cdktf-cdktf-provider-upcloud 14.8.1__py3-none-any.whl → 14.9.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +95 -95
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +72 -72
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +359 -264
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +509 -460
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +555 -412
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +263 -168
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +48 -48
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/network/__init__.py +49 -49
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/router/__init__.py +242 -29
- cdktf_cdktf_provider_upcloud/server/__init__.py +219 -219
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +34 -77
- cdktf_cdktf_provider_upcloud/storage/__init__.py +76 -76
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-14.9.1.dist-info/RECORD +61 -0
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.8.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.8.1.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_server_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_server_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_server_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,16 +29,15 @@ class ServerGroup(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.serverGroup.ServerGroup",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group upcloud_server_group}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
36
36
|
scope: _constructs_77d1e7e8.Construct,
|
|
37
|
-
|
|
37
|
+
id: builtins.str,
|
|
38
38
|
*,
|
|
39
39
|
title: builtins.str,
|
|
40
40
|
anti_affinity_policy: typing.Optional[builtins.str] = None,
|
|
41
|
-
id: typing.Optional[builtins.str] = None,
|
|
42
41
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
43
42
|
members: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
44
43
|
track_members: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
@@ -50,16 +49,15 @@ class ServerGroup(
|
|
|
50
49
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
51
50
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
52
51
|
) -> None:
|
|
53
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
52
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group upcloud_server_group} Resource.
|
|
54
53
|
|
|
55
54
|
:param scope: The scope in which to define this construct.
|
|
56
|
-
:param
|
|
57
|
-
:param title: Title of your server group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
58
|
-
:param anti_affinity_policy: Defines if a server group is an anti-affinity group. Setting this to ``strict`` or ``yes`` will result in all servers in the group being placed on separate compute hosts. The value can be ``strict``, ``yes``, or ``no``:: * `strict` policy doesn't allow servers in the same server group to be on the same host * `yes` refers to best-effort policy and tries to put servers on different hosts, but this is not guaranteed * `no` refers to having no policy and thus no effect on server host affinity To verify if the anti-affinity policies are met by requesting a server group details from API. For more information please see UpCloud API documentation on server groups. Plese also note that anti-affinity policies are only applied on server start. This means that if anti-affinity policies in server group are not met, you need to manually restart the servers in said group, for example via API, UpCloud Control Panel or upctl (UpCloud CLI) Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
59
|
-
:param
|
|
60
|
-
:param
|
|
61
|
-
:param
|
|
62
|
-
:param track_members: Controls if members of the server group are being tracked in this resource. Set to ``false`` when using ``server_group`` property of ``upcloud_server`` to attach servers to the server group to avoid delayed state updates. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/server_group#track_members ServerGroup#track_members}
|
|
55
|
+
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
56
|
+
:param title: Title of your server group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#title ServerGroup#title}
|
|
57
|
+
