Skip to content

Commit e1e56ca

Browse files
committed
chore: make build
1 parent 86d21b4 commit e1e56ca

File tree

27 files changed

+88
-50
lines changed

27 files changed

+88
-50
lines changed

README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -137,6 +137,7 @@ Then perform the following commands on the root folder:
137137
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
138138
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
139139
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
140+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
140141
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
141142
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
142143
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,11 @@ resource "google_container_cluster" "primary" {
198198
enabled = gke_backup_agent_config.value.enabled
199199
}
200200
}
201+
202+
config_connector_config {
203+
enabled = var.config_connector
204+
}
205+
201206
}
202207

203208
datapath_provider = var.datapath_provider

modules/beta-autopilot-private-cluster/variables.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -417,7 +417,6 @@ variable "database_encryption" {
417417
}]
418418
}
419419

420-
421420
variable "timeouts" {
422421
type = map(string)
423422
description = "Timeout for cluster operations."

modules/beta-autopilot-public-cluster/variables.tf

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -387,7 +387,6 @@ variable "database_encryption" {
387387
}]
388388
}
389389

390-
391390
variable "timeouts" {
392391
type = map(string)
393392
description = "Timeout for cluster operations."

modules/beta-private-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Then perform the following commands on the root folder:
172172
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
173173
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
174174
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
175-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
175+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
176176
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
177177
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
178178
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-private-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,11 @@ resource "google_container_cluster" "primary" {
231231
}
232232
}
233233

234+
config_connector_config {
235+
enabled = var.config_connector
236+
}
237+
238+
234239
istio_config {
235240
disabled = !var.istio
236241
auth = var.istio_auth
@@ -247,10 +252,6 @@ resource "google_container_cluster" "primary" {
247252
kalm_config {
248253
enabled = var.kalm_config
249254
}
250-
251-
config_connector_config {
252-
enabled = var.config_connector
253-
}
254255
}
255256

256257
datapath_provider = var.datapath_provider

modules/beta-private-cluster-update-variant/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -624,6 +624,12 @@ variable "gke_backup_agent_config" {
624624
default = false
625625
}
626626

627+
variable "config_connector" {
628+
type = bool
629+
description = "Whether ConfigConnector is enabled for this cluster."
630+
default = false
631+
}
632+
627633
variable "timeouts" {
628634
type = map(string)
629635
description = "Timeout for cluster operations."
@@ -675,12 +681,6 @@ variable "kalm_config" {
675681
default = false
676682
}
677683

678-
variable "config_connector" {
679-
type = bool
680-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
681-
default = false
682-
}
683-
684684
variable "cloudrun" {
685685
description = "(Beta) Enable CloudRun addon"
686686
default = false

modules/beta-private-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -150,7 +150,7 @@ Then perform the following commands on the root folder:
150150
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
151151
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
152152
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
153-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
153+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
154154
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
155155
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
156156
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-private-cluster/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,11 @@ resource "google_container_cluster" "primary" {
231231
}
232232
}
233233

234+
config_connector_config {
235+
enabled = var.config_connector
236+
}
237+
238+
234239
istio_config {
235240
disabled = !var.istio
236241
auth = var.istio_auth
@@ -247,10 +252,6 @@ resource "google_container_cluster" "primary" {
247252
kalm_config {
248253
enabled = var.kalm_config
249254
}
250-
251-
config_connector_config {
252-
enabled = var.config_connector
253-
}
254255
}
255256

256257
datapath_provider = var.datapath_provider

modules/beta-private-cluster/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -624,6 +624,12 @@ variable "gke_backup_agent_config" {
624624
default = false
625625
}
626626

627+
variable "config_connector" {
628+
type = bool
629+
description = "Whether ConfigConnector is enabled for this cluster."
630+
default = false
631+
}
632+
627633
variable "timeouts" {
628634
type = map(string)
629635
description = "Timeout for cluster operations."
@@ -675,12 +681,6 @@ variable "kalm_config" {
675681
default = false
676682
}
677683

