cdktf-cdktf-provider-upcloud 14.1.1__py3-none-any.whl → 14.2.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +10 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +5 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.2.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +10 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +13 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +44 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +254 -29
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +1279 -0
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +1337 -0
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -31
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +50 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +45 -42
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +67 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +31 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +42 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +196 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +34 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +31 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +192 -189
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +336 -333
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +348 -345
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +120 -117
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +53 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +19 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +43 -40
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +33 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +22 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +150 -147
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +25 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +61 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +19 -16
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.2.1.dist-info/RECORD +60 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.1.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.1.1.dist-info/RECORD +0 -58
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.1.1.dist-info → cdktf_cdktf_provider_upcloud-14.2.1.dist-info}/top_level.txt +0 -0
|
@@ -1,8 +1,11 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
6
9
|
import abc
|
|
7
10
|
import builtins
|
|
8
11
|
import datetime
|
|
@@ -26,7 +29,7 @@ class KubernetesCluster(
|
|
|
26
29
|
metaclass=jsii.JSIIMeta,
|
|
27
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
28
31
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
30
33
|
|
|
31
34
|
def __init__(
|
|
32
35
|
self,
|
|
@@ -50,19 +53,19 @@ class KubernetesCluster(
|
|
|
50
53
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
51
54
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
52
55
|
) -> None:
|
|
53
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
54
57
|
|
|
55
58
|
:param scope: The scope in which to define this construct.
|
|
56
59
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
57
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
58
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
59
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
61
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
61
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
62
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
63
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
64
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
65
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
66
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
67
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
68
|
+
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
66
69
|
:param connection:
|
|
67
70
|
:param count:
|
|
68
71
|
:param depends_on:
|
|
@@ -109,7 +112,7 @@ class KubernetesCluster(
|
|
|
109
112
|
|
|
110
113
|
:param scope: The scope in which to define this construct.
|
|
111
114
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
112
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
115
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
113
116
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
114
117
|
'''
|
|
115
118
|
if __debug__:
|
|
@@ -384,15 +387,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
384
387
|
:param lifecycle:
|
|
385
388
|
:param provider:
|
|
386
389
|
:param provisioners:
|
|
387
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
388
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
389
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
390
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
391
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
392
|
-
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
393
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
394
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
395
|
-
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
390
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
391
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
392
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
393
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
394
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
395
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
396
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
397
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
398
|
+
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
396
399
|
'''
|
|
397
400
|
if isinstance(lifecycle, dict):
|
|
398
401
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -515,7 +518,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
515
518
|
|
|
516
519
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
517
520
|
|
|
518
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
521
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
519
522
|
'''
|
|
520
523
|
result = self._values.get("control_plane_ip_filter")
|
|
521
524
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -525,7 +528,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
525
528
|
def name(self) -> builtins.str:
|
|
526
529
|
'''Cluster name. Needs to be unique within the account.
|
|
527
530
|
|
|
528
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
531
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
529
532
|
'''
|
|
530
533
|
result = self._values.get("name")
|
|
531
534
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -535,7 +538,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
535
538
|
def network(self) -> builtins.str:
|
|
536
539
|
'''Network ID for the cluster to run in.
|
|
537
540
|
|
|
538
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
541
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
539
542
|
'''
|
|
540
543
|
result = self._values.get("network")
|
|
541
544
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -545,7 +548,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
545
548
|
def zone(self) -> builtins.str:
|
|
546
549
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
547
550
|
|
|
548
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
549
552
|
'''
|
|
550
553
|
result = self._values.get("zone")
|
|
551
554
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -553,7 +556,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
553
556
|
|
|
554
557
|
@builtins.property
|
|
555
558
|
def id(self) -> typing.Optional[builtins.str]:
|
|
556
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
559
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}.
|
|
557
560
|
|
|
558
561
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
559
562
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -565,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
565
568
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
566
569
|
'''Key-value pairs to classify the cluster.
