cdktf-cdktf-provider-upcloud 13.0.0__py3-none-any.whl → 14.0.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +12 -4
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.0.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +629 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +77 -28
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +47 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +134 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +175 -175
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +73 -73
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +286 -286
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +103 -103
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +40 -79
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +544 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +436 -0
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +51 -104
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +467 -0
- cdktf_cdktf_provider_upcloud/network/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +148 -148
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.0.0.dist-info/RECORD +58 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@13.0.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-13.0.0.dist-info/RECORD +0 -54
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-13.0.0.dist-info → cdktf_cdktf_provider_upcloud-14.0.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class KubernetesCluster(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -38,6 +38,7 @@ class KubernetesCluster(
|
|
|
38
38
|
network: builtins.str,
|
|
39
39
|
zone: builtins.str,
|
|
40
40
|
id: typing.Optional[builtins.str] = None,
|
|
41
|
+
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
41
42
|
plan: typing.Optional[builtins.str] = None,
|
|
42
43
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
43
44
|
version: typing.Optional[builtins.str] = None,
|
|
@@ -49,18 +50,19 @@ class KubernetesCluster(
|
|
|
49
50
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
50
51
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
51
52
|
) -> None:
|
|
52
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
53
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
53
54
|
|
|
54
55
|
:param scope: The scope in which to define this construct.
|
|
55
56
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
56
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
57
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
58
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
59
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
60
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
61
|
-
:param
|
|
62
|
-
:param
|
|
63
|
-
:param
|
|
57
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
58
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
59
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
60
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
61
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
62
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
63
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
64
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
65
|
+
:param version: Kubernetes version ID, e.g. ``1.26``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
64
66
|
:param connection:
|
|
65
67
|
:param count:
|
|
66
68
|
:param depends_on:
|
|
@@ -79,6 +81,7 @@ class KubernetesCluster(
|
|
|
79
81
|
network=network,
|
|
80
82
|
zone=zone,
|
|
81
83
|
id=id,
|
|
84
|
+
labels=labels,
|
|
82
85
|
plan=plan,
|
|
83
86
|
private_node_groups=private_node_groups,
|
|
84
87
|
version=version,
|
|
@@ -106,7 +109,7 @@ class KubernetesCluster(
|
|
|
106
109
|
|
|
107
110
|
:param scope: The scope in which to define this construct.
|
|
108
111
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
109
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
112
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
110
113
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
111
114
|
'''
|
|
112
115
|
if __debug__:
|
|
@@ -121,6 +124,10 @@ class KubernetesCluster(
|
|
|
121
124
|
def reset_id(self) -> None:
|
|
122
125
|
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
123
126
|
|
|
127
|
+
@jsii.member(jsii_name="resetLabels")
|
|
128
|
+
def reset_labels(self) -> None:
|
|
129
|
+
return typing.cast(None, jsii.invoke(self, "resetLabels", []))
|
|
130
|
+
|
|
124
131
|
@jsii.member(jsii_name="resetPlan")
|
|
125
132
|
def reset_plan(self) -> None:
|
|
126
133
|
return typing.cast(None, jsii.invoke(self, "resetPlan", []))
|
|
@@ -173,6 +180,13 @@ class KubernetesCluster(
|
|
|
173
180
|
def id_input(self) -> typing.Optional[builtins.str]:
|
|
174
181
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
175
182
|
|
|
183
|
+
@builtins.property
|
|
184
|
+
@jsii.member(jsii_name="labelsInput")
|
|
185
|
+
def labels_input(
|
|
186
|
+
self,
|
|
187
|
+
) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
188
|
+
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], jsii.get(self, "labelsInput"))
|
|
189
|
+
|
|
176
190
|
@builtins.property
|
|
177
191
|
@jsii.member(jsii_name="nameInput")
|
|
178
192
|
def name_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -229,6 +243,18 @@ class KubernetesCluster(
|
|
|
229
243
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
230
244
|
jsii.set(self, "id", value)
|
|
231
245
|
|
|
246
|
+
@builtins.property
|
|
247
|
+
@jsii.member(jsii_name="labels")
|
|
248
|
+
def labels(self) -> typing.Mapping[builtins.str, builtins.str]:
|
|
249
|
+
return typing.cast(typing.Mapping[builtins.str, builtins.str], jsii.get(self, "labels"))
|
|
250
|
+
|
|
251
|
+
@labels.setter
|
|
252
|
+
def labels(self, value: typing.Mapping[builtins.str, builtins.str]) -> None:
|
|
253
|
+
if __debug__:
|
|
254
|
+
type_hints = typing.get_type_hints(_typecheckingstub__7b9fb1189cc7bea21771f655e6f7d40e2b84a7ccedb6b706bd861ad34f2a71e8)
|
|
255
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
256
|
+
jsii.set(self, "labels", value)
|
|
257
|
