Skip to content

Commit

Permalink
feat: whitelisting is not possible on private cluster
Browse files Browse the repository at this point in the history
Signed-off-by: Fredrik Klingenberg <[email protected]>
  • Loading branch information
fredrkl committed Nov 12, 2023
1 parent 32bd19a commit 34617f2
Show file tree
Hide file tree
Showing 3 changed files with 0 additions and 7 deletions.
1 change: 0 additions & 1 deletion terraform/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -24,7 +24,6 @@ module "aks" {
subnet_id = module.network.aks_dataplane_subnet_id
api_server_subnet_id = module.network.api_server_subnet_id
api_server_identity_id = module.identities.aks_identity_id
# api_server_allowed_cidr_blocks = module.network.jumphost_subnet_cidr_blocks

count = var.enable_aks ? 1 : 0
}
Expand Down
1 change: 0 additions & 1 deletion terraform/modules/aks/main.tf
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,6 @@ resource "azurerm_kubernetes_cluster" "example" {
api_server_access_profile {
vnet_integration_enabled = true
subnet_id = var.api_server_subnet_id
# authorized_ip_ranges = var.api_server_allowed_cidr_blocks
}

tags = {
Expand Down
5 changes: 0 additions & 5 deletions terraform/modules/aks/variables.tf
Original file line number Diff line number Diff line change
Expand Up @@ -20,8 +20,3 @@ variable "api_server_identity_id" {
type = string
description = "The ID of the identity to assign to the AKS API server."
}

#variable "api_server_allowed_cidr_blocks" {
# type = list(string)
# description = "The CIDR blocks allowed to access the AKS API server."
#}

0 comments on commit 34617f2

Please sign in to comment.