-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
- Loading branch information
Showing
24 changed files
with
274 additions
and
17 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -263,6 +263,12 @@ variable "create_service_account" { | |
default = true | ||
} | ||
|
||
variable "grant_registry_access" { | ||
type = bool | ||
description = "Grants created cluster-specific service account storage.objectViewer role." | ||
default = false | ||
} | ||
|
||
variable "service_account" { | ||
type = string | ||
description = "The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created." | ||
|
@@ -362,18 +368,30 @@ variable "pod_security_policy_config" { | |
}] | ||
} | ||
|
||
variable "resource_usage_export_dataset_id" { | ||
type = string | ||
description = "The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic." | ||
default = "" | ||
} | ||
|
||
variable "node_metadata" { | ||
description = "Specifies how node metadata is exposed to the workload running on the node" | ||
default = "UNSPECIFIED" | ||
} | ||
|
||
variable "sandbox_enabled" { | ||
type = bool | ||
description = "(Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it)." | ||
default = false | ||
} | ||
|
||
variable "enable_intranode_visibility" { | ||
type = bool | ||
description = "Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network" | ||
default = false | ||
} | ||
|
||
variable "enable_vertical_pod_autoscaling" { | ||
variable "enable_vertical_pod_autoscaling" { | ||
type = bool | ||
description = "Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it" | ||
default = false | ||
|
@@ -385,5 +403,10 @@ variable "identity_namespace" { | |
default = "" | ||
} | ||
|
||
variable "authenticator_security_group" { | ||
type = string | ||
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]" | ||
default = null | ||
} | ||
|
||
{% endif %} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -136,6 +136,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o | |
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|:----:|:-----:|:-----:| | ||
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected] | string | `"null"` | no | | ||
| basic\_auth\_password | The password to be used with Basic Authentication. | string | `""` | no | | ||
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. | string | `""` | no | | ||
| cloudrun | (Beta) Enable CloudRun addon | string | `"false"` | no | | ||
|
@@ -153,6 +154,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o | |
| enable\_private\_endpoint | (Beta) Whether the master's internal IP address is used as the cluster endpoint | bool | `"false"` | no | | ||
| enable\_private\_nodes | (Beta) Whether nodes have internal IP addresses only | bool | `"false"` | no | | ||
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool | `"false"` | no | | ||
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"false"` | no | | ||
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool | `"true"` | no | | ||
| http\_load\_balancing | Enable httpload balancer addon | bool | `"true"` | no | | ||
| identity\_namespace | Workload Identity namespace | string | `""` | no | | ||
|
@@ -189,6 +191,8 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o | |
| region | The region to host the cluster in (required) | string | n/a | yes | | ||
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool | `"true"` | no | | ||
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool | `"false"` | no | | ||
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string | `""` | no | | ||
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool | `"false"` | no | | ||
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string | `""` | no | | ||
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) | `<map>` | no | | ||
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes | | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -261,6 +261,12 @@ variable "create_service_account" { | |
default = true | ||
} | ||
|
||
variable "grant_registry_access" { | ||
type = bool | ||
description = "Grants created cluster-specific service account storage.objectViewer role." | ||
default = false | ||
} | ||
|
||
variable "service_account" { | ||
type = string | ||
description = "The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created." | ||
|
@@ -357,11 +363,23 @@ variable "pod_security_policy_config" { | |
}] | ||
} | ||
|
||
variable "resource_usage_export_dataset_id" { | ||
type = string | ||
description = "The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic." | ||
default = "" | ||
} | ||
|
||
variable "node_metadata" { | ||
description = "Specifies how node metadata is exposed to the workload running on the node" | ||
default = "UNSPECIFIED" | ||
} | ||
|
||
variable "sandbox_enabled" { | ||
type = bool | ||
description = "(Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it)." | ||
default = false | ||
} | ||
|
||
variable "enable_intranode_visibility" { | ||
type = bool | ||
description = "Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network" | ||
|
@@ -380,4 +398,9 @@ variable "identity_namespace" { | |
default = "" | ||
} | ||
|
||
variable "authenticator_security_group" { | ||
type = string | ||
description = "The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected]" | ||
default = null | ||
} | ||
|
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
|
@@ -131,6 +131,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o | |
|
||
| Name | Description | Type | Default | Required | | ||
|------|-------------|:----:|:-----:|:-----:| | ||
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format [email protected] | string | `"null"` | no | | ||
| basic\_auth\_password | The password to be used with Basic Authentication. | string | `""` | no | | ||
| basic\_auth\_username | The username to be used with Basic Authentication. An empty value will disable Basic Authentication, which is the recommended configuration. | string | `""` | no | | ||
| cloudrun | (Beta) Enable CloudRun addon | string | `"false"` | no | | ||
|
@@ -145,6 +146,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o | |
| enable\_binary\_authorization | Enable BinAuthZ Admission controller | string | `"false"` | no | | ||
| enable\_intranode\_visibility | Whether Intra-node visibility is enabled for this cluster. This makes same node pod to pod traffic visible for VPC network | bool | `"false"` | no | | ||
| enable\_vertical\_pod\_autoscaling | Vertical Pod Autoscaling automatically adjusts the resources of pods controlled by it | bool | `"false"` | no | | ||
| grant\_registry\_access | Grants created cluster-specific service account storage.objectViewer role. | bool | `"false"` | no | | ||
| horizontal\_pod\_autoscaling | Enable horizontal pod autoscaling addon | bool | `"true"` | no | | ||
| http\_load\_balancing | Enable httpload balancer addon | bool | `"true"` | no | | ||
| identity\_namespace | Workload Identity namespace | string | `""` | no | | ||
|
@@ -180,6 +182,8 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o | |
| region | The region to host the cluster in (required) | string | n/a | yes | | ||
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool | `"true"` | no | | ||
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool | `"false"` | no | | ||
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string | `""` | no | | ||
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool | `"false"` | no | | ||
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string | `""` | no | | ||
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) | `<map>` | no | | ||
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes | | ||
|
Oops, something went wrong.