cdktf-cdktf-provider-upcloud 14.8.1__py3-none-any.whl → 14.9.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.

Files changed (62) hide show
  1. cdktf_cdktf_provider_upcloud/__init__.py +3 -3
  2. cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
  3. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.1.jsii.tgz +0 -0
  4. cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
  5. cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
  6. cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
  7. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
  8. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
  9. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
  10. cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
  11. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
  12. cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
  13. cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
  14. cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
  15. cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
  16. cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
  17. cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
  18. cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
  19. cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
  20. cdktf_cdktf_provider_upcloud/gateway/__init__.py +52 -52
  21. cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
  22. cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
  23. cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +40 -40
  24. cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +95 -95
  25. cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +72 -72
  26. cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
  27. cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +20 -20
  28. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
  29. cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +20 -20
  30. cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
  31. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
  32. cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +20 -20
  33. cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +24 -24
  34. cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
  35. cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
  36. cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
  37. cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +359 -264
  38. cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +509 -460
  39. cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +555 -412
  40. cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +263 -168
  41. cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
  42. cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +48 -48
  43. cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +24 -24
  44. cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
  45. cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
  46. cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
  47. cdktf_cdktf_provider_upcloud/network/__init__.py +49 -49
  48. cdktf_cdktf_provider_upcloud/network_peering/__init__.py +38 -38
  49. cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
  50. cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
  51. cdktf_cdktf_provider_upcloud/router/__init__.py +242 -29
  52. cdktf_cdktf_provider_upcloud/server/__init__.py +219 -219
  53. cdktf_cdktf_provider_upcloud/server_group/__init__.py +34 -77
  54. cdktf_cdktf_provider_upcloud/storage/__init__.py +76 -76
  55. cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
  56. {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/METADATA +9 -9
  57. cdktf_cdktf_provider_upcloud-14.9.1.dist-info/RECORD +61 -0
  58. {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/WHEEL +1 -1
  59. cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.8.1.jsii.tgz +0 -0
  60. cdktf_cdktf_provider_upcloud-14.8.1.dist-info/RECORD +0 -61
  61. {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/LICENSE +0 -0
  62. {cdktf_cdktf_provider_upcloud-14.8.1.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/top_level.txt +0 -0
@@ -1,7 +1,7 @@
1
1
  r'''
2
2
  # `upcloud_kubernetes_cluster`
3
3
 
4
- Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster).
4
+ Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster).
5
5
  '''
6
6
  from pkgutil import extend_path
7
7
  __path__ = extend_path(__path__, __name__)
@@ -29,7 +29,7 @@ class KubernetesCluster(
29
29
  metaclass=jsii.JSIIMeta,
30
30
  jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
31
31
  ):
32
- '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
32
+ '''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
33
33
 
34
34
  def __init__(
35
35
  self,
@@ -53,19 +53,19 @@ class KubernetesCluster(
53
53
  provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
54
54
  provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
55
55
  ) -> None:
56
- '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
56
+ '''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
57
57
 
58
58
  :param scope: The scope in which to define this construct.
59
59
  :param id: The scoped construct ID. Must be unique amongst siblings in the same scope
60
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
61
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
62
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
63
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
64
- :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
65
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
66
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
67
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
68
- :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
60
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
61
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
62
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
63
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
64
+ :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
65
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
66
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
67
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
68
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
69
69
  :param connection:
70
70
  :param count:
71
71
  :param depends_on:
@@ -112,7 +112,7 @@ class KubernetesCluster(
112
112
 
113
113
  :param scope: The scope in which to define this construct.
114
114
  :param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
115
- :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
115
+ :param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
116
116
  :param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
117
117
  '''
118
118
  if __debug__:
@@ -237,7 +237,7 @@ class KubernetesCluster(
237
237
  if __debug__:
238
238
  type_hints = typing.get_type_hints(_typecheckingstub__93a87bbc915dd5fa01b944063ae4f03861f927743d8bd0e811ded1b50a775513)
239
239
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
240
- jsii.set(self, "controlPlaneIpFilter", value)
240
+ jsii.set(self, "controlPlaneIpFilter", value) # pyright: ignore[reportArgumentType]
241
241
 
242
242
  @builtins.property
243
243
  @jsii.member(jsii_name="labels")
@@ -249,7 +249,7 @@ class KubernetesCluster(
249
249
  if __debug__:
250
250
  type_hints = typing.get_type_hints(_typecheckingstub__7b9fb1189cc7bea21771f655e6f7d40e2b84a7ccedb6b706bd861ad34f2a71e8)
251
251
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
252
- jsii.set(self, "labels", value)
252
+ jsii.set(self, "labels", value) # pyright: ignore[reportArgumentType]
253
253
 
254
254
  @builtins.property
255
255
  @jsii.member(jsii_name="name")
@@ -261,7 +261,7 @@ class KubernetesCluster(
261
261
  if __debug__:
262
262
  type_hints = typing.get_type_hints(_typecheckingstub__c69847aa2809c05a6052b083ccd5ca5d9c7dc69ef91c872bb1912acd0884cf14)
263
263
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
264
- jsii.set(self, "name", value)
264
+ jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
265
265
 
266
266
  @builtins.property
267
267
  @jsii.member(jsii_name="network")
@@ -273,7 +273,7 @@ class KubernetesCluster(
273
273
  if __debug__:
274
274
  type_hints = typing.get_type_hints(_typecheckingstub__b6a7b0ed76a96de39c59699be8d67bc580fdf1c14ae64b9711ac30f3d69ae37c)
275
275
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
276
- jsii.set(self, "network", value)
276
+ jsii.set(self, "network", value) # pyright: ignore[reportArgumentType]
277
277
 
