cdktf-cdktf-provider-upcloud 14.17.0__py3-none-any.whl → 14.18.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (68) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.18.0.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
  7. cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
  13. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
  14. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
  15. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
  16. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
  17. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
  18. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
  19. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
  20. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
  21. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
  22. cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
  23. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
  24. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
  25. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +31 -31
  26. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
  27. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
  28. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
  29. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
  30. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
  31. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
  33. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +226 -226
  34. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
  35. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
  36. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
  37. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
  38. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
  39. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +201 -201
  40. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +561 -561
  41. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +315 -315
  42. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
  43. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
  44. cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +129 -129
  45. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
  47. cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
  48. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
  49. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
  50. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
  51. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
  52. cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
  53. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
  54. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
  55. cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
  56. cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
  57. cdktf_cdktf_provider_upcloud/server/__init__.py +136 -136
  58. cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
  59. cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
  60. cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
  61. cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
  62. {cdktf_cdktf_provider_upcloud-14.17.0.dist-info → cdktf_cdktf_provider_upcloud-14.18.0.dist-info}/METADATA +4 -4
  63. cdktf_cdktf_provider_upcloud-14.18.0.dist-info/RECORD +67 -0
  64. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.17.0.jsii.tgz +0 -0
  65. cdktf_cdktf_provider_upcloud-14.17.0.dist-info/RECORD +0 -67
  66. {cdktf_cdktf_provider_upcloud-14.17.0.dist-info → cdktf_cdktf_provider_upcloud-14.18.0.dist-info}/LICENSE +0 -0
  67. {cdktf_cdktf_provider_upcloud-14.17.0.dist-info → cdktf_cdktf_provider_upcloud-14.18.0.dist-info}/WHEEL +0 -0
  68. {cdktf_cdktf_provider_upcloud-14.17.0.dist-info → cdktf_cdktf_provider_upcloud-14.18.0.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class KubernetesCluster(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -68,19 +68,19 @@ class KubernetesCluster(
68
68
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
69
69
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
70
70
  ) -> None:
71
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
71
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
72
72
 
73
73
  :param scope: The scope in which to define this construct.
74
74
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
75
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
76
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
77
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
78
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
79
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
80
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
81
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
82
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
83
- :param version: Kubernetes version ID, e.g. ``1.29``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
75
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
76
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
77
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
78
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
79
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
80
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
81
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
82
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
83
+ :param version: Kubernetes version ID, e.g. ``1.29``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
84
84
  :param connection:
85
85
  :param count:
86
86
  :param depends_on:
@@ -127,7 +127,7 @@ class KubernetesCluster(
127
127
 
128
128
  :param scope: The scope in which to define this construct.
129
129
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
130
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
130
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
131
131
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
132
132
  '''
133
133
  if __debug__:
@@ -407,15 +407,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
407
407
  :param lifecycle:
408
408
  :param provider:
409
409
  :param provisioners:
410
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
411
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
412
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
413
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
414
- :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
415
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
416
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
417
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
418
- :param version: Kubernetes version ID, e.g. ``1.29``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
410
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
411
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
412
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
413
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
414
+ :param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
415
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
416
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
417
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
418
+ :param version: Kubernetes version ID, e.g. ``1.29``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
419
419
  '''
420
420
  if isinstance(lifecycle, dict):
421
421
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -538,7 +538,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
538
538
 
539
539
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
540
540
 
541
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
541
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
542
542
  '''
543
543
  result = self._values.get("control_plane_ip_filter")
544
544
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -548,7 +548,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
548
548
  def name(self) -> builtins.str:
549
549
  '''Cluster name. Needs to be unique within the account.
550
550
 
551
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
551
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
552
552
  '''
553
553
  result = self._values.get("name")
554
554
  assert result is not None, "Required property 'name' is missing"
@@ -558,7 +558,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
558
558
  def network(self) -> builtins.str:
559
559
  '''Network ID for the cluster to run in.
560
560
 
561
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
561
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
562
562
  '''
563
563
  result = self._values.get("network")
564
564
  assert result is not None, "Required property 'network' is missing"
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
568
568
  def zone(self) -> builtins.str:
569
569
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
570
570
 
571
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
571
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
572
572
  '''
573
573
  result = self._values.get("zone")
574
574
  assert result is not None, "Required property 'zone' is missing"
@@ -578,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
578
578
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
579
579
  '''User defined key-value pairs to classify the cluster.
580
580
 
581
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
581
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
582
582
  '''
583
583
  result = self._values.get("labels")
584
584
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -589,7 +589,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
589
589
 
590
590
  Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
591
591
 
592
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
592
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
593
593
  '''
594
594
  result = self._values.get("plan")
595
595
  return typing.cast(typing.Optional[builtins.str], result)
@@ -600,7 +600,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
600
600
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
601
601
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
602
602
 
603
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
603
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
604
604
  '''
605
605
  result = self._values.get("private_node_groups")
606
606
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -609,7 +609,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
609
609
  def storage_encryption(self) -> typing.Optional[builtins.str]:
610
610
  '''Set default storage encryption strategy for all nodes in the cluster.
611
611
 
