You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -197,7 +197,7 @@ Then perform the following commands on the root folder:
197
197
| ip\_range\_services | The _name_ of the secondary subnet range to use for services |`string`| n/a | yes |
198
198
| issue\_client\_certificate | Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
199
199
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. |`string`|`"latest"`| no |
200
-
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, CONTROLLER\_MANAGER, KCP\_CONNECTION, KCP\_SSHD, SCHEDULER, and WORKLOADS Empty list is default GKE configuration. |`list(string)`|`[]`| no |
200
+
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, CONTROLLER\_MANAGER, KCP\_CONNECTION, KCP\_SSHD, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
201
201
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none |`string`|`"logging.googleapis.com/kubernetes"`| no |
202
202
| maintenance\_end\_time | Time window specified for recurring maintenance operations in RFC3339 format |`string`|`""`| no |
203
203
| maintenance\_exclusions | List of maintenance exclusions. A cluster can have up to three |`list(object({ name = string, start_time = string, end_time = string, exclusion_scope = string }))`|`[]`| no |
description = "List of services to monitor: SYSTEM_COMPONENTS, APISERVER, CONTROLLER_MANAGER, KCP_CONNECTION, KCP_SSHD, SCHEDULER, and WORKLOADS Empty list is default GKE configuration."
882
+
description = "List of services to monitor: SYSTEM_COMPONENTS, APISERVER, CONTROLLER_MANAGER, KCP_CONNECTION, KCP_SSHD, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration."
| add\_cluster\_firewall\_rules | Create additional firewall rules |`bool`|`false`| no |
70
-
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
71
-
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
72
-
| additional\_ip\_range\_pods | List of _names_ of the additional secondary subnet ip ranges to use for pods |`list(string)`|`[]`| no |
73
-
| allow\_net\_admin | (Optional) Enable NET\_ADMIN for the cluster. |`bool`|`null`| no |
74
-
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]|`string`|`null`| no |
75
-
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. |`string`|`null`| no |
76
-
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster |`map(string)`|`{}`| no |
77
-
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. |`bool`|`false`| no |
78
-
| create\_service\_account | Defines if service account specified to run nodes should be created. |`bool`|`true`| no |
79
-
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. |`list(object({ state = string, key_name = string }))`| <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
80
-
| deletion\_protection | Whether or not to allow Terraform to destroy the cluster. |`bool`|`true`| no |
81
-
| description | The description of the cluster |`string`|`""`| no |
82
-
| disable\_default\_snat | Whether to disable the default SNAT to support the private use of public IP addresses |`bool`|`false`| no |
83
-
| dns\_cache | The status of the NodeLocal DNSCache addon. |`bool`|`true`| no |
84
-
| enable\_binary\_authorization | Enable BinAuthZ Admission controller |`bool`|`false`| no |
85
-
| enable\_cilium\_clusterwide\_network\_policy | Enable Cilium Cluster Wide Network Policies on the cluster |`bool`|`false`| no |
86
-
| enable\_confidential\_nodes | An optional flag to enable confidential node config. |`bool`|`false`| no |
87
-
| enable\_cost\_allocation | Enables Cost Allocation Feature and the cluster name and namespace of your GKE workloads appear in the labels field of the billing export to BigQuery |`bool`|`false`| no |
88
-
| enable\_fqdn\_network\_policy | Enable FQDN Network Policies on the cluster |`bool`|`null`| no |
89
-
| enable\_gcfs | (Beta) Enable image streaming on cluster level. |`bool`|`true`| no |
90
-
| enable\_l4\_ilb\_subsetting | Enable L4 ILB Subsetting on the cluster |`bool`|`false`| no |
91
-
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
92
-
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
93
-
| enable\_secret\_manager\_addon | (Beta) Enable the Secret Manager add-on for this cluster |`bool`|`false`| no |
94
-
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
95
-
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it |`bool`|`true`| no |
96
-
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes |`bool`|`false`| no |
97
-
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. |`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
98
-
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
99
-
| fleet\_project | (Optional) Register the cluster with the fleet in this project. |`string`|`null`| no |
100
-
