cdktf-cdktf-provider-upcloud 14.2.3__py3-none-any.whl → 14.4.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +5 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.4.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +82 -50
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +78 -31
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +403 -47
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +42 -42
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +189 -189
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +330 -376
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +345 -345
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +117 -117
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +221 -130
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +1069 -0
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +153 -153
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-14.2.3.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.4.0.dist-info/RECORD +61 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.2.3.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.2.3.dist-info/RECORD +0 -60
- {cdktf_cdktf_provider_upcloud-14.2.3.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.2.3.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.2.3.dist-info → cdktf_cdktf_provider_upcloud-14.4.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class KubernetesNodeGroup(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -41,10 +41,12 @@ class KubernetesNodeGroup(
|
|
|
41
41
|
node_count: jsii.Number,
|
|
42
42
|
plan: builtins.str,
|
|
43
43
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
44
|
+
custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
44
45
|
id: typing.Optional[builtins.str] = None,
|
|
45
46
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
46
47
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
47
48
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
49
|
+
storage_encryption: typing.Optional[builtins.str] = None,
|
|
48
50
|
taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupTaint", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
49
51
|
utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
50
52
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -55,21 +57,23 @@ class KubernetesNodeGroup(
|
|
|
55
57
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
56
58
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
57
59
|
) -> None:
|
|
58
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
60
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
59
61
|
|
|
60
62
|
:param scope: The scope in which to define this construct.
|
|
61
63
|
:param id_: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
62
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
66
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
67
|
-
:param
|
|
68
|
-
:param
|
|
69
|
-
:param
|
|
70
|
-
:param
|
|
71
|
-
:param
|
|
72
|
-
:param
|
|
64
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
65
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
66
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
67
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
68
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
69
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
70
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
71
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
72
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
73
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
74
|
+
:param storage_encryption: Storage encryption strategy for the nodes in this group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
75
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
76
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
73
77
|
:param connection:
|
|
74
78
|
:param count:
|
|
75
79
|
:param depends_on:
|
|
@@ -88,10 +92,12 @@ class KubernetesNodeGroup(
|
|
|
88
92
|
node_count=node_count,
|
|
89
93
|
plan=plan,
|
|
90
94
|
anti_affinity=anti_affinity,
|
|
95
|
+
custom_plan=custom_plan,
|
|
91
96
|
id=id,
|
|
92
97
|
kubelet_args=kubelet_args,
|
|
93
98
|
labels=labels,
|
|
94
99
|
ssh_keys=ssh_keys,
|
|
100
|
+
storage_encryption=storage_encryption,
|
|
95
101
|
taint=taint,
|
|
96
102
|
utility_network_access=utility_network_access,
|
|
97
103
|
connection=connection,
|
|
@@ -118,7 +124,7 @@ class KubernetesNodeGroup(
|
|
|
118
124
|
|
|
119
125
|
:param scope: The scope in which to define this construct.
|
|
120
126
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
121
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
127
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
122
128
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
123
129
|
'''
|
|
124
130
|
if __debug__:
|
|
@@ -129,6 +135,30 @@ class KubernetesNodeGroup(
|
|
|
129
135
|
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
130
136
|
return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
|
|
131
137
|
|
|
138
|
+
@jsii.member(jsii_name="putCustomPlan")
|
|
139
|
+
def put_custom_plan(
|
|
140
|
+
self,
|
|
141
|
+
*,
|
|
142
|
+
cores: jsii.Number,
|
|
143
|
+
memory: jsii.Number,
|
|
144
|
+
storage_size: jsii.Number,
|
|
145
|
+
storage_tier: typing.Optional[builtins.str] = None,
|
|
146
|
+
) -> None:
|
|
147
|
+
'''
|
|
148
|
+
