Skip to content

Commit 94dbe4b

Browse files
committed
feat: add gcp_filestore_csi_driver_config to addons config
Signed-off-by: DavidSpek <[email protected]>
1 parent 0d9c44e commit 94dbe4b

40 files changed

+120
-9
lines changed

README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -45,6 +45,7 @@ module "gke" {
4545
http_load_balancing = false
4646
network_policy = false
4747
horizontal_pod_autoscaling = true
48+
filestore_csi_driver = false
4849
4950
node_pools = [
5051
{
@@ -143,6 +144,7 @@ Then perform the following commands on the root folder:
143144
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. | `bool` | `true` | no |
144145
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster | `bool` | `true` | no |
145146
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | `bool` | `false` | no |
147+
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes | `bool` | `false` | no |
146148
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. | `list(string)` | <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
147149
| firewall\_priority | Priority rule for firewall rules | `number` | `1000` | no |
148150
| gcloud\_upgrade | Whether to upgrade gcloud at runtime | `bool` | `false` | no |

autogen/main/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -77,6 +77,7 @@ module "gke" {
7777
network_policy = false
7878
{% endif %}
7979
horizontal_pod_autoscaling = true
80+
filestore_csi_driver = false
8081
{% if private_cluster %}
8182
enable_private_endpoint = true
8283
enable_private_nodes = true

autogen/main/cluster.tf.tmpl

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -185,6 +185,11 @@ resource "google_container_cluster" "primary" {
185185
horizontal_pod_autoscaling {
186186
disabled = !var.horizontal_pod_autoscaling
187187
}
188+
189+
gcp_filestore_csi_driver_config {
190+
enabled = var.filestore_csi_driver
191+
}
192+
188193
{% if autopilot_cluster != true %}
189194
network_policy_config {
190195
disabled = !var.network_policy

autogen/main/main.tf.tmpl

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -186,6 +186,7 @@ locals {
186186
cluster_http_load_balancing_enabled = ! local.cluster_output_http_load_balancing_enabled
187187
cluster_horizontal_pod_autoscaling_enabled = ! local.cluster_output_horizontal_pod_autoscaling_enabled
188188
workload_identity_enabled = ! (var.identity_namespace == null || var.identity_namespace == "null")
189+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
189190
cluster_workload_identity_config = ! local.workload_identity_enabled ? [] : var.identity_namespace == "enabled" ? [{
190191
workload_pool = "${var.project_id}.svc.id.goog" }] : [{ workload_pool = var.identity_namespace
191192
}]

autogen/main/variables.tf.tmpl

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -552,6 +552,12 @@ variable "enable_identity_service" {
552552
}
553553
{% endif %}
554554

555+
variable "filestore_csi_driver" {
556+
type = bool
557+
description = "The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes"
558+
default = false
559+
}
560+
555561
variable "authenticator_security_group" {
556562
type = string
557563
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]"

autogen/main/versions.tf.tmpl

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -24,7 +24,7 @@ terraform {
2424
required_providers {
2525
google-beta = {
2626
source = "hashicorp/google-beta"
27-
version = ">= 4.6.0, < 5.0"
27+
version = ">= 4.10.0, < 5.0"
2828
}
2929
kubernetes = {
3030
source = "hashicorp/kubernetes"
@@ -38,7 +38,7 @@ terraform {
3838
required_providers {
3939
google = {
4040
source = "hashicorp/google"
41-
version = ">= 4.0.0, < 5.0"
41+
version = ">= 4.10.0, < 5.0"
4242
}
4343
kubernetes = {
4444
source = "hashicorp/kubernetes"

cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,11 @@ resource "google_container_cluster" "primary" {
109109
network_policy_config {
110110
disabled = !var.network_policy
111111
}
112+
113+
gcp_filestore_csi_driver_config {
114+
enabled = var.filestore_csi_driver
115+
}
116+
112117
}
113118