:param anti_affinity_policy: Defines if a server group is an anti-affinity group. Setting this to ``strict`` or ``yes`` will result in all servers in the group being placed on separate compute hosts. The value can be ``strict``, ``yes``, or ``no``:: * `strict` policy doesn't allow servers in the same server group to be on the same host * `yes` refers to best-effort policy and tries to put servers on different hosts, but this is not guaranteed * `no` refers to having no policy and thus no effect on server host affinity To verify if the anti-affinity policies are met by requesting a server group details from API. For more information please see UpCloud API documentation on server groups. Plese also note that anti-affinity policies are only applied on server start. This means that if anti-affinity policies in server group are not met, you need to manually restart the servers in said group, for example via API, UpCloud Control Panel or upctl (UpCloud CLI) Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#anti_affinity_policy ServerGroup#anti_affinity_policy}
|
|
58
|
+
:param labels: Key-value pairs to classify the server group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#labels ServerGroup#labels}
|
|
59
|
+
:param members: UUIDs of the servers that are members of this group. Servers can also be attached to the server group via ``server_group`` property of ``upcloud_server``. See also ``track_members`` property. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#members ServerGroup#members}
|
|
60
|
+
:param track_members: Controls if members of the server group are being tracked in this resource. Set to ``false`` when using ``server_group`` property of ``upcloud_server`` to attach servers to the server group to avoid delayed state updates. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#track_members ServerGroup#track_members}
|
|
63
61
|
:param connection:
|
|
64
62
|
:param count:
|
|
65
63
|
:param depends_on:
|
|
@@ -71,11 +69,10 @@ class ServerGroup(
|
|
|
71
69
|
if __debug__:
|
|
72
70
|
type_hints = typing.get_type_hints(_typecheckingstub__e7bb9d997cccb31358151de22cea5fb9ccb45e5e867434b036acb120ab3beced)
|
|
73
71
|
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
74
|
-
check_type(argname="argument
|
|
72
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
75
73
|
config = ServerGroupConfig(
|
|
76
74
|
title=title,
|
|
77
75
|
anti_affinity_policy=anti_affinity_policy,
|
|
78
|
-
id=id,
|
|
79
76
|
labels=labels,
|
|
80
77
|
members=members,
|
|
81
78
|
track_members=track_members,
|
|
@@ -88,7 +85,7 @@ class ServerGroup(
|
|
|
88
85
|
provisioners=provisioners,
|
|
89
86
|
)
|
|
90
87
|
|
|
91
|
-
jsii.create(self.__class__, self, [scope,
|
|
88
|
+
jsii.create(self.__class__, self, [scope, id, config])
|
|
92
89
|
|
|
93
90
|
@jsii.member(jsii_name="generateConfigForImport")
|
|
94
91
|
@builtins.classmethod
|
|
@@ -103,7 +100,7 @@ class ServerGroup(
|
|
|
103
100
|
|
|
104
101
|
:param scope: The scope in which to define this construct.
|
|
105
102
|
:param import_to_id: The construct id used in the generated config for the ServerGroup to import.
|
|
106
|
-
:param import_from_id: The id of the existing ServerGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
103
|
+
:param import_from_id: The id of the existing ServerGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#import import section} in the documentation of this resource for the id to use
|
|
107
104
|
:param provider: ? Optional instance of the provider where the ServerGroup to import is found.
|
|
108
105
|
'''
|
|
109
106
|
if __debug__:
|
|
@@ -118,10 +115,6 @@ class ServerGroup(
|
|
|
118
115
|
def reset_anti_affinity_policy(self) -> None:
|
|
119
116
|
return typing.cast(None, jsii.invoke(self, "resetAntiAffinityPolicy", []))
|
|
120
117
|
|
|
121
|
-
@jsii.member(jsii_name="resetId")
|
|
122
|
-
def reset_id(self) -> None:
|
|
123
|
-
return typing.cast(None, jsii.invoke(self, "resetId", []))
|
|
124
|
-
|
|
125
118
|
@jsii.member(jsii_name="resetLabels")
|
|
126
119
|
def reset_labels(self) -> None:
|
|
127
120
|
return typing.cast(None, jsii.invoke(self, "resetLabels", []))
|
|
@@ -147,16 +140,16 @@ class ServerGroup(
|
|
|
147
140
|
def TF_RESOURCE_TYPE(cls) -> builtins.str:
|
|
148
141
|
return typing.cast(builtins.str, jsii.sget(cls, "tfResourceType"))
|
|
149
142
|
|
|
143
|
+
@builtins.property
|
|
144
|
+
@jsii.member(jsii_name="id")
|
|
145
|
+
def id(self) -> builtins.str:
|
|
146
|
+
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
147
|
+
|
|
150
148
|
@builtins.property
|
|
151
149
|
@jsii.member(jsii_name="antiAffinityPolicyInput")
|
|
152
150
|
def anti_affinity_policy_input(self) -> typing.Optional[builtins.str]:
|
|
153
151
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "antiAffinityPolicyInput"))
|
|
154
152
|
|
|
155
|
-
@builtins.property
|
|
156
|
-
@jsii.member(jsii_name="idInput")
|
|
157
|
-
def id_input(self) -> typing.Optional[builtins.str]:
|
|
158
|
-
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "idInput"))
|
|
159
|
