You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: modules/beta-autopilot-private-cluster/README.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -84,16 +84,16 @@ Then perform the following commands on the root folder:
84
84
| create\_service\_account | Defines if service account specified to run nodes should be created. |`bool`|`true`| no |
85
85
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. |`list(object({ state = string, key_name = string }))`| <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
86
86
| deletion\_protection | Whether or not to allow Terraform to destroy the cluster. |`bool`|`true`| no |
87
-
| deploy\_using\_private\_endpoint |(Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. |`bool`|`false`| no |
87
+
| deploy\_using\_private\_endpoint | A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. |`bool`|`false`| no |
88
88
| description | The description of the cluster |`string`|`""`| no |
89
89
| disable\_default\_snat | Whether to disable the default SNAT to support the private use of public IP addresses |`bool`|`false`| no |
90
90
| dns\_cache | The status of the NodeLocal DNSCache addon. |`bool`|`true`| no |
91
91
| enable\_confidential\_nodes | An optional flag to enable confidential node config. |`bool`|`false`| no |
92
92
| enable\_cost\_allocation | Enables Cost Allocation Feature and the cluster name and namespace of your GKE workloads appear in the labels field of the billing export to BigQuery |`bool`|`false`| no |
93
93
| enable\_fqdn\_network\_policy | Enable FQDN Network Policies on the cluster |`bool`|`null`| no |
94
94
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
95
-
| enable\_private\_endpoint |(Beta) Whether the master's internal IP address is used as the cluster endpoint |`bool`|`false`| no |
96
-
| enable\_private\_nodes |(Beta) Whether nodes have internal IP addresses only |`bool`|`false`| no |
95
+
| enable\_private\_endpoint | Whether the master's internal IP address is used as the cluster endpoint |`bool`|`false`| no |
96
+
| enable\_private\_nodes | Whether nodes have internal IP addresses only |`bool`|`false`| no |
97
97
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
98
98
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
99
99
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it |`bool`|`true`| no |
@@ -118,7 +118,7 @@ Then perform the following commands on the root folder:
118
118
| maintenance\_start\_time | Time window specified for daily or recurring maintenance operations in RFC3339 format |`string`|`"05:00"`| no |
119
119
| master\_authorized\_networks | List of master authorized networks. If none are provided, disallow external access (except the cluster node IPs, which GKE automatically whitelists). |`list(object({ cidr_block = string, display_name = string }))`|`[]`| no |
120
120
| master\_global\_access\_enabled | Whether the cluster master is accessible globally (from any region) or only within the same region as the private endpoint. |`bool`|`true`| no |
121
-
| master\_ipv4\_cidr\_block |(Beta) The IP range in CIDR notation to use for the hosted master network. Optional for Autopilot clusters. |`string`|`null`| no |
121
+
| master\_ipv4\_cidr\_block | The IP range in CIDR notation to use for the hosted master network. Optional for Autopilot clusters. |`string`|`null`| no |
122
122
| name | The name of the cluster (required) |`string`| n/a | yes |
123
123
| network | The VPC network to host the cluster in (required) |`string`| n/a | yes |
124
124
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster-update-variant/README.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -190,7 +190,7 @@ Then perform the following commands on the root folder:
190
190
| datapath\_provider | The desired datapath provider for this cluster. By default, `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation. `ADVANCED_DATAPATH` enables Dataplane-V2 feature. |`string`|`"DATAPATH_PROVIDER_UNSPECIFIED"`| no |
191
191
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node |`number`|`110`| no |
192
192
| deletion\_protection | Whether or not to allow Terraform to destroy the cluster. |`bool`|`true`| no |
193
-
| deploy\_using\_private\_endpoint |(Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. |`bool`|`false`| no |
193
+
| deploy\_using\_private\_endpoint | A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. |`bool`|`false`| no |
194
194
| description | The description of the cluster |`string`|`""`| no |
195
195
| disable\_default\_snat | Whether to disable the default SNAT to support the private use of public IP addresses |`bool`|`false`| no |
196
196
| disable\_legacy\_metadata\_endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. |`bool`|`true`| no |
@@ -207,8 +207,8 @@ Then perform the following commands on the root folder:
207
207
| enable\_mesh\_certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. |`bool`|`false`| no |
208
208
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
209
209
| enable\_pod\_security\_policy | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. Pod Security Policy was removed from GKE clusters with version >= 1.25.0. |`bool`|`false`| no |
210
-
| enable\_private\_endpoint |(Beta) Whether the master's internal IP address is used as the cluster endpoint |`bool`|`false`| no |
211
-
| enable\_private\_nodes |(Beta) Whether nodes have internal IP addresses only |`bool`|`false`| no |
210
+
| enable\_private\_endpoint | Whether the master's internal IP address is used as the cluster endpoint |`bool`|`false`| no |
