You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* support gcs fuse addon ([#1722](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1722))
15
+
* Add support for disk_size and disk_type for cluster_autoscaling. ([#1693](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1693))
16
+
17
+
### Features
18
+
19
+
* add project and location output to fleet-membership ([#1740](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1740)) ([825bda6](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/825bda616c6bb28cf56a0b59f5833e3fecdd9eb5))
20
+
* Add support for disk_size and disk_type for cluster_autoscaling. ([#1693](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1693)) ([fd233e5](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/fd233e5cddd9098b6e6520b0671eb16f77a5c187))
21
+
* Add support for Logging Variant to enable max throughput option ([#1616](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1616)) ([acd2d41](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/acd2d410c550a3fbca0cac400d1d07e2d3dc5cd8))
22
+
* mesh_certificates support ([#1712](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1712)) ([8913ef2](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/8913ef27d6c97ae2c57d747ff29ca175a15833e7))
23
+
* promote config_connector_config to ga ([#1559](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1559)) ([ae63848](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/ae6384899909cea52f1f50a140d7c85b335b64eb))
24
+
* support configuring ACM git service account email ([#1685](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1685)) ([426f06f](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/426f06f4ecbc4816cac5cad4e2a0b35a58d426b3))
25
+
* support gcs fuse addon ([#1722](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1722)) ([2f5a276](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/2f5a2769fada01333b178d0bc9ec1e8192535043))
26
+
27
+
28
+
### Bug Fixes
29
+
30
+
* random zones only when zones are not provided ([#1709](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/1709)) ([50ea965](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/50ea96505135c390e64482e4af053ee1191697a7))
@@ -130,13 +135,15 @@ Then perform the following commands on the root folder:
130
135
| add\_cluster\_firewall\_rules | Create additional firewall rules |`bool`|`false`| no |
131
136
| add\_master\_webhook\_firewall\_rules | Create master\_webhook firewall rules for ports defined in `firewall_inbound_ports`|`bool`|`false`| no |
132
137
| add\_shadow\_firewall\_rules | Create GKE shadow firewall (the same as default firewall rules with firewall logs enabled). |`bool`|`false`| no |
138
+
| additional\_ip\_range\_pods | List of _names_ of the additional secondary subnet ip ranges to use for pods |`list(string)`|`[]`| no |
133
139
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]|`string`|`null`| no |
| cluster\_dns\_domain | The suffix used for all cluster service records. |`string`|`""`| no |
136
142
| cluster\_dns\_provider | Which in-cluster DNS provider should be used. PROVIDER\_UNSPECIFIED (default) or PLATFORM\_DEFAULT or CLOUD\_DNS. |`string`|`"PROVIDER_UNSPECIFIED"`| no |
137
143
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. |`string`|`"DNS_SCOPE_UNSPECIFIED"`| no |
138
144
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. |`string`|`null`| no |
139
145
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster |`map(string)`|`{}`| no |
146
+
| config\_connector | Whether ConfigConnector is enabled for this cluster. |`bool`|`false`| no |
140
147
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. |`bool`|`false`| no |
141
148
| create\_service\_account | Defines if service account specified to run nodes should be created. |`bool`|`true`| no |
142
149
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. |`list(object({ state = string, key_name = string }))`| <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
@@ -149,6 +156,7 @@ Then perform the following commands on the root folder:
149
156
| enable\_binary\_authorization | Enable BinAuthZ Admission controller |`bool`|`false`| no |
150
157
| enable\_cost\_allocation | Enables Cost Allocation Feature and the cluster name and namespace of your GKE workloads appear in the labels field of the billing export to BigQuery |`bool`|`false`| no |
151
158
| enable\_kubernetes\_alpha | Whether to enable Kubernetes Alpha features for this cluster. Note that when this option is enabled, the cluster cannot be upgraded and will be automatically deleted after 30 days. |`bool`|`false`| no |
159
+
| enable\_mesh\_certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. |`bool`|`false`| no |
152
160
| enable\_network\_egress\_export | Whether to enable network egress metering for this cluster. If enabled, a daemonset will be created in the cluster to meter network egress traffic. |`bool`|`false`| no |
153
161
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. |`bool`|`true`| no |
154
162
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster |`bool`|`true`| no |
@@ -158,6 +166,7 @@ Then perform the following commands on the root folder:
158
166
| firewall\_priority | Priority rule for firewall rules |`number`|`1000`| no |
159
167
| gateway\_api\_channel | The gateway api channel of this cluster. Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`. |`string`|`null`| no |
160
168
| gce\_pd\_csi\_driver | Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. |`bool`|`true`| no |
169
+
| gcs\_fuse\_csi\_driver | Whether GCE FUSE CSI driver is enabled for this cluster. |`bool`|`false`| no |
161
170
| gke\_backup\_agent\_config | Whether Backup for GKE agent is enabled for this cluster. |`bool`|`false`| no |
162
171
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles. |`bool`|`false`| no |
163
172
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon |`bool`|`true`| no |
@@ -231,6 +240,7 @@ Then perform the following commands on the root folder:
231
240
| logging\_service | Logging service used |
232
241
| master\_authorized\_networks\_config | Networks from which access to master is permitted |
233
242
| master\_version | Current master kubernetes version |
| min\_master\_version | Minimum master kubernetes version |
235
245
| monitoring\_service | Monitoring service used |
236
246
| name | Cluster name |
@@ -271,6 +281,7 @@ The node_pools variable takes the following parameters:
271
281
| image_type | The image type to use for this node. Note that changing the image type will delete and recreate all nodes in the node pool | COS_CONTAINERD | Optional |
272
282
| initial_node_count | The initial number of nodes for the pool. In regional or multi-zonal clusters, this is the number of nodes per zone. Changing this will force recreation of the resource. Defaults to the value of min_count | " " | Optional |
273
283
| key | The key required for the taint || Required |
284
+
| logging_variant | The type of logging agent that is deployed by default for newly created node pools in the cluster. Valid values include DEFAULT and MAX_THROUGHPUT. | DEFAULT | Optional |
274
285
| local_ssd_count | The amount of local SSD disks that will be attached to each cluster node and may be used as a `hostpath` volume or a `local` PersistentVolume. | 0 | Optional |
275
286
| machine_type | The name of a Google Compute Engine machine type | e2-medium | Optional |
276
287
| min_cpu_platform | Minimum CPU platform to be used by the nodes in the pool. The nodes may be scheduled on the specified or newer CPU platform. | " " | Optional |
@@ -317,7 +328,7 @@ The [project factory](https://github.com/terraform-google-modules/terraform-goog
-[Terraform Provider for GCP][terraform-provider-google] v4.51
322
333
#### gcloud
323
334
Some submodules use the [terraform-google-gcloud](https://github.com/terraform-google-modules/terraform-google-gcloud) module. By default, this module assumes you already have gcloud installed in your $PATH.
@@ -346,3 +357,4 @@ In order to operate with the Service Account you must activate the following API
0 commit comments