# Define Kubernetes provider to use the AKS cluster provider "kubernetes" { host = "${azurerm_kubernetes_cluster.default.kube_config.0.host}" client_certificate = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.client_certificate)}" client_key = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.client_key)}" cluster_ca_certificate = "${base64decode(azurerm_kubernetes_cluster.default.kube_config.0.cluster_ca_certificate)}" } # Create a service account for the Helm Tiller resource "kubernetes_service_account" "tiller" { metadata { name = "tiller" namespace = "kube-system" } } # Grant cluster-admin rights to the Tiller Service Account resource "kubernetes_cluster_role_binding" "tiller" { metadata { name = "${kubernetes_service_account.tiller.metadata.0.name}" } role_ref { api_group = "rbac.authorization.k8s.io" kind = "ClusterRole" name = "cluster-admin" } subject { kind = "ServiceAccount" name = "${kubernetes_service_account.tiller.metadata.0.name}" namespace = "kube-system" } }