cdktf-cdktf-provider-upcloud 14.10.0__py3-none-any.whl → 14.10.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (63) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.1.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +31 -31
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +42 -42
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +195 -195
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +441 -441
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +309 -309
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +123 -123
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +153 -153
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  55. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  56. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  57. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/METADATA +4 -4
  58. cdktf_cdktf_provider_upcloud-14.10.1.dist-info/RECORD +62 -0
  59. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.10.0.jsii.tgz +0 -0
  60. cdktf_cdktf_provider_upcloud-14.10.0.dist-info/RECORD +0 -62
  61. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/LICENSE +0 -0
  62. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/WHEEL +0 -0
  63. {cdktf_cdktf_provider_upcloud-14.10.0.dist-info → cdktf_cdktf_provider_upcloud-14.10.1.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class KubernetesCluster(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -53,19 +53,19 @@ class KubernetesCluster(
53
53
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
54
54
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
55
55
  ) -> None:
56
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
56
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
57
57
 
58
58
  :param scope: The scope in which to define this construct.
59
59
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
60
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
61
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
62
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
63
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
64
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
65
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
66
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
67
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
68
- :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
60
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
61
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
62
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
63
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
64
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
65
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
66
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
67
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
68
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
69
69
  :param connection:
70
70
  :param count:
71
71
  :param depends_on:
@@ -112,7 +112,7 @@ class KubernetesCluster(
112
112
 
113
113
  :param scope: The scope in which to define this construct.
114
114
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
115
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
115
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
116
116
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
117
117
  '''
118
118
  if __debug__:
@@ -392,15 +392,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
392
392
  :param lifecycle:
393
393
  :param provider:
394
394
  :param provisioners:
395
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
396
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
397
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
398
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
399
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
400
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
401
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
402
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
403
- :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
395
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
396
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
397
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
398
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
399
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
400
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
401
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
402
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
403
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
404
404
  '''
405
405
  if isinstance(lifecycle, dict):
406
406
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -523,7 +523,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
523
523
 
524
524
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
525
525
 
526
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
526
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
527
527
  '''
528
528
  result = self._values.get("control_plane_ip_filter")
529
529
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -533,7 +533,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
533
533
  def name(self) -> builtins.str:
534
534
  '''Cluster name. Needs to be unique within the account.
535
535
 
536
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
536
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
537
537
  '''
538
538
  result = self._values.get("name")
539
539
  assert result is not None, "Required property 'name' is missing"
@@ -543,7 +543,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
543
543
  def network(self) -> builtins.str:
544
544
  '''Network ID for the cluster to run in.
545
545
 
546
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
546
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
547
547
  '''
548
548
  result = self._values.get("network")
549
549
  assert result is not None, "Required property 'network' is missing"
@@ -553,7 +553,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
553
553
  def zone(self) -> builtins.str:
554
554
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
555
555
 
556
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
556
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
557
557
  '''
558
558
  result = self._values.get("zone")
559
559
  assert result is not None, "Required property 'zone' is missing"
@@ -563,7 +563,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
563
563
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
564
564
  '''User defined key-value pairs to classify the cluster.
565
565
 
566
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
566
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
567
567
  '''
568
568
  result = self._values.get("labels")
569
569
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -574,7 +574,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
574
574
 
575
575
  Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
576
576
 
577
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
577
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
578
578
  '''
579
579
  result = self._values.get("plan")
580
580
  return typing.cast(typing.Optional[builtins.str], result)
@@ -585,7 +585,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
585
585
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
586
586
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
587
587
 
588
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
588
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
589
589
  '''
590
590
  result = self._values.get("private_node_groups")
591
591
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -594,7 +594,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
594
594
  def storage_encryption(self) -> typing.Optional[builtins.str]:
595
595
  '''Set default storage encryption strategy for all nodes in the cluster.
596
596
 
597
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
597
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
598
598
  '''
599
599
  result = self._values.get("storage_encryption")
600
600
  return typing.cast(typing.Optional[builtins.str], result)
@@ -603,7 +603,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
603
603
  def version(self) -> typing.Optional[builtins.str]:
604
604
  '''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
605
605
 
606
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
606
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
607
607
  '''
608
608
  result = self._values.get("version")
609
609
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_node_group`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class KubernetesNodeGroup(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -56,22 +56,22 @@ class KubernetesNodeGroup(
56
56
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
57
57
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
58
58
  ) -> None:
59
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
59
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
60
60
 
