You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/acm/README.md
+12-8Lines changed: 12 additions & 8 deletions
Original file line number
Diff line number
Diff line change
@@ -3,6 +3,7 @@
3
3
This module installs [Anthos Config Management](https://cloud.google.com/anthos-config-management/docs/) (ACM) in a Kubernetes cluster.
4
4
5
5
Specifically, this module automates the following steps for [installing ACM](https://cloud.google.com/anthos-config-management/docs/how-to/installing):
6
+
6
7
1. Enabling the ACM feature on the fleet
7
8
2. Registering the cluster to the fleet
8
9
3. Optionally, generating an SSH key for accessing Git and providing it to the Operator
@@ -11,6 +12,7 @@ Specifically, this module automates the following steps for [installing ACM](htt
11
12
6. Optionally, create and configure a Google Cloud Service Account for writing ACM metrics to Cloud Monitoring
12
13
13
14
## Fleet feature
15
+
14
16
Only the first cluster in a fleet should activate the ACM fleet feature.
15
17
16
18
Other clusters should disable feature activation by setting `enable_fleet_feature = false`.
@@ -46,9 +48,10 @@ module "acm" {
46
48
```
47
49
48
50
To deploy this config:
51
+
49
52
1. Configure the [Kubernetes Provider](https://registry.terraform.io/providers/hashicorp/kubernetes/latest/docs) for the target cluster, for example:
3. Inspect the `git_creds_public`[output](#outputs) to retrieve the public key used for accessing Git. Whitelist this key for access to your Git repo. Instructions for some popular Git hosting providers are included for convenience:
64
+
1. Run `terraform apply`
65
+
1. Inspect the `git_creds_public`[output](#outputs) to retrieve the public key used for accessing Git. Whitelist this key for access to your Git repo. Instructions for some popular Git hosting providers are included for convenience:
<!-- BEGINNING OF PRE-COMMIT-TERRAFORM DOCS HOOK -->
70
73
## Inputs
@@ -80,14 +83,15 @@ data "google_client_config" "default" {}
80
83
| enable\_fleet\_feature | Whether to enable the ACM feature on the fleet. |`bool`|`true`| no |
81
84
| enable\_fleet\_registration | Whether to create a new membership. |`bool`|`true`| no |
82
85
| enable\_log\_denies | Whether to enable logging of all denies and dryrun failures for ACM Policy Controller. |`bool`|`false`| no |
86
+
| enable\_mutation | Whether to enable mutations for ACM Policy Controller. |`bool`|`false`| no |
83
87
| enable\_policy\_controller | Whether to enable the ACM Policy Controller on the cluster |`bool`|`true`| no |
84
88
| enable\_referential\_rules | Enables referential constraints which reference another object in it definition and are therefore eventually consistent. |`bool`|`true`| no |
85
89
| hierarchy\_controller | Configurations for Hierarchy Controller. See [Hierarchy Controller docs](https://cloud.google.com/anthos-config-management/docs/how-to/installing-hierarchy-controller) for more details |`map(any)`|`null`| no |
86
90
| https\_proxy | URL for the HTTPS proxy to be used when communicating with the Git repo. |`string`|`null`| no |
87
91
| install\_template\_library | Whether to install the default Policy Controller template library |`bool`|`true`| no |
88
92
| location | GCP location used to reach cluster. |`string`| n/a | yes |
89
93
| metrics\_gcp\_sa\_name | The name of the Google service account for ACM metrics writing |`string`|`"acm-metrics-writer"`| no |
90
-
| policy\_bundles | A list of Policy Controller policy bundles git urls (example: https://github.com/GoogleCloudPlatform/acm-policy-controller-library.git/bundles/policy-essentials-v2022) to install on the cluster. |`list(string)`|`[]`| no |
94
+
| policy\_bundles | A list of Policy Controller policy bundles git urls (example: <https://github.com/GoogleCloudPlatform/acm-policy-controller-library.git/bundles/policy-essentials-v2022>) to install on the cluster. |`list(string)`|`[]`| no |
91
95
| policy\_dir | Subfolder containing configs in ACM Git repo. If un-set, uses Config Management default. |`string`|`""`| no |
92
96
| project\_id | GCP project\_id used to reach cluster. |`string`| n/a | yes |
93
97
| secret\_type | git authentication secret type, is passed through to ConfigManagement spec.git.secretType. Overriden to value 'ssh' if `create_ssh_key` is true |`string`|`"ssh"`| no |
description="Whether to enable mutations for ACM Policy Controller."
139
+
type=bool
140
+
default=false
141
+
}
142
+
137
143
# Hierarchy Controller config
138
144
variable"hierarchy_controller" {
139
145
description="Configurations for Hierarchy Controller. See [Hierarchy Controller docs](https://cloud.google.com/anthos-config-management/docs/how-to/installing-hierarchy-controller) for more details"
0 commit comments