114119
datapath_provider = var.datapath_provider

main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -133,6 +133,7 @@ locals {
133133
cluster_monitoring_service = local.cluster_output_monitoring_service
134134
cluster_node_pools_names = local.cluster_output_node_pools_names
135135
cluster_node_pools_versions = local.cluster_output_node_pools_versions
136+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
136137
cluster_network_policy_enabled = !local.cluster_output_network_policy_enabled
137138
cluster_http_load_balancing_enabled = !local.cluster_output_http_load_balancing_enabled
138139
cluster_horizontal_pod_autoscaling_enabled = !local.cluster_output_horizontal_pod_autoscaling_enabled

modules/beta-private-cluster-update-variant/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ module "gke" {
7070
http_load_balancing = false
7171
network_policy = false
7272
horizontal_pod_autoscaling = true
73+
filestore_csi_driver = false
7374
enable_private_endpoint = true
7475
enable_private_nodes = true
7576
master_ipv4_cidr_block = "10.0.0.0/28"
@@ -192,6 +193,7 @@ Then perform the following commands on the root folder:
192193
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster | `bool` | `true` | no |
193194
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! | `bool` | `false` | no |
194195
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | `bool` | `false` | no |
196+
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes | `bool` | `false` | no |
195197
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. | `list(string)` | <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
196198
| firewall\_priority | Priority rule for firewall rules | `number` | `1000` | no |
197199
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `false` | no |

modules/beta-private-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,11 @@ resource "google_container_cluster" "primary" {
161161
disabled = !var.network_policy
162162
}
163163

164+
gcp_filestore_csi_driver_config {
165+
enabled = var.filestore_csi_driver
166+
}
167+
168+
164169
istio_config {
165170
disabled = !var.istio
166171
auth = var.istio_auth

modules/beta-private-cluster-update-variant/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,7 @@ locals {
157157
cluster_monitoring_service = local.cluster_output_monitoring_service
158158
cluster_node_pools_names = local.cluster_output_node_pools_names
159159
cluster_node_pools_versions = local.cluster_output_node_pools_versions
160+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
160161
cluster_network_policy_enabled = !local.cluster_output_network_policy_enabled
161162
cluster_http_load_balancing_enabled = !local.cluster_output_http_load_balancing_enabled
162163
cluster_horizontal_pod_autoscaling_enabled = !local.cluster_output_horizontal_pod_autoscaling_enabled

modules/beta-private-cluster-update-variant/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -516,6 +516,12 @@ variable "enable_identity_service" {
516516
default = false
517517
}
518518

519+
variable "filestore_csi_driver" {
520+
type = bool
521+
description = "The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes"
522+
default = false
523+
}
524+
519525
variable "authenticator_security_group" {
520526
type = string
521527
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]"

modules/beta-private-cluster-update-variant/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ terraform {
2121
required_providers {
2222
google-beta = {
2323
source = "hashicorp/google-beta"
24-
version = ">= 4.6.0, < 5.0"
24+
version = ">= 4.10.0, < 5.0"
2525
}
2626
kubernetes = {
2727
source = "hashicorp/kubernetes"

modules/beta-private-cluster/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ module "gke" {
4848
http_load_balancing = false
4949
network_policy = false
5050
horizontal_pod_autoscaling = true
51+
filestore_csi_driver = false
5152
enable_private_endpoint = true
5253
enable_private_nodes = true
5354
master_ipv4_cidr_block = "10.0.0.0/28"
@@ -170,6 +171,7 @@ Then perform the following commands on the root folder:
170171
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster | `bool` | `true` | no |
171172
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! | `bool` | `false` | no |
172173
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | `bool` | `false` | no |
174+
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes | `bool` | `false` | no |
173175
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. | `list(string)` | <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
174176
| firewall\_priority | Priority rule for firewall rules | `number` | `1000` | no |
175177
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `false` | no |

modules/beta-private-cluster/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,11 @@ resource "google_container_cluster" "primary" {
161161
disabled = !var.network_policy
162162
}
163163

164+
gcp_filestore_csi_driver_config {
165+
enabled = var.filestore_csi_driver
166+
}
167+
168+
164169
istio_config {
165170
disabled = !var.istio
166171
auth = var.istio_auth

modules/beta-private-cluster/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -157,6 +157,7 @@ locals {
157157
cluster_monitoring_service = local.cluster_output_monitoring_service
158158
cluster_node_pools_names = local.cluster_output_node_pools_names
159159
cluster_node_pools_versions = local.cluster_output_node_pools_versions
160+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
160161
cluster_network_policy_enabled = !local.cluster_output_network_policy_enabled
161162
cluster_http_load_balancing_enabled = !local.cluster_output_http_load_balancing_enabled
162163
cluster_horizontal_pod_autoscaling_enabled = !local.cluster_output_horizontal_pod_autoscaling_enabled

modules/beta-private-cluster/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -516,6 +516,12 @@ variable "enable_identity_service" {
516516
default = false
517517
}
518518

