You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+24-2Lines changed: 24 additions & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -129,46 +129,63 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
129
129
130
130
| Name | Description | Type | Default | Required |
131
131
|------|-------------|:----:|:-----:|:-----:|
132
+
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]| string |`"null"`| no |
132
133
| basic\_auth\_password | The password to be used with Basic Authentication. | string |`""`| no |
133
134
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. | string |`""`| no |
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | string |`""`| no |
135
137
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | map(string) |`<map>`| no |
136
138
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | string |`"false"`| no |
137
139
| create\_service\_account | Defines if service account specified to run nodes should be created. | bool |`"true"`| no |
140
+
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key_name is the name of a CloudKMS key. | object |`<list>`| no |
141
+
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | string |`"110"`| no |
142
+
| deploy\_using\_private\_endpoint | (Beta) A toggle for Terraform and kubectl to connect to the master's internal IP address during deployment. | bool |`"false"`| no |
138
143
| description | The description of the cluster | string |`""`| no |
139
144
| disable\_legacy\_metadata\_endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | bool |`"true"`| no |
| enable\_intranode\_visibility | Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network | bool |`"false"`| no |
147
+
| enable\_private\_endpoint | (Beta) Whether the master's internal IP address is used as the cluster endpoint | bool |`"false"`| no |
148
+
| enable\_private\_nodes | (Beta) Whether nodes have internal IP addresses only | bool |`"false"`| no |
149
+
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool |`"false"`| no |
140
150
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool |`"false"`| no |
141
151
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool |`"true"`| no |
| initial\_node\_count | The number of nodes to create in this cluster's default node pool. | number |`"0"`| no |
144
155
| ip\_masq\_link\_local | Whether to masquerade traffic to the link-local prefix (169.254.0.0/16). | bool |`"false"`| no |
145
156
| ip\_masq\_resync\_interval | The interval at which the agent attempts to sync its ConfigMap file from the disk. | string |`"60s"`| no |
146
157
| ip\_range\_pods | The _name_ of the secondary subnet ip range to use for pods | string | n/a | yes |
147
158
| ip\_range\_services | The _name_ of the secondary subnet range to use for services | string | n/a | yes |
148
159
| issue\_client\_certificate | Issues a client certificate to authenticate to the cluster endpoint. To maximize the security of your cluster, leave this option disabled. Client certificates don't automatically rotate and aren't easily revocable. WARNING: changing this after cluster creation is destructive! | bool |`"false"`| no |
| kubernetes\_version | The Kubernetes version of the masters. If set to 'latest' it will pull latest available version in the selected region. | string |`"latest"`| no |
151
163
| logging\_service | The logging service that the cluster should write logs to. Available options include logging.googleapis.com, logging.googleapis.com/kubernetes (beta), and none | string |`"logging.googleapis.com"`| no |
152
164
| maintenance\_start\_time | Time window specified for daily maintenance operations in RFC3339 format | string |`"05:00"`| no |
153
165
| master\_authorized\_networks\_config | The desired configuration options for master authorized networks. The object format is {cidr_blocks = list(object({cidr_block = string, display_name = string}))}. Omit the nested cidr_blocks attribute to disallow external access (except the cluster node IPs, which GKE automatically whitelists). | object |`<list>`| no |
166
+
| master\_ipv4\_cidr\_block | (Beta) The IP range in CIDR notation to use for the hosted master network | string |`"10.0.0.0/28"`| no |
154
167
| monitoring\_service | The monitoring service that the cluster should write metrics to. Automatically send metrics from pods in the cluster to the Google Cloud Monitoring API. VM metrics will be collected by Google Compute Engine regardless of this setting Available options include monitoring.googleapis.com, monitoring.googleapis.com/kubernetes (beta) and none | string |`"monitoring.googleapis.com"`| no |
155
168
| name | The name of the cluster (required) | string | n/a | yes |
156
169
| network | The VPC network to host the cluster in (required) | string | n/a | yes |
| network\_policy\_provider | The network policy provider. | string |`"CALICO"`| no |
159
172
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) | string |`""`| no |
173
+
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node | string |`"SECURE"`| no |
160
174
| node\_pools | List of maps containing node pools | list(map(string)) |`<list>`| no |
161
175
| node\_pools\_labels | Map of maps containing node labels by node-pool name | map(map(string)) |`<map>`| no |
162
176
| node\_pools\_metadata | Map of maps containing node metadata by node-pool name | map(map(string)) |`<map>`| no |
163
177
| node\_pools\_oauth\_scopes | Map of lists containing node oauth scopes by node-pool name | map(list(string)) |`<map>`| no |
164
178
| node\_pools\_tags | Map of lists containing node network tags by node-pool name | map(list(string)) |`<map>`| no |
179
+
| node\_pools\_taints | Map of lists containing node taints by node-pool name | object |`<map>`| no |
165
180
| node\_version | The Kubernetes version of the node pools. Defaults kubernetes_version (master) variable and can be overridden for individual node pools by setting the `version` key on them. Must be empyty or set the same as master at cluster creation. | string |`""`| no |
166
181
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
182
+
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
167
183
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
168
-
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
184
+
| region | The region to host the cluster in (required) | string |n/a|yes|
169
185
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
170
-
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
171
186
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
187
+
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
188
+
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
172
189
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
173
190
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
174
191
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
@@ -180,9 +197,12 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
180
197
| Name | Description |
181
198
|------|-------------|
182
199
| ca\_certificate | Cluster ca certificate (base64 encoded) |
200
+
| cloudrun\_enabled | Whether CloudRun enabled |
183
201
| endpoint | Cluster endpoint |
184
202
| horizontal\_pod\_autoscaling\_enabled | Whether horizontal pod autoscaling enabled |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster-update-variant/README.md
+3Lines changed: 3 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -258,6 +258,9 @@ following project roles:
258
258
- roles/iam.serviceAccountUser
259
259
- roles/resourcemanager.projectIamAdmin (only required if `service_account` is set to `create`)
260
260
261
+
Additionally, if `service_account` is set to `create` and `grant_registry_access` is requested, the service account requires the following role on the `registry_project_id` project:
262
+
- roles/resourcemanager.projectIamAdmin
263
+
261
264
### Enable APIs
262
265
In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:
description="Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project."
274
+
default=""
275
+
}
276
+
270
277
variable"service_account" {
271
278
type=string
272
279
description="The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created."
Copy file name to clipboardExpand all lines: modules/beta-private-cluster/README.md
+1-2Lines changed: 1 addition & 2 deletions
Original file line number
Diff line number
Diff line change
@@ -188,9 +188,8 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
188
188
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
189
189
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
190
190
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
191
-
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
191
+
| region | The region to host the cluster in (required) | string |n/a|yes|
192
192
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
193
-
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
194
193
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
195
194
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
196
195
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
0 commit comments