cdktf-cdktf-provider-upcloud 11.0.0__py3-none-any.whl → 11.0.2__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.0.2.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +72 -25
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +47 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +165 -165
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +172 -172
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +289 -289
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +97 -97
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/network/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +133 -133
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +55 -55
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-11.0.0.dist-info → cdktf_cdktf_provider_upcloud-11.0.2.dist-info}/METADATA +5 -6
- cdktf_cdktf_provider_upcloud-11.0.2.dist-info/RECORD +53 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@11.0.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-11.0.0.dist-info/RECORD +0 -53
- {cdktf_cdktf_provider_upcloud-11.0.0.dist-info → cdktf_cdktf_provider_upcloud-11.0.2.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-11.0.0.dist-info → cdktf_cdktf_provider_upcloud-11.0.2.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-11.0.0.dist-info → cdktf_cdktf_provider_upcloud-11.0.2.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registory for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
4
|
+
Refer to the Terraform Registory for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class KubernetesCluster(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -40,6 +40,7 @@ class KubernetesCluster(
|
|
|
40
40
|
id: typing.Optional[builtins.str] = None,
|
|
41
41
|
plan: typing.Optional[builtins.str] = None,
|
|
42
42
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
43
|
+
version: typing.Optional[builtins.str] = None,
|
|
43
44
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
44
45
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
45
46
|
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
@@ -48,17 +49,18 @@ class KubernetesCluster(
|
|
|
48
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
49
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
50
51
|
) -> None:
|
|
51
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
52
53
|
|
|
53
54
|
:param scope: The scope in which to define this construct.
|
|
54
55
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
55
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
56
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
57
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
58
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
59
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
60
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
61
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
56
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
57
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
58
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
59
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
60
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
61
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
62
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
63
|
+
:param version: Kubernetes version ID, e.g. ``1.26``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
62
64
|
:param connection:
|
|
63
65
|
:param count:
|
|
64
66
|
:param depends_on:
|
|
@@ -79,6 +81,7 @@ class KubernetesCluster(
|
|
|
79
81
|
id=id,
|
|
80
82
|
plan=plan,
|
|
81
83
|
private_node_groups=private_node_groups,
|
|
84
|
+
version=version,
|
|
82
85
|
connection=connection,
|
|
83
86
|
count=count,
|
|
84
87
|
depends_on=depends_on,
|
|
@@ -103,7 +106,7 @@ class KubernetesCluster(
|
|
|
103
106
|
|
|
104
107
|
:param scope: The scope in which to define this construct.
|
|
105
108
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
106
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
109
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
107
110
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
108
111
|
'''
|
|
109
112
|
if __debug__:
|
|
@@ -126,6 +129,10 @@ class KubernetesCluster(
|
|
|
126
129
|
def reset_private_node_groups(self) -> None:
|
|
127
130
|
return typing.cast(None, jsii.invoke(self, "resetPrivateNodeGroups", []))
|
|
128
131
|
|
|
132
|
+
@jsii.member(jsii_name="resetVersion")
|
|
133
|
+
def reset_version(self) -> None:
|
|
134
|
+
return typing.cast(None, jsii.invoke(self, "resetVersion", []))
|
|
135
|
+
|
|
129
136
|
@jsii.member(jsii_name="synthesizeAttributes")
|
|
130
137
|
def _synthesize_attributes(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
131
138
|
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "synthesizeAttributes", []))
|
|
@@ -184,6 +191,11 @@ class KubernetesCluster(
|
|
|
184
191
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
185
192
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], jsii.get(self, "privateNodeGroupsInput"))
|
|
186
193
|
|
|
194
|
+
@builtins.property
|
|
195
|
+
@jsii.member(jsii_name="versionInput")
|
|
196
|
+
def version_input(self) -> typing.Optional[builtins.str]:
|
|
197
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "versionInput"))
|
|
198
|
+
|
|
187
199
|
@builtins.property
|
|
188
200
|
@jsii.member(jsii_name="zoneInput")
|
|
189
201
|
def zone_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -266,6 +278,18 @@ class KubernetesCluster(
|
|
|
266
278
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
267
279
|
jsii.set(self, "privateNodeGroups", value)
|
|
268
280
|
|
