cdktf-cdktf-provider-upcloud 14.20.1__py3-none-any.whl → 14.20.2__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.20.2.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +33 -35
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +37 -35
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +201 -201
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +552 -552
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +315 -315
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +136 -136
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-14.20.1.dist-info → cdktf_cdktf_provider_upcloud-14.20.2.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.20.2.dist-info/RECORD +67 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.20.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.20.1.dist-info/RECORD +0 -67
- {cdktf_cdktf_provider_upcloud-14.20.1.dist-info → cdktf_cdktf_provider_upcloud-14.20.2.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.20.1.dist-info → cdktf_cdktf_provider_upcloud-14.20.2.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.20.1.dist-info → cdktf_cdktf_provider_upcloud-14.20.2.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class KubernetesCluster(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -68,19 +68,19 @@ class KubernetesCluster(
|
|
|
68
68
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
69
69
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
70
70
|
) -> None:
|
|
71
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
71
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
72
72
|
|
|
73
73
|
:param scope: The scope in which to define this construct.
|
|
74
74
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
75
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
76
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
77
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
78
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
79
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
80
|
-
:param plan: The pricing plan used for the cluster.
|
|
81
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
82
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
83
|
-
:param version: Kubernetes version ID, e.g. ``1.
|
|
75
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
76
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
77
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
78
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
79
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
80
|
+
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
81
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
82
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
83
|
+
:param version: Kubernetes version ID, e.g. ``1.30``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
84
84
|
:param connection:
|
|
85
85
|
:param count:
|
|
86
86
|
:param depends_on:
|
|
@@ -127,7 +127,7 @@ class KubernetesCluster(
|
|
|
127
127
|
|
|
128
128
|
:param scope: The scope in which to define this construct.
|
|
129
129
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
130
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
130
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
131
131
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
132
132
|
'''
|
|
133
133
|
if __debug__:
|
|
@@ -407,15 +407,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
407
407
|
:param lifecycle:
|
|
408
408
|
:param provider:
|
|
409
409
|
:param provisioners:
|
|
410
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
411
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
412
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
413
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
414
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
415
|
-
:param plan: The pricing plan used for the cluster.
|
|
416
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
417
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
418
|
-
:param version: Kubernetes version ID, e.g. ``1.
|
|
410
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
411
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
412
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
413
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
414
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
415
|
+
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
416
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
417
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
418
|
+
:param version: Kubernetes version ID, e.g. ``1.30``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
419
419
|
'''
|
|
420
420
|
if isinstance(lifecycle, dict):
|
|
421
421
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -538,7 +538,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
538
538
|
|
|
539
539
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
540
540
|
|
|
541
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
541
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
542
542
|
'''
|
|
543
543
|
result = self._values.get("control_plane_ip_filter")
|
|
544
544
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -548,7 +548,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
548
548
|
def name(self) -> builtins.str:
|
|
549
549
|
'''Cluster name. Needs to be unique within the account.
|
|
550
550
|
|
|
551
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
551
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
552
552
|
'''
|
|
553
553
|
result = self._values.get("name")
|
|
554
554
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -558,7 +558,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
558
558
|
def network(self) -> builtins.str:
|
|
559
559
|
'''Network ID for the cluster to run in.
|
|
560
560
|
|
|
561
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
561
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
562
562
|
'''
|
|
563
563
|
result = self._values.get("network")
|
|
564
564
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
568
568
|
def zone(self) -> builtins.str:
|
|
569
569
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
570
570
|
|
|
571
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
571
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
572
572
|
'''
|
|
573
573
|
result = self._values.get("zone")
|
|
574
574
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -578,18 +578,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
578
578
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
579
579
|
'''User defined key-value pairs to classify the cluster.
|
|
580
580
|
|
|
581
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
581
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
582
582
|
'''
|
|
583
583
|
result = self._values.get("labels")
|
|
584
584
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
585
585
|
|
|
586
586
|
@builtins.property
|
|
587
587
|
def plan(self) -> typing.Optional[builtins.str]:
|
|
588
|
-
'''The pricing plan used for the cluster.
|
|
588
|
+
'''The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``.
|
|
589
589
|
|
|
590
|
-
|
|
591
|
-
|
|
592
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
590
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
593
591
|
'''
|
|
594
592
|
result = self._values.get("plan")
|
|
595
593
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -600,7 +598,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
600
598
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
601
599
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
602
600
|
|
|
603
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
601
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
604
602
|
'''
|
|
605
603
|
result = self._values.get("private_node_groups")
|
|
606
604
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -609,16 +607,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
609
607
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
610
608
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
611
609
|
|
|
612
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
610
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
613
611
|
'''
|
|
614
612
|
result = self._values.get("storage_encryption")
|
|
615
613
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
616
614
|
|
|
617
615
|
@builtins.property
|
|
618
616
|
def version(self) -> typing.Optional[builtins.str]:
|
|
619
|
-
'''Kubernetes version ID, e.g. ``1.
