You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+2-24Lines changed: 2 additions & 24 deletions
Original file line number
Diff line number
Diff line change
@@ -129,63 +129,46 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
129
129
130
130
| Name | Description | Type | Default | Required |
131
131
|------|-------------|:----:|:-----:|:-----:|
132
-
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]| string |`"null"`| no |
133
132
| basic\_auth\_password | The password to be used with Basic Authentication. | string |`""`| no |
134
133
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. | string |`""`| no |
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | string |`""`| no |
137
135
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | map(string) |`<map>`| no |
138
136
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | string |`"false"`| no |
139
137
| create\_service\_account | Defines if service account specified to run nodes should be created. | bool |`"true"`| no |
140
-
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key_name is the name of a CloudKMS key. | object |`<list>`| no |
141
-
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | string |`"110"`| no |
142
-
| deploy\_using\_private\_endpoint | (Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. | bool |`"false"`| no |
143
138
| description | The description of the cluster | string |`""`| no |
144
139
| disable\_legacy\_metadata\_endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | bool |`"true"`| no |
| enable\_intranode\_visibility | Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network | bool |`"false"`| no |
147
-
| enable\_private\_endpoint | (Beta) Whether the master's internal IP address is used as the cluster endpoint | bool |`"false"`| no |
148
-
| enable\_private\_nodes | (Beta) Whether nodes have internal IP addresses only | bool |`"false"`| no |
149
-
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool |`"false"`| no |
150
140
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool |`"false"`| no |
151
141
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool |`"true"`| no |
| initial\_node\_count | The number of nodes to create in this cluster's default node pool. | number |`"0"`| no |
155
144
| ip\_masq\_link\_local | Whether to masquerade traffic to the link-local prefix (169.254.0.0/16). | bool |`"false"`| no |
156
145
| ip\_masq\_resync\_interval | The interval at which the agent attempts to sync its ConfigMap file from the disk. | string |`"60s"`| no |
157
146
| ip\_range\_pods | The _name_ of the secondary subnet ip range to use for pods | string | n/a | yes |
158
147
| ip\_range\_services | The _name_ of the secondary subnet range to use for services | string | n/a | yes |
159
148
| issue\_client\_certificate | Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive! | bool |`"false"`| no |
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. | string |`"latest"`| no |
163
151
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none | string |`"logging.googleapis.com"`| no |
164
152
| maintenance\_start\_time | Time window specified for daily maintenance operations in RFC3339 format | string |`"05:00"`| no |
165
153
| master\_authorized\_networks\_config | The desired configuration options for master authorized networks. The object format is {cidr_blocks = list(object({cidr_block = string, display_name = string}))}. Omit the nested cidr_blocks attribute to disallow external access (except the cluster node IPs, which GKE automatically whitelists). | object |`<list>`| no |
166
-
| master\_ipv4\_cidr\_block | (Beta) The IP range in CIDR notation to use for the hosted master network | string |`"10.0.0.0/28"`| no |
167
154
| monitoring\_service | The monitoring service that the cluster should write metrics to. Automatically send metrics from pods in the cluster to the Google Cloud Monitoring API. VM metrics will be collected by Google Compute Engine regardless of this setting Available options include monitoring.googleapis.com, monitoring.googleapis.com/kubernetes (beta) and none | string |`"monitoring.googleapis.com"`| no |
168
155
| name | The name of the cluster (required) | string | n/a | yes |
169
156
| network | The VPC network to host the cluster in (required) | string | n/a | yes |
| network\_policy\_provider | The network policy provider. | string |`"CALICO"`| no |
172
159
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) | string |`""`| no |
173
-
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node | string |`"SECURE"`| no |
174
160
| node\_pools | List of maps containing node pools | list(map(string)) |`<list>`| no |
175
161
| node\_pools\_labels | Map of maps containing node labels by node-pool name | map(map(string)) |`<map>`| no |
176
162
| node\_pools\_metadata | Map of maps containing node metadata by node-pool name | map(map(string)) |`<map>`| no |
177
163
| node\_pools\_oauth\_scopes | Map of lists containing node oauth scopes by node-pool name | map(list(string)) |`<map>`| no |
178
164
| node\_pools\_tags | Map of lists containing node network tags by node-pool name | map(list(string)) |`<map>`| no |
179
-
| node\_pools\_taints | Map of lists containing node taints by node-pool name | object |`<map>`| no |
180
165
| node\_version | The Kubernetes version of the node pools. Defaults kubernetes_version (master) variable and can be overridden for individual node pools by setting the `version` key on them. Must be empyty or set the same as master at cluster creation. | string |`""`| no |
181
166
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
182
-
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
183
167
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
184
-
| region | The region to host the cluster in (required) | string |n/a|yes|
168
+
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
185
169
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
170
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
186
171