278
278
  @builtins.property
279
279
  @jsii.member(jsii_name="plan")
@@ -285,7 +285,7 @@ class KubernetesCluster(
285
285
  if __debug__:
286
286
  type_hints = typing.get_type_hints(_typecheckingstub__04fa3a378e45d0014b1d148124a7ea27e53d6fce1e52acbce0b79a572d803d02)
287
287
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
288
- jsii.set(self, "plan", value)
288
+ jsii.set(self, "plan", value) # pyright: ignore[reportArgumentType]
289
289
 
290
290
  @builtins.property
291
291
  @jsii.member(jsii_name="privateNodeGroups")
@@ -302,7 +302,7 @@ class KubernetesCluster(
302
302
  if __debug__:
303
303
  type_hints = typing.get_type_hints(_typecheckingstub__f49f70d8405be1fa26fe8c061357eb2ec81b867b995db8ff053c4f9a5fdca1b9)
304
304
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
305
- jsii.set(self, "privateNodeGroups", value)
305
+ jsii.set(self, "privateNodeGroups", value) # pyright: ignore[reportArgumentType]
306
306
 
307
307
  @builtins.property
308
308
  @jsii.member(jsii_name="storageEncryption")
@@ -314,7 +314,7 @@ class KubernetesCluster(
314
314
  if __debug__:
315
315
  type_hints = typing.get_type_hints(_typecheckingstub__cedce06cdd644121d16e8723f1b12d6b73c8a3982cac05b297172fec86ac6b6c)
316
316
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
317
- jsii.set(self, "storageEncryption", value)
317
+ jsii.set(self, "storageEncryption", value) # pyright: ignore[reportArgumentType]
318
318
 
319
319
  @builtins.property
320
320
  @jsii.member(jsii_name="version")
@@ -326,7 +326,7 @@ class KubernetesCluster(
326
326
  if __debug__:
327
327
  type_hints = typing.get_type_hints(_typecheckingstub__776ba3ef3b832d50876fe4a1d205b0bbe70e283570bc607f5f3709b3061f153f)
328
328
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
329
- jsii.set(self, "version", value)
329
+ jsii.set(self, "version", value) # pyright: ignore[reportArgumentType]
330
330
 
331
331
  @builtins.property
332
332
  @jsii.member(jsii_name="zone")
@@ -338,7 +338,7 @@ class KubernetesCluster(
338
338
  if __debug__:
339
339
  type_hints = typing.get_type_hints(_typecheckingstub__70f488b5c223cfa038f56985e1d22e4c38a93cbe80f0a3a2fb36e7395578336e)
340
340
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
341
- jsii.set(self, "zone", value)
341
+ jsii.set(self, "zone", value) # pyright: ignore[reportArgumentType]
342
342
 
343
343
 
344
344
  @jsii.data_type(
@@ -392,15 +392,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
392
392
  :param lifecycle:
393
393
  :param provider:
394
394
  :param provisioners:
395
- :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
396
- :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
397
- :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
398
- :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
399
- :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
400
- :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
401
- :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
402
- :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
403
- :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
395
+ :param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
396
+ :param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
397
+ :param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
398
+ :param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
399
+ :param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
400
+ :param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
401
+ :param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
402
+ :param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
403
+ :param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
404
404
  '''
405
405
  if isinstance(lifecycle, dict):
406
406
  lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
@@ -523,7 +523,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
523
523
 
524
524
  To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
525
525
 
526
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
526
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
527
527
  '''
528
528
  result = self._values.get("control_plane_ip_filter")
529
529
  assert result is not None, "Required property 'control_plane_ip_filter' is missing"
@@ -533,7 +533,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
533
533
  def name(self) -> builtins.str:
534
534
  '''Cluster name. Needs to be unique within the account.
535
535
 
536
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
536
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
537
537
  '''
538
538
  result = self._values.get("name")
539
539
  assert result is not None, "Required property 'name' is missing"
@@ -543,7 +543,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
543
543
  def network(self) -> builtins.str:
544
544
  '''Network ID for the cluster to run in.
545
545
 
546
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
546
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
547
547
  '''
548
548
  result = self._values.get("network")
549
549
  assert result is not None, "Required property 'network' is missing"
@@ -553,7 +553,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
553
553
  def zone(self) -> builtins.str:
554
554
  '''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
555
555
 
556
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
556
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
557
557
  '''
558
558
  result = self._values.get("zone")
559
559
  assert result is not None, "Required property 'zone' is missing"
@@ -563,7 +563,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
563
563
  def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
564
564
  '''Key-value pairs to classify the cluster.
565
565
 
566
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
566
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
567
567
  '''
568
568
  result = self._values.get("labels")
569
569
  return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
@@ -574,7 +574,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
574
574
 
575
575
  Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
576
576
 
577
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
577
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
578
578
  '''
579
579
  result = self._values.get("plan")
580
580
  return typing.cast(typing.Optional[builtins.str], result)
@@ -585,7 +585,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
585
585
  ) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
586
586
  '''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
587
587
 
588
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
588
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
589
589
  '''
590
590
  result = self._values.get("private_node_groups")
591
591
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
@@ -594,7 +594,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
594
594
  def storage_encryption(self) -> typing.Optional[builtins.str]:
595
595
  '''Set default storage encryption strategy for all nodes in the cluster.
596
596
 
597
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
597
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
598
598
  '''
599
599
  result = self._values.get("storage_encryption")
600
600
  return typing.cast(typing.Optional[builtins.str], result)
@@ -603,7 +603,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
603
603
  def version(self) -> typing.Optional[builtins.str]:
604
604
  '''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
605
605
 
606
- Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.8.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
606
+ Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
607
607
  '''
608
608
  result = self._values.get("version")
609
609
  return typing.cast(typing.Optional[builtins.str], result)