678-
variable "config_connector" {
679-
type = bool
680-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
681-
default = false
682-
}
683-
684684
variable "cloudrun" {
685685
description = "(Beta) Enable CloudRun addon"
686686
default = false

modules/beta-public-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -166,7 +166,7 @@ Then perform the following commands on the root folder:
166166
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
167167
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
168168
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
169-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
169+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
170170
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
171171
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
172172
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-public-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,11 @@ resource "google_container_cluster" "primary" {
231231
}
232232
}
233233

234+
config_connector_config {
235+
enabled = var.config_connector
236+
}
237+
238+
234239
istio_config {
235240
disabled = !var.istio
236241
auth = var.istio_auth
@@ -247,10 +252,6 @@ resource "google_container_cluster" "primary" {
247252
kalm_config {
248253
enabled = var.kalm_config
249254
}
250-
251-
config_connector_config {
252-
enabled = var.config_connector
253-
}
254255
}
255256

256257
datapath_provider = var.datapath_provider

modules/beta-public-cluster-update-variant/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -594,6 +594,12 @@ variable "gke_backup_agent_config" {
594594
default = false
595595
}
596596

597+
variable "config_connector" {
598+
type = bool
599+
description = "Whether ConfigConnector is enabled for this cluster."
600+
default = false
601+
}
602+
597603
variable "timeouts" {
598604
type = map(string)
599605
description = "Timeout for cluster operations."
@@ -645,12 +651,6 @@ variable "kalm_config" {
645651
default = false
646652
}
647653

648-
variable "config_connector" {
649-
type = bool
650-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
651-
default = false
652-
}
653-
654654
variable "cloudrun" {
655655
description = "(Beta) Enable CloudRun addon"
656656
default = false

modules/beta-public-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -144,7 +144,7 @@ Then perform the following commands on the root folder:
144144
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
145145
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
146146
| cluster\_telemetry\_type | Available options include ENABLED, DISABLED, and SYSTEM\_ONLY | `string` | `null` | no |
147-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
147+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
148148
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
149149
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
150150
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/beta-public-cluster/cluster.tf

Lines changed: 5 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -231,6 +231,11 @@ resource "google_container_cluster" "primary" {
231231
}
232232
}
233233

234+
config_connector_config {
235+
enabled = var.config_connector
236+
}
237+
238+
234239
istio_config {
235240
disabled = !var.istio
236241
auth = var.istio_auth
@@ -247,10 +252,6 @@ resource "google_container_cluster" "primary" {
247252
kalm_config {
248253
enabled = var.kalm_config
249254
}
250-
251-
config_connector_config {
252-
enabled = var.config_connector
253-
}
254255
}
255256

256257
datapath_provider = var.datapath_provider

modules/beta-public-cluster/variables.tf

Lines changed: 6 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -594,6 +594,12 @@ variable "gke_backup_agent_config" {
594594
default = false
595595
}
596596

597+
variable "config_connector" {
598+
type = bool
599+
description = "Whether ConfigConnector is enabled for this cluster."
600+
default = false
601+
}
602+
597603
variable "timeouts" {
598604
type = map(string)
599605
description = "Timeout for cluster operations."
@@ -645,12 +651,6 @@ variable "kalm_config" {
645651
default = false
646652
}
647653

648-
variable "config_connector" {
649-
type = bool
650-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
651-
default = false
652-
}
653-
654654
variable "cloudrun" {
655655
description = "(Beta) Enable CloudRun addon"
656656
default = false

modules/private-cluster-update-variant/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -165,6 +165,7 @@ Then perform the following commands on the root folder:
165165
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
166166
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
167167
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
168+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
168169
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
169170
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
170171
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/private-cluster-update-variant/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,11 @@ resource "google_container_cluster" "primary" {
198198
enabled = gke_backup_agent_config.value.enabled
199199
}
200200
}
201+
202+
config_connector_config {
203+
enabled = var.config_connector
204+
}
205+
201206
}
202207

