You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
feat: Introduce add_master_webhook_firewall_rules flag to add webhooks (#882)
- Flag controls exclusive creation of a firewall rule for ports defined in firewall_inbound_ports
- The existing flag add_cluster_firewall_rules is kept on the firewall rule resource for backwards compatibility
| add\_cluster\_firewall\_rules | Create additional firewall rules |`bool`|`false`| no |
127
+
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
127
128
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
128
129
| basic\_auth\_password | The password to be used with Basic Authentication. |`string`|`""`| no |
129
130
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. |`string`|`""`| no |
@@ -141,7 +142,7 @@ Then perform the following commands on the root folder:
141
142
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
142
143
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
143
144
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it |`bool`|`false`| no |
144
-
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers |`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
145
+
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied.|`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
145
146
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
146
147
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
147
148
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. |`bool`|`false`| no |
description = "List of TCP ports for admission/webhook controllers"
586
+
description = "List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied."
| add\_cluster\_firewall\_rules | Create additional firewall rules |`bool`|`false`| no |
158
+
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
158
159
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
159
160
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]|`string`|`null`| no |
160
161
| basic\_auth\_password | The password to be used with Basic Authentication. |`string`|`""`| no |
@@ -187,7 +188,7 @@ Then perform the following commands on the root folder:
187
188
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
188
189
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
189
190
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it |`bool`|`false`| no |
190
-
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers |`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
191
+
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied.|`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
191
192
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
192
193
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`false`| no |
193
194
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
description="List of TCP ports for admission/webhook controllers"
566
+
description="List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied."
| add\_cluster\_firewall\_rules | Create additional firewall rules |`bool`|`false`| no |
136
+
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
136
137
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
137
138
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]|`string`|`null`| no |
138
139
| basic\_auth\_password | The password to be used with Basic Authentication. |`string`|`""`| no |
@@ -165,7 +166,7 @@ Then perform the following commands on the root folder:
165
166
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
166
167
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
167
168
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it |`bool`|`false`| no |
168
-
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers |`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
169
+
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied.|`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
169
170
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
170
171
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`false`| no |
171
172
| gcloud\_upgrade | Whether to upgrade gcloud at runtime |`bool`|`false`| no |
description="List of TCP ports for admission/webhook controllers"
566
+
description="List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied."
0 commit comments