519+
variable "filestore_csi_driver" {
520+
type = bool
521+
description = "The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes"
522+
default = false
523+
}
524+
519525
variable "authenticator_security_group" {
520526
type = string
521527
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]"

modules/beta-private-cluster/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ terraform {
2121
required_providers {
2222
google-beta = {
2323
source = "hashicorp/google-beta"
24-
version = ">= 4.6.0, < 5.0"
24+
version = ">= 4.10.0, < 5.0"
2525
}
2626
kubernetes = {
2727
source = "hashicorp/kubernetes"

modules/beta-public-cluster-update-variant/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ module "gke" {
7070
istio = true
7171
cloudrun = true
7272
dns_cache = false
73+
filestore_csi_driver = false
7374
7475
node_pools = [
7576
{
@@ -183,6 +184,7 @@ Then perform the following commands on the root folder:
183184
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster | `bool` | `true` | no |
184185
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! | `bool` | `false` | no |
185186
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | `bool` | `false` | no |
187+
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes | `bool` | `false` | no |
186188
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. | `list(string)` | <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
187189
| firewall\_priority | Priority rule for firewall rules | `number` | `1000` | no |
188190
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `false` | no |

modules/beta-public-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,11 @@ resource "google_container_cluster" "primary" {
161161
disabled = !var.network_policy
162162
}
163163

164+
gcp_filestore_csi_driver_config {
165+
enabled = var.filestore_csi_driver
166+
}
167+
168+
164169
istio_config {
165170
disabled = !var.istio
166171
auth = var.istio_auth

modules/beta-public-cluster-update-variant/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,7 @@ locals {
156156
cluster_monitoring_service = local.cluster_output_monitoring_service
157157
cluster_node_pools_names = local.cluster_output_node_pools_names
158158
cluster_node_pools_versions = local.cluster_output_node_pools_versions
159+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
159160
cluster_network_policy_enabled = !local.cluster_output_network_policy_enabled
160161
cluster_http_load_balancing_enabled = !local.cluster_output_http_load_balancing_enabled
161162
cluster_horizontal_pod_autoscaling_enabled = !local.cluster_output_horizontal_pod_autoscaling_enabled

modules/beta-public-cluster-update-variant/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -485,6 +485,12 @@ variable "enable_identity_service" {
485485
default = false
486486
}
487487

488+
variable "filestore_csi_driver" {
489+
type = bool
490+
description = "The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes"
491+
default = false
492+
}
493+
488494
variable "authenticator_security_group" {
489495
type = string
490496
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]"

modules/beta-public-cluster-update-variant/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ terraform {
2121
required_providers {
2222
google-beta = {
2323
source = "hashicorp/google-beta"
24-
version = ">= 4.6.0, < 5.0"
24+
version = ">= 4.10.0, < 5.0"
2525
}
2626
kubernetes = {
2727
source = "hashicorp/kubernetes"

modules/beta-public-cluster/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -48,6 +48,7 @@ module "gke" {
4848
istio = true
4949
cloudrun = true
5050
dns_cache = false
51+
filestore_csi_driver = false
5152
5253
node_pools = [
5354
{
@@ -161,6 +162,7 @@ Then perform the following commands on the root folder:
161162
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster | `bool` | `true` | no |
162163
| enable\_tpu | Enable Cloud TPU resources in the cluster. WARNING: changing this after cluster creation is destructive! | `bool` | `false` | no |
163164
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | `bool` | `false` | no |
165+
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes | `bool` | `false` | no |
164166
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. | `list(string)` | <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
165167
| firewall\_priority | Priority rule for firewall rules | `number` | `1000` | no |
166168
| gce\_pd\_csi\_driver | (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver. | `bool` | `false` | no |

modules/beta-public-cluster/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -161,6 +161,11 @@ resource "google_container_cluster" "primary" {
161161
disabled = !var.network_policy
162162
}
163163