| fleet\_project\_grant\_service\_agent | (Optional) Grant the fleet project service identity the `roles/gkehub.serviceAgent` and `roles/gkehub.crossProjectServiceAgent` roles. |`bool`|`false`| no |
101
-
| gateway\_api\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. |`string`|`null`| no |
102
-
| gcp\_public\_cidrs\_access\_enabled | Allow access through Google Cloud public IP addresses |`bool`|`null`| no |
103
-
| gcs\_fuse\_csi\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. |`bool`|`false`| no |
104
-
| gke\_backup\_agent\_config | Whether Backup for GKE agent is enabled for this cluster. |`bool`|`false`| no |
105
-
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
106
-
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
107
-
| http\_load\_balancing | Enable httpload balancer addon |`bool`|`true`| no |
108
-
| identity\_namespace | The workload pool to attach all Kubernetes service accounts to. (Default value of `enabled` automatically sets project-based pool `[project_id].svc.id.goog`) |`string`|`"enabled"`| no |
109
-
| ip\_masq\_link\_local | Whether to masquerade traffic to the link-local prefix (169.254.0.0/16). |`bool`|`false`| no |
110
-
| ip\_masq\_resync\_interval | The interval at which the agent attempts to sync its ConfigMap file from the disk. |`string`|`"60s"`| no |
111
-
| ip\_range\_pods | The _name_ of the secondary subnet ip range to use for pods |`string`| n/a | yes |
112
-
| ip\_range\_services | The _name_ of the secondary subnet range to use for services |`string`| n/a | yes |
113
-
| issue\_client\_certificate | Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
114
-
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. |`string`|`"latest"`| no |
115
-
| logging\_variant | (Optional) The type of logging agent that is deployed by default for newly created node pools in the cluster. Valid values include DEFAULT and MAX\_THROUGHPUT. |`string`|`null`| no |
116
-
| maintenance\_end\_time | Time window specified for recurring maintenance operations in RFC3339 format |`string`|`""`| no |
117
-
| maintenance\_exclusions | List of maintenance exclusions. A cluster can have up to three |`list(object({ name = string, start_time = string, end_time = string, exclusion_scope = string }))`|`[]`| no |
118
-
| maintenance\_recurrence | Frequency of the recurring maintenance window in RFC5545 format. |`string`|`""`| no |
119
-
| maintenance\_start\_time | Time window specified for daily or recurring maintenance operations in RFC3339 format |`string`|`"05:00"`| no |
120
-
| master\_authorized\_networks | List of master authorized networks. If none are provided, disallow external access (except the cluster node IPs, which GKE automatically whitelists). |`list(object({ cidr_block = string, display_name = string }))`|`[]`| no |
121
-
| name | The name of the cluster (required) |`string`| n/a | yes |
122
-
| network | The VPC network to host the cluster in (required) |`string`| n/a | yes |
123
-
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
124
-
| network\_tags | (Optional) - List of network tags applied to auto-provisioned node pools. |`list(string)`|`[]`| no |
125
-
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. |`list(string)`| <pre>[<br> "10.0.0.0/8",<br> "172.16.0.0/12",<br> "192.168.0.0/16"<br>]</pre> | no |
126
-
| notification\_config\_topic | The desired Pub/Sub topic to which notifications will be sent by GKE. Format is projects/{project}/topics/{topic}. |`string`|`""`| no |
127
-
| notification\_filter\_event\_type | Choose what type of notifications you want to receive. If no filters are applied, you'll receive all notification types. Can be used to filter what notifications are sent. Accepted values are UPGRADE\_AVAILABLE\_EVENT, UPGRADE\_EVENT, and SECURITY\_BULLETIN\_EVENT. |`list(string)`|`[]`| no |
128
-
| project\_id | The project ID to host the cluster in (required) |`string`| n/a | yes |
129
-
| ray\_operator\_config | The Ray Operator Addon configuration for this cluster. | <pre>object({<br> enabled = bool<br> logging_enabled = optional(bool, false)<br> monitoring_enabled = optional(bool, false)<br> })</pre> | <pre>{<br> "enabled": false,<br> "logging_enabled": false,<br> "monitoring_enabled": false<br>}</pre> | no |
130
-
| region | The region to host the cluster in (optional if zonal cluster / required if regional) |`string`|`null`| no |
131
-
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) |`bool`|`true`| no |
132
-
| registry\_project\_ids | Projects holding Google Container Registries. If empty, we use the cluster project. If a service account is created and the `grant_registry_access` variable is set to `true`, the `storage.objectViewer` and `artifactregsitry.reader` roles are assigned on these projects. |`list(string)`|`[]`| no |