612
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
612
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
613
613
  '''
614
614
  result = self._values.get("storage_encryption")
615
615
  return typing.cast(typing.Optional[builtins.str], result)
@@ -618,7 +618,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
618
618
  def version(self) -> typing.Optional[builtins.str]:
619
619
  '''Kubernetes version ID, e.g. ``1.29``. You can list available version IDs with ``upctl kubernetes versions``.
620
620
 
621
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
621
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
622
622
  '''
623
623
  result = self._values.get("version")
624
624
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_node_group`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -44,7 +44,7 @@ class KubernetesNodeGroup(
44
44
  metaclass=jsii.JSIIMeta,
45
45
  jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
46
46
  ):
47
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
47
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
48
48
 
49
49
  def __init__(
50
50
  self,
@@ -71,22 +71,22 @@ class KubernetesNodeGroup(
71
71
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
72
72
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
73
73
  ) -> None:
74
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
74
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
75
75
 
76
76
  :param scope: The scope in which to define this construct.
77
77
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
78
- :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
79
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
80
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
81
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
82
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
83
- :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
84
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
85
- :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
86
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
87
- :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
88
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
89
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
78
+ :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
79
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
80
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
81
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
82
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
83
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
84
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
85
+ :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
86
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
87
+ :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
88
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
89
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
90
90
  :param connection:
91
91
  :param count:
92
92
  :param depends_on:
@@ -136,7 +136,7 @@ class KubernetesNodeGroup(
136
136
 
137
137
  :param scope: The scope in which to define this construct.
138
138
  :param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
139
- :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
139
+ :param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
140
140
  :param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
141
141
  '''
142
142
  if __debug__:
@@ -497,18 +497,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
497
497
  :param lifecycle:
498
498
  :param provider:
499
499
  :param provisioners:
500
- :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
501
- :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
502
- :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
503
- :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
504
- :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
505
- :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
506
- :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
507
- :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
508
- :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
509
- :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
510
- :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
511
- :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
500
+ :param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
501
+ :param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
502
+ :param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
503
+ :param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
504
+ :param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
505
+ :param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
506
+ :param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
507
+ :param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
508
+ :param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
509
+ :param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
510
+ :param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
511
+ :param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
512
512
  '''
513
513
  if isinstance(lifecycle, dict):
514
514
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -638,7 +638,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
638
638
  def cluster(self) -> builtins.str:
639
639
  '''UUID of the cluster.
640
640
 
641
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
641
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
642
642
  '''
643
643
  result = self._values.get("cluster")
644
644
  assert result is not None, "Required property 'cluster' is missing"
@@ -648,7 +648,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
648
648
  def name(self) -> builtins.str:
649
649
  '''The name of the node group. Needs to be unique within a cluster.
650
650
 
651
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
651
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
652
652
  '''
653
653
  result = self._values.get("name")
654
654
  assert result is not None, "Required property 'name' is missing"
@@ -658,7 +658,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
658
658
  def node_count(self) -> jsii.Number:
659
659
  '''Amount of nodes to provision in the node group.
660
660
 
661
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
661
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
662
662
  '''
663
663
  result = self._values.get("node_count")
664
664
  assert result is not None, "Required property 'node_count' is missing"
@@ -668,7 +668,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
668
668
  def plan(self) -> builtins.str:
669
669
  '''The server plan used for the node group. You can list available plans with ``upctl server plans``.
670
670
 
671
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
671
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
672
672
  '''
673
673
  result = self._values.get("plan")
674
674
  assert result is not None, "Required property 'plan' is missing"
@@ -682,7 +682,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
682
682
 
683
683
  Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
684
684
 
685
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
685
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
686
686
  '''
687
687
  result = self._values.get("anti_affinity")
688
688
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -693,7 +693,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
693
693
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
694
694
  '''custom_plan block.
695
695
 
696
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
696
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
697
697
  '''
698
698
  result = self._values.get("custom_plan")
699
699
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
@@ -704,7 +704,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
704
704
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
705
705
  '''kubelet_args block.
706
706
 
707
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
707
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
708
708
  '''
709
709
  result = self._values.get("kubelet_args")
710
710
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
@@ -713,7 +713,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
713
713
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
714
714
  '''User defined key-value pairs to classify the node_group.
715
715
 
716
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
716
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
717
717
  '''
718
718
  result = self._values.get("labels")
719
719
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -724,7 +724,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
724
724
 
725
725
  This allows you to connect to the nodes via SSH once they are running.
726
726
 
727
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
727
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
728
728
  '''
729
729
  result = self._values.get("ssh_keys")
730
730
  return typing.cast(typing.Optional[typing.List[builtins.str]], result)
@@ -735,7 +735,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
735
735
 
736
736
  If not set, the cluster's storage encryption strategy will be used, if applicable.
737
737
 