|
|
567
570
|
|
|
568
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
571
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
569
572
|
'''
|
|
570
573
|
result = self._values.get("labels")
|
|
571
574
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -576,7 +579,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
576
579
|
|
|
577
580
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
578
581
|
|
|
579
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
582
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
580
583
|
'''
|
|
581
584
|
result = self._values.get("plan")
|
|
582
585
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -587,7 +590,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
587
590
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
588
591
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
589
592
|
|
|
590
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
593
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
591
594
|
'''
|
|
592
595
|
result = self._values.get("private_node_groups")
|
|
593
596
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -596,7 +599,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
596
599
|
def version(self) -> typing.Optional[builtins.str]:
|
|
597
600
|
'''Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
598
601
|
|
|
599
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
602
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
600
603
|
'''
|
|
601
604
|
result = self._values.get("version")
|
|
602
605
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,8 +1,11 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
|
+
from pkgutil import extend_path
|
|
7
|
+
__path__ = extend_path(__path__, __name__)
|
|
8
|
+
|
|
6
9
|
import abc
|
|
7
10
|
import builtins
|
|
8
11
|
import datetime
|
|
@@ -26,7 +29,7 @@ class KubernetesNodeGroup(
|
|
|
26
29
|
metaclass=jsii.JSIIMeta,
|
|
27
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
28
31
|
):
|
|
29
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
30
33
|
|
|
31
34
|
def __init__(
|
|
32
35
|
self,
|
|
@@ -52,21 +55,21 @@ class KubernetesNodeGroup(
|
|
|
52
55
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
53
56
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
54
57
|
) -> None:
|
|
55
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
58
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
56
59
|
|
|
57
60
|
:param scope: The scope in which to define this construct.
|
|
58
61
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
59
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
61
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
66
|
-
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
68
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
69
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
63
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
64
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
65
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
66
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
67
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
68
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
69
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
70
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
71
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
72
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
70
73
|
:param connection:
|
|
71
74
|
:param count:
|
|
72
75
|
:param depends_on:
|
|
@@ -115,7 +118,7 @@ class KubernetesNodeGroup(
|
|
|
115
118
|
|
|
116
119
|
:param scope: The scope in which to define this construct.
|
|
117
120
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
118
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
121
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
119
122
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
120
123
|
'''
|
|
121
124
|
if __debug__:
|
|
@@ -440,17 +443,17 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
440
443
|
:param lifecycle:
|
|
441
444
|
:param provider:
|
|
442
445
|
:param provisioners:
|
|
443
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
444
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
445
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
446
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
447
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
448
|
-
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
449
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
450
|
-
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
451
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
452
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
453
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
446
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
447
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
448
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
449
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
450
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
451
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
452
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
453
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
454
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
455
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
456
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
454
457
|
'''
|
|
455
458
|
if isinstance(lifecycle, dict):
|
|
456
459
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -577,7 +580,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
577
580
|
def cluster(self) -> builtins.str:
|
|
578
581
|
'''Cluster ID.
|
|
579
582
|
|
|
580
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
583
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
581
584
|
'''
|
|
582
585
|
result = self._values.get("cluster")
|
|
583
586
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -587,7 +590,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
587
590
|
def name(self) -> builtins.str:
|
|
588
591
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
589
592
|
|
|
590
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
593
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
591
594
|
'''
|
|
592
595
|
result = self._values.get("name")
|
|
593
596
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -597,7 +600,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
597
600
|
def node_count(self) -> jsii.Number:
|
|
598
601
|
'''Amount of nodes to provision in the node group.