|
|
617
|
+
'''Kubernetes version ID, e.g. ``1.30``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
620
618
|
|
|
621
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
619
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
622
620
|
'''
|
|
623
621
|
result = self._values.get("version")
|
|
624
622
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class KubernetesNodeGroup(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -71,22 +71,22 @@ class KubernetesNodeGroup(
|
|
|
71
71
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
72
72
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
73
73
|
) -> None:
|
|
74
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
74
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
75
75
|
|
|
76
76
|
:param scope: The scope in which to define this construct.
|
|
77
77
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
78
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
79
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
80
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
81
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
82
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
83
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
84
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
85
|
-
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
86
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
87
|
-
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
88
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
89
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
78
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
79
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
80
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
81
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
82
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
83
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
84
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
85
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
86
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
87
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
88
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
89
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
90
90
|
:param connection:
|
|
91
91
|
:param count:
|
|
92
92
|
:param depends_on:
|
|
@@ -136,7 +136,7 @@ class KubernetesNodeGroup(
|
|
|
136
136
|
|
|
137
137
|
:param scope: The scope in which to define this construct.
|
|
138
138
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
139
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
139
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
140
140
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
141
141
|
'''
|
|
142
142
|
if __debug__:
|
|
@@ -497,18 +497,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
497
497
|
:param lifecycle:
|
|
498
498
|
:param provider:
|
|
499
499
|
:param provisioners:
|
|
500
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
501
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
502
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
503
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
504
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
505
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
506
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
507
|
-
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
508
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
509
|
-
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
510
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
511
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
500
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
501
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
502
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
503
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
504
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
505
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
506
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
507
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
508
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
509
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
510
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
511
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
512
512
|
'''
|
|
513
513
|
if isinstance(lifecycle, dict):
|
|
514
514
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -638,7 +638,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
638
638
|
def cluster(self) -> builtins.str:
|
|
639
639
|
'''UUID of the cluster.
|
|
640
640
|
|
|
641
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
641
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
642
642
|
'''
|
|
643
643
|
result = self._values.get("cluster")
|
|
644
644
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -648,7 +648,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
648
648
|
def name(self) -> builtins.str:
|
|
649
649
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
650
650
|
|
|
651
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
651
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
652
652
|
'''
|
|
653
653
|
result = self._values.get("name")
|
|
654
654
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -658,7 +658,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
658
658
|
def node_count(self) -> jsii.Number:
|
|
659
659
|
'''Amount of nodes to provision in the node group.
|
|
660
660
|
|
|
661
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
661
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
662
662
|
'''
|
|
663
663
|
result = self._values.get("node_count")
|
|
664
664
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -668,7 +668,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
668
668
|
def plan(self) -> builtins.str:
|
|
669
669
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
670
670
|
|
|
671
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
671
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
672
672
|
'''
|
|
673
673
|
result = self._values.get("plan")
|
|
674
674
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -682,7 +682,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
682
682
|
|
|
683
683
|
Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
684
684
|
|
|
685
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
685
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
686
686
|
'''
|
|
687
687
|
result = self._values.get("anti_affinity")
|
|
688
688
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -693,7 +693,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
693
693
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
|
|
694
694
|
'''custom_plan block.
|
|
695
695
|
|
|
696
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
696
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
697
697
|
'''
|
|
698
698
|
result = self._values.get("custom_plan")
|
|
699
699
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
|
|
@@ -704,7 +704,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
704
704
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
705
705
|
'''kubelet_args block.
|
|
706
706
|
|
|
707
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
707
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
708
708
|
'''
|
|
709
709
|
result = self._values.get("kubelet_args")
|
|
710
710
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -713,7 +713,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
713
713
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
714
714
|
'''User defined key-value pairs to classify the node_group.
|
|
715
715
|
|
|
716
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
716
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
717
717
|
'''
|
|
718
718
|
result = self._values.get("labels")
|
|
719
719
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -724,7 +724,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
724
724
|
|
|
725
725
|
This allows you to connect to the nodes via SSH once they are running.
|
|
726
726
|
|
|
727
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
727
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
728
728
|
'''
|
|
729
729
|
result = self._values.get("ssh_keys")
|
|
730
730
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -735,7 +735,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
735
735
|
|
|
736
736
|
If not set, the cluster's storage encryption strategy will be used, if applicable.
|
|
737
737
|
|
|
738
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
738
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
739
739
|
'''
|
|
740
740
|
result = self._values.get("storage_encryption")
|
|
741
741
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -746,7 +746,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
746
746
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
747
747
|
'''taint block.