133
-
| release\_channel | The release channel of this cluster. Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`. |`string`|`"REGULAR"`| no |
134
-
| resource\_usage\_export\_dataset\_id | The ID of a BigQuery Dataset for using BigQuery as the destination of resource usage export. |`string`|`""`| no |
135
-
| security\_posture\_mode | Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`. |`string`|`"DISABLED"`| no |
136
-
| security\_posture\_vulnerability\_mode | Security posture vulnerability mode. Accepted values are `VULNERABILITY_DISABLED`, `VULNERABILITY_BASIC`, and `VULNERABILITY_ENTERPRISE`. Defaults to `VULNERABILITY_DISABLED`. |`string`|`"VULNERABILITY_DISABLED"`| no |
137
-
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create\_service\_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service\_account\_name variable. |`string`|`""`| no |
138
-
| service\_account\_name | The name of the service account that will be created if create\_service\_account is true. If you wish to use an existing service account, use service\_account variable. |`string`|`""`| no |
139
-
| service\_external\_ips | Whether external ips specified by a service will be allowed in this cluster |`bool`|`false`| no |
140
-
| shadow\_firewall\_rules\_log\_config | The log\_config for shadow firewall rules. You can set this variable to `null` to disable logging. | <pre>object({<br> metadata = string<br> })</pre> | <pre>{<br> "metadata": "INCLUDE_ALL_METADATA"<br>}</pre> | no |
141
-
| shadow\_firewall\_rules\_priority | The firewall priority of GKE shadow firewall rules. The priority should be less than default firewall, which is 1000. |`number`|`999`| no |
142
-
| stack\_type | The stack type to use for this cluster. Either `IPV4` or `IPV4_IPV6`. Defaults to `IPV4`. |`string`|`"IPV4"`| no |
143
-
| stateful\_ha | Whether the Stateful HA Addon is enabled for this cluster. |`bool`|`false`| no |
144
-
| subnetwork | The subnetwork to host the cluster in (required) |`string`| n/a | yes |
145
-
| timeouts | Timeout for cluster operations. |`map(string)`|`{}`| no |
146
-
| workload\_config\_audit\_mode | (beta) Sets which mode of auditing should be used for the cluster's workloads. Accepted values are DISABLED, BASIC. |`string`|`"DISABLED"`| no |
147
-
| workload\_vulnerability\_mode | (beta) Sets which mode to use for Protect workload vulnerability scanning feature. Accepted values are DISABLED, BASIC. |`string`|`""`| no |
148
-
| zones | The zones to host the cluster in (optional if regional cluster / required if zonal) |`list(string)`|`[]`| no |
149
-
150
-
## Outputs
151
-
152
-
| Name | Description |
153
-
|------|-------------|
154
-
| ca\_certificate | Cluster ca certificate (base64 encoded) |
155
-
| cloudrun\_enabled | Whether CloudRun enabled |
156
-
| cluster\_id | Cluster ID |
157
-
| dns\_cache\_enabled | Whether DNS Cache enabled |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster-update-variant/README.md
+1-1Lines changed: 1 addition & 1 deletion
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -243,7 +243,7 @@ Then perform the following commands on the root folder:
243
243
| istio\_auth | (Beta) The authentication type between services in Istio. |`string`|`"AUTH_MUTUAL_TLS"`| no |
244
244
| kalm\_config | (Beta) Whether KALM is enabled for this cluster. |`bool`|`false`| no |
245
245
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. |`string`|`"latest"`| no |
246
-
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, CONTROLLER\_MANAGER, KCP\_CONNECTION, KCP\_SSHD, SCHEDULER, and WORKLOADS Empty list is default GKE configuration. |`list(string)`|`[]`| no |
246
+
| logging\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, APISERVER, CONTROLLER\_MANAGER, KCP\_CONNECTION, KCP\_SSHD, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
247
247
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none |`string`|`"logging.googleapis.com/kubernetes"`| no |
248
248
| maintenance\_end\_time | Time window specified for recurring maintenance operations in RFC3339 format |`string`|`""`| no |
249
249
| maintenance\_exclusions | List of maintenance exclusions. A cluster can have up to three |`list(object({ name = string, start_time = string, end_time = string, exclusion_scope = string }))`|`[]`| no |
description="List of services to monitor: SYSTEM_COMPONENTS, APISERVER, CONTROLLER_MANAGER, KCP_CONNECTION, KCP_SSHD, SCHEDULER, and WORKLOADS Empty list is default GKE configuration."
841
+
description="List of services to monitor: SYSTEM_COMPONENTS, APISERVER, CONTROLLER_MANAGER, KCP_CONNECTION, KCP_SSHD, SCHEDULER, and WORKLOADS. Empty list is default GKE configuration."
0 commit comments