You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2Lines changed: 2 additions & 0 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -162,6 +162,7 @@ Then perform the following commands on the root folder:
162
162
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
163
163
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
164
164
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
165
+
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
165
166
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it |`bool`|`false`| no |
166
167
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes |`bool`|`false`| no |
167
168
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. |`list(string)`| <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
@@ -257,6 +258,7 @@ Then perform the following commands on the root folder:
257
258
| region | Cluster region |
258
259
| release\_channel | The release channel of this cluster |
259
260
| service\_account | The service account to default running nodes as if not overridden in `node_pools`. |
261
+
| tpu\_ipv4\_cidr\_block | The IP range in CIDR notation used for the TPUs |
260
262
| type | Cluster type (regional / zonal) |
261
263
| vertical\_pod\_autoscaling\_enabled | Whether vertical pod autoscaling enabled |
262
264
| zones | List of zones in which the cluster resides |
Copy file name to clipboardExpand all lines: modules/beta-autopilot-private-cluster/variables.tf
+1Lines changed: 1 addition & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -433,6 +433,7 @@ variable "enable_tpu" {
433
433
description="Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive!"
434
434
default=false
435
435
}
436
+
436
437
variable"database_encryption" {
437
438
description="Application-layer Secrets Encryption settings. The object format is {state = string, key_name = string}. Valid values of state are: \"ENCRYPTED\"; \"DECRYPTED\". key_name is the name of a CloudKMS key."
438
439
type=list(object({ state =string, key_name =string }))
0 commit comments