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
149
|
+
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
150
|
+
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
151
|
+
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
152
|
+
'''
|
|
153
|
+
value = KubernetesNodeGroupCustomPlan(
|
|
154
|
+
cores=cores,
|
|
155
|
+
memory=memory,
|
|
156
|
+
storage_size=storage_size,
|
|
157
|
+
storage_tier=storage_tier,
|
|
158
|
+
)
|
|
159
|
+
|
|
160
|
+
return typing.cast(None, jsii.invoke(self, "putCustomPlan", [value]))
|
|
161
|
+
|
|
132
162
|
@jsii.member(jsii_name="putKubeletArgs")
|
|
133
163
|
def put_kubelet_args(
|
|
134
164
|
self,
|
|
@@ -159,6 +189,10 @@ class KubernetesNodeGroup(
|
|
|
159
189
|
def reset_anti_affinity(self) -> None:
|
|
160
190
|
return typing.cast(None, jsii.invoke(self, "resetAntiAffinity", []))
|
|
161
191
|
|
|
192
|
+
@jsii.member(jsii_name="resetCustomPlan")
|
|
193
|
+
def reset_custom_plan(self) -> None:
|
|
194
|
+
return typing.cast(None, jsii.invoke(self, "resetCustomPlan", []))
|
|
195
|
+
|
|
162
196
|
@jsii.member(jsii_name="resetId")
|
|
163
197
|
def reset_id(self) -> None:
|
|
164
198
|
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
@@ -175,6 +209,10 @@ class KubernetesNodeGroup(
|
|
|
175
209
|
def reset_ssh_keys(self) -> None:
|
|
176
210
|
return typing.cast(None, jsii.invoke(self, "resetSshKeys", []))
|
|
177
211
|
|
|
212
|
+
@jsii.member(jsii_name="resetStorageEncryption")
|
|
213
|
+
def reset_storage_encryption(self) -> None:
|
|
214
|
+
return typing.cast(None, jsii.invoke(self, "resetStorageEncryption", []))
|
|
215
|
+
|
|
178
216
|
@jsii.member(jsii_name="resetTaint")
|
|
179
217
|
def reset_taint(self) -> None:
|
|
180
218
|
return typing.cast(None, jsii.invoke(self, "resetTaint", []))
|
|
@@ -196,6 +234,11 @@ class KubernetesNodeGroup(
|
|
|
196
234
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
197
235
|
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
198
236
|
|
|
237
|
+
@builtins.property
|
|
238
|
+
@jsii.member(jsii_name="customPlan")
|
|
239
|
+
def custom_plan(self) -> "KubernetesNodeGroupCustomPlanOutputReference":
|
|
240
|
+
return typing.cast("KubernetesNodeGroupCustomPlanOutputReference", jsii.get(self, "customPlan"))
|
|
241
|
+
|
|
199
242
|
@builtins.property
|
|
200
243
|
@jsii.member(jsii_name="kubeletArgs")
|
|
201
244
|
def kubelet_args(self) -> "KubernetesNodeGroupKubeletArgsList":
|
|
@@ -218,6 +261,11 @@ class KubernetesNodeGroup(
|
|
|
218
261
|
def cluster_input(self) -> typing.Optional[builtins.str]:
|
|
219
262
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "clusterInput"))
|
|
220
263
|
|
|
264
|
+
@builtins.property
|
|
265
|
+
@jsii.member(jsii_name="customPlanInput")
|
|
266
|
+
def custom_plan_input(self) -> typing.Optional["KubernetesNodeGroupCustomPlan"]:
|
|
267
|
+
return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], jsii.get(self, "customPlanInput"))
|
|
268
|
+
|
|
221
269
|
@builtins.property
|
|
222
270
|
@jsii.member(jsii_name="idInput")
|
|
223
271
|
def id_input(self) -> typing.Optional[builtins.str]:
|
|
@@ -257,6 +305,11 @@ class KubernetesNodeGroup(
|
|
|
257
305
|
def ssh_keys_input(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
258
306
|
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "sshKeysInput"))
|
|
259
307
|
|
|
308
|
+
@builtins.property
|
|
309
|
+
@jsii.member(jsii_name="storageEncryptionInput")
|
|
310
|
+
def storage_encryption_input(self) -> typing.Optional[builtins.str]:
|
|
311
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "storageEncryptionInput"))
|
|
312
|
+
|
|
260
313
|
@builtins.property
|
|
261
314
|
@jsii.member(jsii_name="taintInput")
|
|
262
315
|
def taint_input(
|
|
@@ -370,6 +423,18 @@ class KubernetesNodeGroup(
|
|
|
370
423
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
371
424
|
jsii.set(self, "sshKeys", value)
|
|
372
425
|
|
|
426
|
+
@builtins.property
|
|
427
|
+
@jsii.member(jsii_name="storageEncryption")
|
|
428
|
+
def storage_encryption(self) -> builtins.str:
|
|
429
|
+
return typing.cast(builtins.str, jsii.get(self, "storageEncryption"))
|
|
430
|
+
|
|
431
|
+
@storage_encryption.setter
|
|
432
|
+
def storage_encryption(self, value: builtins.str) -> None:
|
|
433
|
+
if __debug__:
|
|
434
|
+
type_hints = typing.get_type_hints(_typecheckingstub__b4b669e48a3836306fe80e34225d241ad384a8351e76d8d7b17ffdd8544edf45)
|
|
435
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
436
|
+
jsii.set(self, "storageEncryption", value)
|
|
437
|
+
|
|
373
438
|
@builtins.property
|
|
374
439
|
@jsii.member(jsii_name="utilityNetworkAccess")
|
|
375
440
|
def utility_network_access(
|
|
@@ -404,10 +469,12 @@ class KubernetesNodeGroup(
|
|
|
404
469
|
"node_count": "nodeCount",
|
|
405
470
|
"plan": "plan",
|
|
406
471
|
"anti_affinity": "antiAffinity",
|
|
472
|
+
"custom_plan": "customPlan",
|
|
407
473
|
"id": "id",
|
|
408
474
|
"kubelet_args": "kubeletArgs",
|
|
409
475
|
"labels": "labels",
|
|
410
476
|
"ssh_keys": "sshKeys",
|
|
477
|
+
"storage_encryption": "storageEncryption",
|
|
411
478
|
"taint": "taint",
|
|
412
479
|
"utility_network_access": "utilityNetworkAccess",
|
|
413
480
|
},
|
|
@@ -428,10 +495,12 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
428
495
|
node_count: jsii.Number,
|
|
429
496
|
