` through a machine of the private network
# **/
# host = azurerm_postgresql_flexible_server.public.fqdn
# username = local.public_pgsql_admin_login
# password = random_password.pgsql_admin_password.result
# superuser = false
# }