cdktf-cdktf-provider-upcloud 14.10.0__py3-none-any.whl → 14.10.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +42 -42
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +195 -195
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +441 -441
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +309 -309
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +123 -123
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +153 -153
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/METADATA +4 -4
- cdktf_cdktf_provider_upcloud-14.10.1.dist-info/RECORD +62 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +0 -62
- {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class KubernetesCluster(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -53,19 +53,19 @@ class KubernetesCluster(
|
|
|
53
53
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
54
54
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
55
55
|
) -> None:
|
|
56
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
56
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
57
57
|
|
|
58
58
|
:param scope: The scope in which to define this construct.
|
|
59
59
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
60
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
61
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
62
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
63
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
64
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
65
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
66
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
67
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
68
|
-
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
60
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
61
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
62
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
63
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
64
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
65
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
66
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
67
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
68
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
69
69
|
:param connection:
|
|
70
70
|
:param count:
|
|
71
71
|
:param depends_on:
|
|
@@ -112,7 +112,7 @@ class KubernetesCluster(
|
|
|
112
112
|
|
|
113
113
|
:param scope: The scope in which to define this construct.
|
|
114
114
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
115
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
115
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
116
116
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
117
117
|
'''
|
|
118
118
|
if __debug__:
|
|
@@ -392,15 +392,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
392
392
|
:param lifecycle:
|
|
393
393
|
:param provider:
|
|
394
394
|
:param provisioners:
|
|
395
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
396
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
397
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
398
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
399
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
400
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
401
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
402
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
403
|
-
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
395
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
396
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
397
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
398
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
399
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
400
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
401
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
402
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
403
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
404
404
|
'''
|
|
405
405
|
if isinstance(lifecycle, dict):
|
|
406
406
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -523,7 +523,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
523
523
|
|
|
524
524
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
525
525
|
|
|
526
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
526
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
527
527
|
'''
|
|
528
528
|
result = self._values.get("control_plane_ip_filter")
|
|
529
529
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -533,7 +533,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
533
533
|
def name(self) -> builtins.str:
|
|
534
534
|
'''Cluster name. Needs to be unique within the account.
|
|
535
535
|
|
|
536
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
536
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
537
537
|
'''
|
|
538
538
|
result = self._values.get("name")
|
|
539
539
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -543,7 +543,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
543
543
|
def network(self) -> builtins.str:
|
|
544
544
|
'''Network ID for the cluster to run in.
|
|
545
545
|
|
|
546
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
546
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
547
547
|
'''
|
|
548
548
|
result = self._values.get("network")
|
|
549
549
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -553,7 +553,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
553
553
|
def zone(self) -> builtins.str:
|
|
554
554
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
555
555
|
|
|
556
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
556
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
557
557
|
'''
|
|
558
558
|
result = self._values.get("zone")
|
|
559
559
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -563,7 +563,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
563
563
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
564
564
|
'''User defined key-value pairs to classify the cluster.
|
|
565
565
|
|
|
566
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
566
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
567
567
|
'''
|
|
568
568
|
result = self._values.get("labels")
|
|
569
569
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -574,7 +574,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
574
574
|
|
|
575
575
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
576
576
|
|
|
577
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
577
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
578
578
|
'''
|
|
579
579
|
result = self._values.get("plan")
|
|
580
580
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -585,7 +585,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
585
585
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
586
586
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
587
587
|
|
|
588
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
588
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
589
589
|
'''
|
|
590
590
|
result = self._values.get("private_node_groups")
|
|
591
591
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -594,7 +594,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
594
594
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
595
595
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
596
596
|
|
|
597
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
597
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
598
598
|
'''
|
|
599
599
|
result = self._values.get("storage_encryption")
|
|
600
600
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -603,7 +603,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
603
603
|
def version(self) -> typing.Optional[builtins.str]:
|
|
604
604
|
'''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
605
605
|
|
|
606
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
606
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
607
607
|
'''
|
|
608
608
|
result = self._values.get("version")
|
|
609
609
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class KubernetesNodeGroup(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -56,22 +56,22 @@ class KubernetesNodeGroup(
|
|
|
56
56
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
57
57
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
58
58
|
) -> None:
|
|
59
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
59
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
60
60
|
|
|
61
61
|
:param scope: The scope in which to define this construct.