plan: builtins.str,
|
|
430
497
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
498
|
+
custom_plan: typing.Optional[typing.Union["KubernetesNodeGroupCustomPlan", typing.Dict[builtins.str, typing.Any]]] = None,
|
|
431
499
|
id: typing.Optional[builtins.str] = None,
|
|
432
500
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupKubeletArgs", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
433
501
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
434
502
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
503
|
+
storage_encryption: typing.Optional[builtins.str] = None,
|
|
435
504
|
taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union["KubernetesNodeGroupTaint", typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
436
505
|
utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
437
506
|
) -> None:
|
|
@@ -443,20 +512,24 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
443
512
|
:param lifecycle:
|
|
444
513
|
:param provider:
|
|
445
514
|
:param provisioners:
|
|
446
|
-
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
447
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
448
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
449
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
450
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
451
|
-
:param
|
|
452
|
-
:param
|
|
453
|
-
:param
|
|
454
|
-
:param
|
|
455
|
-
:param
|
|
456
|
-
:param
|
|
515
|
+
:param cluster: Cluster ID. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
516
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
517
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
518
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
519
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
520
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
521
|
+
:param id: Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}. Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2. If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
522
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
523
|
+
:param labels: Key-value pairs to classify the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
524
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
525
|
+
:param storage_encryption: Storage encryption strategy for the nodes in this group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
526
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
527
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
457
528
|
'''
|
|
458
529
|
if isinstance(lifecycle, dict):
|
|
459
530
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
531
|
+
if isinstance(custom_plan, dict):
|
|
532
|
+
custom_plan = KubernetesNodeGroupCustomPlan(**custom_plan)
|
|
460
533
|
if __debug__:
|
|
461
534
|
type_hints = typing.get_type_hints(_typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c51da43c4)
|
|
462
535
|
check_type(argname="argument connection", value=connection, expected_type=type_hints["connection"])
|
|
@@ -471,10 +544,12 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
471
544
|
check_type(argname="argument node_count", value=node_count, expected_type=type_hints["node_count"])
|
|
472
545
|
check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
|
|
473
546
|
check_type(argname="argument anti_affinity", value=anti_affinity, expected_type=type_hints["anti_affinity"])
|
|
547
|
+
check_type(argname="argument custom_plan", value=custom_plan, expected_type=type_hints["custom_plan"])
|
|
474
548
|
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
475
549
|
check_type(argname="argument kubelet_args", value=kubelet_args, expected_type=type_hints["kubelet_args"])
|
|
476
550
|
check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
|
|
477
551
|
check_type(argname="argument ssh_keys", value=ssh_keys, expected_type=type_hints["ssh_keys"])
|
|
552
|
+
check_type(argname="argument storage_encryption", value=storage_encryption, expected_type=type_hints["storage_encryption"])
|
|
478
553
|
check_type(argname="argument taint", value=taint, expected_type=type_hints["taint"])
|
|
479
554
|
check_type(argname="argument utility_network_access", value=utility_network_access, expected_type=type_hints["utility_network_access"])
|
|
480
555
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
@@ -499,6 +574,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
499
574
|
self._values["provisioners"] = provisioners
|
|
500
575
|
if anti_affinity is not None:
|
|
501
576
|
self._values["anti_affinity"] = anti_affinity
|
|
577
|
+
if custom_plan is not None:
|
|
578
|
+
self._values["custom_plan"] = custom_plan
|
|
502
579
|
if id is not None:
|
|
503
580
|
self._values["id"] = id
|
|
504
581
|
if kubelet_args is not None:
|
|
@@ -507,6 +584,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
507
584
|
self._values["labels"] = labels
|
|
508
585
|
if ssh_keys is not None:
|
|
509
586
|
self._values["ssh_keys"] = ssh_keys
|
|
587
|
+
if storage_encryption is not None:
|
|
588
|
+
self._values["storage_encryption"] = storage_encryption
|
|
510
589
|
if taint is not None:
|
|
511
590
|
self._values["taint"] = taint
|
|
512
591
|
if utility_network_access is not None:
|
|
@@ -580,7 +659,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
580
659
|
def cluster(self) -> builtins.str:
|
|
581
660
|
'''Cluster ID.