|
281
|
+
@builtins.property
|
|
282
|
+
@jsii.member(jsii_name="version")
|
|
283
|
+
def version(self) -> builtins.str:
|
|
284
|
+
return typing.cast(builtins.str, jsii.get(self, "version"))
|
|
285
|
+
|
|
286
|
+
@version.setter
|
|
287
|
+
def version(self, value: builtins.str) -> None:
|
|
288
|
+
if __debug__:
|
|
289
|
+
type_hints = typing.get_type_hints(_typecheckingstub__776ba3ef3b832d50876fe4a1d205b0bbe70e283570bc607f5f3709b3061f153f)
|
|
290
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
291
|
+
jsii.set(self, "version", value)
|
|
292
|
+
|
|
269
293
|
@builtins.property
|
|
270
294
|
@jsii.member(jsii_name="zone")
|
|
271
295
|
def zone(self) -> builtins.str:
|
|
@@ -297,6 +321,7 @@ class KubernetesCluster(
|
|
|
297
321
|
"id": "id",
|
|
298
322
|
"plan": "plan",
|
|
299
323
|
"private_node_groups": "privateNodeGroups",
|
|
324
|
+
"version": "version",
|
|
300
325
|
},
|
|
301
326
|
)
|
|
302
327
|
class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
@@ -317,6 +342,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
317
342
|
id: typing.Optional[builtins.str] = None,
|
|
318
343
|
plan: typing.Optional[builtins.str] = None,
|
|
319
344
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
345
|
+
version: typing.Optional[builtins.str] = None,
|
|
320
346
|
) -> None:
|
|
321
347
|
'''
|
|
322
348
|
:param connection:
|
|
@@ -326,13 +352,14 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
326
352
|
:param lifecycle:
|
|
327
353
|
:param provider:
|
|
328
354
|
:param provisioners:
|
|
329
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
330
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
331
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
332
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
333
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
334
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
335
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
355
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
356
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
357
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
358
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
359
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
360
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
361
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
362
|
+
:param version: Kubernetes version ID, e.g. ``1.26``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
336
363
|
'''
|
|
337
364
|
if isinstance(lifecycle, dict):
|
|
338
365
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -352,6 +379,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
352
379
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
353
380
|
check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
|
|
354
381
|
check_type(argname="argument private_node_groups", value=private_node_groups, expected_type=type_hints["private_node_groups"])
|
|
382
|
+
check_type(argname="argument version", value=version, expected_type=type_hints["version"])
|
|
355
383
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
356
384
|
"control_plane_ip_filter": control_plane_ip_filter,
|
|
357
385
|
"name": name,
|
|
@@ -378,6 +406,8 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
378
406
|
self._values["plan"] = plan
|
|
379
407
|
if private_node_groups is not None:
|
|
380
408
|
self._values["private_node_groups"] = private_node_groups
|
|
409
|
+
if version is not None:
|
|
410
|
+
self._values["version"] = version
|
|
381
411
|
|
|
382
412
|
@builtins.property
|
|
383
413
|
def connection(
|
|
@@ -449,7 +479,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
449
479
|
|
|
450
480
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
451
481
|
|
|
452
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
482
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
453
483
|
'''
|
|
454
484
|
result = self._values.get("control_plane_ip_filter")
|
|
455
485
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -459,7 +489,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
459
489
|
def name(self) -> builtins.str:
|
|
460
490
|
'''Cluster name. Needs to be unique within the account.
|
|
461
491
|
|
|
462
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
492
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
463
493
|
'''
|
|
464
494
|
result = self._values.get("name")
|
|
465
495
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -469,7 +499,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
469
499
|
def network(self) -> builtins.str:
|
|
470
500
|
'''Network ID for the cluster to run in.
|
|
471
501
|
|
|
472
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
502
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
473
503
|
'''
|
|
474
504
|
result = self._values.get("network")
|
|
475
505
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -479,7 +509,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
479
509
|
def zone(self) -> builtins.str:
|
|
480
510
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
481
511
|
|
|
482
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
512
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
483
513
|
'''
|
|
484
514
|
result = self._values.get("zone")
|
|
485
515
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -487,7 +517,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
487
517
|
|
|
488
518
|
@builtins.property
|
|
489
519
|
def id(self) -> typing.Optional[builtins.str]:
|
|
490
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
520
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}.
