ClusterTrustedAccessRoleBinding

class ClusterTrustedAccessRoleBinding : KotlinCustomResource

Manages a Kubernetes Cluster Trusted Access Role Binding

Note: This Resource is in Preview to use this you must be opted into the Preview. You can do this by running az feature register --namespace Microsoft.ContainerService --name TrustedAccessPreview and then az provider register -n Microsoft.ContainerService .

Example Usage

package generated_program;
import com.pulumi.Context;
import com.pulumi.Pulumi;
import com.pulumi.core.Output;
import com.pulumi.azure.core.ResourceGroup;
import com.pulumi.azure.core.ResourceGroupArgs;
import com.pulumi.azure.appinsights.Insights;
import com.pulumi.azure.appinsights.InsightsArgs;
import com.pulumi.azure.core.CoreFunctions;
import com.pulumi.azure.keyvault.KeyVault;
import com.pulumi.azure.keyvault.KeyVaultArgs;
import com.pulumi.azure.keyvault.AccessPolicy;
import com.pulumi.azure.keyvault.AccessPolicyArgs;
import com.pulumi.azure.containerservice.KubernetesCluster;
import com.pulumi.azure.containerservice.KubernetesClusterArgs;
import com.pulumi.azure.containerservice.inputs.KubernetesClusterDefaultNodePoolArgs;
import com.pulumi.azure.containerservice.inputs.KubernetesClusterIdentityArgs;
import com.pulumi.azure.storage.Account;
import com.pulumi.azure.storage.AccountArgs;
import com.pulumi.azure.machinelearning.Workspace;
import com.pulumi.azure.machinelearning.WorkspaceArgs;
import com.pulumi.azure.machinelearning.inputs.WorkspaceIdentityArgs;
import com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBinding;
import com.pulumi.azure.containerservice.ClusterTrustedAccessRoleBindingArgs;
import java.util.List;
import java.util.ArrayList;
import java.util.Map;
import java.io.File;
import java.nio.file.Files;
import java.nio.file.Paths;
public class App {
public static void main(String[] args) {
Pulumi.run(App::stack);
}
public static void stack(Context ctx) {
var exampleResourceGroup = new ResourceGroup("exampleResourceGroup", ResourceGroupArgs.builder()
.location("West Europe")
.build());
var exampleInsights = new Insights("exampleInsights", InsightsArgs.builder()
.location(exampleResourceGroup.location())
.resourceGroupName(exampleResourceGroup.name())
.applicationType("example-value")
.build());
final var test = CoreFunctions.getClientConfig();
var exampleKeyVault = new KeyVault("exampleKeyVault", KeyVaultArgs.builder()
.location(exampleResourceGroup.location())
.resourceGroupName(exampleResourceGroup.name())
.tenantId(data.azurerm_client_config().example().tenant_id())
.skuName("example-value")
.softDeleteRetentionDays("example-value")
.build());
var exampleAccessPolicy = new AccessPolicy("exampleAccessPolicy", AccessPolicyArgs.builder()
.keyVaultId(exampleKeyVault.id())
.tenantId(data.azurerm_client_config().example().tenant_id())
.objectId(data.azurerm_client_config().example().object_id())
.keyPermissions("example-value")
.build());
var exampleKubernetesCluster = new KubernetesCluster("exampleKubernetesCluster", KubernetesClusterArgs.builder()
.location(exampleResourceGroup.location())
.resourceGroupName(exampleResourceGroup.name())
.dnsPrefix("acctestaksexample")
.defaultNodePool(KubernetesClusterDefaultNodePoolArgs.builder()
.name("example-value")
.nodeCount("example-value")
.vmSize("example-value")
.build())
.identity(KubernetesClusterIdentityArgs.builder()
.type("example-value")
.build())
.build());
var exampleAccount = new Account("exampleAccount", AccountArgs.builder()
.location(exampleResourceGroup.location())
.resourceGroupName(exampleResourceGroup.name())
.accountTier("example-value")
.accountReplicationType("example-value")
.build());
var exampleWorkspace = new Workspace("exampleWorkspace", WorkspaceArgs.builder()
.location(exampleResourceGroup.location())
.resourceGroupName(exampleResourceGroup.name())
.keyVaultId(exampleKeyVault.id())
.storageAccountId(exampleAccount.id())
.applicationInsightsId(exampleInsights.id())
.identity(WorkspaceIdentityArgs.builder()
.type("example-value")
.build())
.build());
var exampleClusterTrustedAccessRoleBinding = new ClusterTrustedAccessRoleBinding("exampleClusterTrustedAccessRoleBinding", ClusterTrustedAccessRoleBindingArgs.builder()
.kubernetesClusterId(exampleKubernetesCluster.id())
.roles("example-value")
.sourceResourceId(exampleWorkspace.id())
.build());
}
}

Import

An existing Kubernetes Cluster Trusted Access Role Binding can be imported into Terraform using the resource id, e.g.

$ pulumi import azure:containerservice/clusterTrustedAccessRoleBinding:ClusterTrustedAccessRoleBinding example /subscriptions/{subscriptionId}/resourceGroups/{resourceGroupName}/providers/Microsoft.ContainerService/managedClusters/{managedClusterName}/trustedAccessRoleBindings/{trustedAccessRoleBindingName}
  • Where {subscriptionId} is the ID of the Azure Subscription where the Kubernetes Cluster Trusted Access Role Binding exists. For example 12345678-1234-9876-4563-123456789012. * Where {resourceGroupName} is the name of Resource Group where this Kubernetes Cluster Trusted Access Role Binding exists. For example example-resource-group. * Where {managedClusterName} is the name of the Managed Cluster. For example managedClusterValue. * Where {trustedAccessRoleBindingName} is the name of the Trusted Access Role Binding. For example trustedAccessRoleBindingValue.

Properties

Link copied to clipboard
val id: Output<String>
Link copied to clipboard

Specifies the Kubernetes Cluster Id within which this Kubernetes Cluster Trusted Access Role Binding should exist. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.

Link copied to clipboard
val name: Output<String>

Specifies the name of this Kubernetes Cluster Trusted Access Role Binding. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.

Link copied to clipboard
val pulumiChildResources: Set<KotlinResource>
Link copied to clipboard
Link copied to clipboard
Link copied to clipboard
val roles: Output<List<String>>

A list of roles to bind, each item is a resource type qualified role name.

Link copied to clipboard

The ARM resource ID of source resource that trusted access is configured for. Changing this forces a new Kubernetes Cluster Trusted Access Role Binding to be created.

Link copied to clipboard
val urn: Output<String>