|
|
582
661
|
|
|
583
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
662
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
584
663
|
'''
|
|
585
664
|
result = self._values.get("cluster")
|
|
586
665
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -590,7 +669,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
590
669
|
def name(self) -> builtins.str:
|
|
591
670
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
592
671
|
|
|
593
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
672
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
594
673
|
'''
|
|
595
674
|
result = self._values.get("name")
|
|
596
675
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -600,7 +679,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
600
679
|
def node_count(self) -> jsii.Number:
|
|
601
680
|
'''Amount of nodes to provision in the node group.
|
|
602
681
|
|
|
603
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
682
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
604
683
|
'''
|
|
605
684
|
result = self._values.get("node_count")
|
|
606
685
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -610,7 +689,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
610
689
|
def plan(self) -> builtins.str:
|
|
611
690
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
612
691
|
|
|
613
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
692
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
614
693
|
'''
|
|
615
694
|
result = self._values.get("plan")
|
|
616
695
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -624,14 +703,23 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
624
703
|
|
|
625
704
|
Please note that anti-affinity policy is considered "best effort" and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
626
705
|
|
|
627
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
706
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
628
707
|
'''
|
|
629
708
|
result = self._values.get("anti_affinity")
|
|
630
709
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
631
710
|
|
|
711
|
+
@builtins.property
|
|
712
|
+
def custom_plan(self) -> typing.Optional["KubernetesNodeGroupCustomPlan"]:
|
|
713
|
+
'''custom_plan block.
|
|
714
|
+
|
|
715
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
716
|
+
'''
|
|
717
|
+
result = self._values.get("custom_plan")
|
|
718
|
+
return typing.cast(typing.Optional["KubernetesNodeGroupCustomPlan"], result)
|
|
719
|
+
|
|
632
720
|
@builtins.property
|
|
633
721
|
def id(self) -> typing.Optional[builtins.str]:
|
|
634
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
722
|
+
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#id KubernetesNodeGroup#id}.
|
|
635
723
|
|
|
636
724
|
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
637
725
|
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
@@ -645,7 +733,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
645
733
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
646
734
|
'''kubelet_args block.
|
|
647
735
|
|
|
648
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
736
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
649
737
|
'''
|
|
650
738
|
result = self._values.get("kubelet_args")
|
|
651
739
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -654,7 +742,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
654
742
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
655
743
|
'''Key-value pairs to classify the node group.
|
|
656
744
|
|
|
657
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
745
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
658
746
|
'''
|
|
659
747
|
result = self._values.get("labels")
|
|
660
748
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -665,18 +753,27 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
665
753
|
|
|
666
754
|
This allows you to connect to the nodes via SSH once they are running.
|
|
667
755
|
|
|
668
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
756
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
669
757
|
'''
|
|
670
758
|
result = self._values.get("ssh_keys")
|
|
671
759
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
672
760
|
|
|
761
|
+
@builtins.property
|
|
762
|
+
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
763
|
+
'''Storage encryption strategy for the nodes in this group.
|
|
764
|
+
|
|
765
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
766
|
+
'''
|
|
767
|
+
result = self._values.get("storage_encryption")
|
|
768
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
769
|
+
|
|
673
770
|
@builtins.property
|
|
674
771
|
def taint(
|
|
675
772
|
self,
|
|
676
773
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
677
774
|
'''taint block.
