You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+6-4Lines changed: 6 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -194,7 +194,7 @@ Then perform the following commands on the root folder:
194
194
| ip\_range\_services | The _name_ of the secondary subnet range to use for services |`string`| n/a | yes |
195
195
| issue\_client\_certificate | Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
196
196
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. |`string`|`"latest"`| no |
197
-
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
197
+
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, CONTROLLER\_MANAGER, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
198
198
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none |`string`|`"logging.googleapis.com/kubernetes"`| no |
199
199
| maintenance\_end\_time | Time window specified for recurring maintenance operations in RFC3339 format |`string`|`""`| no |
200
200
| maintenance\_exclusions | List of maintenance exclusions. A cluster can have up to three |`list(object({ name = string, start_time = string, end_time = string, exclusion_scope = string }))`|`[]`| no |
@@ -203,7 +203,7 @@ Then perform the following commands on the root folder:
203
203
| master\_authorized\_networks | List of master authorized networks. If none are provided, disallow external access (except the cluster node IPs, which GKE automatically whitelists). |`list(object({ cidr_block = string, display_name = string }))`|`[]`| no |
204
204
| monitoring\_enable\_managed\_prometheus | Configuration for Managed Service for Prometheus. Whether or not the managed collection is enabled. |`bool`|`false`| no |
205
205
| monitoring\_enable\_observability\_metrics | Whether or not the advanced datapath metrics are enabled. |`bool`|`false`| no |
206
-
| monitoring\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
206
+
| monitoring\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, SCHEDULER, CONTROLLER\_MANAGER, STORAGE, HPA, POD, DAEMONSET, DEPLOYMENT, STATEFULSET, KUBELET, CADVISOR and DCGM. In beta provider, WORKLOADS is supported on top of those 12 values. (WORKLOADS is deprecated and removed in GKE 1.24.) KUBELET and CADVISOR are only supported in GKE 1.29.3-gke.1093000 and above. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
207
207
| monitoring\_observability\_metrics\_relay\_mode | Mode used to make advanced datapath metrics relay available. |`string`|`null`| no |
208
208
| monitoring\_service | The monitoring service that the cluster should write metrics to. Automatically send metrics from pods in the cluster to the Google Cloud Monitoring API. VM metrics will be collected by Google Compute Engine regardless of this setting Available options include monitoring.googleapis.com, monitoring.googleapis.com/kubernetes (beta) and none |`string`|`"monitoring.googleapis.com/kubernetes"`| no |
209
209
| name | The name of the cluster (required) |`string`| n/a | yes |
@@ -231,8 +231,8 @@ Then perform the following commands on the root folder:
231
231
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. |`string`|`"REGULAR"`| no |
232
232
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
233
233
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
234
-
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
235
-
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
234
+
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
235
+
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
236
236
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create\_service\_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service\_account\_name variable. |`string`|`""`| no |
237
237
| service\_account\_name | The name of the service account that will be created if create\_service\_account is true. If you wish to use an existing service account, use service\_account variable. |`string`|`""`| no |
238
238
| service\_external\_ips | Whether external ips specified by a service will be allowed in this cluster |`bool`|`false`| no |
@@ -302,6 +302,7 @@ The node_pools variable takes the following parameters:
302
302
| cpu_cfs_quota | Enforces the Pod's CPU limit. Setting this value to false means that the CPU limits for Pods are ignored | null | Optional |
303
303
| cpu_cfs_quota_period | The CPU CFS quota period value, which specifies the period of how often a cgroup's access to CPU resources should be reallocated | null | Optional |
304
304
| pod_pids_limit | Controls the maximum number of processes allowed to run in a pod. The value must be greater than or equal to 1024 and less than 4194304. | null | Optional |
305
+
| enable_confidential_nodes | An optional flag to enable confidential node config. | false | Optional |
305
306
| disk_size_gb | Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB | 100 | Optional |
306
307
| disk_type | Type of the disk attached to each node (e.g. 'pd-standard' or 'pd-ssd') | pd-standard | Optional |
307
308
| effect | Effect for the taint || Required |
@@ -320,6 +321,7 @@ The node_pools variable takes the following parameters:
320
321
| local_nvme_ssd_count | Number of raw-block local NVMe SSD disks to be attached to the node.Each local SSD is 375 GB in size. If zero, it means no raw-block local NVMe SSD disks to be attached to the node. | 0 | Optional |
321
322
| machine_type | The name of a Google Compute Engine machine type | e2-medium | Optional |
322
323
| min_cpu_platform | Minimum CPU platform to be used by the nodes in the pool. The nodes may be scheduled on the specified or newer CPU platform. | " " | Optional |
324
+
| enable_confidential_storage | Enabling Confidential Storage will create boot disk with confidential mode. | false | Optional |
323
325
| max_count | Maximum number of nodes in the NodePool. Must be >= min_count. Cannot be used with total limits. | 100 | Optional |
324
326
