cdktf-cdktf-provider-upcloud 14.6.1__py3-none-any.whl → 14.8.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.8.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +83 -46
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +19 -59
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +41 -41
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +42 -85
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +66 -66
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +42 -42
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +64 -64
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +215 -116
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +193 -193
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +31 -31
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +189 -189
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +431 -330
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +301 -1155
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +118 -118
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +50 -50
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +153 -153
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/storage/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-14.6.1.dist-info → cdktf_cdktf_provider_upcloud-14.8.0.dist-info}/METADATA +5 -5
- cdktf_cdktf_provider_upcloud-14.8.0.dist-info/RECORD +61 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.6.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.6.1.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.6.1.dist-info → cdktf_cdktf_provider_upcloud-14.8.0.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.6.1.dist-info → cdktf_cdktf_provider_upcloud-14.8.0.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-14.6.1.dist-info → cdktf_cdktf_provider_upcloud-14.8.0.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,18 +29,17 @@ class KubernetesCluster(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
36
36
|
scope: _constructs_77d1e7e8.Construct,
|
|
37
|
-
|
|
37
|
+
id: builtins.str,
|
|
38
38
|
*,
|
|
39
39
|
control_plane_ip_filter: typing.Sequence[builtins.str],
|
|
40
40
|
name: builtins.str,
|
|
41
41
|
network: builtins.str,
|
|
42
42
|
zone: builtins.str,
|
|
43
|
-
id: typing.Optional[builtins.str] = None,
|
|
44
43
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
45
44
|
plan: typing.Optional[builtins.str] = None,
|
|
46
45
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
@@ -54,20 +53,19 @@ class KubernetesCluster(
|
|
|
54
53
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
55
54
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
56
55
|
) -> None:
|
|
57
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
56
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
58
57
|
|
|
59
58
|
:param scope: The scope in which to define this construct.
|
|
60
|
-
:param
|
|
61
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
62
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
63
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
64
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
65
|
-
:param
|
|
66
|
-
:param
|
|
67
|
-
:param
|
|
68
|
-
:param
|
|
69
|
-
:param
|
|
70
|
-
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
59
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
60
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
61
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
62
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
63
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
64
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
65
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
66
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
67
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
68
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
71
69
|
:param connection:
|
|
72
70
|
:param count:
|
|
73
71
|
:param depends_on:
|
|
@@ -79,13 +77,12 @@ class KubernetesCluster(
|
|
|
79
77
|
if __debug__:
|
|
80
78
|
type_hints = typing.get_type_hints(_typecheckingstub__8a9b711fc0d4f95af1581b8c47ef51571908b57197927d077ddbf475a99293e0)
|
|
81
79
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
82
|
-
check_type(argname="argument
|
|
80
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
83
81
|
config = KubernetesClusterConfig(
|
|
84
82
|
control_plane_ip_filter=control_plane_ip_filter,
|
|
85
83
|
name=name,
|
|
86
84
|
network=network,
|
|
87
85
|
zone=zone,
|
|
88
|
-
id=id,
|
|
89
86
|
labels=labels,
|
|
90
87
|
plan=plan,
|
|
91
88
|
private_node_groups=private_node_groups,
|
|
@@ -100,7 +97,7 @@ class KubernetesCluster(
|
|
|
100
97
|
provisioners=provisioners,
|
|
101
98
|
)
|
|
102
99
|
|
|
103
|
-
jsii.create(self.__class__, self, [scope,
|
|
100
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
104
101
|
|
|
105
102
|
@jsii.member(jsii_name="generateConfigForImport")
|
|
106
103
|
@builtins.classmethod
|
|
@@ -115,7 +112,7 @@ class KubernetesCluster(
|
|
|
115
112
|
|
|
116
113
|
:param scope: The scope in which to define this construct.
