Providers like Kubernetes and Helm expect a secret with kubeconfig value. Such secrets are created when using AWS, Azure, or GCP providers. However, Terrajet Azure is not adding kubeconfig entry into the secret, thus preventing us to combine it with other providers.
Here's the output of the secret created by the KubernetesCluster resource:
@vfarcic attribute.kube_config_raw key already contains the kubeconfig for the cluster and you should be able to pass this as a key to provider helm/kubernetes providerconfig.
Still, it makes sense to add a kubeconfig to be consistent with others, opened #113
What happened?
Providers like Kubernetes and Helm expect a secret with
kubeconfig
value. Such secrets are created when using AWS, Azure, or GCP providers. However, Terrajet Azure is not addingkubeconfig
entry into the secret, thus preventing us to combine it with other providers.Here's the output of the secret created by the
KubernetesCluster
resource:How can we reproduce it?
Create an EKS cluster through
KubernetesCluster
.Config that
data
entrykubeconfig
does not exist.