203208
datapath_provider = var.datapath_provider

modules/private-cluster-update-variant/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -606,6 +606,12 @@ variable "gke_backup_agent_config" {
606606
default = false
607607
}
608608

609+
variable "config_connector" {
610+
type = bool
611+
description = "Whether ConfigConnector is enabled for this cluster."
612+
default = false
613+
}
614+
609615
variable "timeouts" {
610616
type = map(string)
611617
description = "Timeout for cluster operations."

modules/private-cluster/README.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -143,6 +143,7 @@ Then perform the following commands on the root folder:
143143
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
144144
| cluster\_ipv4\_cidr | The IP address range of the kubernetes pods in this cluster. Default is an automatically assigned CIDR. | `string` | `null` | no |
145145
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
146+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
146147
| configure\_ip\_masq | Enables the installation of ip masquerading, which is usually no longer required when using aliasied IP addresses. IP masquerading uses a kubectl call, so when you have a private cluster, you will need access to the API server. | `bool` | `false` | no |
147148
| create\_service\_account | Defines if service account specified to run nodes should be created. | `bool` | `true` | no |
148149
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |

modules/private-cluster/cluster.tf

Lines changed: 5 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -198,6 +198,11 @@ resource "google_container_cluster" "primary" {
198198
enabled = gke_backup_agent_config.value.enabled
199199
}
200200
}
201+
202+
config_connector_config {
203+
enabled = var.config_connector
204+
}
205+
201206
}
202207

203208
datapath_provider = var.datapath_provider

modules/private-cluster/variables.tf

Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -606,6 +606,12 @@ variable "gke_backup_agent_config" {
606606
default = false
607607
}
608608

609+
variable "config_connector" {
610+
type = bool
611+
description = "Whether ConfigConnector is enabled for this cluster."
612+
default = false
613+
}
614+
609615
variable "timeouts" {
610616
type = map(string)
611617
description = "Timeout for cluster operations."

modules/safer-cluster-update-variant/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ For simplicity, we suggest using `roles/container.admin` and
210210
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
211211
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
212212
| compute\_engine\_service\_account | Use the given service account for nodes rather than creating a new dedicated service account. | `string` | `""` | no |
213-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
213+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
214214
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
215215
| datapath\_provider | The desired datapath provider for this cluster. By default, `ADVANCED_DATAPATH` enables Dataplane-V2 feature. `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation as a fallback since upgrading to V2 requires a cluster re-creation. | `string` | `"ADVANCED_DATAPATH"` | no |
216216
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | `number` | `110` | no |

modules/safer-cluster-update-variant/variables.tf

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -468,7 +468,7 @@ variable "firewall_inbound_ports" {
468468

469469
variable "config_connector" {
470470
type = bool
471-
description = "(Beta) Whether ConfigConnector is enabled for this cluster."
471+
description = "Whether ConfigConnector is enabled for this cluster."
472472
default = false
473473
}
474474

modules/safer-cluster/README.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -210,7 +210,7 @@ For simplicity, we suggest using `roles/container.admin` and
210210
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. | `string` | `"DNS_SCOPE_UNSPECIFIED"` | no |
211211
| cluster\_resource\_labels | The GCE resource labels (a map of key/value pairs) to be applied to the cluster | `map(string)` | `{}` | no |
212212
| compute\_engine\_service\_account | Use the given service account for nodes rather than creating a new dedicated service account. | `string` | `""` | no |
213-
| config\_connector | (Beta) Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
213+
| config\_connector | Whether ConfigConnector is enabled for this cluster. | `bool` | `false` | no |
214214
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. | `list(object({ state = string, key_name = string }))` | <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
215215
| datapath\_provider | The desired datapath provider for this cluster. By default, `ADVANCED_DATAPATH` enables Dataplane-V2 feature. `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation as a fallback since upgrading to V2 requires a cluster re-creation. | `string` | `"ADVANCED_DATAPATH"` | no |
216216
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node | `number` | `110` | no |

0 commit comments

Comments
 (0)