211
+
| enable\_private\_nodes | Whether nodes have internal IP addresses only |`bool`|`false`| no |
212
212
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
213
213
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
214
214
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
@@ -244,7 +244,7 @@ Then perform the following commands on the root folder:
244
244
| maintenance\_start\_time | Time window specified for daily or recurring maintenance operations in RFC3339 format |`string`|`"05:00"`| no |
245
245
| master\_authorized\_networks | List of master authorized networks. If none are provided, disallow external access (except the cluster node IPs, which GKE automatically whitelists). |`list(object({ cidr_block = string, display_name = string }))`|`[]`| no |
246
246
| master\_global\_access\_enabled | Whether the cluster master is accessible globally (from any region) or only within the same region as the private endpoint. |`bool`|`true`| no |
247
-
| master\_ipv4\_cidr\_block |(Beta) The IP range in CIDR notation to use for the hosted master network. Optional for Autopilot clusters. |`string`|`"10.0.0.0/28"`| no |
247
+
| master\_ipv4\_cidr\_block | The IP range in CIDR notation to use for the hosted master network. Optional for Autopilot clusters. |`string`|`"10.0.0.0/28"`| no |
248
248
| monitoring\_enable\_managed\_prometheus | Configuration for Managed Service for Prometheus. Whether or not the managed collection is enabled. |`bool`|`false`| no |
249
249
| monitoring\_enable\_observability\_metrics | Whether or not the advanced datapath metrics are enabled. |`bool`|`false`| no |
250
250
| monitoring\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster/README.md
+4-4Lines changed: 4 additions & 4 deletions
Original file line number
Diff line number
Diff line change
@@ -168,7 +168,7 @@ Then perform the following commands on the root folder:
168
168
| datapath\_provider | The desired datapath provider for this cluster. By default, `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation. `ADVANCED_DATAPATH` enables Dataplane-V2 feature. |`string`|`"DATAPATH_PROVIDER_UNSPECIFIED"`| no |
169
169
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node |`number`|`110`| no |
170
170
| deletion\_protection | Whether or not to allow Terraform to destroy the cluster. |`bool`|`true`| no |
171
-
| deploy\_using\_private\_endpoint |(Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. |`bool`|`false`| no |
171
+
| deploy\_using\_private\_endpoint | A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. |`bool`|`false`| no |
172
172
| description | The description of the cluster |`string`|`""`| no |
173
173
| disable\_default\_snat | Whether to disable the default SNAT to support the private use of public IP addresses |`bool`|`false`| no |
174
174
| disable\_legacy\_metadata\_endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. |`bool`|`true`| no |
@@ -185,8 +185,8 @@ Then perform the following commands on the root folder:
185
185
| enable\_mesh\_certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. |`bool`|`false`| no |
186
186
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
187
187
| enable\_pod\_security\_policy | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. Pod Security Policy was removed from GKE clusters with version >= 1.25.0. |`bool`|`false`| no |
188
-
| enable\_private\_endpoint |(Beta) Whether the master's internal IP address is used as the cluster endpoint |`bool`|`false`| no |
189
-
| enable\_private\_nodes |(Beta) Whether nodes have internal IP addresses only |`bool`|`false`| no |
188
+
| enable\_private\_endpoint | Whether the master's internal IP address is used as the cluster endpoint |`bool`|`false`| no |
189
+
| enable\_private\_nodes | Whether nodes have internal IP addresses only |`bool`|`false`| no |
190
190
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
191
191
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
192
192
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! |`bool`|`false`| no |
@@ -222,7 +222,7 @@ Then perform the following commands on the root folder:
222
222
| maintenance\_start\_time | Time window specified for daily or recurring maintenance operations in RFC3339 format |`string`|`"05:00"`| no |
223
223
| master\_authorized\_networks | List of master authorized networks. If none are provided, disallow external access (except the cluster node IPs, which GKE automatically whitelists). |`list(object({ cidr_block = string, display_name = string }))`|`[]`| no |
224
224
| master\_global\_access\_enabled | Whether the cluster master is accessible globally (from any region) or only within the same region as the private endpoint. |`bool`|`true`| no |
225
-
| master\_ipv4\_cidr\_block |(Beta) The IP range in CIDR notation to use for the hosted master network. Optional for Autopilot clusters. |`string`|`"10.0.0.0/28"`| no |
225
+
| master\_ipv4\_cidr\_block | The IP range in CIDR notation to use for the hosted master network. Optional for Autopilot clusters. |`string`|`"10.0.0.0/28"`| no |
226
226
| monitoring\_enable\_managed\_prometheus | Configuration for Managed Service for Prometheus. Whether or not the managed collection is enabled. |`bool`|`false`| no |
227
227
| monitoring\_enable\_observability\_metrics | Whether or not the advanced datapath metrics are enabled. |`bool`|`false`| no |
228
228
| monitoring\_enabled\_components | List of services to monitor: SYSTEM\_COMPONENTS, WORKLOADS. Empty list is default GKE configuration. |`list(string)`|`[]`| no |
0 commit comments