alexbaptista / aks-argocd

Proof of Concept for AKS ArgoCD using Azure Pipelines

Geek Repo:Geek Repo

Github PK Tool:Github PK Tool

aks-argocd

Proof of Concept for AKS ArgoCD

NOTE: Azure Pipelines (Azure DevOps) being used by template - https://github.com/alexbaptista/azuredevops-iac-template-pipeline

NOTE 2: Should be used AFTER pipeline execution from repository - https://github.com/alexbaptista/aks-cluster


                

Folder structure

.
├── azure-pipelines.yaml
└── terraform
    ├── README.md
    ├── azurerm_key_vault_secret.tf
    ├── kubectl_file_documents.tf
    ├── kubectl_manifest.tf
    ├── kubernetes_secret.tf
    ├── main.tf
    ├── manifests
    │   └── v2.4.12
    │       ├── install.yaml
    │       └── namespace.yaml
    ├── outputs.tf
    ├── terraform_remote_state.tf
    └── variables.tf
  • terraform/*: This folder contains Terraform files. The documentation can be accessed here

  • terraform/manifests*: This folder contains ArgoCD manifests to be applied into Kubernetes cluster.

What does it will create ?

  • ArgoCD: GitOps tool;

Next Steps

Notes

After Terraform done, is necessary to give permission to appropriate users for Keyvault.

Initially, the access is only granted for tenant user used to run Terraform

How to do: https://learn.microsoft.com/en-us/azure/key-vault/general/assign-access-policy?tabs=azure-portal

References

About

Proof of Concept for AKS ArgoCD using Azure Pipelines

License:MIT License


Languages

Language:HCL 100.0%