|
|
491
521
|
|
|
492
522
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
493
523
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -501,7 +531,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
501
531
|
|
|
502
532
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
503
533
|
|
|
504
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
534
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
505
535
|
'''
|
|
506
536
|
result = self._values.get("plan")
|
|
507
537
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -512,11 +542,20 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
512
542
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
513
543
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
514
544
|
|
|
515
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
545
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
516
546
|
'''
|
|
517
547
|
result = self._values.get("private_node_groups")
|
|
518
548
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
519
549
|
|
|
550
|
+
@builtins.property
|
|
551
|
+
def version(self) -> typing.Optional[builtins.str]:
|
|
552
|
+
'''Kubernetes version ID, e.g. ``1.26``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
553
|
+
|
|
554
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
555
|
+
'''
|
|
556
|
+
result = self._values.get("version")
|
|
557
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
558
|
+
|
|
520
559
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
521
560
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
522
561
|
|
|
@@ -547,6 +586,7 @@ def _typecheckingstub__8a9b711fc0d4f95af1581b8c47ef51571908b57197927d077ddbf475a
|
|
|
547
586
|
id: typing.Optional[builtins.str] = None,
|
|
548
587
|
plan: typing.Optional[builtins.str] = None,
|
|
549
588
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
589
|
+
version: typing.Optional[builtins.str] = None,
|
|
550
590
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
551
591
|
count: typing.Optional[typing.Union[jsii.Number, _cdktf_9a9027ec.TerraformCount]] = None,
|
|
552
592
|
depends_on: typing.Optional[typing.Sequence[_cdktf_9a9027ec.ITerraformDependable]] = None,
|
|
@@ -603,6 +643,12 @@ def _typecheckingstub__f49f70d8405be1fa26fe8c061357eb2ec81b867b995db8ff053c4f9a5
|
|
|
603
643
|
"""Type checking stubs"""
|
|
604
644
|
pass
|
|
605
645
|
|
|
646
|
+
def _typecheckingstub__776ba3ef3b832d50876fe4a1d205b0bbe70e283570bc607f5f3709b3061f153f(
|
|
647
|
+
value: builtins.str,
|
|
648
|
+
) -> None:
|
|
649
|
+
"""Type checking stubs"""
|
|
650
|
+
pass
|
|
651
|
+
|
|
606
652
|
def _typecheckingstub__70f488b5c223cfa038f56985e1d22e4c38a93cbe80f0a3a2fb36e7395578336e(
|
|
607
653
|
value: builtins.str,
|
|
608
654
|
) -> None:
|
|
@@ -625,6 +671,7 @@ def _typecheckingstub__e268687db9e34ae4b03f85f7b2bdf19564690fdaacf69cdb2c9bd3f76
|
|
|
625
671
|
id: typing.Optional[builtins.str] = None,
|
|
626
672
|
plan: typing.Optional[builtins.str] = None,
|
|
627
673
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
674
|
+
version: typing.Optional[builtins.str] = None,
|
|
628
675
|
) -> None:
|
|
629
676
|
"""Type checking stubs"""
|
|
630
677
|
pass
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registory for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
4
|
+
Refer to the Terraform Registory for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class KubernetesNodeGroup(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -52,21 +52,21 @@ class KubernetesNodeGroup(
|
|
|
52
52
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
53
53
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
54
54
|
) -> None:
|
|
55
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
55
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
56
56
|
|
|
57
57
|
:param scope: The scope in which to define this construct.
|
|
58
58
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
59
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
60
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
61
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
62
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
63
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
64
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
65
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
66
|
-
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
67
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
68
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
69
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
59
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
60
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
61
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
62
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
63
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
64
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
65
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
66
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
67
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
68
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
69
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
70
70
|
:param connection:
|
|
71
71
|
:param count:
|
|
72
72
|
:param depends_on:
|
|
@@ -115,7 +115,7 @@ class KubernetesNodeGroup(
|
|
|
115
115
|
|
|
116
116
|
:param scope: The scope in which to define this construct.
|
|
117
117
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
118
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
118
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
119
119
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
120
120
|
'''
|
|
121
121
|
if __debug__:
|
|
@@ -436,17 +436,17 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
436
436
|
:param lifecycle:
|
|
437
437
|
:param provider:
|
|
438
438
|
:param provisioners:
|
|
439
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
440
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
441
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
442
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
443
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
444
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
445
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
446
|
-
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
447
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
448
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
449
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
439
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
440
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
441
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
442
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
443
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
444
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
445
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
446
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
447
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
448
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
449
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
450
450
|
'''
|
|
451
451
|
if isinstance(lifecycle, dict):
|
|
452
452
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -573,7 +573,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
573
573
|
def cluster(self) -> builtins.str:
|
|
574
574
|
'''Cluster ID.
|
|
575
575
|
|
|
576
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
576
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
577
577
|
'''
|
|
578
578
|
result = self._values.get("cluster")
|
|
579
579
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -583,7 +583,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
583
583
|
def name(self) -> builtins.str:
|
|
584
584
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
585
585
|
|
|
586
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
586
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
587
587
|
'''
|
|
588
588
|
result = self._values.get("name")
|
|
589
589
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -593,7 +593,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
593
593
|
def node_count(self) -> jsii.Number:
|
|
594
594
|
'''Amount of nodes to provision in the node group.