|
|
678
775
|
|
|
679
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
776
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
680
777
|
'''
|
|
681
778
|
result = self._values.get("taint")
|
|
682
779
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -687,7 +784,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
687
784
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
688
785
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
689
786
|
|
|
690
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
787
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
691
788
|
'''
|
|
692
789
|
result = self._values.get("utility_network_access")
|
|
693
790
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -704,6 +801,206 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
704
801
|
)
|
|
705
802
|
|
|
706
803
|
|
|
804
|
+
@jsii.data_type(
|
|
805
|
+
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupCustomPlan",
|
|
806
|
+
jsii_struct_bases=[],
|
|
807
|
+
name_mapping={
|
|
808
|
+
"cores": "cores",
|
|
809
|
+
"memory": "memory",
|
|
810
|
+
"storage_size": "storageSize",
|
|
811
|
+
"storage_tier": "storageTier",
|
|
812
|
+
},
|
|
813
|
+
)
|
|
814
|
+
class KubernetesNodeGroupCustomPlan:
|
|
815
|
+
def __init__(
|
|
816
|
+
self,
|
|
817
|
+
*,
|
|
818
|
+
cores: jsii.Number,
|
|
819
|
+
memory: jsii.Number,
|
|
820
|
+
storage_size: jsii.Number,
|
|
821
|
+
storage_tier: typing.Optional[builtins.str] = None,
|
|
822
|
+
) -> None:
|
|
823
|
+
'''
|
|
824
|
+
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
825
|
+
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
826
|
+
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
827
|
+
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
828
|
+
'''
|
|
829
|
+
if __debug__:
|
|
830
|
+
type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
|
|
831
|
+
check_type(argname="argument cores", value=cores, expected_type=type_hints["cores"])
|
|
832
|
+
check_type(argname="argument memory", value=memory, expected_type=type_hints["memory"])
|
|
833
|
+
check_type(argname="argument storage_size", value=storage_size, expected_type=type_hints["storage_size"])
|
|
834
|
+
check_type(argname="argument storage_tier", value=storage_tier, expected_type=type_hints["storage_tier"])
|
|
835
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
836
|
+
"cores": cores,
|
|
837
|
+
"memory": memory,
|
|
838
|
+
"storage_size": storage_size,
|
|
839
|
+
}
|
|
840
|
+
if storage_tier is not None:
|
|
841
|
+
self._values["storage_tier"] = storage_tier
|
|
842
|
+
|
|
843
|
+
@builtins.property
|
|
844
|
+
def cores(self) -> jsii.Number:
|
|
845
|
+
'''The number of CPU cores dedicated to individual node group nodes when using custom plan.
|
|
846
|
+
|
|
847
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
848
|
+
'''
|
|
849
|
+
result = self._values.get("cores")
|
|
850
|
+
assert result is not None, "Required property 'cores' is missing"
|
|
851
|
+
return typing.cast(jsii.Number, result)
|
|
852
|
+
|
|
853
|
+
@builtins.property
|
|
854
|
+
def memory(self) -> jsii.Number:
|
|
855
|
+
'''The amount of memory in megabytes to assign to individual node group node when using custom plan.
|
|
856
|
+
|
|
857
|
+
Value needs to be divisible by 1024.
|
|
858
|
+
|
|
859
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
860
|
+
'''
|
|
861
|
+
result = self._values.get("memory")
|
|
862
|
+
assert result is not None, "Required property 'memory' is missing"
|
|
863
|
+
return typing.cast(jsii.Number, result)
|
|
864
|
+
|
|
865
|
+
@builtins.property
|
|
866
|
+
def storage_size(self) -> jsii.Number:
|
|
867
|
+
'''The size of the storage device in gigabytes.
|
|
868
|
+
|
|
869
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
870
|
+
'''
|
|
871
|
+
result = self._values.get("storage_size")
|
|
872
|
+
assert result is not None, "Required property 'storage_size' is missing"
|
|
873
|
+
return typing.cast(jsii.Number, result)
|
|
874
|
+
|
|
875
|
+
@builtins.property
|
|
876
|
+
def storage_tier(self) -> typing.Optional[builtins.str]:
|
|
877
|
+
'''The storage tier to use. Defaults to maxiops.
|
|
878
|
+
|
|
879
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
880
|
+
'''
|
|
881
|
+
result = self._values.get("storage_tier")
|
|
882
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
883
|
+
|
|
884
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
885
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
886
|
+
|
|
887
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
888
|
+
return not (rhs == self)
|
|
889
|
+
|
|
890
|
+
def __repr__(self) -> str:
|
|
891
|
+
return "KubernetesNodeGroupCustomPlan(%s)" % ", ".join(
|
|
892
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
893
|
+
)
|
|
894
|
+
|
|
895
|
+
|
|
896
|
+
class KubernetesNodeGroupCustomPlanOutputReference(
|
|
897
|
+
_cdktf_9a9027ec.ComplexObject,
|
|
898
|
+
metaclass=jsii.JSIIMeta,
|
|
899
|
+
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupCustomPlanOutputReference",
|
|
900
|
+
):
|
|
901
|
+
def __init__(
|
|
902
|
+
self,
|
|
903
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
904
|
+
terraform_attribute: builtins.str,
|
|
905
|
+
) -> None:
|
|
906
|
+
'''
|
|
907
|
+
:param terraform_resource: The parent resource.
|
|
908
|
+
:param terraform_attribute: The attribute on the parent resource this class is referencing.
