Skip to content

Commit 093d723

Browse files
committed
chore: make build
1 parent f3bcb5c commit 093d723

File tree

27 files changed

+88
-50
lines changed

27 files changed

+88
-50
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@ Then perform the following commands on the root folder:
137137
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
138138
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
139139
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
140+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
140141
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
141142
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
142143
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,11 @@ resource "google_container_cluster" "primary" {
192192
enabled = gke_backup_agent_config.value.enabled
193193
}
194194
}
195+
196+
config_connector_config {
197+
enabled = var.config_connector
198+
}
199+
195200
}
196201

197202
datapath_provider = var.datapath_provider

modules/beta-autopilot-private-cluster/variables.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -412,7 +412,6 @@ variable "database_encryption" {
412412
}]
413413
}
414414

415-
416415
variable "timeouts" {
417416
type = map(string)
418417
description = "Timeout for cluster operations."

modules/beta-autopilot-public-cluster/variables.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -382,7 +382,6 @@ variable "database_encryption" {
382382
}]
383383
}
384384

385-
386385
variable "timeouts" {
387386
type = map(string)
388387
description = "Timeout for cluster operations."

modules/beta-private-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Then perform the following commands on the root folder:
172172
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
173173
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
174174
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
175-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
175+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
176176
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
177177
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
178178
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-private-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -225,6 +225,11 @@ resource "google_container_cluster" "primary" {
225225
}
226226
}
227227

228+
config_connector_config {
229+
enabled = var.config_connector
230+
}
231+
232+
228233
istio_config {
229234
disabled = !var.istio
230235
auth = var.istio_auth
@@ -241,10 +246,6 @@ resource "google_container_cluster" "primary" {
241246
kalm_config {
242247
enabled = var.kalm_config
243248
}
244-
245-
config_connector_config {
246-
enabled = var.config_connector
247-
}
248249
}
249250

250251
datapath_provider = var.datapath_provider

modules/beta-private-cluster-update-variant/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -620,6 +620,12 @@ variable "gke_backup_agent_config" {
620620
default = false
621621
}
622622

623+
variable "config_connector" {
624+
type = bool
625+
description = "Whether ConfigConnector is enabled for this cluster."
626+
default = false
627+
}
628+
623629
variable "timeouts" {
624630
type = map(string)
625631
description = "Timeout for cluster operations."
@@ -671,12 +677,6 @@ variable "kalm_config" {
671677
default = false
672678
}
673679

674-
variable "config_connector" {
675-
type = bool
676-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
677-
default = false
678-
}
679-
680680
variable "cloudrun" {
681681
description = "(Beta) Enable CloudRun addon"
682682
default = false

modules/beta-private-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ Then perform the following commands on the root folder:
150150
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
151151
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
152152
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
153-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
153+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
154154
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
155155
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
156156
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-private-cluster/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -225,6 +225,11 @@ resource "google_container_cluster" "primary" {
225225
}
226226
}
227227

228+
config_connector_config {
229+
enabled = var.config_connector
230+
}
231+
232+
228233
istio_config {
229234
disabled = !var.istio
230235
auth = var.istio_auth
@@ -241,10 +246,6 @@ resource "google_container_cluster" "primary" {
241246
kalm_config {
242247
enabled = var.kalm_config
243248
}
244-
245-
config_connector_config {
246-
enabled = var.config_connector
247-
}
248249
}
249250

250251
datapath_provider = var.datapath_provider

modules/beta-private-cluster/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -620,6 +620,12 @@ variable "gke_backup_agent_config" {
620620
default = false
621621
}
622622

623+
variable "config_connector" {
624+
type = bool
625+
description = "Whether ConfigConnector is enabled for this cluster."
626+
default = false
627+
}
628+
623629
variable "timeouts" {
624630
type = map(string)
625631
description = "Timeout for cluster operations."
@@ -671,12 +677,6 @@ variable "kalm_config" {
671677
default = false
672678
}
673679

674-
variable "config_connector" {
675-
type = bool
676-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
677-
default = false
678-
}
679-
680680
variable "cloudrun" {
681681
description = "(Beta) Enable CloudRun addon"
682682
default = false

modules/beta-public-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ Then perform the following commands on the root folder:
166166
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
167167
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
168168
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
169-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
169+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
170170
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
171171
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
172172
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-public-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -225,6 +225,11 @@ resource "google_container_cluster" "primary" {
225225
}
226226
}
227227

228+
config_connector_config {
229+
enabled = var.config_connector
230+
}
231+
232+
228233
istio_config {
229234
disabled = !var.istio
230235
auth = var.istio_auth
@@ -241,10 +246,6 @@ resource "google_container_cluster" "primary" {
241246
kalm_config {
242247
enabled = var.kalm_config
243248
}
244-
245-
config_connector_config {
246-
enabled = var.config_connector
247-
}
248249
}
249250

250251
datapath_provider = var.datapath_provider

modules/beta-public-cluster-update-variant/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -590,6 +590,12 @@ variable "gke_backup_agent_config" {
590590
default = false
591591
}
592592