+
|
|
232
258
|
@builtins.property
|
|
233
259
|
@jsii.member(jsii_name="name")
|
|
234
260
|
def name(self) -> builtins.str:
|
|
@@ -323,6 +349,7 @@ class KubernetesCluster(
|
|
|
323
349
|
"network": "network",
|
|
324
350
|
"zone": "zone",
|
|
325
351
|
"id": "id",
|
|
352
|
+
"labels": "labels",
|
|
326
353
|
"plan": "plan",
|
|
327
354
|
"private_node_groups": "privateNodeGroups",
|
|
328
355
|
"version": "version",
|
|
@@ -344,6 +371,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
344
371
|
network: builtins.str,
|
|
345
372
|
zone: builtins.str,
|
|
346
373
|
id: typing.Optional[builtins.str] = None,
|
|
374
|
+
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
347
375
|
plan: typing.Optional[builtins.str] = None,
|
|
348
376
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
349
377
|
version: typing.Optional[builtins.str] = None,
|
|
@@ -356,14 +384,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
356
384
|
:param lifecycle:
|
|
357
385
|
:param provider:
|
|
358
386
|
:param provisioners:
|
|
359
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
360
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
361
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
362
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
363
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
364
|
-
:param
|
|
365
|
-
:param
|
|
366
|
-
:param
|
|
387
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
388
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
389
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
390
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
391
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
392
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
393
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
394
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
395
|
+
:param version: Kubernetes version ID, e.g. ``1.26``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
367
396
|
'''
|
|
368
397
|
if isinstance(lifecycle, dict):
|
|
369
398
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -381,6 +410,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
381
410
|
check_type(argname="argument network", value=network, expected_type=type_hints["network"])
|
|
382
411
|
check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
|
|
383
412
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
413
|
+
check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
|
|
384
414
|
check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
|
|
385
415
|
check_type(argname="argument private_node_groups", value=private_node_groups, expected_type=type_hints["private_node_groups"])
|
|
386
416
|
check_type(argname="argument version", value=version, expected_type=type_hints["version"])
|
|
@@ -406,6 +436,8 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
406
436
|
self._values["provisioners"] = provisioners
|
|
407
437
|
if id is not None:
|
|
408
438
|
self._values["id"] = id
|
|
439
|
+
if labels is not None:
|
|
440
|
+
self._values["labels"] = labels
|
|
409
441
|
if plan is not None:
|
|
410
442
|
self._values["plan"] = plan
|
|
411
443
|
if private_node_groups is not None:
|
|
@@ -483,7 +515,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
483
515
|
|
|
484
516
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
485
517
|
|
|
486
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
518
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
487
519
|
'''
|
|
488
520
|
result = self._values.get("control_plane_ip_filter")
|
|
489
521
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -493,7 +525,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
493
525
|
def name(self) -> builtins.str:
|
|
494
526
|
'''Cluster name. Needs to be unique within the account.
|
|
495
527
|
|
|
496
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
528
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
497
529
|
'''
|
|
498
530
|
result = self._values.get("name")
|
|
499
531
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -503,7 +535,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
503
535
|
def network(self) -> builtins.str:
|
|
504
536
|
'''Network ID for the cluster to run in.
|
|
505
537
|
|
|
506
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
538
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
507
539
|
'''
|
|
508
540
|
result = self._values.get("network")
|
|
509
541
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -513,7 +545,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
513
545
|
def zone(self) -> builtins.str:
|
|
514
546
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
515
547
|
|
|
516
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
548
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
517
549
|
'''
|
|
518
550
|
result = self._values.get("zone")
|
|
519
551
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -521,7 +553,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
521
553
|
|
|
522
554
|
@builtins.property
|
|
523
555
|
def id(self) -> typing.Optional[builtins.str]:
|
|
524
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
556
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}.
|
|
525
557
|
|
|
526
558
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
527
559
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -529,13 +561,22 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
529
561
|
result = self._values.get("id")
|
|
530
562
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
531
563
|
|
|
564
|
+
@builtins.property
|
|
565
|
+
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
566
|
+
'''Key-value pairs to classify the cluster.
|
|
567
|
+
|
|
568
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
569
|
+
'''
|
|
570
|
+
result = self._values.get("labels")
|
|
571
|
+
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
572
|
+
|
|
532
573
|
@builtins.property
|
|
533
574
|
def plan(self) -> typing.Optional[builtins.str]:
|
|
534
575
|
'''The pricing plan used for the cluster.