|
|
909
|
+
'''
|
|
910
|
+
if __debug__:
|
|
911
|
+
type_hints = typing.get_type_hints(_typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f)
|
|
912
|
+
check_type(argname="argument terraform_resource", value=terraform_resource, expected_type=type_hints["terraform_resource"])
|
|
913
|
+
check_type(argname="argument terraform_attribute", value=terraform_attribute, expected_type=type_hints["terraform_attribute"])
|
|
914
|
+
jsii.create(self.__class__, self, [terraform_resource, terraform_attribute])
|
|
915
|
+
|
|
916
|
+
@jsii.member(jsii_name="resetStorageTier")
|
|
917
|
+
def reset_storage_tier(self) -> None:
|
|
918
|
+
return typing.cast(None, jsii.invoke(self, "resetStorageTier", []))
|
|
919
|
+
|
|
920
|
+
@builtins.property
|
|
921
|
+
@jsii.member(jsii_name="coresInput")
|
|
922
|
+
def cores_input(self) -> typing.Optional[jsii.Number]:
|
|
923
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "coresInput"))
|
|
924
|
+
|
|
925
|
+
@builtins.property
|
|
926
|
+
@jsii.member(jsii_name="memoryInput")
|
|
927
|
+
def memory_input(self) -> typing.Optional[jsii.Number]:
|
|
928
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "memoryInput"))
|
|
929
|
+
|
|
930
|
+
@builtins.property
|
|
931
|
+
@jsii.member(jsii_name="storageSizeInput")
|
|
932
|
+
def storage_size_input(self) -> typing.Optional[jsii.Number]:
|
|
933
|
+
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "storageSizeInput"))
|
|
934
|
+
|
|
935
|
+
@builtins.property
|
|
936
|
+
@jsii.member(jsii_name="storageTierInput")
|
|
937
|
+
def storage_tier_input(self) -> typing.Optional[builtins.str]:
|
|
938
|
+
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "storageTierInput"))
|
|
939
|
+
|
|
940
|
+
@builtins.property
|
|
941
|
+
@jsii.member(jsii_name="cores")
|
|
942
|
+
def cores(self) -> jsii.Number:
|
|
943
|
+
return typing.cast(jsii.Number, jsii.get(self, "cores"))
|
|
944
|
+
|
|
945
|
+
@cores.setter
|
|
946
|
+
def cores(self, value: jsii.Number) -> None:
|
|
947
|
+
if __debug__:
|
|
948
|
+
type_hints = typing.get_type_hints(_typecheckingstub__15878cdb5de9a8700102ae207bdd26c19d28bebbb88e918a78101ee82831a764)
|
|
949
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
950
|
+
jsii.set(self, "cores", value)
|
|
951
|
+
|
|
952
|
+
@builtins.property
|
|
953
|
+
@jsii.member(jsii_name="memory")
|
|
954
|
+
def memory(self) -> jsii.Number:
|
|
955
|
+
return typing.cast(jsii.Number, jsii.get(self, "memory"))
|
|
956
|
+
|
|
957
|
+
@memory.setter
|
|
958
|
+
def memory(self, value: jsii.Number) -> None:
|
|
959
|
+
if __debug__:
|
|
960
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c63d931f4ac068dc3819c8179015a8c83a41a8032a345678fcc3e6da49734aeb)
|
|
961
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
962
|
+
jsii.set(self, "memory", value)
|
|
963
|
+
|
|
964
|
+
@builtins.property
|
|
965
|
+
@jsii.member(jsii_name="storageSize")
|
|
966
|
+
def storage_size(self) -> jsii.Number:
|
|
967
|
+
return typing.cast(jsii.Number, jsii.get(self, "storageSize"))
|
|
968
|
+
|
|
969
|
+
@storage_size.setter
|
|
970
|
+
def storage_size(self, value: jsii.Number) -> None:
|
|
971
|
+
if __debug__:
|
|
972
|
+
type_hints = typing.get_type_hints(_typecheckingstub__5657fcbc706cb9657327d1390116d8b8349d44ebea2c09586646bfd32bee67b2)
|
|
973
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
974
|
+
jsii.set(self, "storageSize", value)
|
|
975
|
+
|
|
976
|
+
@builtins.property
|
|
977
|
+
@jsii.member(jsii_name="storageTier")
|
|
978
|
+
def storage_tier(self) -> builtins.str:
|
|
979
|
+
return typing.cast(builtins.str, jsii.get(self, "storageTier"))
|
|
980
|
+
|
|
981
|
+
@storage_tier.setter
|
|
982
|
+
def storage_tier(self, value: builtins.str) -> None:
|
|
983
|
+
if __debug__:
|
|
984
|
+
type_hints = typing.get_type_hints(_typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910ff8c4e5a)
|
|
985
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
986
|
+
jsii.set(self, "storageTier", value)
|
|
987
|
+
|
|
988
|
+
@builtins.property
|
|
989
|
+
@jsii.member(jsii_name="internalValue")
|
|
990
|
+
def internal_value(self) -> typing.Optional[KubernetesNodeGroupCustomPlan]:
|
|
991
|
+
return typing.cast(typing.Optional[KubernetesNodeGroupCustomPlan], jsii.get(self, "internalValue"))
|
|
992
|
+
|
|
993
|
+
@internal_value.setter
|
|
994
|
+
def internal_value(
|
|
995
|
+
self,
|
|
996
|
+
value: typing.Optional[KubernetesNodeGroupCustomPlan],
|
|
997
|
+
) -> None:
|
|
998
|
+
if __debug__:
|
|
999
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a)
|
|
1000
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1001
|
+
jsii.set(self, "internalValue", value)
|
|
1002
|
+
|
|
1003
|
+
|
|
707
1004
|
@jsii.data_type(
|
|
708
1005
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroupKubeletArgs",
|
|
709
1006
|
jsii_struct_bases=[],
|
|
@@ -712,8 +1009,8 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
712
1009
|
class KubernetesNodeGroupKubeletArgs:
|
|
713
1010
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
714
1011
|
'''
|
|
715
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
716
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1012
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1013
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
717
1014
|
'''
|
|
718
1015
|
if __debug__:
|
|
719
1016
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -728,7 +1025,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
728
1025
|
def key(self) -> builtins.str:
|
|
729
1026
|
'''Kubelet argument key.