593+
variable "config_connector" {
594+
type = bool
595+
description = "Whether ConfigConnector is enabled for this cluster."
596+
default = false
597+
}
598+
593599
variable "timeouts" {
594600
type = map(string)
595601
description = "Timeout for cluster operations."
@@ -641,12 +647,6 @@ variable "kalm_config" {
641647
default = false
642648
}
643649

644-
variable "config_connector" {
645-
type = bool
646-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
647-
default = false
648-
}
649-
650650
variable "cloudrun" {
651651
description = "(Beta) Enable CloudRun addon"
652652
default = false

modules/beta-public-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Then perform the following commands on the root folder:
144144
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
145145
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
146146
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
147-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
147+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
148148
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
149149
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
150150
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-public-cluster/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -225,6 +225,11 @@ resource "google_container_cluster" "primary" {
225225
}
226226
}
227227

228+
config_connector_config {
229+
enabled = var.config_connector
230+
}
231+
232+
228233
istio_config {
229234
disabled = !var.istio
230235
auth = var.istio_auth
@@ -241,10 +246,6 @@ resource "google_container_cluster" "primary" {
241246
kalm_config {
242247
enabled = var.kalm_config
243248
}
244-
245-
config_connector_config {
246-
enabled = var.config_connector
247-
}
248249
}
249250

250251
datapath_provider = var.datapath_provider

modules/beta-public-cluster/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -590,6 +590,12 @@ variable "gke_backup_agent_config" {
590590
default = false
591591
}
592592

593+
variable "config_connector" {
594+
type = bool
595+
description = "Whether ConfigConnector is enabled for this cluster."
596+
default = false
597+
}
598+
593599
variable "timeouts" {
594600
type = map(string)
595601
description = "Timeout for cluster operations."
@@ -641,12 +647,6 @@ variable "kalm_config" {
641647
default = false
642648
}
643649

644-
variable "config_connector" {
645-
type = bool
646-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
647-
default = false
648-
}
649-
650650
variable "cloudrun" {
651651
description = "(Beta) Enable CloudRun addon"
652652
default = false

modules/private-cluster-update-variant/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,7 @@ Then perform the following commands on the root folder:
165165
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
166166
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
167167
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
168+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
168169
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
169170
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
170171
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/private-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,11 @@ resource "google_container_cluster" "primary" {
192192
enabled = gke_backup_agent_config.value.enabled
193193
}
194194
}
195+
196+
config_connector_config {
197+
enabled = var.config_connector
198+
}
199+
195200
}
196201

197202
datapath_provider = var.datapath_provider

modules/private-cluster-update-variant/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -591,6 +591,12 @@ variable "gke_backup_agent_config" {
591591
default = false
592592
}
593593

594+
variable "config_connector" {
595+
type = bool
596+
description = "Whether ConfigConnector is enabled for this cluster."
597+
default = false
598+
}
599+
594600
variable "timeouts" {
595601
type = map(string)
596602
description = "Timeout for cluster operations."

modules/private-cluster/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,7 @@ Then perform the following commands on the root folder:
143143
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
144144
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
145145
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
146+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
146147
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
147148
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
148149
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/private-cluster/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -192,6 +192,11 @@ resource "google_container_cluster" "primary" {
192192
enabled = gke_backup_agent_config.value.enabled
193193
}
194194
}
195+
196+
config_connector_config {
197+
enabled = var.config_connector
198+
}
199+
195200
}
196201

197202
datapath_provider = var.datapath_provider

modules/private-cluster/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -591,6 +591,12 @@ variable "gke_backup_agent_config" {
591591
default = false
592592
}
593593

594+
variable "config_connector" {
595+
type = bool
596+
description = "Whether ConfigConnector is enabled for this cluster."
597+
default = false
598+
}
599+
594600
variable "timeouts" {
595601
type = map(string)
596602
description = "Timeout for cluster operations."

modules/safer-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ For simplicity, we suggest using `roles/container.admin` and
210210
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
211211
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
212212
| compute\_engine\_service\_account | Use the given service account for nodes rather than creating a new dedicated service account. | `string` | `""` | no |
213-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
213+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
214214
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
215215
| datapath\_provider | The desired datapath provider for this cluster. By default, `ADVANCED_DATAPATH` enables Dataplane-V2 feature. `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation as a fallback since upgrading to V2 requires a cluster re-creation. | `string` | `"ADVANCED_DATAPATH"` | no |
216216
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | `number` | `110` | no |

modules/safer-cluster-update-variant/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -464,7 +464,7 @@ variable "firewall_inbound_ports" {
464464

465465
variable "config_connector" {
466466
type = bool
467-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
467+
description = "Whether ConfigConnector is enabled for this cluster."
468468
default = false
469469
}
470470

modules/safer-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ For simplicity, we suggest using `roles/container.admin` and
210210
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
211211
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
212212
| compute\_engine\_service\_account | Use the given service account for nodes rather than creating a new dedicated service account. | `string` | `""` | no |
213-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
213+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
214214
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
215215
| datapath\_provider | The desired datapath provider for this cluster. By default, `ADVANCED_DATAPATH` enables Dataplane-V2 feature. `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation as a fallback since upgrading to V2 requires a cluster re-creation. | `string` | `"ADVANCED_DATAPATH"` | no |
216216
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | `number` | `110` | no |

0 commit comments

Comments
 (0)