In this project, we will be creating AKS cluster the right way by using service principle.kubeconfig and service principle will be generated after the terraform plan and secret will be upload to keyvault to be used further.
- Resource Group
- Service Principle
- AKS cluster using the SPN
- Azure key vault to store the client secret
- Secret uploaded to key vault
- kubeconfig for AKS
- kubectl cli installed
- Azure CLI installed and logged in
- Storage Account and blob container created to store the tfstate file as backend, you can use below shell script as well
#!/bin/bash
RESOURCE_GROUP_NAME=backend-rg
STORAGE_ACCOUNT_NAME=backendsa101
CONTAINER_NAME=tfstate
# Create resource group
az group create --name $RESOURCE_GROUP_NAME --location canadacentral
# Create storage account
az storage account create --resource-group $RESOURCE_GROUP_NAME --name $STORAGE_ACCOUNT_NAME --sku Standard_LRS --encryption-services blob
# Create blob container
az storage container create --name $CONTAINER_NAME --account-name $STORAGE_ACCOUNT_NAME
az login --use-device-code
alias tf=terraform
tf init
tf plan
tf apply --auto-approve
Error: creating Cluster: (Managed Cluster Name
"clusternew-aks-cluster" / Resource Group "rgname"):
containerservice.ManagedClustersClient#CreateOrUpdate:
Failure sending request: StatusCode=404 -- Original Error:
Code="ServicePrincipalNotFound" Message="Service principal
clientID: xxxx-xxxxx-xxxx-xxxxx not found in Active Directory
tenant xxxx-xxxxx-xxxx-xxxxx, Please see https://aka.ms/
aks-sp-help for more details."
Rerun the tf apply command, this could be a bug in the particular provider version. Running the command again resolves the issue.
Error: checking for presence of existing Secret
"xxxx-xxxxx-xxxx-xxxxx" (Key Vault "https://keyvaultname.
vault.azure.net/"): keyvault.BaseClient#GetSecret: Failure
responding to request: StatusCode=403 -- Original Error:
autorest/azure: Service returned an error. Status=403
Code="Forbidden" Message="Caller is not authorized to perform
action on resource.\r\nIf role assignments, deny assignments
or role definitions were changed recently, InnerError=
{"code":"ForbiddenByRbac"}
on main.tf line 46, in resource "azurerm_key_vault_secret"
"example":
46: resource "azurerm_key_vault_secret" "example" {
User should have keyvault admin role even if the user has owner role.
Checkout the below video for complete hands-on demo of this project