You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -233,7 +233,7 @@ Then perform the following commands on the root folder:
233
233
| network\_policy | Enable network policy addon |`bool`|`false`| no |
234
234
| network\_policy\_provider | The network policy provider. |`string`|`"CALICO"`| no |
235
235
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
236
-
| network\_tags | (Optional) - List of network tags applied to auto-provisioned node pools. |`list(string)`|`[]`| no |
236
+
| network\_tags | (Optional) - List of network tags applied to autopilot and auto-provisioned node pools. |`list(string)`|`[]`| no |
237
237
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node |`string`|`"GKE_METADATA"`| no |
238
238
| node\_pools | List of maps containing node pools |`list(map(any))`| <pre>[<br> {<br> "name": "default-node-pool"<br> }<br>]</pre> | no |
239
239
| node\_pools\_cgroup\_mode | Map of strings containing cgroup node config by node-pool name |`map(string)`| <pre>{<br> "all": "",<br> "default-node-pool": ""<br>}</pre> | no |
@@ -259,6 +259,7 @@ Then perform the following commands on the root folder:
259
259
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
260
260
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. |`string`|`"REGULAR"`| no |
261
261
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
262
+
| resource\_manager\_tags | (Optional) - List of resource manager tags applied to autopilot and auto-provisioned node pools. A maximum of 5 tags can be specified. Tags must be in one of these formats: `tagKeys/{tag_key_id}=tagValues/{tag_value_id}`, `{org_id}/{tag_key_name}={tag_value_name}`, `{project_id}/{tag_key_name}={tag_value_name}`|`map(string)`|`{}`| no |
262
263
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
263
264
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
264
265
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
description = "(Optional) - List of network tags applied to auto-provisioned node pools."
397
+
description = "(Optional) - List of network tags applied to autopilot and auto-provisioned node pools."
398
398
type = list(string)
399
399
default = []
400
400
}
401
401
402
+
variable "resource_manager_tags" {
403
+
description = "(Optional) - List of resource manager tags applied to autopilot and auto-provisioned node pools. A maximum of 5 tags can be specified. Tags must be in one of these formats: \"tagKeys/{tag_key_id}\"=\"tagValues/{tag_value_id}\", \"{org_id}/{tag_key_name}\"=\"{tag_value_name}\", \"{project_id}/{tag_key_name}\"=\"{tag_value_name}\"."
404
+
type = map(string)
405
+
default = {}
406
+
}
407
+
402
408
variable "enable_k8s_beta_apis" {
403
409
description = "(Optional) - List of Kubernetes Beta APIs to enable in cluster."
Copy file name to clipboardExpand all lines: metadata.yaml
+5-1Lines changed: 5 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -400,9 +400,13 @@ spec:
400
400
- https://www.googleapis.com/auth/cloud-platform
401
401
default-node-pool: []
402
402
- name: network_tags
403
-
description: (Optional) - List of network tags applied to auto-provisioned node pools.
403
+
description: (Optional) - List of network tags applied to autopilot and auto-provisioned node pools.
404
404
varType: list(string)
405
405
defaultValue: []
406
+
- name: resource_manager_tags
407
+
description: "(Optional) - List of resource manager tags applied to autopilot and auto-provisioned node pools. A maximum of 5 tags can be specified. Tags must be in one of these formats: `tagKeys/{tag_key_id}=tagValues/{tag_value_id}`, `{org_id}/{tag_key_name}={tag_value_name}`, `{project_id}/{tag_key_name}={tag_value_name}`"
408
+
varType: map(string)
409
+
defaultValue: {}
406
410
- name: enable_k8s_beta_apis
407
411
description: (Optional) - List of Kubernetes Beta APIs to enable in cluster.
Copy file name to clipboardExpand all lines: modules/beta-autopilot-private-cluster/README.md
+2-1Lines changed: 2 additions & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -143,7 +143,7 @@ Then perform the following commands on the root folder:
143
143
| name | The name of the cluster (required) |`string`| n/a | yes |
144
144
| network | The VPC network to host the cluster in (required) |`string`| n/a | yes |
145
145
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
146
-
| network\_tags | (Optional) - List of network tags applied to auto-provisioned node pools. |`list(string)`|`[]`| no |
146
+
| network\_tags | (Optional) - List of network tags applied to autopilot and auto-provisioned node pools. |`list(string)`|`[]`| no |
147
147
| node\_pools\_cgroup\_mode | Specifies the Linux cgroup mode for autopilot Kubernetes nodes in the cluster. Accepted values are `CGROUP_MODE_UNSPECIFIED`, `CGROUP_MODE_V1`, and `CGROUP_MODE_V2`, which determine the control group hierarchy used for resource management. |`string`|`null`| no |
148
148
| notification\_config\_topic | The desired Pub/Sub topic to which notifications will be sent by GKE. Format is projects/{project}/topics/{topic}. |`string`|`""`| no |
149
149
| notification\_filter\_event\_type | Choose what type of notifications you want to receive. If no filters are applied, you'll receive all notification types. Can be used to filter what notifications are sent. Accepted values are UPGRADE\_AVAILABLE\_EVENT, UPGRADE\_EVENT, and SECURITY\_BULLETIN\_EVENT. |`list(string)`|`[]`| no |
@@ -155,6 +155,7 @@ Then perform the following commands on the root folder:
155
155
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
156
156
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
157
157
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. |`string`|`"REGULAR"`| no |
158
+
| resource\_manager\_tags | (Optional) - List of resource manager tags applied to autopilot and auto-provisioned node pools. A maximum of 5 tags can be specified. Tags must be in one of these formats: `tagKeys/{tag_key_id}=tagValues/{tag_value_id}`, `{org_id}/{tag_key_name}={tag_value_name}`, `{project_id}/{tag_key_name}={tag_value_name}`|`map(string)`|`{}`| no |
158
159
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
159
160
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
160
161
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
0 commit comments