You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* Regex for network, subnetwork, CIDR block and Workload Pool in standard and autopilot cluster ([#2479](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2479)) ([4f47d6a](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/4f47d6a4b258300c64c1ae45191ec1b3b96d1ad2))
* add support for anonymous_authentication_config ([#2436](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2436)) ([f27a2dd](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/f27a2ddab530a5952a3e3466174bac20623a5f71))
26
+
* add support for NAP/autopilot resource manager tags ([#2447](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2447)) ([3a1945f](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/3a1945f75479af7e694ec5f1a32f5a61265f2e44))
* add required fields for GKE autopilot and standard cluster ([#2461](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2461)) ([a3da13d](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/a3da13d2dc773b574a1d7b71e406d0265a11d965))
33
+
* syntax in main.tf for field cost_management_config ([#2466](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2466)) ([6a9b284](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/6a9b28408b342cfc423320b02f10cc96b9dad51b))
34
+
* updated description in nodepool field ([#2471](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2471)) ([f43ad46](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/f43ad4686ac68f58024b72c04e7d716c1af1a971))
Copy file name to clipboardExpand all lines: README.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -144,8 +144,9 @@ Then perform the following commands on the root folder:
144
144
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
145
145
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
146
146
| additional\_ip\_range\_pods | List of _names_ of the additional secondary subnet ip ranges to use for pods |`list(string)`|`[]`| no |
147
-
| additional\_pod\_ranges\_config | the configuration for individual additional subnetworks attached to the cluster |`list(object({ subnetwork = string, pod_ipv4_range_names = list(string) }))`|`[]`| no |
147
+
| additional\_ip\_ranges\_config | the configuration for individual additional subnetworks attached to the cluster |`list(object({ subnetwork = string, pod_ipv4_range_names = list(string) }))`|`[]`| no |
148
148
| additive\_vpc\_scope\_dns\_domain | This will enable Cloud DNS additive VPC scope. Must provide a domain name that is unique within the VPC. For this to work cluster\_dns = `CLOUD_DNS` and cluster\_dns\_scope = `CLUSTER_SCOPE` must both be set as well. |`string`|`""`| no |
149
+
| anonymous\_authentication\_config\_mode | Allows users to restrict or enable anonymous access to the cluster. Valid values are `ENABLED` and `LIMITED`. |`string`|`null`| no |
149
150
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]|`string`|`null`| no |
150
151
| boot\_disk\_kms\_key | The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool, if not overridden in `node_pools`. This should be of the form projects/[KEY\_PROJECT\_ID]/locations/[LOCATION]/keyRings/[RING\_NAME]/cryptoKeys/[KEY\_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption|`string`|`null`| no |
@@ -159,6 +160,7 @@ Then perform the following commands on the root folder:
159
160
| create\_service\_account | Defines if service account specified to run nodes should be created. |`bool`|`true`| no |
160
161
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. |`list(object({ state = string, key_name = string }))`| <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
161
162
| datapath\_provider | The desired datapath provider for this cluster. By default, `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation. `ADVANCED_DATAPATH` enables Dataplane-V2 feature. |`string`|`"DATAPATH_PROVIDER_UNSPECIFIED"`| no |
163
+
| default\_compute\_class\_enabled | Enable Spot VMs as the default compute class for Node Auto-Provisioning |`bool`|`null`| no |
162
164
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node |`number`|`110`| no |
163
165
| deletion\_protection | Whether or not to allow Terraform to destroy the cluster. |`bool`|`true`| no |
164
166
| description | The description of the cluster |`string`|`""`| no |
@@ -234,7 +236,7 @@ Then perform the following commands on the root folder:
234
236
| network\_policy | Enable network policy addon |`bool`|`false`| no |
235
237
| network\_policy\_provider | The network policy provider. |`string`|`"CALICO"`| no |
236
238
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
237
-
| network\_tags | (Optional) - List of network tags applied to auto-provisioned node pools. |`list(string)`|`[]`| no |
239
+
| network\_tags | (Optional) - List of network tags applied to autopilot and auto-provisioned node pools. |`list(string)`|`[]`| no |
238
240
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node |`string`|`"GKE_METADATA"`| no |
239
241
| node\_pools | List of maps containing node pools |`list(map(any))`| <pre>[<br> {<br> "name": "default-node-pool"<br> }<br>]</pre> | no |
240
242
| node\_pools\_cgroup\_mode | Map of strings containing cgroup node config by node-pool name |`map(string)`| <pre>{<br> "all": "",<br> "default-node-pool": ""<br>}</pre> | no |
@@ -260,6 +262,7 @@ Then perform the following commands on the root folder:
260
262
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
261
263
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. |`string`|`"REGULAR"`| no |
262
264
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster |`bool`|`false`| no |
265
+
| resource\_manager\_tags | (Optional) - List of resource manager tags applied to autopilot and auto-provisioned node pools. A maximum of 5 tags can be specified. Tags must be in one of these formats: "tagKeys/{tag\_key\_id}"="tagValues/{tag\_value\_id}", "{org\_id}/{tag\_key\_name}"="{tag\_value\_name}", "{project\_id}/{tag\_key\_name}"="{tag\_value\_name}". |`map(string)`|`{}`| no |
263
266
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
264
267
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
265
268
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
description = "(Optional) - List of network tags applied to auto-provisioned node pools."
403
+
description = "(Optional) - List of network tags applied to autopilot and auto-provisioned node pools."
404
404
type = list(string)
405
405
default = []
406
406
}
407
407
408
+
variable "resource_manager_tags" {
409
+
description = "(Optional) - List of resource manager tags applied to autopilot and auto-provisioned node pools. A maximum of 5 tags can be specified. Tags must be in one of these formats: \"tagKeys/{tag_key_id}\"=\"tagValues/{tag_value_id}\", \"{org_id}/{tag_key_name}\"=\"{tag_value_name}\", \"{project_id}/{tag_key_name}\"=\"{tag_value_name}\"."
410
+
type = map(string)
411
+
default = {}
412
+
}
413
+
408
414
variable "enable_k8s_beta_apis" {
409
415
description = "(Optional) - List of Kubernetes Beta APIs to enable in cluster."
description = "Allows users to restrict or enable anonymous access to the cluster. Valid values are `ENABLED` and `LIMITED`."
733
+
type = string
734
+
default = null
735
+
}
736
+
725
737
variable "total_egress_bandwidth_tier" {
726
738
type = string
727
739
description = "Specifies the total network bandwidth tier for NodePools in the cluster. Valid values are `TIER_UNSPECIFIED` and `TIER_1`. Defaults to `TIER_UNSPECIFIED`."
0 commit comments