azurerm_kubernetes_cluster_trusted_access_role_binding

Manages a Kubernetes Cluster Trusted Access Role Binding

Example Usage

resource "azurerm_application_insights" "example" {
  name                = "example"
  location            = azurerm_resource_group.example.location
  resource_group_name = azurerm_resource_group.example.name
  application_type    = "example-value"
}
data "azurerm_client_config" "test" {}
resource "azurerm_key_vault" "example" {
  name                       = "example"
  location                   = azurerm_resource_group.example.location
  resource_group_name        = azurerm_resource_group.example.name
  tenant_id                  = data.azurerm_client_config.example.tenant_id
  sku_name                   = "example-value"
  soft_delete_retention_days = "example-value"
}
resource "azurerm_key_vault_access_policy" "example" {
  key_vault_id    = azurerm_key_vault.example.id
  tenant_id       = data.azurerm_client_config.example.tenant_id
  object_id       = data.azurerm_client_config.example.object_id
  key_permissions = "example-value"
}
resource "azurerm_kubernetes_cluster" "example" {
  name                = "example"
  location            = azurerm_resource_group.example.location
  resource_group_name = azurerm_resource_group.example.name
  dns_prefix          = "acctestaksexample"
  default_node_pool {
    name       = "example-value"
    node_count = "example-value"
    vm_size    = "example-value"
    upgrade_settings {
      max_surge = "example-value"
    }
  }
  identity {
    type = "example-value"
  }
}
resource "azurerm_machine_learning_workspace" "example" {
  name                    = "example"
  location                = azurerm_resource_group.example.location
  resource_group_name     = azurerm_resource_group.example.name
  key_vault_id            = azurerm_key_vault.example.id
  storage_account_id      = azurerm_storage_account.example.id
  application_insights_id = azurerm_application_insights.example.id
  identity {
    type = "example-value"
  }
}
resource "azurerm_resource_group" "example" {
  name     = "example-resources"
  location = "West Europe"
}
resource "azurerm_storage_account" "example" {
  name                     = "example"
  location                 = azurerm_resource_group.example.location
  resource_group_name      = azurerm_resource_group.example.name
  account_tier             = "example-value"
  account_replication_type = "example-value"
}
resource "azurerm_kubernetes_cluster_trusted_access_role_binding" "example" {
  kubernetes_cluster_id = azurerm_kubernetes_cluster.example.id
  name                  = "example"
  roles                 = "example-value"
  source_resource_id    = azurerm_machine_learning_workspace.example.id
}

Arguments Reference

The following arguments are supported:

Attributes Reference

In addition to the Arguments listed above - the following Attributes are exported:


Timeouts

The timeouts block allows you to specify timeouts for certain actions:

Import

An existing Kubernetes Cluster Trusted Access Role Binding can be imported into Terraform using the resource id, e.g.

terraform import azurerm_kubernetes_cluster_trusted_access_role_binding.example /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{managedClusterName}/trustedAccessRoleBindings/{trustedAccessRoleBindingName}