-
|
|
160
153
|
@builtins.property
|
|
161
154
|
@jsii.member(jsii_name="labelsInput")
|
|
162
155
|
def labels_input(
|
|
@@ -191,19 +184,7 @@ class ServerGroup(
|
|
|
191
184
|
if __debug__:
|
|
192
185
|
type_hints = typing.get_type_hints(_typecheckingstub__4390bd2492fd3d3bbedd7c19e60d04383672093eba56d821ee968f23e93bf140)
|
|
193
186
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
194
|
-
jsii.set(self, "antiAffinityPolicy", value)
|
|
195
|
-
|
|
196
|
-
@builtins.property
|
|
197
|
-
@jsii.member(jsii_name="id")
|
|
198
|
-
def id(self) -> builtins.str:
|
|
199
|
-
return typing.cast(builtins.str, jsii.get(self, "id"))
|
|
200
|
-
|
|
201
|
-
@id.setter
|
|
202
|
-
def id(self, value: builtins.str) -> None:
|
|
203
|
-
if __debug__:
|
|
204
|
-
type_hints = typing.get_type_hints(_typecheckingstub__58ffbe716a28a79007cd788fa1c1c7a03a9678d24e84d8ceec963248ecb72f8e)
|
|
205
|
-
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
206
|
-
jsii.set(self, "id", value)
|
|
187
|
+
jsii.set(self, "antiAffinityPolicy", value) # pyright: ignore[reportArgumentType]
|
|
207
188
|
|
|
208
189
|
@builtins.property
|
|
209
190
|
@jsii.member(jsii_name="labels")
|
|
@@ -215,7 +196,7 @@ class ServerGroup(
|
|
|
215
196
|
if __debug__:
|
|
216
197
|
type_hints = typing.get_type_hints(_typecheckingstub__c063a7fc6c1346d722a1473260458630c3f8c7f42337e5589ab67dac5732fc2d)
|
|
217
198
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
218
|
-
jsii.set(self, "labels", value)
|
|
199
|
+
jsii.set(self, "labels", value) # pyright: ignore[reportArgumentType]
|
|
219
200
|
|
|
220
201
|
@builtins.property
|
|
221
202
|
@jsii.member(jsii_name="members")
|
|
@@ -227,7 +208,7 @@ class ServerGroup(
|
|
|
227
208
|
if __debug__:
|
|
228
209
|
type_hints = typing.get_type_hints(_typecheckingstub__78ebd68f276317393d82cc8da37c9a3be28f59d4933cfcf477190dc1856602e9)
|
|
229
210
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
230
|
-
jsii.set(self, "members", value)
|
|
211
|
+
jsii.set(self, "members", value) # pyright: ignore[reportArgumentType]
|
|
231
212
|
|
|
232
213
|
@builtins.property
|
|
233
214
|
@jsii.member(jsii_name="title")
|
|
@@ -239,7 +220,7 @@ class ServerGroup(
|
|
|
239
220
|
if __debug__:
|
|
240
221
|
type_hints = typing.get_type_hints(_typecheckingstub__7194848368d4b426a57d37e7301e9f7cd0a15042f72fed971eaf1ec8f481ba71)
|
|
241
222
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
242
|
-
jsii.set(self, "title", value)
|
|
223
|
+
jsii.set(self, "title", value) # pyright: ignore[reportArgumentType]
|
|
243
224
|
|
|
244
225
|
@builtins.property
|
|
245
226
|
@jsii.member(jsii_name="trackMembers")
|
|
@@ -254,7 +235,7 @@ class ServerGroup(
|
|
|
254
235
|
if __debug__:
|
|
255
236
|
type_hints = typing.get_type_hints(_typecheckingstub__829c5a6ee0abba8900e0384709d592d3b9dfce002df2c4e19aa1e5c4a5f3c175)
|
|
256
237
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
257
|
-
jsii.set(self, "trackMembers", value)
|
|
238
|
+
jsii.set(self, "trackMembers", value) # pyright: ignore[reportArgumentType]
|
|
258
239
|
|
|
259
240
|
|
|
260
241
|
@jsii.data_type(
|
|
@@ -270,7 +251,6 @@ class ServerGroup(
|
|
|
270
251
|
"provisioners": "provisioners",
|
|
271
252
|
"title": "title",
|
|
272
253
|
"anti_affinity_policy": "antiAffinityPolicy",
|
|
273
|
-
"id": "id",
|
|
274
254
|
"labels": "labels",
|
|
275
255
|
"members": "members",
|
|
276
256
|
"track_members": "trackMembers",
|
|
@@ -289,7 +269,6 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
289
269
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
290
270
|
title: builtins.str,
|
|
291
271
|
anti_affinity_policy: typing.Optional[builtins.str] = None,
|
|
292
|
-
id: typing.Optional[builtins.str] = None,
|
|
293
272
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
294
273
|
members: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
295
274
|
track_members: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
@@ -302,12 +281,11 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
302
281
|
:param lifecycle:
|
|
303
282
|
:param provider:
|
|
304
283
|
:param provisioners:
|
|
305
|
-
:param title: Title of your server group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
306
|
-