61
61
  :param scope: The scope in which to define this construct.
62
62
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
63
- :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
64
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
65
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
66
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
67
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
68
- :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
69
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
70
- :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
71
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
72
- :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
73
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
74
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
63
+ :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
64
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
65
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
66
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
67
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
68
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
69
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
70
+ :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
71
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
72
+ :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
73
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
74
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
75
75
  :param connection:
76
76
  :param count:
77
77
  :param depends_on:
@@ -121,7 +121,7 @@ class KubernetesNodeGroup(
121
121
 
122
122
  :param scope: The scope in which to define this construct.
123
123
  :param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
124
- :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
124
+ :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
125
125
  :param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
126
126
  '''
127
127
  if __debug__:
@@ -482,18 +482,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
482
482
  :param lifecycle:
483
483
  :param provider:
484
484
  :param provisioners:
485
- :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
486
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
487
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
488
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
489
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
490
- :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
491
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
492
- :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
493
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
494
- :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
495
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
496
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
485
+ :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
486
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
487
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
488
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
489
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
490
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
491
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
492
+ :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
493
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
494
+ :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
495
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
496
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
497
497
  '''
498
498
  if isinstance(lifecycle, dict):
499
499
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -623,7 +623,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
623
623
  def cluster(self) -> builtins.str:
624
624
  '''UUID of the cluster.
625
625
 
626
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
626
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
627
627
  '''
628
628
  result = self._values.get("cluster")
629
629
  assert result is not None, "Required property 'cluster' is missing"
@@ -633,7 +633,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
633
633
  def name(self) -> builtins.str:
634
634
  '''The name of the node group. Needs to be unique within a cluster.
635
635
 
636
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
636
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
637
637
  '''
638
638
  result = self._values.get("name")
639
639
  assert result is not None, "Required property 'name' is missing"
@@ -643,7 +643,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
643
643
  def node_count(self) -> jsii.Number:
644
644
  '''Amount of nodes to provision in the node group.
645
645
 
646
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
646
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
647
647
  '''
648
648
  result = self._values.get("node_count")
649
649
  assert result is not None, "Required property 'node_count' is missing"
@@ -653,7 +653,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
653
653
  def plan(self) -> builtins.str:
654
654
  '''The server plan used for the node group. You can list available plans with ``upctl server plans``.
655
655
 
656
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
656
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
657
657
  '''
658
658
  result = self._values.get("plan")
659
659
  assert result is not None, "Required property 'plan' is missing"
@@ -667,7 +667,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
667
667
 
668
668
  Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
669
669
 
670
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
670
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
671
671
  '''
672
672
  result = self._values.get("anti_affinity")
673
673
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -678,7 +678,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
678
678
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
679
679
  '''custom_plan block.
680
680
 
681
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
681
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
682
682
  '''
683
683
  result = self._values.get("custom_plan")
684
684
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
@@ -689,7 +689,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
689
689
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
690
690
  '''kubelet_args block.
691
691
 
692
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
692
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
693
693
  '''
694
694
  result = self._values.get("kubelet_args")
695
695
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
@@ -698,7 +698,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
698
698
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
699
699
  '''User defined key-value pairs to classify the node_group.
700
700
 
701
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
701
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
702
702
  '''
703
703
  result = self._values.get("labels")
704
704
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -709,7 +709,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
709
709
 
710
710
  This allows you to connect to the nodes via SSH once they are running.
711
711
 
712
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
712
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
713
713
  '''
714
714
  result = self._values.get("ssh_keys")
715
715
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -720,7 +720,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
720
720
 
721
721
  If not set, the cluster's storage encryption strategy will be used, if applicable.
722
722
 
723
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
723
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
724
724
  '''
725
725
  result = self._values.get("storage_encryption")
726
726
  return typing.cast(typing.Optional[builtins.str], result)
@@ -731,7 +731,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
731
731
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
732
732
  '''taint block.
733
733
 
734
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
734
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
735
735
  '''
736
736
  result = self._values.get("taint")
737
737
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
@@ -742,7 +742,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
742
742
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
743
743
  '''If set to false, nodes in this group will not have access to utility network.
744
744
 