|
|
62
62
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
63
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
64
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
65
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
66
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
67
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
68
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
69
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
70
|
-
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
71
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
72
|
-
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
73
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
74
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
63
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
64
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
65
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
66
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
67
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
68
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
69
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
70
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
71
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
72
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
73
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
74
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
75
75
|
:param connection:
|
|
76
76
|
:param count:
|
|
77
77
|
:param depends_on:
|
|
@@ -121,7 +121,7 @@ class KubernetesNodeGroup(
|
|
|
121
121
|
|
|
122
122
|
:param scope: The scope in which to define this construct.
|
|
123
123
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
124
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
124
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
125
125
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
126
126
|
'''
|
|
127
127
|
if __debug__:
|
|
@@ -482,18 +482,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
482
482
|
:param lifecycle:
|
|
483
483
|
:param provider:
|
|
484
484
|
:param provisioners:
|
|
485
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
486
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
487
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
488
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
489
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
490
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
491
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
492
|
-
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
493
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
494
|
-
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
495
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
496
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
485
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
486
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
487
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
488
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
489
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
490
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
491
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
492
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
493
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
494
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
495
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
496
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
497
497
|
'''
|
|
498
498
|
if isinstance(lifecycle, dict):
|
|
499
499
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -623,7 +623,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
623
623
|
def cluster(self) -> builtins.str:
|
|
624
624
|
'''UUID of the cluster.
|
|
625
625
|
|
|
626
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
626
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
627
627
|
'''
|
|
628
628
|
result = self._values.get("cluster")
|
|
629
629
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -633,7 +633,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
633
633
|
def name(self) -> builtins.str:
|
|
634
634
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
635
635
|
|
|
636
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
636
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
637
637
|
'''
|
|
638
638
|
result = self._values.get("name")
|
|
639
639
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -643,7 +643,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
643
643
|
def node_count(self) -> jsii.Number:
|
|
644
644
|
'''Amount of nodes to provision in the node group.
|
|
645
645
|
|
|
646
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
646
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
647
647
|
'''
|
|
648
648
|
result = self._values.get("node_count")
|
|
649
649
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -653,7 +653,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
653
653
|
def plan(self) -> builtins.str:
|
|
654
654
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
655
655
|
|
|
656
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
656
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
657
657
|
'''
|
|
658
658
|
result = self._values.get("plan")
|
|
659
659
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -667,7 +667,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
667
667
|
|
|
668
668
|
Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
669
669
|
|
|
670
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
670
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
671
671
|
'''
|
|
672
672
|
result = self._values.get("anti_affinity")
|
|
673
673
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -678,7 +678,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
678
678
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
|
|
679
679
|
'''custom_plan block.
|
|
680
680
|
|
|
681
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
681
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
682
682
|
'''
|
|
683
683
|
result = self._values.get("custom_plan")
|
|
684
684
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
|
|
@@ -689,7 +689,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
689
689
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
690
690
|
'''kubelet_args block.
|
|
691
691
|
|
|
692
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
692
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
693
693
|
'''
|
|
694
694
|
result = self._values.get("kubelet_args")
|
|
695
695
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -698,7 +698,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
698
698
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
699
699
|
'''User defined key-value pairs to classify the node_group.
|
|
700
700
|
|
|
701
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
701
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
702
702
|
'''
|
|
703
703
|
result = self._values.get("labels")
|
|
704
704
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -709,7 +709,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
709
709
|
|
|
710
710
|
This allows you to connect to the nodes via SSH once they are running.
|
|
711
711
|
|
|
712
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
712
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
713
713
|
'''
|
|
714
714
|
result = self._values.get("ssh_keys")
|
|
715
715
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -720,7 +720,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
720
720
|
|
|
721
721
|
If not set, the cluster's storage encryption strategy will be used, if applicable.
|
|
722
722
|
|
|
723
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
723
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
724
724
|
'''
|
|
725
725
|
result = self._values.get("storage_encryption")
|
|
726
726
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -731,7 +731,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
731
731
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
732
732
|
'''taint block.