:param anti_affinity_policy: Defines if a server group is an anti-affinity group. Setting this to ``strict`` or ``yes`` will result in all servers in the group being placed on separate compute hosts. The value can be ``strict``, ``yes``, or ``no``:: * `strict` policy doesn't allow servers in the same server group to be on the same host * `yes` refers to best-effort policy and tries to put servers on different hosts, but this is not guaranteed * `no` refers to having no policy and thus no effect on server host affinity To verify if the anti-affinity policies are met by requesting a server group details from API. For more information please see UpCloud API documentation on server groups. Plese also note that anti-affinity policies are only applied on server start. This means that if anti-affinity policies in server group are not met, you need to manually restart the servers in said group, for example via API, UpCloud Control Panel or upctl (UpCloud CLI) Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
307
|
-
:param
|
|
308
|
-
:param
|
|
309
|
-
:param
|
|
310
|
-
:param track_members: Controls if members of the server group are being tracked in this resource. Set to ``false`` when using ``server_group`` property of ``upcloud_server`` to attach servers to the server group to avoid delayed state updates. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/server_group#track_members ServerGroup#track_members}
|
|
284
|
+
:param title: Title of your server group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#title ServerGroup#title}
|
|
285
|
+
:param anti_affinity_policy: Defines if a server group is an anti-affinity group. Setting this to ``strict`` or ``yes`` will result in all servers in the group being placed on separate compute hosts. The value can be ``strict``, ``yes``, or ``no``:: * `strict` policy doesn't allow servers in the same server group to be on the same host * `yes` refers to best-effort policy and tries to put servers on different hosts, but this is not guaranteed * `no` refers to having no policy and thus no effect on server host affinity To verify if the anti-affinity policies are met by requesting a server group details from API. For more information please see UpCloud API documentation on server groups. Plese also note that anti-affinity policies are only applied on server start. This means that if anti-affinity policies in server group are not met, you need to manually restart the servers in said group, for example via API, UpCloud Control Panel or upctl (UpCloud CLI) Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#anti_affinity_policy ServerGroup#anti_affinity_policy}
|
|
286
|
+
:param labels: Key-value pairs to classify the server group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#labels ServerGroup#labels}
|
|
287
|
+
:param members: UUIDs of the servers that are members of this group. Servers can also be attached to the server group via ``server_group`` property of ``upcloud_server``. See also ``track_members`` property. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#members ServerGroup#members}
|
|
288
|
+
:param track_members: Controls if members of the server group are being tracked in this resource. Set to ``false`` when using ``server_group`` property of ``upcloud_server`` to attach servers to the server group to avoid delayed state updates. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#track_members ServerGroup#track_members}
|
|
311
289
|
'''
|
|
312
290
|
if isinstance(lifecycle, dict):
|
|
313
291
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -322,7 +300,6 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
322
300
|
check_type(argname="argument provisioners", value=provisioners, expected_type=type_hints["provisioners"])
|
|
323
301
|
check_type(argname="argument title", value=title, expected_type=type_hints["title"])
|
|
324
302
|
check_type(argname="argument anti_affinity_policy", value=anti_affinity_policy, expected_type=type_hints["anti_affinity_policy"])
|
|
325
|
-
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
326
303
|
check_type(argname="argument labels", value=labels, expected_type=type_hints["labels"])
|
|
327
304
|
check_type(argname="argument members", value=members, expected_type=type_hints["members"])
|
|
328
305
|
check_type(argname="argument track_members", value=track_members, expected_type=type_hints["track_members"])
|
|
@@ -345,8 +322,6 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
345
322
|
self._values["provisioners"] = provisioners
|
|
346
323
|
if anti_affinity_policy is not None:
|
|
347
324
|
self._values["anti_affinity_policy"] = anti_affinity_policy
|
|
348
|
-
if id is not None:
|
|
349
|
-
self._values["id"] = id
|
|
350
325
|
if labels is not None:
|
|
351
326
|
self._values["labels"] = labels
|
|
352
327
|
if members is not None:
|
|
@@ -422,7 +397,7 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
422
397
|
def title(self) -> builtins.str:
|
|
423
398
|
'''Title of your server group.