738
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
738
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
739
739
  '''
740
740
  result = self._values.get("storage_encryption")
741
741
  return typing.cast(typing.Optional[builtins.str], result)
@@ -746,7 +746,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
746
746
  ) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
747
747
  '''taint block.
748
748
 
749
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
749
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
750
750
  '''
751
751
  result = self._values.get("taint")
752
752
  return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
@@ -757,7 +757,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
757
757
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
758
758
  '''If set to false, nodes in this group will not have access to utility network.
759
759
 
760
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
760
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
761
761
  '''
762
762
  result = self._values.get("utility_network_access")
763
763
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -794,10 +794,10 @@ class KubernetesNodeGroupCustomPlan:
794
794
  storage_tier: typing.Optional[builtins.str] = None,
795
795
  ) -> None:
796
796
  '''
797
- :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
798
- :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
799
- :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
800
- :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
797
+ :param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
798
+ :param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
799
+ :param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
800
+ :param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
801
801
  '''
802
802
  if __debug__:
803
803
  type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
@@ -817,7 +817,7 @@ class KubernetesNodeGroupCustomPlan:
817
817
  def cores(self) -> jsii.Number:
818
818
  '''The number of CPU cores dedicated to individual node group nodes when using custom plan.
819
819
 
820
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
820
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
821
821
  '''
822
822
  result = self._values.get("cores")
823
823
  assert result is not None, "Required property 'cores' is missing"
@@ -829,7 +829,7 @@ class KubernetesNodeGroupCustomPlan:
829
829
 
830
830
  Value needs to be divisible by 1024.
831
831
 
832
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
832
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
833
833
  '''
834
834
  result = self._values.get("memory")
835
835
  assert result is not None, "Required property 'memory' is missing"
@@ -839,7 +839,7 @@ class KubernetesNodeGroupCustomPlan:
839
839
  def storage_size(self) -> jsii.Number:
840
840
  '''The size of the storage device in gigabytes.
841
841
 
842
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
842
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
843
843
  '''
844
844
  result = self._values.get("storage_size")
845
845
  assert result is not None, "Required property 'storage_size' is missing"
@@ -849,7 +849,7 @@ class KubernetesNodeGroupCustomPlan:
849
849
  def storage_tier(self) -> typing.Optional[builtins.str]:
850
850
  '''The storage tier to use. Defaults to maxiops.
851
851
 
852
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
852
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
853
853
  '''
854
854
  result = self._values.get("storage_tier")
855
855
  return typing.cast(typing.Optional[builtins.str], result)
@@ -1080,8 +1080,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
1080
1080
  class KubernetesNodeGroupKubeletArgs:
1081
1081
  def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
1082
1082
  '''
1083
- :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1084
- :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1083
+ :param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1084
+ :param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1085
1085
  '''
1086
1086
  if __debug__:
1087
1087
  type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
@@ -1096,7 +1096,7 @@ class KubernetesNodeGroupKubeletArgs:
1096
1096
  def key(self) -> builtins.str:
1097
1097
  '''Kubelet argument key.
1098
1098
 
1099
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1099
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1100
1100
  '''
1101
1101
  result = self._values.get("key")
1102
1102
  assert result is not None, "Required property 'key' is missing"
@@ -1106,7 +1106,7 @@ class KubernetesNodeGroupKubeletArgs:
1106
1106
  def value(self) -> builtins.str:
1107
1107
  '''Kubelet argument value.
1108
1108
 
1109
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1109
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1110
1110
  '''
1111
1111
  result = self._values.get("value")
1112
1112
  assert result is not None, "Required property 'value' is missing"
@@ -1309,9 +1309,9 @@ class KubernetesNodeGroupTaint:
1309
1309
  value: builtins.str,
1310
1310
  ) -> None:
1311
1311
  '''
1312
- :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1313
- :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1314
- :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1312
+ :param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1313
+ :param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1314
+ :param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1315
1315
  '''
1316
1316
  if __debug__:
1317
1317
  type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
@@ -1328,7 +1328,7 @@ class KubernetesNodeGroupTaint:
1328
1328
  def effect(self) -> builtins.str:
1329
1329
  '''Taint effect.
1330
1330
 
1331
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1331
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
1332
1332
  '''
1333
1333
  result = self._values.get("effect")
1334
1334
  assert result is not None, "Required property 'effect' is missing"
@@ -1338,7 +1338,7 @@ class KubernetesNodeGroupTaint:
1338
1338
  def key(self) -> builtins.str:
1339
1339
  '''Taint key.
1340
1340
 
1341
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1341
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
1342
1342
  '''
1343
1343
  result = self._values.get("key")
1344
1344
  assert result is not None, "Required property 'key' is missing"
@@ -1348,7 +1348,7 @@ class KubernetesNodeGroupTaint:
1348
1348
  def value(self) -> builtins.str:
1349
1349
  '''Taint value.
1350
1350
 
1351
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.17.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1351
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.18.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
1352
1352
  '''
1353
1353
  result = self._values.get("value")
1354
1354
  assert result is not None, "Required property 'value' is missing"