Auto update
This commit is contained in:
Родитель
57c5c493af
Коммит
5f85c5ee1c
|
@ -5,6 +5,7 @@
|
|||
**Merged pull requests:**
|
||||
|
||||
- Add support for nodepool's `gpu_instance` [\#519](https://github.com/Azure/terraform-azurerm-aks/pull/519) ([lonegunmanb](https://github.com/lonegunmanb))
|
||||
- Add upgrade notice document [\#513](https://github.com/Azure/terraform-azurerm-aks/pull/513) ([lonegunmanb](https://github.com/lonegunmanb))
|
||||
- Remove precondition on extra node pool which prevent using windows pool with overlay [\#512](https://github.com/Azure/terraform-azurerm-aks/pull/512) ([lonegunmanb](https://github.com/lonegunmanb))
|
||||
- Add retry when the ingress is not ready [\#510](https://github.com/Azure/terraform-azurerm-aks/pull/510) ([lonegunmanb](https://github.com/lonegunmanb))
|
||||
- Add support for `support_plan` and `Premium` sku tier. [\#508](https://github.com/Azure/terraform-azurerm-aks/pull/508) ([ecklm](https://github.com/ecklm))
|
||||
|
|
|
@ -50,4 +50,4 @@ The `brown_field_application_gateway_for_ingress`, `create_role_assignments_for_
|
|||
|
||||
2. `green_field_application_gateway_for_ingress`: This variable is used when you want the module to create a new Application Gateway for the AKS cluster. It is an object that contains the name of the Application Gateway to be used or created in the Nodepool Resource Group (`name`), the subnet CIDR to be used to create an Application Gateway (`subnet_cidr`), and the ID of the subnet on which to create an Application Gateway (`subnet_id`). If this variable is set, the module will create a new Application Gateway with the provided configuration.
|
||||
|
||||
3. `create_role_assignments_for_application_gateway`: This is a boolean variable that determines whether to create the corresponding role assignments for the application gateway or not. By default, it is set to `true`. Role assignments are necessary for the Application Gateway to function correctly with the AKS cluster. If set to `true`, the module will create the necessary role assignments on the Application Gateway.
|
||||
3. `create_role_assignments_for_application_gateway`: This is a boolean variable that determines whether to create the corresponding role assignments for the application gateway or not. By default, it is set to `true`. Role assignments are necessary for the Application Gateway to function correctly with the AKS cluster. If set to `true`, the module will create the necessary role assignments on the Application Gateway.
|
||||
|
|
|
@ -46,7 +46,7 @@ resource "azurerm_kubernetes_cluster_node_pool" "node_pool_create_before_destroy
|
|||
avm_git_last_modified_at = "2024-03-04 03:19:50"
|
||||
avm_git_org = "Azure"
|
||||
avm_git_repo = "terraform-azurerm-aks"
|
||||
avm_yor_trace = "261b062d-f574-4857-b261-9b74588b49f1"
|
||||
avm_yor_trace = "76af7376-ff4d-4110-af01-e51d1bb7b83e"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
|
||||
ultra_ssd_enabled = each.value.ultra_ssd_enabled
|
||||
vnet_subnet_id = each.value.vnet_subnet_id
|
||||
|
@ -204,7 +204,7 @@ resource "azurerm_kubernetes_cluster_node_pool" "node_pool_create_after_destroy"
|
|||
avm_git_last_modified_at = "2024-01-11 08:26:20"
|
||||
avm_git_org = "Azure"
|
||||
avm_git_repo = "terraform-azurerm-aks"
|
||||
avm_yor_trace = "b4cf4544-a770-4bc0-8f67-414427a02448"
|
||||
avm_yor_trace = "b1387377-92ee-4e41-9115-8ab5fe8e966d"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
|
||||
ultra_ssd_enabled = each.value.ultra_ssd_enabled
|
||||
vnet_subnet_id = each.value.vnet_subnet_id
|
||||
|
|
|
@ -12,7 +12,7 @@ resource "azurerm_log_analytics_workspace" "main" {
|
|||
avm_git_last_modified_at = "2023-06-05 02:21:33"
|
||||
avm_git_org = "Azure"
|
||||
avm_git_repo = "terraform-azurerm-aks"
|
||||
avm_yor_trace = "47ab6592-fff6-4515-a7d1-f05b318a14a4"
|
||||
avm_yor_trace = "f47f0879-0a59-4096-843f-ff6941ee0258"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/), (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
|
||||
avm_yor_name = "main"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
|
||||
|
@ -53,7 +53,7 @@ resource "azurerm_log_analytics_solution" "main" {
|
|||
avm_git_last_modified_at = "2023-07-20 06:04:07"
|
||||
avm_git_org = "Azure"
|
||||
avm_git_repo = "terraform-azurerm-aks"
|
||||
avm_yor_trace = "f2b5bb99-c106-48ae-b87d-f05bc4ce5c8e"
|
||||
avm_yor_trace = "586a5e29-06cd-4ed8-8fe5-871bf8adbedc"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/), (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
|
||||
avm_yor_name = "main"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
|
||||
|
|
2
main.tf
2
main.tf
|
@ -43,7 +43,7 @@ resource "azurerm_kubernetes_cluster" "main" {
|
|||
avm_git_last_modified_at = "2024-02-16 15:45:22"
|
||||
avm_git_org = "Azure"
|
||||
avm_git_repo = "terraform-azurerm-aks"
|
||||
avm_yor_trace = "72f59bd1-7f9d-4275-ae24-747832effdb1"
|
||||
avm_yor_trace = "2a0f2d3f-13c1-41a9-9f76-3e4979168ee1"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/), (/*<box>*/ (var.tracing_tags_enabled ? { for k, v in /*</box>*/ {
|
||||
avm_yor_name = "main"
|
||||
} /*<box>*/ : replace(k, "avm_", var.tracing_tags_prefix) => v } : {}) /*</box>*/))
|
||||
|
|
Загрузка…
Ссылка в новой задаче