|
|
535
576
|
|
|
536
577
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
537
578
|
|
|
538
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
579
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
539
580
|
'''
|
|
540
581
|
result = self._values.get("plan")
|
|
541
582
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -546,7 +587,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
546
587
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
547
588
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
548
589
|
|
|
549
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
590
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
550
591
|
'''
|
|
551
592
|
result = self._values.get("private_node_groups")
|
|
552
593
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -555,7 +596,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
555
596
|
def version(self) -> typing.Optional[builtins.str]:
|
|
556
597
|
'''Kubernetes version ID, e.g. ``1.26``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
557
598
|
|
|
558
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
599
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
559
600
|
'''
|
|
560
601
|
result = self._values.get("version")
|
|
561
602
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -588,6 +629,7 @@ def _typecheckingstub__8a9b711fc0d4f95af1581b8c47ef51571908b57197927d077ddbf475a
|
|
|
588
629
|
network: builtins.str,
|
|
589
630
|
zone: builtins.str,
|
|
590
631
|
id: typing.Optional[builtins.str] = None,
|
|
632
|
+
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
591
633
|
plan: typing.Optional[builtins.str] = None,
|
|
592
634
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
593
635
|
version: typing.Optional[builtins.str] = None,
|
|
@@ -623,6 +665,12 @@ def _typecheckingstub__f78fce845db53a9c80ea63aab3e2cb839deb5afb0d1201080c6f0426d
|
|
|
623
665
|
"""Type checking stubs"""
|
|
624
666
|
pass
|
|
625
667
|
|
|
668
|
+
def _typecheckingstub__7b9fb1189cc7bea21771f655e6f7d40e2b84a7ccedb6b706bd861ad34f2a71e8(
|
|
669
|
+
value: typing.Mapping[builtins.str, builtins.str],
|
|
670
|
+
) -> None:
|
|
671
|
+
"""Type checking stubs"""
|
|
672
|
+
pass
|
|
673
|
+
|
|
626
674
|
def _typecheckingstub__c69847aa2809c05a6052b083ccd5ca5d9c7dc69ef91c872bb1912acd0884cf14(
|
|
627
675
|
value: builtins.str,
|
|
628
676
|
) -> None:
|
|
@@ -673,6 +721,7 @@ def _typecheckingstub__e268687db9e34ae4b03f85f7b2bdf19564690fdaacf69cdb2c9bd3f76
|
|
|
673
721
|
network: builtins.str,
|
|
674
722
|
zone: builtins.str,
|
|
675
723
|
id: typing.Optional[builtins.str] = None,
|
|
724
|
+
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
676
725
|
plan: typing.Optional[builtins.str] = None,
|
|
677
726
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
678
727
|
version: typing.Optional[builtins.str] = None,
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
import abc
|
|
7
7
|
import builtins
|
|
@@ -26,7 +26,7 @@ class KubernetesNodeGroup(
|
|
|
26
26
|
metaclass=jsii.JSIIMeta,
|
|
27
27
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
28
28
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
29
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
30
30
|
|
|
31
31
|
def __init__(
|
|
32
32
|
self,
|
|
@@ -52,21 +52,21 @@ class KubernetesNodeGroup(
|
|
|
52
52
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
53
53
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
54
54
|
) -> None:
|
|
55
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
55
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
56
56
|
|
|
57
57
|
:param scope: The scope in which to define this construct.
|
|
58
58
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
59
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
60
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
61
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
62
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
63
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
64
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
65
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
66
|
-
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
67
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
68
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
69
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
59
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
60
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
61
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
62
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
63
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
64
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
65
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
66
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
67
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
68
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
69
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
70
70
|
:param connection:
|
|
71
71
|
:param count:
|
|
72
72
|
:param depends_on:
|
|
@@ -115,7 +115,7 @@ class KubernetesNodeGroup(
|
|
|
115
115
|
|
|
116
116
|
:param scope: The scope in which to define this construct.
|
|
117
117
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
118
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
118
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
119
119
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
120
120
|
'''
|
|
121
121
|
if __debug__:
|
|
@@ -440,17 +440,17 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
440
440
|
:param lifecycle:
|
|
441
441
|
:param provider:
|
|
442
442
|
:param provisioners:
|
|
443
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
444
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
445
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
446
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
447
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
448
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
449
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
450
|
-
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
451
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
452
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
453
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
443
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
444
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
445
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
446
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
447
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
448
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
449
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
450
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
451
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
452
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
453
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
454
454
|
'''
|
|
455
455
|
if isinstance(lifecycle, dict):
|
|
456
456
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -577,7 +577,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
577
577
|
def cluster(self) -> builtins.str:
|
|
578
578
|
'''Cluster ID.
