You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
***deps:** Update Terraform Google Provider to v7 (major) ([#2425](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2425)) ([6967a8f](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/6967a8f2658073959a866b4b638c4e950802eb04))
15
+
16
+
17
+
### Bug Fixes
18
+
19
+
* note org support of Identity Service for GKE ([#2422](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2422)) ([893ba59](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/893ba597d38bef0bc6a47a5d2a37c802f7ce749d))
Copy file name to clipboardExpand all lines: README.md
+6-2Lines changed: 6 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -173,10 +173,12 @@ Then perform the following commands on the root folder:
173
173
| enable\_default\_node\_pools\_metadata | Whether to enable the default node pools metadata key-value pairs such as `cluster_name` and `node_pool`|`bool`|`true`| no |
174
174
| enable\_fqdn\_network\_policy | Enable FQDN Network Policies on the cluster |`bool`|`null`| no |
175
175
| enable\_gcfs | Enable image streaming on cluster level. |`bool`|`false`| no |
176
-
| enable\_identity\_service | (Optional) Enable the Identity Service component, which allows customers to use external identity providers with the K8S API. |`bool`|`false`| no |
176
+
| enable\_identity\_service | (Optional) Enable the Identity Service component, which allows customers to use external identity providers with the K8S API. NOTE: Starting on July 1, 2025, new Google Cloud organizations that you create won't support Identity Service for GKE. |`bool`|`false`| no |
177
177
| enable\_intranode\_visibility | Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network |`bool`|`false`| no |
178
+
| enable\_k8s\_beta\_apis | (Optional) - List of Kubernetes Beta APIs to enable in cluster. |`list(string)`|`[]`| no |
178
179
| enable\_kubernetes\_alpha | Whether to enable Kubernetes Alpha features for this cluster. Note that when this option is enabled, the cluster cannot be upgraded and will be automatically deleted after 30 days. |`bool`|`false`| no |
179
180
| enable\_l4\_ilb\_subsetting | Enable L4 ILB Subsetting on the cluster |`bool`|`false`| no |
181
+
| enable\_legacy\_lustre\_port | Set it to true for GKE cluster runs a version earlier than 1.33.2-gke.4780000. Allows the Lustre CSI driver to initialize LNet (the virtual network layer for Lustre kernel module) using port 6988. This flag is required to workaround a port conflict with the gke-metadata-server on GKE nodes |`bool`|`false`| no |
180
182
| enable\_mesh\_certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. |`bool`|`false`| no |
181
183
| enable\_multi\_networking | Whether multi-networking is enabled for this cluster |`bool`|`null`| no |
182
184
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
@@ -214,6 +216,7 @@ Then perform the following commands on the root folder:
214
216
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, CONTROLLER\_MANAGER, KCP\_CONNECTION, KCP\_SSHD, KCP\_HPA, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
215
217
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none |`string`|`"logging.googleapis.com/kubernetes"`| no |
216
218
| logging\_variant | (Optional) The type of logging agent that is deployed by default for newly created node pools in the cluster. Valid values include DEFAULT and MAX\_THROUGHPUT. |`string`|`null`| no |
219
+
| lustre\_csi\_driver | The status of the Lustre CSI driver addon, which allows the usage of a Lustre instances as volumes |`bool`|`null`| no |
217
220
| maintenance\_end\_time | Time window specified for recurring maintenance operations in RFC3339 format |`string`|`""`| no |
218
221
| maintenance\_exclusions | List of maintenance exclusions. A cluster can have up to three |`list(object({ name = string, start_time = string, end_time = string, exclusion_scope = string }))`|`[]`| no |
219
222
| maintenance\_recurrence | Frequency of the recurring maintenance window in RFC5545 format. |`string`|`""`| no |
@@ -251,6 +254,7 @@ Then perform the following commands on the root folder:
251
254
| parallelstore\_csi\_driver | Whether the Parallelstore CSI driver Addon is enabled for this cluster. |`bool`|`null`| no |
252
255
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
253
256
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
257
+
| rbac\_binding\_config | RBACBindingConfig allows user to restrict ClusterRoleBindings an RoleBindings that can be created. | <pre>object({<br> enable_insecure_binding_system_unauthenticated = optional(bool, null)<br> enable_insecure_binding_system_authenticated = optional(bool, null)<br> })</pre> | <pre>{<br> "enable_insecure_binding_system_authenticated": null,<br> "enable_insecure_binding_system_unauthenticated": null<br>}</pre> | no |
254
258
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
255
259
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
256
260
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
@@ -435,7 +439,7 @@ The [project factory](https://github.com/terraform-google-modules/terraform-goog
description = "The status of the Lustre CSI driver addon, which allows the usage of a Lustre instances as volumes"
784
+
default = null
785
+
}
786
+
787
+
variable "enable_legacy_lustre_port" {
788
+
type = bool
789
+
description = "Set it to true for GKE cluster runs a version earlier than 1.33.2-gke.4780000. Allows the Lustre CSI driver to initialize LNet (the virtual network layer for Lustre kernel module) using port 6988. This flag is required to workaround a port conflict with the gke-metadata-server on GKE nodes"
description = "(Optional) Enable the Identity Service component, which allows customers to use external identity providers with the K8S API."
1122
+
description = "(Optional) Enable the Identity Service component, which allows customers to use external identity providers with the K8S API. NOTE: Starting on July 1, 2025, new Google Cloud organizations that you create won't support Identity Service for GKE."
0 commit comments