|
|
733
733
|
|
|
734
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
734
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
735
735
|
'''
|
|
736
736
|
result = self._values.get("taint")
|
|
737
737
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -742,7 +742,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
742
742
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
743
743
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
744
744
|
|
|
745
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
745
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
746
746
|
'''
|
|
747
747
|
result = self._values.get("utility_network_access")
|
|
748
748
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -779,10 +779,10 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
779
779
|
storage_tier: typing.Optional[builtins.str] = None,
|
|
780
780
|
) -> None:
|
|
781
781
|
'''
|
|
782
|
-
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
783
|
-
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
784
|
-
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
785
|
-
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
782
|
+
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
783
|
+
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
784
|
+
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
785
|
+
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
786
786
|
'''
|
|
787
787
|
if __debug__:
|
|
788
788
|
type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
|
|
@@ -802,7 +802,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
802
802
|
def cores(self) -> jsii.Number:
|
|
803
803
|
'''The number of CPU cores dedicated to individual node group nodes when using custom plan.
|
|
804
804
|
|
|
805
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
805
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
806
806
|
'''
|
|
807
807
|
result = self._values.get("cores")
|
|
808
808
|
assert result is not None, "Required property 'cores' is missing"
|
|
@@ -814,7 +814,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
814
814
|
|
|
815
815
|
Value needs to be divisible by 1024.
|
|
816
816
|
|
|
817
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
817
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
818
818
|
'''
|
|
819
819
|
result = self._values.get("memory")
|
|
820
820
|
assert result is not None, "Required property 'memory' is missing"
|
|
@@ -824,7 +824,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
824
824
|
def storage_size(self) -> jsii.Number:
|
|
825
825
|
'''The size of the storage device in gigabytes.
|
|
826
826
|
|
|
827
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
827
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
828
828
|
'''
|
|
829
829
|
result = self._values.get("storage_size")
|
|
830
830
|
assert result is not None, "Required property 'storage_size' is missing"
|
|
@@ -834,7 +834,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
834
834
|
def storage_tier(self) -> typing.Optional[builtins.str]:
|
|
835
835
|
'''The storage tier to use. Defaults to maxiops.
|
|
836
836
|
|
|
837
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
837
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
838
838
|
'''
|
|
839
839
|
result = self._values.get("storage_tier")
|
|
840
840
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1065,8 +1065,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
1065
1065
|
class KubernetesNodeGroupKubeletArgs:
|
|
1066
1066
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
1067
1067
|
'''
|
|
1068
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1069
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1068
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1069
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1070
1070
|
'''
|
|
1071
1071
|
if __debug__:
|
|
1072
1072
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -1081,7 +1081,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1081
1081
|
def key(self) -> builtins.str:
|
|
1082
1082
|
'''Kubelet argument key.
|
|
1083
1083
|
|
|
1084
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1084
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1085
1085
|
'''
|
|
1086
1086
|
result = self._values.get("key")
|
|
1087
1087
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1091,7 +1091,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1091
1091
|
def value(self) -> builtins.str:
|
|
1092
1092
|
'''Kubelet argument value.
|
|
1093
1093
|
|
|
1094
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1094
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1095
1095
|
'''
|
|
1096
1096
|
result = self._values.get("value")
|
|
1097
1097
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -1294,9 +1294,9 @@ class KubernetesNodeGroupTaint:
|
|
|
1294
1294
|
value: builtins.str,
|
|
1295
1295
|
) -> None:
|
|
1296
1296
|
'''
|
|
1297
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1298
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1299
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1297
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1298
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1299
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1300
1300
|
'''
|
|
1301
1301
|
if __debug__:
|
|
1302
1302
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -1313,7 +1313,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1313
1313
|
def effect(self) -> builtins.str:
|
|
1314
1314
|
'''Taint effect.
|
|
1315
1315
|
|
|
1316
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1316
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1317
1317
|
'''
|
|
1318
1318
|
result = self._values.get("effect")
|
|
1319
1319
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -1323,7 +1323,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1323
1323
|
def key(self) -> builtins.str:
|
|
1324
1324
|
'''Taint key.
|
|
1325
1325
|
|
|
1326
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1326
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1327
1327
|
'''
|
|
1328
1328
|
result = self._values.get("key")
|
|
1329
1329
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1333,7 +1333,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1333
1333
|
def value(self) -> builtins.str:
|
|
1334
1334
|
'''Taint value.
|
|
1335
1335
|
|
|
1336
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.
|
|
1336
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1337
1337
|
'''
|
|
1338
1338
|
result = self._values.get("value")
|
|
1339
1339
|
assert result is not None, "Required property 'value' is missing"
|