Skip to content

Commit f221440

Browse files
feat(gkeonprem): update the api
#### gkeonprem:v1 The following keys were added: - schemas.VmwareAdminMetalLbConfig.properties.enabled.type (Total Keys: 1)
1 parent a3d7bf9 commit f221440

File tree

2 files changed

+11
-2
lines changed

2 files changed

+11
-2
lines changed

docs/dyn/gkeonprem_v1.projects.locations.vmwareAdminClusters.html

Lines changed: 4 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -177,6 +177,7 @@ <h3>Method Details</h3>
177177
&quot;konnectivityServerNodePort&quot;: 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
178178
},
179179
&quot;metalLbConfig&quot;: { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
180+
&quot;enabled&quot;: True or False, # Whether MetalLB is enabled.
180181
},
181182
&quot;seesawConfig&quot;: { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the &#x27;CreateVmwareCluster&#x27; API method. First you will need to create the user cluster&#x27;s namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the &#x27;VmwareCluster.local_name&#x27; to disambiguate collisions; for more context see the documentation of &#x27;VmwareCluster.local_name&#x27;. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called &#x27;user-cluster-creds&#x27; and contain Seesaw&#x27;s SSH and Cert credentials. The credentials must be keyed with the following names: &#x27;seesaw-ssh-private-key&#x27;, &#x27;seesaw-ssh-public-key&#x27;, &#x27;seesaw-ssh-ca-key&#x27;, &#x27;seesaw-ssh-ca-cert&#x27;. # Output only. Configuration for Seesaw typed load balancers.
182183
&quot;enableHa&quot;: True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
@@ -508,6 +509,7 @@ <h3>Method Details</h3>
508509
&quot;konnectivityServerNodePort&quot;: 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
509510
},
510511
&quot;metalLbConfig&quot;: { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
512+
&quot;enabled&quot;: True or False, # Whether MetalLB is enabled.
511513
},
512514
&quot;seesawConfig&quot;: { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the &#x27;CreateVmwareCluster&#x27; API method. First you will need to create the user cluster&#x27;s namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the &#x27;VmwareCluster.local_name&#x27; to disambiguate collisions; for more context see the documentation of &#x27;VmwareCluster.local_name&#x27;. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called &#x27;user-cluster-creds&#x27; and contain Seesaw&#x27;s SSH and Cert credentials. The credentials must be keyed with the following names: &#x27;seesaw-ssh-private-key&#x27;, &#x27;seesaw-ssh-public-key&#x27;, &#x27;seesaw-ssh-ca-key&#x27;, &#x27;seesaw-ssh-ca-cert&#x27;. # Output only. Configuration for Seesaw typed load balancers.
513515
&quot;enableHa&quot;: True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
@@ -808,6 +810,7 @@ <h3>Method Details</h3>
808810
&quot;konnectivityServerNodePort&quot;: 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
809811
},
810812
&quot;metalLbConfig&quot;: { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
813+
&quot;enabled&quot;: True or False, # Whether MetalLB is enabled.
811814
},
812815
&quot;seesawConfig&quot;: { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the &#x27;CreateVmwareCluster&#x27; API method. First you will need to create the user cluster&#x27;s namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the &#x27;VmwareCluster.local_name&#x27; to disambiguate collisions; for more context see the documentation of &#x27;VmwareCluster.local_name&#x27;. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called &#x27;user-cluster-creds&#x27; and contain Seesaw&#x27;s SSH and Cert credentials. The credentials must be keyed with the following names: &#x27;seesaw-ssh-private-key&#x27;, &#x27;seesaw-ssh-public-key&#x27;, &#x27;seesaw-ssh-ca-key&#x27;, &#x27;seesaw-ssh-ca-cert&#x27;. # Output only. Configuration for Seesaw typed load balancers.
813816
&quot;enableHa&quot;: True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
@@ -1070,6 +1073,7 @@ <h3>Method Details</h3>
10701073
&quot;konnectivityServerNodePort&quot;: 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
10711074
},
10721075
&quot;metalLbConfig&quot;: { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
1076+
&quot;enabled&quot;: True or False, # Whether MetalLB is enabled.
10731077
},
10741078
&quot;seesawConfig&quot;: { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the &#x27;CreateVmwareCluster&#x27; API method. First you will need to create the user cluster&#x27;s namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the &#x27;VmwareCluster.local_name&#x27; to disambiguate collisions; for more context see the documentation of &#x27;VmwareCluster.local_name&#x27;. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called &#x27;user-cluster-creds&#x27; and contain Seesaw&#x27;s SSH and Cert credentials. The credentials must be keyed with the following names: &#x27;seesaw-ssh-private-key&#x27;, &#x27;seesaw-ssh-public-key&#x27;, &#x27;seesaw-ssh-ca-key&#x27;, &#x27;seesaw-ssh-ca-cert&#x27;. # Output only. Configuration for Seesaw typed load balancers.
10751079
&quot;enableHa&quot;: True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.

googleapiclient/discovery_cache/documents/gkeonprem.v1.json

Lines changed: 7 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -3094,7 +3094,7 @@
30943094
}
30953095
}
30963096
},
3097-
"revision": "20241023",
3097+
"revision": "20241110",
30983098
"rootUrl": "https://gkeonprem.googleapis.com/",
30993099
"schemas": {
31003100
"Authorization": {
@@ -5837,7 +5837,12 @@
58375837
"VmwareAdminMetalLbConfig": {
58385838
"description": "VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed.",
58395839
"id": "VmwareAdminMetalLbConfig",
5840-
"properties": {},
5840+
"properties": {
5841+
"enabled": {
5842+
"description": "Whether MetalLB is enabled.",
5843+
"type": "boolean"
5844+
}
5845+
},
58415846
"type": "object"
58425847
},
58435848
"VmwareAdminNetworkConfig": {

0 commit comments

Comments
 (0)