when performing terraform plan
, if an azurerm_kubernetes_cluster
(Azure) resource exists in the state, terraform will print some information from kube_config
which seems sensitive
Example printout: (all ...
values get printed)
kube_config = [
{
client_certificate = (...)
client_key = (...)
cluster_ca_certificate = (...)
host = (...)
password = (...)
}
I'm not exactly sure WHICH of those values are sensitive, but password
probably is...right?
On the other hand, terraform does seem to have some knowledge of which values are sensitive, as it does print the client_secret
this way:
service_principal {
client_id = "(...)"
client_secret = (sensitive value)
}
So, my questions would be:
- Are those values actually sensitive?
- If so, is there a way to instruct terraform to mask those values in the plan?
Versions we are using:
provider "azurerm" {
version = "~>1.37.0"
}
The reason why this is problematic is that we pipe the plan in a Github PR comment.
Thanks
v1.6.0
which was released back in May 2018. Fix was in github.com/terraform-providers/terraform-provider-azurerm/… – ydaetskcoR