| total_max_count | Total maximum number of nodes in the NodePool. Must be >= min_count. Cannot be used with per zone limits. | null | Optional |
325
327
| max_pods_per_node | The maximum number of pods per node in this cluster | null | Optional |
Copy file name to clipboardExpand all lines: autogen/main/README.md
+2-3Lines changed: 2 additions & 3 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -201,9 +201,7 @@ The node_pools variable takes the following parameters:
201
201
| cpu_cfs_quota | Enforces the Pod's CPU limit. Setting this value to false means that the CPU limits for Pods are ignored | null | Optional |
202
202
| cpu_cfs_quota_period | The CPU CFS quota period value, which specifies the period of how often a cgroup's access to CPU resources should be reallocated | null | Optional |
203
203
| pod_pids_limit | Controls the maximum number of processes allowed to run in a pod. The value must be greater than or equal to 1024 and less than 4194304. | null | Optional |
204
-
{% if beta_cluster %}
205
-
| enable\_confidential\_nodes | An optional flag to enable confidential node config. |`bool`|`false`| no |
206
-
{% endif %}
204
+
| enable_confidential_nodes | An optional flag to enable confidential node config. | false | Optional |
207
205
| disk_size_gb | Size of the disk attached to each node, specified in GB. The smallest allowed disk size is 10GB | 100 | Optional |
208
206
| disk_type | Type of the disk attached to each node (e.g. 'pd-standard' or 'pd-ssd') | pd-standard | Optional |
209
207
| effect | Effect for the taint || Required |
@@ -225,6 +223,7 @@ The node_pools variable takes the following parameters:
225
223
| local_nvme_ssd_count | Number of raw-block local NVMe SSD disks to be attached to the node.Each local SSD is 375 GB in size. If zero, it means no raw-block local NVMe SSD disks to be attached to the node. | 0 | Optional |
226
224
| machine_type | The name of a Google Compute Engine machine type | e2-medium | Optional |
227
225
| min_cpu_platform | Minimum CPU platform to be used by the nodes in the pool. The nodes may be scheduled on the specified or newer CPU platform. | " " | Optional |
226
+
| enable_confidential_storage | Enabling Confidential Storage will create boot disk with confidential mode. | false | Optional |
228
227
| max_count | Maximum number of nodes in the NodePool. Must be >= min_count. Cannot be used with total limits. | 100 | Optional |
229
228
| total_max_count | Total maximum number of nodes in the NodePool. Must be >= min_count. Cannot be used with per zone limits. | null | Optional |
230
229
| max_pods_per_node | The maximum number of pods per node in this cluster | null | Optional |
description = "List of services to monitor: SYSTEM_COMPONENTS, WORKLOADS. Empty list is default GKE configuration."
811
+
description = "List of services to monitor: SYSTEM_COMPONENTS, APISERVER, SCHEDULER, CONTROLLER_MANAGER, STORAGE, HPA, POD, DAEMONSET, DEPLOYMENT, STATEFULSET, KUBELET, CADVISOR and DCGM. In beta provider, WORKLOADS is supported on top of those 12 values. (WORKLOADS is deprecated and removed in GKE 1.24.) KUBELET and CADVISOR are only supported in GKE 1.29.3-gke.1093000 and above. Empty list is default GKE configuration."
812
812
default = []
813
813
}
814
814
815
815
variable "logging_enabled_components" {
816
816
type = list(string)
817
-
description = "List of services to monitor: SYSTEM_COMPONENTS, WORKLOADS. Empty list is default GKE configuration."
817
+
description = "List of services to monitor: SYSTEM_COMPONENTS, APISERVER, CONTROLLER_MANAGER, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration."
Copy file name to clipboardExpand all lines: modules/beta-autopilot-private-cluster/README.md
+4-4Lines changed: 4 additions & 4 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -137,8 +137,8 @@ Then perform the following commands on the root folder:
137
137
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
138
138
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. |`string`|`"REGULAR"`| no |
139
139
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
140
-
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
141
-
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
140
+
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
141
+
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
142
142
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create\_service\_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service\_account\_name variable. |`string`|`""`| no |
143
143
| service\_account\_name | The name of the service account that will be created if create\_service\_account is true. If you wish to use an existing service account, use service\_account variable. |`string`|`""`| no |
144
144
| service\_external\_ips | Whether external ips specified by a service will be allowed in this cluster |`bool`|`false`| no |
@@ -150,8 +150,8 @@ Then perform the following commands on the root folder:
150
150
| subnetwork | The subnetwork to host the cluster in (required) |`string`| n/a | yes |
151
151
| timeouts | Timeout for cluster operations. |`map(string)`|`{}`| no |
152
152
| upstream\_nameservers | If specified, the values replace the nameservers taken by default from the node’s /etc/resolv.conf |`list(string)`|`[]`| no |
| workload\_vulnerability\_mode | (beta) Vulnerability mode. |`string`|`""`| no |
153
+
| workload\_config\_audit\_mode | (beta) Sets which mode of auditing should be used for the cluster's workloads. Accepted values are DISABLED, BASIC. |`string`|`"DISABLED"`| no |
154
+
| workload\_vulnerability\_mode | (beta) Sets which mode to use for Protect workload vulnerability scanning feature. Accepted values are DISABLED, BASIC. |`string`|`""`| no |
155
155
| zones | The zones to host the cluster in (optional if regional cluster / required if zonal) |`list(string)`|`[]`| no |
0 commit comments