745
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
745
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
746
746
  '''
747
747
  result = self._values.get("utility_network_access")
748
748
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -779,10 +779,10 @@ class KubernetesNodeGroupCustomPlan:
779
779
  storage_tier: typing.Optional[builtins.str] = None,
780
780
  ) -> None:
781
781
  '''
782
- :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
783
- :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
784
- :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
785
- :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
782
+ :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
783
+ :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
784
+ :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
785
+ :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
786
786
  '''
787
787
  if __debug__:
788
788
  type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
@@ -802,7 +802,7 @@ class KubernetesNodeGroupCustomPlan:
802
802
  def cores(self) -> jsii.Number:
803
803
  '''The number of CPU cores dedicated to individual node group nodes when using custom plan.
804
804
 
805
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
805
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
806
806
  '''
807
807
  result = self._values.get("cores")
808
808
  assert result is not None, "Required property 'cores' is missing"
@@ -814,7 +814,7 @@ class KubernetesNodeGroupCustomPlan:
814
814
 
815
815
  Value needs to be divisible by 1024.
816
816
 
817
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
817
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
818
818
  '''
819
819
  result = self._values.get("memory")
820
820
  assert result is not None, "Required property 'memory' is missing"
@@ -824,7 +824,7 @@ class KubernetesNodeGroupCustomPlan:
824
824
  def storage_size(self) -> jsii.Number:
825
825
  '''The size of the storage device in gigabytes.
826
826
 
827
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
827
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
828
828
  '''
829
829
  result = self._values.get("storage_size")
830
830
  assert result is not None, "Required property 'storage_size' is missing"
@@ -834,7 +834,7 @@ class KubernetesNodeGroupCustomPlan:
834
834
  def storage_tier(self) -> typing.Optional[builtins.str]:
835
835
  '''The storage tier to use. Defaults to maxiops.
836
836
 
837
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
837
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
838
838
  '''
839
839
  result = self._values.get("storage_tier")
840
840
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1065,8 +1065,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
1065
1065
  class KubernetesNodeGroupKubeletArgs:
1066
1066
  def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
1067
1067
  '''
1068
- :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1069
- :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1068
+ :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1069
+ :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1070
1070
  '''
1071
1071
  if __debug__:
1072
1072
  type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
@@ -1081,7 +1081,7 @@ class KubernetesNodeGroupKubeletArgs:
1081
1081
  def key(self) -> builtins.str:
1082
1082
  '''Kubelet argument key.
1083
1083
 
1084
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1084
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1085
1085
  '''
1086
1086
  result = self._values.get("key")
1087
1087
  assert result is not None, "Required property 'key' is missing"
@@ -1091,7 +1091,7 @@ class KubernetesNodeGroupKubeletArgs:
1091
1091
  def value(self) -> builtins.str:
1092
1092
  '''Kubelet argument value.
1093
1093
 
1094
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1094
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1095
1095
  '''
1096
1096
  result = self._values.get("value")
1097
1097
  assert result is not None, "Required property 'value' is missing"
@@ -1294,9 +1294,9 @@ class KubernetesNodeGroupTaint:
1294
1294
  value: builtins.str,
1295
1295
  ) -> None:
1296
1296
  '''
1297
- :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1298
- :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1299
- :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1297
+ :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1298
+ :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1299
+ :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1300
1300
  '''
1301
1301
  if __debug__:
1302
1302
  type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
@@ -1313,7 +1313,7 @@ class KubernetesNodeGroupTaint:
1313
1313
  def effect(self) -> builtins.str:
1314
1314
  '''Taint effect.
1315
1315
 
1316
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1316
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1317
1317
  '''
1318
1318
  result = self._values.get("effect")
1319
1319
  assert result is not None, "Required property 'effect' is missing"
@@ -1323,7 +1323,7 @@ class KubernetesNodeGroupTaint:
1323
1323
  def key(self) -> builtins.str:
1324
1324
  '''Taint key.
1325
1325
 
1326
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1326
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1327
1327
  '''
1328
1328
  result = self._values.get("key")
1329
1329
  assert result is not None, "Required property 'key' is missing"
@@ -1333,7 +1333,7 @@ class KubernetesNodeGroupTaint:
1333
1333
  def value(self) -> builtins.str:
1334
1334
  '''Taint value.
1335
1335
 
1336
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1336
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.10.1/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1337
1337
  '''
1338
1338
  result = self._values.get("value")
1339
1339
  assert result is not None, "Required property 'value' is missing"