|
|
579
579
|
|
|
580
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
580
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
581
581
|
'''
|
|
582
582
|
result = self._values.get("cluster")
|
|
583
583
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -587,7 +587,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
587
587
|
def name(self) -> builtins.str:
|
|
588
588
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
589
589
|
|
|
590
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
590
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
591
591
|
'''
|
|
592
592
|
result = self._values.get("name")
|
|
593
593
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -597,7 +597,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
597
597
|
def node_count(self) -> jsii.Number:
|
|
598
598
|
'''Amount of nodes to provision in the node group.
|
|
599
599
|
|
|
600
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
600
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
601
601
|
'''
|
|
602
602
|
result = self._values.get("node_count")
|
|
603
603
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -607,7 +607,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
607
607
|
def plan(self) -> builtins.str:
|
|
608
608
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
609
609
|
|
|
610
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
610
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
611
611
|
'''
|
|
612
612
|
result = self._values.get("plan")
|
|
613
613
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -621,14 +621,14 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
621
621
|
|
|
622
622
|
Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
623
623
|
|
|
624
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
624
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
625
625
|
'''
|
|
626
626
|
result = self._values.get("anti_affinity")
|
|
627
627
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
628
628
|
|
|
629
629
|
@builtins.property
|
|
630
630
|
def id(self) -> typing.Optional[builtins.str]:
|
|
631
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
631
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
|
|
632
632
|
|
|
633
633
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
634
634
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -642,7 +642,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
642
642
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
643
643
|
'''kubelet_args block.
|
|
644
644
|
|
|
645
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
645
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
646
646
|
'''
|
|
647
647
|
result = self._values.get("kubelet_args")
|
|
648
648
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -651,7 +651,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
651
651
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
652
652
|
'''Key-value pairs to classify the node group.
|
|
653
653
|
|
|
654
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
654
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
655
655
|
'''
|
|
656
656
|
result = self._values.get("labels")
|
|
657
657
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -662,7 +662,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
662
662
|
|
|
663
663
|
This allows you to connect to the nodes via SSH once they are running.
|
|
664
664
|
|
|
665
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
665
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
666
666
|
'''
|
|
667
667
|
result = self._values.get("ssh_keys")
|
|
668
668
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -673,7 +673,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
673
673
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
674
674
|
'''taint block.
|
|
675
675
|
|
|
676
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
676
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
677
677
|
'''
|
|
678
678
|
result = self._values.get("taint")
|
|
679
679
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -684,7 +684,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
684
684
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
685
685
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
686
686
|
|
|
687
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
687
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
688
688
|
'''
|
|
689
689
|
result = self._values.get("utility_network_access")
|
|
690
690
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -709,8 +709,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
709
709
|
class KubernetesNodeGroupKubeletArgs:
|
|
710
710
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
711
711
|
'''
|
|
712
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
713
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
712
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
713
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
714
714
|
'''
|
|
715
715
|
if __debug__:
|
|
716
716
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -725,7 +725,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
725
725
|
def key(self) -> builtins.str:
|
|
726
726
|
'''Kubelet argument key.
|
|
727
727
|
|
|
728
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
728
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
729
729
|
'''
|
|
730
730
|
result = self._values.get("key")
|
|
731
731
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -735,7 +735,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
735
735
|
def value(self) -> builtins.str:
|
|
736
736
|
'''Kubelet argument value.
|
|
737
737
|
|
|
738
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
738
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
739
739
|
'''
|
|
740
740
|
result = self._values.get("value")
|
|
741
741
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -938,9 +938,9 @@ class KubernetesNodeGroupTaint:
|
|
|
938
938
|
value: builtins.str,
|
|
939
939
|
) -> None:
|
|
940
940
|
'''
|
|
941
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
942
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
943
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
941
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
942
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
943
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
944
944
|
'''
|
|
945
945
|
if __debug__:
|
|
946
946
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -957,7 +957,7 @@ class KubernetesNodeGroupTaint:
|
|
|
957
957
|
def effect(self) -> builtins.str:
|
|
958
958
|
'''Taint effect.
|
|
959
959
|
|
|
960
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
960
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
961
961
|
'''
|
|
962
962
|
result = self._values.get("effect")
|
|
963
963
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -967,7 +967,7 @@ class KubernetesNodeGroupTaint:
|
|
|
967
967
|
def key(self) -> builtins.str:
|
|
968
968
|
'''Taint key.
|
|
969
969
|
|
|
970
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
970
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
971
971
|
'''
|
|
972
972
|
result = self._values.get("key")
|
|
973
973
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -977,7 +977,7 @@ class KubernetesNodeGroupTaint:
|
|
|
977
977
|
def value(self) -> builtins.str:
|
|
978
978
|
'''Taint value.
|
|
979
979
|
|
|
980
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/
|
|
980
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.0.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
981
981
|
'''
|
|
982
982
|
result = self._values.get("value")
|
|
983
983
|
assert result is not None, "Required property 'value' is missing"
|