|
|
730
1027
|
|
|
731
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1028
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
732
1029
|
'''
|
|
733
1030
|
result = self._values.get("key")
|
|
734
1031
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -738,7 +1035,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
738
1035
|
def value(self) -> builtins.str:
|
|
739
1036
|
'''Kubelet argument value.
|
|
740
1037
|
|
|
741
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1038
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
742
1039
|
'''
|
|
743
1040
|
result = self._values.get("value")
|
|
744
1041
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -941,9 +1238,9 @@ class KubernetesNodeGroupTaint:
|
|
|
941
1238
|
value: builtins.str,
|
|
942
1239
|
) -> None:
|
|
943
1240
|
'''
|
|
944
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
945
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
946
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1241
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1242
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1243
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
947
1244
|
'''
|
|
948
1245
|
if __debug__:
|
|
949
1246
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -960,7 +1257,7 @@ class KubernetesNodeGroupTaint:
|
|
|
960
1257
|
def effect(self) -> builtins.str:
|
|
961
1258
|
'''Taint effect.
|
|
962
1259
|
|
|
963
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1260
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
964
1261
|
'''
|
|
965
1262
|
result = self._values.get("effect")
|
|
966
1263
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -970,7 +1267,7 @@ class KubernetesNodeGroupTaint:
|
|
|
970
1267
|
def key(self) -> builtins.str:
|
|
971
1268
|
'''Taint key.
|
|
972
1269
|
|
|
973
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1270
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
974
1271
|
'''
|
|
975
1272
|
result = self._values.get("key")
|
|
976
1273
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -980,7 +1277,7 @@ class KubernetesNodeGroupTaint:
|
|
|
980
1277
|
def value(self) -> builtins.str:
|
|
981
1278
|
'''Taint value.
|
|
982
1279
|
|
|
983
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
1280
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.4.0/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
984
1281
|
'''
|
|
985
1282
|
result = self._values.get("value")
|
|
986
1283
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -1186,6 +1483,8 @@ class KubernetesNodeGroupTaintOutputReference(
|
|
|
1186
1483
|
__all__ = [
|
|
1187
1484
|
"KubernetesNodeGroup",
|
|
1188
1485
|
"KubernetesNodeGroupConfig",
|
|
1486
|
+
"KubernetesNodeGroupCustomPlan",
|
|
1487
|
+
"KubernetesNodeGroupCustomPlanOutputReference",
|
|
1189
1488
|
"KubernetesNodeGroupKubeletArgs",
|
|
1190
1489
|
"KubernetesNodeGroupKubeletArgsList",
|
|
1191
1490
|
"KubernetesNodeGroupKubeletArgsOutputReference",
|
|
@@ -1205,10 +1504,12 @@ def _typecheckingstub__8bbcd241d9ab4cfd557f0a030c928c51f93c7d6d9f343e0bcdbdda3cb
|
|
|
1205
1504
|
node_count: jsii.Number,
|
|
1206
1505
|
plan: builtins.str,
|
|
1207
1506
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1507
|
+
custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1208
1508
|
id: typing.Optional[builtins.str] = None,
|
|
1209
1509
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1210
1510
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
1211
1511
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1512
|
+
storage_encryption: typing.Optional[builtins.str] = None,
|
|
1212
1513
|
taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupTaint, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1213
1514
|
utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1214
1515
|
