You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
|<a name="input_cert_manager_chart_version"></a> [cert\_manager\_chart\_version](#input\_cert\_manager\_chart\_version) | Version of the cert-manager helm chart to install. | `string` | `"v1.17.1"` | no |
104
+
|<a name="input_cert_manager_install_timeout"></a> [cert\_manager\_install\_timeout](#input\_cert\_manager\_install\_timeout) | Timeout for installing the cert-manager helm chart, in seconds. | `number` | `300` | no |
105
+
|<a name="input_cert_manager_namespace"></a> [cert\_manager\_namespace](#input\_cert\_manager\_namespace) | The name of the namespace in which cert-manager is or will be installed. | `string` | `"cert-manager"` | no |
|<a name="input_helm_chart"></a> [helm\_chart](#input\_helm\_chart) | Chart name from repository or local path to chart. For local charts, set the path to the chart directory. | `string` | `"materialize-operator"` | no |
104
108
|<a name="input_helm_values"></a> [helm\_values](#input\_helm\_values) | Additional Helm values to merge with defaults | `any` | `{}` | no |
109
+
|<a name="input_install_cert_manager"></a> [install\_cert\_manager](#input\_install\_cert\_manager) | Whether to install cert-manager. | `bool` | `false` | no |
105
110
|<a name="input_install_materialize_operator"></a> [install\_materialize\_operator](#input\_install\_materialize\_operator) | Whether to install the Materialize operator | `bool` | `true` | no |
106
111
|<a name="input_location"></a> [location](#input\_location) | The location where resources will be created | `string` | `"eastus2"` | no |
|<a name="input_namespace"></a> [namespace](#input\_namespace) | Namespace for all resources, usually the organization or project name | `string` | `"materialize"` | no |
|<a name="input_operator_namespace"></a> [operator\_namespace](#input\_operator\_namespace) | Namespace for the Materialize operator | `string` | `"materialize"` | no |
111
116
|<a name="input_operator_version"></a> [operator\_version](#input\_operator\_version) | Version of the Materialize operator to install | `string` | `null` | no |
112
-
|<a name="input_orchestratord_version"></a> [orchestratord\_version](#input\_orchestratord\_version) | Version of the Materialize orchestrator to install | `string` | `"v0.130.4"` | no |
117
+
|<a name="input_orchestratord_version"></a> [orchestratord\_version](#input\_orchestratord\_version) | Version of the Materialize orchestrator to install | `string` | `null` | no |
113
118
|<a name="input_prefix"></a> [prefix](#input\_prefix) | Prefix to be used for resource names | `string` | `"materialize"` | no |
114
119
|<a name="input_resource_group_name"></a> [resource\_group\_name](#input\_resource\_group\_name) | The name of the resource group | `string` | n/a | yes |
115
120
|<a name="input_tags"></a> [tags](#input\_tags) | Tags to apply to all resources | `map(string)` | `{}` | no |
116
121
|<a name="input_use_local_chart"></a> [use\_local\_chart](#input\_use\_local\_chart) | Whether to use a local chart instead of one from a repository | `bool` | `false` | no |
122
+
|<a name="input_use_self_signed_cluster_issuer"></a> [use\_self\_signed\_cluster\_issuer](#input\_use\_self\_signed\_cluster\_issuer) | Whether to install and use a self-signed ClusterIssuer for TLS. Due to limitations in Terraform, this may not be enabled before the cert-manager CRDs are installed. | `bool` | `false` | no |
117
123
118
124
## Outputs
119
125
@@ -138,4 +144,26 @@ az aks get-credentials --resource-group $(terraform output -raw resource_group_n
138
144
```
139
145
140
146
This command retrieves the AKS cluster credentials and merges them into the `~/.kube/config` file. You can now interact with the AKS cluster using `kubectl`.
147
+
148
+
## Connecting to Materialize instances
149
+
150
+
Access to the database is through the balancerd pods on:
151
+
* Port 6875 for SQL connections.
