You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/dyn/gkeonprem_v1.projects.locations.vmwareAdminClusters.html
+4Lines changed: 4 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -177,6 +177,7 @@ <h3>Method Details</h3>
177
177
"konnectivityServerNodePort": 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
178
178
},
179
179
"metalLbConfig": { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
180
+
"enabled": True or False, # Whether MetalLB is enabled.
180
181
},
181
182
"seesawConfig": { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the 'CreateVmwareCluster' API method. First you will need to create the user cluster's namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the 'VmwareCluster.local_name' to disambiguate collisions; for more context see the documentation of 'VmwareCluster.local_name'. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called 'user-cluster-creds' and contain Seesaw's SSH and Cert credentials. The credentials must be keyed with the following names: 'seesaw-ssh-private-key', 'seesaw-ssh-public-key', 'seesaw-ssh-ca-key', 'seesaw-ssh-ca-cert'. # Output only. Configuration for Seesaw typed load balancers.
182
183
"enableHa": True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
@@ -508,6 +509,7 @@ <h3>Method Details</h3>
508
509
"konnectivityServerNodePort": 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
509
510
},
510
511
"metalLbConfig": { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
512
+
"enabled": True or False, # Whether MetalLB is enabled.
511
513
},
512
514
"seesawConfig": { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the 'CreateVmwareCluster' API method. First you will need to create the user cluster's namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the 'VmwareCluster.local_name' to disambiguate collisions; for more context see the documentation of 'VmwareCluster.local_name'. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called 'user-cluster-creds' and contain Seesaw's SSH and Cert credentials. The credentials must be keyed with the following names: 'seesaw-ssh-private-key', 'seesaw-ssh-public-key', 'seesaw-ssh-ca-key', 'seesaw-ssh-ca-cert'. # Output only. Configuration for Seesaw typed load balancers.
513
515
"enableHa": True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
@@ -808,6 +810,7 @@ <h3>Method Details</h3>
808
810
"konnectivityServerNodePort": 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
809
811
},
810
812
"metalLbConfig": { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
813
+
"enabled": True or False, # Whether MetalLB is enabled.
811
814
},
812
815
"seesawConfig": { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the 'CreateVmwareCluster' API method. First you will need to create the user cluster's namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the 'VmwareCluster.local_name' to disambiguate collisions; for more context see the documentation of 'VmwareCluster.local_name'. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called 'user-cluster-creds' and contain Seesaw's SSH and Cert credentials. The credentials must be keyed with the following names: 'seesaw-ssh-private-key', 'seesaw-ssh-public-key', 'seesaw-ssh-ca-key', 'seesaw-ssh-ca-cert'. # Output only. Configuration for Seesaw typed load balancers.
813
816
"enableHa": True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
@@ -1070,6 +1073,7 @@ <h3>Method Details</h3>
1070
1073
"konnectivityServerNodePort": 42, # NodePort for konnectivity server service running as a sidecar in each kube-apiserver pod (ex. 30564).
1071
1074
},
1072
1075
"metalLbConfig": { # VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed. # MetalLB load balancers.
1076
+
"enabled": True or False, # Whether MetalLB is enabled.
1073
1077
},
1074
1078
"seesawConfig": { # VmwareSeesawConfig represents configuration parameters for an already existing Seesaw load balancer. IMPORTANT: Please note that the Anthos On-Prem API will not generate or update Seesaw configurations it can only bind a pre-existing configuration to a new user cluster. IMPORTANT: When attempting to create a user cluster with a pre-existing Seesaw load balancer you will need to follow some preparation steps before calling the 'CreateVmwareCluster' API method. First you will need to create the user cluster's namespace via kubectl. The namespace will need to use the following naming convention : -gke-onprem-mgmt or -gke-onprem-mgmt depending on whether you used the 'VmwareCluster.local_name' to disambiguate collisions; for more context see the documentation of 'VmwareCluster.local_name'. Once the namespace is created you will need to create a secret resource via kubectl. This secret will contain copies of your Seesaw credentials. The Secret must be called 'user-cluster-creds' and contain Seesaw's SSH and Cert credentials. The credentials must be keyed with the following names: 'seesaw-ssh-private-key', 'seesaw-ssh-public-key', 'seesaw-ssh-ca-key', 'seesaw-ssh-ca-cert'. # Output only. Configuration for Seesaw typed load balancers.
1075
1079
"enableHa": True or False, # Enable two load balancer VMs to achieve a highly-available Seesaw load balancer.
Copy file name to clipboardExpand all lines: googleapiclient/discovery_cache/documents/gkeonprem.v1.json
+7-2Lines changed: 7 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -3094,7 +3094,7 @@
3094
3094
}
3095
3095
}
3096
3096
},
3097
-
"revision": "20241023",
3097
+
"revision": "20241110",
3098
3098
"rootUrl": "https://gkeonprem.googleapis.com/",
3099
3099
"schemas": {
3100
3100
"Authorization": {
@@ -5837,7 +5837,12 @@
5837
5837
"VmwareAdminMetalLbConfig": {
5838
5838
"description": "VmwareAdminMetalLbConfig represents configuration parameters for a MetalLB load balancer. For admin clusters, currently no configurations is needed.",
0 commit comments