|
|
117
114
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
118
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
115
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
119
116
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
120
117
|
'''
|
|
121
118
|
if __debug__:
|
|
@@ -126,10 +123,6 @@ class KubernetesCluster(
|
|
|
126
123
|
check_type(argname="argument provider", value=provider, expected_type=type_hints["provider"])
|
|
127
124
|
return typing.cast(_cdktf_9a9027ec.ImportableResource, jsii.sinvoke(cls, "generateConfigForImport", [scope, import_to_id, import_from_id, provider]))
|
|
128
125
|
|
|
129
|
-
@jsii.member(jsii_name="resetId")
|
|
130
|
-
def reset_id(self) -> None:
|
|
131
|
-
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
132
|
-
|
|
133
126
|
@jsii.member(jsii_name="resetLabels")
|
|
134
127
|
def reset_labels(self) -> None:
|
|
135
128
|
return typing.cast(None, jsii.invoke(self, "resetLabels", []))
|
|
@@ -163,6 +156,11 @@ class KubernetesCluster(
|
|
|
163
156
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
164
157
|
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
165
158
|
|
|
159
|
+
@builtins.property
|
|
160
|
+
@jsii.member(jsii_name="id")
|
|
161
|
+
def id(self) -> builtins.str:
|
|
162
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
163
|
+
|
|
166
164
|
@builtins.property
|
|
167
165
|
@jsii.member(jsii_name="networkCidr")
|
|
168
166
|
def network_cidr(self) -> builtins.str:
|
|
@@ -185,11 +183,6 @@ class KubernetesCluster(
|
|
|
185
183
|
) -> typing.Optional[typing.List[builtins.str]]:
|
|
186
184
|
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "controlPlaneIpFilterInput"))
|
|
187
185
|
|
|
188
|
-
@builtins.property
|
|
189
|
-
@jsii.member(jsii_name="idInput")
|
|
190
|
-
def id_input(self) -> typing.Optional[builtins.str]:
|
|
191
|
-
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
192
|
-
|
|
193
186
|
@builtins.property
|
|
194
187
|
@jsii.member(jsii_name="labelsInput")
|
|
195
188
|
def labels_input(
|
|
@@ -246,18 +239,6 @@ class KubernetesCluster(
|
|
|
246
239
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
247
240
|
jsii.set(self, "controlPlaneIpFilter", value)
|
|
248
241
|
|
|
249
|
-
@builtins.property
|
|
250
|
-
@jsii.member(jsii_name="id")
|
|
251
|
-
def id(self) -> builtins.str:
|
|
252
|
-
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
253
|
-
|
|
254
|
-
@id.setter
|
|
255
|
-
def id(self, value: builtins.str) -> None:
|
|
256
|
-
if __debug__:
|
|
257
|
-
type_hints = typing.get_type_hints(_typecheckingstub__f78fce845db53a9c80ea63aab3e2cb839deb5afb0d1201080c6f0426df83e94c)
|
|
258
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
259
|
-
jsii.set(self, "id", value)
|
|
260
|
-
|
|
261
242
|
@builtins.property
|
|
262
243
|
@jsii.member(jsii_name="labels")
|
|
263
244
|
def labels(self) -> typing.Mapping[builtins.str, builtins.str]:
|
|
@@ -375,7 +356,6 @@ class KubernetesCluster(
|
|
|
375
356
|
"name": "name",
|
|
376
357
|
"network": "network",
|
|
377
358
|
"zone": "zone",
|
|
378
|
-
"id": "id",
|
|
379
359
|
"labels": "labels",
|
|
380
360
|
"plan": "plan",
|
|
381
361
|
"private_node_groups": "privateNodeGroups",
|
|
@@ -398,7 +378,6 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
398
378
|
name: builtins.str,
|
|
399
379
|
network: builtins.str,
|
|
400
380
|
zone: builtins.str,
|
|
401
|
-
id: typing.Optional[builtins.str] = None,
|
|
402
381
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
403
382
|
plan: typing.Optional[builtins.str] = None,
|
|
404
383
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
@@ -413,16 +392,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
413
392
|
:param lifecycle:
|
|
414
393
|
:param provider:
|
|
415
394
|
:param provisioners:
|
|
416
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
417
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
418
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
419
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
420
|
-
:param
|
|
421
|
-
:param
|
|
422
|
-
:param
|
|
423
|
-
:param
|
|
424
|
-
:param
|
|
425
|
-
:param version: Kubernetes version ID, e.g. ``1.27``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
395
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
396
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
397
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
398
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
399
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
400
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
401
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
402
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
403
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
426
404
|
'''
|
|
427
405
|
if isinstance(lifecycle, dict):
|
|
428
406
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -439,7 +417,6 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
439
417
|
check_type(argname="argument name", value=name, expected_type=type_hints["name"])
|
|
440
418
|
check_type(argname="argument network", value=network, expected_type=type_hints["network"])
|
|
441
419
|
check_type(argname="argument zone", value=zone, expected_type=type_hints["zone"])
|
|
442
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
443
420
|
check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
|
|
444
421
|
check_type(argname="argument plan", value=plan, expected_type=type_hints["plan"])
|
|
445
422
|
check_type(argname="argument private_node_groups", value=private_node_groups, expected_type=type_hints["private_node_groups"])
|
|
@@ -465,8 +442,6 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
465
442
|
self._values["provider"] = provider
|
|
466
443
|
if provisioners is not None:
|
|
467
444
|
self._values["provisioners"] = provisioners
|
|
468
|
-
if id is not None:
|
|
469
|
-
self._values["id"] = id
|
|
470
445
|
if labels is not None:
|
|
471
446
|
self._values["labels"] = labels
|
|
472
447
|
if plan is not None:
|
|
@@ -548,7 +523,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
548
523
|
|
|
549
524
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
550
525
|
|
|
551
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
526
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
552
527
|
'''
|
|
553
528
|
result = self._values.get("control_plane_ip_filter")
|
|
554
529
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -558,7 +533,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
558
533
|
def name(self) -> builtins.str:
|
|
559
534
|
'''Cluster name. Needs to be unique within the account.