152
+
* Port 6876 for HTTP(S) connections.
153
+
154
+
Access to the web console is through the console pods on port 8080.
155
+
156
+
#### TLS support
157
+
158
+
For example purposes, optional TLS support is provided by using `cert-manager` and a self-signed `ClusterIssuer`.
159
+
160
+
More advanced TLS support using user-provided CAs or per-Materialize `Issuer`s are out of scope for this Terraform module. Please refer to the [cert-manager documentation](https://cert-manager.io/docs/configuration/) for detailed guidance on more advanced usage.
161
+
162
+
###### To enable installation of `cert-manager` and configuration of the self-signed `ClusterIssuer`
163
+
1. Set `install_cert_manager` to `true`.
164
+
1. Run `terraform apply`.
165
+
1. Set `use_self_signed_cluster_issuer` to `true`.
166
+
1. Run `terraform apply`.
167
+
168
+
Due to limitations in Terraform, it cannot plan Kubernetes resources using CRDs that do not exist yet. We need to first install `cert-manager`in the first `terraform apply`, before defining any `ClusterIssuer` or `Certificate` resources which get created in the second `terraform apply`.
Copy file name to clipboardExpand all lines: docs/footer.md
+22Lines changed: 22 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -7,3 +7,25 @@ az aks get-credentials --resource-group $(terraform output -raw resource_group_n
7
7
```
8
8
9
9
This command retrieves the AKS cluster credentials and merges them into the `~/.kube/config` file. You can now interact with the AKS cluster using `kubectl`.
10
+
11
+
## Connecting to Materialize instances
12
+
13
+
Access to the database is through the balancerd pods on:
14
+
* Port 6875 for SQL connections.
15
+
* Port 6876 for HTTP(S) connections.
16
+
17
+
Access to the web console is through the console pods on port 8080.
18
+
19
+
#### TLS support
20
+
21
+
For example purposes, optional TLS support is provided by using `cert-manager` and a self-signed `ClusterIssuer`.
22
+
23
+
More advanced TLS support using user-provided CAs or per-Materialize `Issuer`s are out of scope for this Terraform module. Please refer to the [cert-manager documentation](https://cert-manager.io/docs/configuration/) for detailed guidance on more advanced usage.
24
+
25
+
###### To enable installation of `cert-manager` and configuration of the self-signed `ClusterIssuer`
26
+
1. Set `install_cert_manager` to `true`.
27
+
1. Run `terraform apply`.
28
+
1. Set `use_self_signed_cluster_issuer` to `true`.
29
+
1. Run `terraform apply`.
30
+
31
+
Due to limitations in Terraform, it cannot plan Kubernetes resources using CRDs that do not exist yet. We need to first install `cert-manager` in the first `terraform apply`, before defining any `ClusterIssuer` or `Certificate` resources which get created in the second `terraform apply`.
description="Whether to install and use a self-signed ClusterIssuer for TLS. Due to limitations in Terraform, this may not be enabled before the cert-manager CRDs are installed."
description="Whether to install and use a self-signed ClusterIssuer for TLS. Due to limitations in Terraform, this may not be enabled before the cert-manager CRDs are installed."
8
+
type=bool
9
+
}
10
+
11
+
variable"cert_manager_namespace" {
12
+
description="The name of the namespace in which cert-manager is or will be installed."
13
+
type=string
14
+
}
15
+
16
+
variable"name_prefix" {
17
+
description="The name prefix to use for Kubernetes resources. Does not apply to cert-manager itself, as that is a singleton per cluster."
18
+
type=string
19
+
}
20
+
21
+
variable"cert_manager_install_timeout" {
22
+
description="Timeout for installing the cert-manager helm chart, in seconds."
23
+
type=number
24
+
}
25
+
26
+
variable"cert_manager_chart_version" {
27
+
description="Version of the cert-manager helm chart to install."
0 commit comments