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
187
-
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
188
-
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
189
172
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
190
173
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
191
174
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
@@ -197,12 +180,9 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
197
180
| Name | Description |
198
181
|------|-------------|
199
182
| ca\_certificate | Cluster ca certificate (base64 encoded) |
200
-
| cloudrun\_enabled | Whether CloudRun enabled |
201
183
| endpoint | Cluster endpoint |
202
184
| horizontal\_pod\_autoscaling\_enabled | Whether horizontal pod autoscaling enabled |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster-update-variant/README.md
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -188,8 +188,9 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
188
188
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
189
189
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
190
190
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
191
-
| region | The region to host the cluster in (required) | string |n/a|yes|
191
+
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
192
192
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
193
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
193
194
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
194
195
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
195
196
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster/README.md
+2-1Lines changed: 2 additions & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -188,8 +188,9 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
188
188
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
189
189
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
190
190
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
191
-
| region | The region to host the cluster in (required) | string |n/a|yes|
191
+
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
192
192
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
193
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
193
194
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
194
195
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
195
196
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
Copy file name to clipboardExpand all lines: modules/beta-public-cluster/README.md
+2-5Lines changed: 2 additions & 5 deletions
Original file line number
Diff line number
Diff line change
@@ -141,13 +141,10 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
141
141
| create\_service\_account | Defines if service account specified to run nodes should be created. | bool |`"true"`| no |
142
142
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key_name is the name of a CloudKMS key. | object |`<list>`| no |
143
143
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | string |`"110"`| no |
144
-
| deploy\_using\_private\_endpoint | (Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. | bool |`"false"`| no |
145
144
| description | The description of the cluster | string |`""`| no |
146
145
| disable\_legacy\_metadata\_endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | bool |`"true"`| no |
| enable\_intranode\_visibility | Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network | bool |`"false"`| no |
149
-
| enable\_private\_endpoint | (Beta) Whether the master's internal IP address is used as the cluster endpoint | bool |`"false"`| no |
150
-
| enable\_private\_nodes | (Beta) Whether nodes have internal IP addresses only | bool |`"false"`| no |
151
148
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool |`"false"`| no |
152
149
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool |`"false"`| no |
153
150
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool |`"true"`| no |
@@ -165,7 +162,6 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
165
162
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none | string |`"logging.googleapis.com"`| no |
166
163
| maintenance\_start\_time | Time window specified for daily maintenance operations in RFC3339 format | string |`"05:00"`| no |
167
164
| master\_authorized\_networks\_config | The desired configuration options for master authorized networks. The object format is {cidr_blocks = list(object({cidr_block = string, display_name = string}))}. Omit the nested cidr_blocks attribute to disallow external access (except the cluster node IPs, which GKE automatically whitelists). | object |`<list>`| no |
168
-
| master\_ipv4\_cidr\_block | (Beta) The IP range in CIDR notation to use for the hosted master network | string |`"10.0.0.0/28"`| no |
169
165
| monitoring\_service | The monitoring service that the cluster should write metrics to. Automatically send metrics from pods in the cluster to the Google Cloud Monitoring API. VM metrics will be collected by Google Compute Engine regardless of this setting Available options include monitoring.googleapis.com, monitoring.googleapis.com/kubernetes (beta) and none | string |`"monitoring.googleapis.com"`| no |
170
166
| name | The name of the cluster (required) | string | n/a | yes |
171
167
| network | The VPC network to host the cluster in (required) | string | n/a | yes |
@@ -183,8 +179,9 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
183
179
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
184
180
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
185
181
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
186
-
| region | The region to host the cluster in (required) | string |n/a|yes|
182
+
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
187
183
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
184
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
188
185
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
189
186
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
190
187
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
0 commit comments