|
|
560
535
|
|
|
561
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
536
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
562
537
|
'''
|
|
563
538
|
result = self._values.get("name")
|
|
564
539
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -568,7 +543,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
568
543
|
def network(self) -> builtins.str:
|
|
569
544
|
'''Network ID for the cluster to run in.
|
|
570
545
|
|
|
571
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
546
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
572
547
|
'''
|
|
573
548
|
result = self._values.get("network")
|
|
574
549
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -578,27 +553,17 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
578
553
|
def zone(self) -> builtins.str:
|
|
579
554
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
580
555
|
|
|
581
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
556
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
582
557
|
'''
|
|
583
558
|
result = self._values.get("zone")
|
|
584
559
|
assert result is not None, "Required property 'zone' is missing"
|
|
585
560
|
return typing.cast(builtins.str, result)
|
|
586
561
|
|
|
587
|
-
@builtins.property
|
|
588
|
-
def id(self) -> typing.Optional[builtins.str]:
|
|
589
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.6.1/docs/resources/kubernetes_cluster#id KubernetesCluster#id}.
|
|
590
|
-
|
|
591
|
-
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
592
|
-
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
593
|
-
'''
|
|
594
|
-
result = self._values.get("id")
|
|
595
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
596
|
-
|
|
597
562
|
@builtins.property
|
|
598
563
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
599
564
|
'''Key-value pairs to classify the cluster.
|
|
600
565
|
|
|
601
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
566
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
602
567
|
'''
|
|
603
568
|
result = self._values.get("labels")
|
|
604
569
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -609,7 +574,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
609
574
|
|
|
610
575
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
611
576
|
|
|
612
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
577
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
613
578
|
'''
|
|
614
579
|
result = self._values.get("plan")
|
|
615
580
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -620,7 +585,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
620
585
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
621
586
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
622
587
|
|
|
623
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
588
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
624
589
|
'''
|
|
625
590
|
result = self._values.get("private_node_groups")
|
|
626
591
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -629,16 +594,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
629
594
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
630
595
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
631
596
|
|
|
632
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
597
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
633
598
|
'''
|
|
634
599
|
result = self._values.get("storage_encryption")
|
|
635
600
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
636
601
|
|
|
637
602
|
@builtins.property
|
|
638
603
|
def version(self) -> typing.Optional[builtins.str]:
|
|
639
|
-
'''Kubernetes version ID, e.g. ``1.
|
|
604
|
+
'''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
640
605
|
|
|
641
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
606
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.0/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
642
607
|
'''
|
|
643
608
|
result = self._values.get("version")
|
|
644
609
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -664,13 +629,12 @@ publication.publish()
|
|
|
664
629
|
|
|
665
630
|
def _typecheckingstub__8a9b711fc0d4f95af1581b8c47ef51571908b57197927d077ddbf475a99293e0(
|
|
666
631
|
scope: _constructs_77d1e7e8.Construct,
|
|
667
|
-
|
|
632
|
+
id: builtins.str,
|
|
668
633
|
*,
|
|
669
634
|
control_plane_ip_filter: typing.Sequence[builtins.str],
|
|
670
635
|
name: builtins.str,
|
|
671
636
|
network: builtins.str,
|
|
672
637
|
zone: builtins.str,
|
|
673
|
-
id: typing.Optional[builtins.str] = None,
|
|
674
638
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
675
639
|
plan: typing.Optional[builtins.str] = None,
|
|
676
640
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
@@ -702,12 +666,6 @@ def _typecheckingstub__93a87bbc915dd5fa01b944063ae4f03861f927743d8bd0e811ded1b50
|
|
|
702
666
|
"""Type checking stubs"""
|
|
703
667
|
pass
|
|
704
668
|
|
|
705
|
-
def _typecheckingstub__f78fce845db53a9c80ea63aab3e2cb839deb5afb0d1201080c6f0426df83e94c(
|
|
706
|
-
value: builtins.str,
|
|
707
|
-
) -> None:
|
|
708
|
-
"""Type checking stubs"""
|
|
709
|
-
pass
|
|
710
|
-
|
|
711
669
|
def _typecheckingstub__7b9fb1189cc7bea21771f655e6f7d40e2b84a7ccedb6b706bd861ad34f2a71e8(
|
|
712
670
|
value: typing.Mapping[builtins.str, builtins.str],
|
|
713
671
|
) -> None:
|
|
@@ -769,7 +727,6 @@ def _typecheckingstub__e268687db9e34ae4b03f85f7b2bdf19564690fdaacf69cdb2c9bd3f76
|
|
|
769
727
|
name: builtins.str,
|
|
770
728
|
network: builtins.str,
|
|
771
729
|
zone: builtins.str,
|
|
772
|
-
id: typing.Optional[builtins.str] = None,
|
|
773
730
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
774
731
|
plan: typing.Optional[builtins.str] = None,
|
|
775
732
|
private_node_groups: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|