|
|
424
399
|
|
|
425
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
400
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#title ServerGroup#title}
|
|
426
401
|
'''
|
|
427
402
|
result = self._values.get("title")
|
|
428
403
|
assert result is not None, "Required property 'title' is missing"
|
|
@@ -446,26 +421,16 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
446
421
|
policies in server group are not met, you need to manually restart the servers in said group,
|
|
447
422
|
for example via API, UpCloud Control Panel or upctl (UpCloud CLI)
|
|
448
423
|
|
|
449
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
424
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#anti_affinity_policy ServerGroup#anti_affinity_policy}
|
|
450
425
|
'''
|
|
451
426
|
result = self._values.get("anti_affinity_policy")
|
|
452
427
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
453
428
|
|
|
454
|
-
@builtins.property
|
|
455
|
-
def id(self) -> typing.Optional[builtins.str]:
|
|
456
|
-
'''Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/server_group#id ServerGroup#id}.
|
|
457
|
-
|
|
458
|
-
Please be aware that the id field is automatically added to all resources in Terraform providers using a Terraform provider SDK version below 2.
|
|
459
|
-
If you experience problems setting this value it might not be settable. Please take a look at the provider documentation to ensure it should be settable.
|
|
460
|
-
'''
|
|
461
|
-
result = self._values.get("id")
|
|
462
|
-
return typing.cast(typing.Optional[builtins.str], result)
|
|
463
|
-
|
|
464
429
|
@builtins.property
|
|
465
430
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
466
431
|
'''Key-value pairs to classify the server group.
|
|
467
432
|
|
|
468
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
433
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#labels ServerGroup#labels}
|
|
469
434
|
'''
|
|
470
435
|
result = self._values.get("labels")
|
|
471
436
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -476,7 +441,7 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
476
441
|
|
|
477
442
|
Servers can also be attached to the server group via ``server_group`` property of ``upcloud_server``. See also ``track_members`` property.
|
|
478
443
|
|
|
479
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
444
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#members ServerGroup#members}
|
|
480
445
|
'''
|
|
481
446
|
result = self._values.get("members")
|
|
482
447
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -489,7 +454,7 @@ class ServerGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
489
454
|
|
|
490
455
|
Set to ``false`` when using ``server_group`` property of ``upcloud_server`` to attach servers to the server group to avoid delayed state updates.
|
|
491
456
|
|
|
492
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.
|
|
457
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/server_group#track_members ServerGroup#track_members}
|
|
493
458
|
'''
|
|
494
459
|
result = self._values.get("track_members")
|
|
495
460
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -515,11 +480,10 @@ publication.publish()
|
|
|
515
480
|
|
|
516
481
|
def _typecheckingstub__e7bb9d997cccb31358151de22cea5fb9ccb45e5e867434b036acb120ab3beced(
|
|
517
482
|
scope: _constructs_77d1e7e8.Construct,
|
|
518
|
-
|
|
483
|
+
id: builtins.str,
|
|
519
484
|
*,
|
|
520
485
|
title: builtins.str,
|
|
521
486
|
anti_affinity_policy: typing.Optional[builtins.str] = None,
|
|
522
|
-
id: typing.Optional[builtins.str] = None,
|
|
523
487
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
524
488
|
members: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
525
489
|
track_members: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|
|
@@ -549,12 +513,6 @@ def _typecheckingstub__4390bd2492fd3d3bbedd7c19e60d04383672093eba56d821ee968f23e
|
|
|
549
513
|
"""Type checking stubs"""
|
|
550
514
|
pass
|
|
551
515
|
|
|
552
|
-
def _typecheckingstub__58ffbe716a28a79007cd788fa1c1c7a03a9678d24e84d8ceec963248ecb72f8e(
|
|
553
|
-
value: builtins.str,
|
|
554
|
-
) -> None:
|
|
555
|
-
"""Type checking stubs"""
|
|
556
|
-
pass
|
|
557
|
-
|
|
558
516
|
def _typecheckingstub__c063a7fc6c1346d722a1473260458630c3f8c7f42337e5589ab67dac5732fc2d(
|
|
559
517
|
value: typing.Mapping[builtins.str, builtins.str],
|
|
560
518
|
) -> None:
|
|
@@ -590,7 +548,6 @@ def _typecheckingstub__b403df006cfad85b18163ab30df327c027139a019345d554635499f60
|
|
|
590
548
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
591
549
|
title: builtins.str,
|
|
592
550
|
anti_affinity_policy: typing.Optional[builtins.str] = None,
|
|
593
|
-
id: typing.Optional[builtins.str] = None,
|
|
594
551
|
labels: typing.Optional[typing.Mapping[builtins.str, builtins.str]] = None,
|
|
595
552
|
members: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
596
553
|
track_members: typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]] = None,
|