connection: typing.Optional[typing.Union[typing.Union[_cdktf_9a9027ec.SSHProvisionerConnection, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.WinrmProvisionerConnection, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
@@ -1291,6 +1592,12 @@ def _typecheckingstub__3caf64b524bd36e4019e89ade967c6b4e62d55fddf7a8f9e9ed8118d3
|
|
|
1291
1592
|
"""Type checking stubs"""
|
|
1292
1593
|
pass
|
|
1293
1594
|
|
|
1595
|
+
def _typecheckingstub__b4b669e48a3836306fe80e34225d241ad384a8351e76d8d7b17ffdd8544edf45(
|
|
1596
|
+
value: builtins.str,
|
|
1597
|
+
) -> None:
|
|
1598
|
+
"""Type checking stubs"""
|
|
1599
|
+
pass
|
|
1600
|
+
|
|
1294
1601
|
def _typecheckingstub__1c2a3afca29e180734047644aa682bae1b7fbd5aacc3d234ed7616ba415f5fb6(
|
|
1295
1602
|
value: typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable],
|
|
1296
1603
|
) -> None:
|
|
@@ -1311,16 +1618,65 @@ def _typecheckingstub__2489ae5bd3c17ee9de104387734150d3686d0bce3df0c0db5244751c5
|
|
|
1311
1618
|
node_count: jsii.Number,
|
|
1312
1619
|
plan: builtins.str,
|
|
1313
1620
|
anti_affinity: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1621
|
+
custom_plan: typing.Optional[typing.Union[KubernetesNodeGroupCustomPlan, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
1314
1622
|
id: typing.Optional[builtins.str] = None,
|
|
1315
1623
|
kubelet_args: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupKubeletArgs, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1316
1624
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
1317
1625
|
ssh_keys: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
1626
|
+
storage_encryption: typing.Optional[builtins.str] = None,
|
|
1318
1627
|
taint: typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.Sequence[typing.Union[KubernetesNodeGroupTaint, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
1319
1628
|
utility_network_access: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
1320
1629
|
) -> None:
|
|
1321
1630
|
"""Type checking stubs"""
|
|
1322
1631
|
pass
|
|
1323
1632
|
|
|
1633
|
+
def _typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c(
|
|
1634
|
+
*,
|
|
1635
|
+
cores: jsii.Number,
|
|
1636
|
+
memory: jsii.Number,
|
|
1637
|
+
storage_size: jsii.Number,
|
|
1638
|
+
storage_tier: typing.Optional[builtins.str] = None,
|
|
1639
|
+
) -> None:
|
|
1640
|
+
"""Type checking stubs"""
|
|
1641
|
+
pass
|
|
1642
|
+
|
|
1643
|
+
def _typecheckingstub__8d2b117bf11d56c5c2ad00b1177ef138495c9f14ccd650ff5fcac5bedc510e7f(
|
|
1644
|
+
terraform_resource: _cdktf_9a9027ec.IInterpolatingParent,
|
|
1645
|
+
terraform_attribute: builtins.str,
|
|
1646
|
+
) -> None:
|
|
1647
|
+
"""Type checking stubs"""
|
|
1648
|
+
pass
|
|
1649
|
+
|
|
1650
|
+
def _typecheckingstub__15878cdb5de9a8700102ae207bdd26c19d28bebbb88e918a78101ee82831a764(
|
|
1651
|
+
value: jsii.Number,
|
|
1652
|
+
) -> None:
|
|
1653
|
+
"""Type checking stubs"""
|
|
1654
|
+
pass
|
|
1655
|
+
|
|
1656
|
+
def _typecheckingstub__c63d931f4ac068dc3819c8179015a8c83a41a8032a345678fcc3e6da49734aeb(
|
|
1657
|
+
value: jsii.Number,
|
|
1658
|
+
) -> None:
|
|
1659
|
+
"""Type checking stubs"""
|
|
1660
|
+
pass
|
|
1661
|
+
|
|
1662
|
+
def _typecheckingstub__5657fcbc706cb9657327d1390116d8b8349d44ebea2c09586646bfd32bee67b2(
|
|
1663
|
+
value: jsii.Number,
|
|
1664
|
+
) -> None:
|
|
1665
|
+
"""Type checking stubs"""
|
|
1666
|
+
pass
|
|
1667
|
+
|
|
1668
|
+
def _typecheckingstub__7b087d3351ca31ac1af59c32711d8f4d022346ac4bccf9ec972df910ff8c4e5a(
|
|
1669
|
+
value: builtins.str,
|
|
1670
|
+
) -> None:
|
|
1671
|
+
"""Type checking stubs"""
|
|
1672
|
+
pass
|
|
1673
|
+
|
|
1674
|
+
def _typecheckingstub__c7a11f561e4b919a685206286a7eed09483e309fbeeea066dff67583e94f0c7a(
|
|
1675
|
+
value: typing.Optional[KubernetesNodeGroupCustomPlan],
|
|
1676
|
+
) -> None:
|
|
1677
|
+
"""Type checking stubs"""
|
|
1678
|
+
pass
|
|
1679
|
+
|
|
1324
1680
|
def _typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803(
|
|
1325
1681
|
*,
|
|
1326
1682
|
key: builtins.str,
|