|
|
595
595
|
|
|
596
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
596
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
597
597
|
'''
|
|
598
598
|
result = self._values.get("node_count")
|
|
599
599
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -603,7 +603,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
603
603
|
def plan(self) -> builtins.str:
|
|
604
604
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
605
605
|
|
|
606
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
606
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
607
607
|
'''
|
|
608
608
|
result = self._values.get("plan")
|
|
609
609
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -617,14 +617,14 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
617
617
|
|
|
618
618
|
Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
619
619
|
|
|
620
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
620
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
621
621
|
'''
|
|
622
622
|
result = self._values.get("anti_affinity")
|
|
623
623
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
624
624
|
|
|
625
625
|
@builtins.property
|
|
626
626
|
def id(self) -> typing.Optional[builtins.str]:
|
|
627
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
627
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
|
|
628
628
|
|
|
629
629
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
630
630
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -638,7 +638,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
638
638
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
639
639
|
'''kubelet_args block.
|
|
640
640
|
|
|
641
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
641
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
642
642
|
'''
|
|
643
643
|
result = self._values.get("kubelet_args")
|
|
644
644
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -647,7 +647,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
647
647
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
648
648
|
'''Key-value pairs to classify the node group.
|
|
649
649
|
|
|
650
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
650
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
651
651
|
'''
|
|
652
652
|
result = self._values.get("labels")
|
|
653
653
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -658,7 +658,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
658
658
|
|
|
659
659
|
This allows you to connect to the nodes via SSH once they are running.
|
|
660
660
|
|
|
661
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
661
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
662
662
|
'''
|
|
663
663
|
result = self._values.get("ssh_keys")
|
|
664
664
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -669,7 +669,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
669
669
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
670
670
|
'''taint block.
|
|
671
671
|
|
|
672
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
672
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
673
673
|
'''
|
|
674
674
|
result = self._values.get("taint")
|
|
675
675
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -680,7 +680,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
680
680
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
681
681
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
682
682
|
|
|
683
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
683
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
684
684
|
'''
|
|
685
685
|
result = self._values.get("utility_network_access")
|
|
686
686
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -705,8 +705,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
705
705
|
class KubernetesNodeGroupKubeletArgs:
|
|
706
706
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
707
707
|
'''
|
|
708
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
709
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
708
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
709
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
710
710
|
'''
|
|
711
711
|
if __debug__:
|
|
712
712
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -721,7 +721,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
721
721
|
def key(self) -> builtins.str:
|
|
722
722
|
'''Kubelet argument key.
|
|
723
723
|
|
|
724
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
724
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
725
725
|
'''
|
|
726
726
|
result = self._values.get("key")
|
|
727
727
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -731,7 +731,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
731
731
|
def value(self) -> builtins.str:
|
|
732
732
|
'''Kubelet argument value.
|
|
733
733
|
|
|
734
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
734
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
735
735
|
'''
|
|
736
736
|
result = self._values.get("value")
|
|
737
737
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -934,9 +934,9 @@ class KubernetesNodeGroupTaint:
|
|
|
934
934
|
value: builtins.str,
|
|
935
935
|
) -> None:
|
|
936
936
|
'''
|
|
937
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
938
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
939
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
937
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
938
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
939
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
940
940
|
'''
|
|
941
941
|
if __debug__:
|
|
942
942
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -953,7 +953,7 @@ class KubernetesNodeGroupTaint:
|
|
|
953
953
|
def effect(self) -> builtins.str:
|
|
954
954
|
'''Taint effect.
|
|
955
955
|
|
|
956
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
956
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
957
957
|
'''
|
|
958
958
|
result = self._values.get("effect")
|
|
959
959
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -963,7 +963,7 @@ class KubernetesNodeGroupTaint:
|
|
|
963
963
|
def key(self) -> builtins.str:
|
|
964
964
|
'''Taint key.
|
|
965
965
|
|
|
966
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
966
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
967
967
|
'''
|
|
968
968
|
result = self._values.get("key")
|
|
969
969
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -973,7 +973,7 @@ class KubernetesNodeGroupTaint:
|
|
|
973
973
|
def value(self) -> builtins.str:
|
|
974
974
|
'''Taint value.
|
|
975
975
|
|
|
976
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.
|
|
976
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/3.1.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
977
977
|
'''
|
|
978
978
|
result = self._values.get("value")
|
|
979
979
|
assert result is not None, "Required property 'value' is missing"
|