|
|
748
748
|
|
|
749
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
749
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
750
750
|
'''
|
|
751
751
|
result = self._values.get("taint")
|
|
752
752
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -757,7 +757,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
757
757
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
758
758
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
759
759
|
|
|
760
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
760
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
761
761
|
'''
|
|
762
762
|
result = self._values.get("utility_network_access")
|
|
763
763
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -794,10 +794,10 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
794
794
|
storage_tier: typing.Optional[builtins.str] = None,
|
|
795
795
|
) -> None:
|
|
796
796
|
'''
|
|
797
|
-
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
798
|
-
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
799
|
-
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
800
|
-
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
797
|
+
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
798
|
+
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
799
|
+
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
800
|
+
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
801
801
|
'''
|
|
802
802
|
if __debug__:
|
|
803
803
|
type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
|
|
@@ -817,7 +817,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
817
817
|
def cores(self) -> jsii.Number:
|
|
818
818
|
'''The number of CPU cores dedicated to individual node group nodes when using custom plan.
|
|
819
819
|
|
|
820
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
820
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
821
821
|
'''
|
|
822
822
|
result = self._values.get("cores")
|
|
823
823
|
assert result is not None, "Required property 'cores' is missing"
|
|
@@ -829,7 +829,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
829
829
|
|
|
830
830
|
Value needs to be divisible by 1024.
|
|
831
831
|
|
|
832
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
832
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
833
833
|
'''
|
|
834
834
|
result = self._values.get("memory")
|
|
835
835
|
assert result is not None, "Required property 'memory' is missing"
|
|
@@ -839,7 +839,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
839
839
|
def storage_size(self) -> jsii.Number:
|
|
840
840
|
'''The size of the storage device in gigabytes.
|
|
841
841
|
|
|
842
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
842
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
843
843
|
'''
|
|
844
844
|
result = self._values.get("storage_size")
|
|
845
845
|
assert result is not None, "Required property 'storage_size' is missing"
|
|
@@ -849,7 +849,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
849
849
|
def storage_tier(self) -> typing.Optional[builtins.str]:
|
|
850
850
|
'''The storage tier to use. Defaults to maxiops.
|
|
851
851
|
|
|
852
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
852
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
853
853
|
'''
|
|
854
854
|
result = self._values.get("storage_tier")
|
|
855
855
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1080,8 +1080,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
1080
1080
|
class KubernetesNodeGroupKubeletArgs:
|
|
1081
1081
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
1082
1082
|
'''
|
|
1083
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1084
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1083
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1084
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1085
1085
|
'''
|
|
1086
1086
|
if __debug__:
|
|
1087
1087
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -1096,7 +1096,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1096
1096
|
def key(self) -> builtins.str:
|
|
1097
1097
|
'''Kubelet argument key.
|
|
1098
1098
|
|
|
1099
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1099
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1100
1100
|
'''
|
|
1101
1101
|
result = self._values.get("key")
|
|
1102
1102
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1106,7 +1106,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1106
1106
|
def value(self) -> builtins.str:
|
|
1107
1107
|
'''Kubelet argument value.
|
|
1108
1108
|
|
|
1109
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1109
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1110
1110
|
'''
|
|
1111
1111
|
result = self._values.get("value")
|
|
1112
1112
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -1309,9 +1309,9 @@ class KubernetesNodeGroupTaint:
|
|
|
1309
1309
|
value: builtins.str,
|
|
1310
1310
|
) -> None:
|
|
1311
1311
|
'''
|
|
1312
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1313
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1314
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1312
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1313
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1314
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1315
1315
|
'''
|
|
1316
1316
|
if __debug__:
|
|
1317
1317
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -1328,7 +1328,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1328
1328
|
def effect(self) -> builtins.str:
|
|
1329
1329
|
'''Taint effect.
|
|
1330
1330
|
|
|
1331
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1331
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1332
1332
|
'''
|
|
1333
1333
|
result = self._values.get("effect")
|
|
1334
1334
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -1338,7 +1338,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1338
1338
|
def key(self) -> builtins.str:
|
|
1339
1339
|
'''Taint key.
|
|
1340
1340
|
|
|
1341
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1341
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1342
1342
|
'''
|
|
1343
1343
|
result = self._values.get("key")
|
|
1344
1344
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1348,7 +1348,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1348
1348
|
def value(self) -> builtins.str:
|
|
1349
1349
|
'''Taint value.
|
|
1350
1350
|
|
|
1351
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.
|
|
1351
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.20.2/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1352
1352
|
'''
|
|
1353
1353
|
result = self._values.get("value")
|
|
1354
1354
|
assert result is not None, "Required property 'value' is missing"
|