Based on the following Terraform example.
Assumes:
- Azure credentials are passed as environment variables
- See
ARM_*
arguments here
- See
cp terraform.tfvars.sample terraform.tfvars
Amend the values for
client_id
client_secret
cluster_name
resource_group_name
suffix
aks_nodes
aks_node_type
aks_node_disk_size
environment
export ARM_CLIENT_ID=xxx
export ARM_CLIENT_SECRET=xxx
export ARM_SUBSCRIPTION_ID=xxx
export ARM_TENANT_ID=xxx
Replace occurrences of
xxx
above with appropriate values
./create-cluster.sh
./list-clusters.sh
Use the name and location of the cluster you just created to update kubeconfig
and set the current context for kubectl
./set-kubectl-context.sh {AKS_CLUSTER_NAME} {RESOURCE_GROUP_NAME}
./destroy-cluster.sh
For example
scp -i ~/.ssh/toolset-vm_rsa /home/cphillipson/.kube/aks-9f-config ubuntu@13.78.140.12:/home/ubuntu
ssh -i ~/.ssh/toolset-vm_rsa ubuntu@13.78.140.12
## Now that you're on the bastion you need set KUBECONFIG environment variable to connect
export KUBECONFIG=/home/ubuntu/aks-9f-config
kubectl get nodes -o wide
kubectl get po -A -o wide
This action is workflow dispatched with inputs.