164+
gcp_filestore_csi_driver_config {
165+
enabled = var.filestore_csi_driver
166+
}
167+
168+
164169
istio_config {
165170
disabled = !var.istio
166171
auth = var.istio_auth

modules/beta-public-cluster/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -156,6 +156,7 @@ locals {
156156
cluster_monitoring_service = local.cluster_output_monitoring_service
157157
cluster_node_pools_names = local.cluster_output_node_pools_names
158158
cluster_node_pools_versions = local.cluster_output_node_pools_versions
159+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
159160
cluster_network_policy_enabled = !local.cluster_output_network_policy_enabled
160161
cluster_http_load_balancing_enabled = !local.cluster_output_http_load_balancing_enabled
161162
cluster_horizontal_pod_autoscaling_enabled = !local.cluster_output_horizontal_pod_autoscaling_enabled

modules/beta-public-cluster/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -485,6 +485,12 @@ variable "enable_identity_service" {
485485
default = false
486486
}
487487

488+
variable "filestore_csi_driver" {
489+
type = bool
490+
description = "The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes"
491+
default = false
492+
}
493+
488494
variable "authenticator_security_group" {
489495
type = string
490496
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]"

modules/beta-public-cluster/versions.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -21,7 +21,7 @@ terraform {
2121
required_providers {
2222
google-beta = {
2323
source = "hashicorp/google-beta"
24-
version = ">= 4.6.0, < 5.0"
24+
version = ">= 4.10.0, < 5.0"
2525
}
2626
kubernetes = {
2727
source = "hashicorp/kubernetes"

modules/private-cluster-update-variant/README.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -70,6 +70,7 @@ module "gke" {
7070
http_load_balancing = false
7171
network_policy = false
7272
horizontal_pod_autoscaling = true
73+
filestore_csi_driver = false
7374
enable_private_endpoint = true
7475
enable_private_nodes = true
7576
master_ipv4_cidr_block = "10.0.0.0/28"
@@ -174,6 +175,7 @@ Then perform the following commands on the root folder:
174175
| enable\_resource\_consumption\_export | Whether to enable resource consumption metering on this cluster. When enabled, a table will be created in the resource export BigQuery dataset to store resource consumption data. The resulting table can be joined with the resource usage table or with BigQuery billing export. | `bool` | `true` | no |
175176
| enable\_shielded\_nodes | Enable Shielded Nodes features on all nodes in this cluster | `bool` | `true` | no |
176177
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | `bool` | `false` | no |
178+
| filestore\_csi\_driver | The status of the Filestore CSI driver addon, which allows the usage of filestore instance as volumes | `bool` | `false` | no |
177179
| firewall\_inbound\_ports | List of TCP ports for admission/webhook controllers. Either flag `add_master_webhook_firewall_rules` or `add_cluster_firewall_rules` (also adds egress rules) must be set to `true` for inbound-ports firewall rules to be applied. | `list(string)` | <pre>[<br> "8443",<br> "9443",<br> "15017"<br>]</pre> | no |
178180
| firewall\_priority | Priority rule for firewall rules | `number` | `1000` | no |
179181
| gcloud\_upgrade | Whether to upgrade gcloud at runtime | `bool` | `false` | no |

modules/private-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -109,6 +109,11 @@ resource "google_container_cluster" "primary" {
109109
network_policy_config {
110110
disabled = !var.network_policy
111111
}
112+
113+
gcp_filestore_csi_driver_config {
114+
enabled = var.filestore_csi_driver
115+
}
116+
112117
}
113118

114119
datapath_provider = var.datapath_provider

modules/private-cluster-update-variant/main.tf

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -134,6 +134,7 @@ locals {
134134
cluster_monitoring_service = local.cluster_output_monitoring_service
135135
cluster_node_pools_names = local.cluster_output_node_pools_names
136136
cluster_node_pools_versions = local.cluster_output_node_pools_versions
137+
cluster_filestore_csi_driver_config = var.filestore_csi_driver
137138
cluster_network_policy_enabled = !local.cluster_output_network_policy_enabled
138139
cluster_http_load_balancing_enabled = !local.cluster_output_http_load_balancing_enabled
139140
cluster_horizontal_pod_autoscaling_enabled = !local.cluster_output_horizontal_pod_autoscaling_enabled

0 commit comments

Comments
 (0)