|
|
599
602
|
|
|
600
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
603
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
601
604
|
'''
|
|
602
605
|
result = self._values.get("node_count")
|
|
603
606
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -607,7 +610,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
607
610
|
def plan(self) -> builtins.str:
|
|
608
611
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
609
612
|
|
|
610
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
613
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
611
614
|
'''
|
|
612
615
|
result = self._values.get("plan")
|
|
613
616
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -621,14 +624,14 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
621
624
|
|
|
622
625
|
Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
623
626
|
|
|
624
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
627
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
625
628
|
'''
|
|
626
629
|
result = self._values.get("anti_affinity")
|
|
627
630
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
628
631
|
|
|
629
632
|
@builtins.property
|
|
630
633
|
def id(self) -> typing.Optional[builtins.str]:
|
|
631
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
634
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
|
|
632
635
|
|
|
633
636
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
634
637
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -642,7 +645,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
642
645
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
643
646
|
'''kubelet_args block.
|
|
644
647
|
|
|
645
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
648
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
646
649
|
'''
|
|
647
650
|
result = self._values.get("kubelet_args")
|
|
648
651
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -651,7 +654,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
651
654
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
652
655
|
'''Key-value pairs to classify the node group.
|
|
653
656
|
|
|
654
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
657
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
655
658
|
'''
|
|
656
659
|
result = self._values.get("labels")
|
|
657
660
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -662,7 +665,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
662
665
|
|
|
663
666
|
This allows you to connect to the nodes via SSH once they are running.
|
|
664
667
|
|
|
665
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
668
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
666
669
|
'''
|
|
667
670
|
result = self._values.get("ssh_keys")
|
|
668
671
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -673,7 +676,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
673
676
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
674
677
|
'''taint block.
|
|
675
678
|
|
|
676
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
679
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
677
680
|
'''
|
|
678
681
|
result = self._values.get("taint")
|
|
679
682
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -684,7 +687,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
684
687
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
685
688
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
686
689
|
|
|
687
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
690
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
688
691
|
'''
|
|
689
692
|
result = self._values.get("utility_network_access")
|
|
690
693
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -709,8 +712,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
709
712
|
class KubernetesNodeGroupKubeletArgs:
|
|
710
713
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
711
714
|
'''
|
|
712
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
713
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
715
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
716
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
714
717
|
'''
|
|
715
718
|
if __debug__:
|
|
716
719
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -725,7 +728,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
725
728
|
def key(self) -> builtins.str:
|
|
726
729
|
'''Kubelet argument key.
|
|
727
730
|
|
|
728
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
731
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
729
732
|
'''
|
|
730
733
|
result = self._values.get("key")
|
|
731
734
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -735,7 +738,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
735
738
|
def value(self) -> builtins.str:
|
|
736
739
|
'''Kubelet argument value.
|
|
737
740
|
|
|
738
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
741
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
739
742
|
'''
|
|
740
743
|
result = self._values.get("value")
|
|
741
744
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -938,9 +941,9 @@ class KubernetesNodeGroupTaint:
|
|
|
938
941
|
value: builtins.str,
|
|
939
942
|
) -> None:
|
|
940
943
|
'''
|
|
941
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
942
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
943
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
944
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
945
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
946
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
944
947
|
'''
|
|
945
948
|
if __debug__:
|
|
946
949
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -957,7 +960,7 @@ class KubernetesNodeGroupTaint:
|
|
|
957
960
|
def effect(self) -> builtins.str:
|
|
958
961
|
'''Taint effect.
|
|
959
962
|
|
|
960
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
963
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
961
964
|
'''
|
|
962
965
|
result = self._values.get("effect")
|
|
963
966
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -967,7 +970,7 @@ class KubernetesNodeGroupTaint:
|
|
|
967
970
|
def key(self) -> builtins.str:
|
|
968
971
|
'''Taint key.
|
|
969
972
|
|
|
970
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
973
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
971
974
|
'''
|
|
972
975
|
result = self._values.get("key")
|
|
973
976
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -977,7 +980,7 @@ class KubernetesNodeGroupTaint:
|
|
|
977
980
|
def value(self) -> builtins.str:
|
|
978
981
|
'''Taint value.
|
|
979
982
|
|
|
980
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
983
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.2.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
981
984
|
'''
|
|
982
985
|
result = self._values.get("value")
|
|
983
986
|
assert result is not None, "Required property 'value' is missing"
|