cdktf-cdktf-provider-upcloud 14.9.0__py3-none-any.whl → 14.9.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.1.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +44 -44
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +12 -12
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +8 -8
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +62 -62
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +54 -54
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +80 -80
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +95 -95
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +72 -72
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +84 -84
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +52 -52
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +351 -351
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +40 -40
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +36 -36
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +314 -268
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +464 -464
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +510 -416
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +218 -172
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +70 -70
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +48 -48
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +20 -20
- cdktf_cdktf_provider_upcloud/network/__init__.py +49 -49
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +43 -43
- cdktf_cdktf_provider_upcloud/provider/__init__.py +32 -32
- cdktf_cdktf_provider_upcloud/router/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/server/__init__.py +219 -219
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +24 -24
- cdktf_cdktf_provider_upcloud/storage/__init__.py +76 -76
- cdktf_cdktf_provider_upcloud/tag/__init__.py +20 -20
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-14.9.1.dist-info/RECORD +61 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/WHEEL +1 -1
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@14.9.0.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-14.9.0.dist-info/RECORD +0 -61
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-14.9.0.dist-info → cdktf_cdktf_provider_upcloud-14.9.1.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -29,7 +29,7 @@ class KubernetesCluster(
|
|
|
29
29
|
metaclass=jsii.JSIIMeta,
|
|
30
30
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
31
31
|
):
|
|
32
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
32
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
33
33
|
|
|
34
34
|
def __init__(
|
|
35
35
|
self,
|
|
@@ -53,19 +53,19 @@ class KubernetesCluster(
|
|
|
53
53
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
54
54
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
55
55
|
) -> None:
|
|
56
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
56
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
57
57
|
|
|
58
58
|
:param scope: The scope in which to define this construct.
|
|
59
59
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
60
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
61
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
62
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
63
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
64
|
-
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
65
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
66
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
67
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
68
|
-
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
60
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
61
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
62
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
63
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
64
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
65
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
66
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
67
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
68
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
69
69
|
:param connection:
|
|
70
70
|
:param count:
|
|
71
71
|
:param depends_on:
|
|
@@ -112,7 +112,7 @@ class KubernetesCluster(
|
|
|
112
112
|
|
|
113
113
|
:param scope: The scope in which to define this construct.
|
|
114
114
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
115
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
115
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
116
116
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
117
117
|
'''
|
|
118
118
|
if __debug__:
|
|
@@ -237,7 +237,7 @@ class KubernetesCluster(
|
|
|
237
237
|
if __debug__:
|
|
238
238
|
type_hints = typing.get_type_hints(_typecheckingstub__93a87bbc915dd5fa01b944063ae4f03861f927743d8bd0e811ded1b50a775513)
|
|
239
239
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
240
|
-
jsii.set(self, "controlPlaneIpFilter", value)
|
|
240
|
+
jsii.set(self, "controlPlaneIpFilter", value) # pyright: ignore[reportArgumentType]
|
|
241
241
|
|
|
242
242
|
@builtins.property
|
|
243
243
|
@jsii.member(jsii_name="labels")
|
|
@@ -249,7 +249,7 @@ class KubernetesCluster(
|
|
|
249
249
|
if __debug__:
|
|
250
250
|
type_hints = typing.get_type_hints(_typecheckingstub__7b9fb1189cc7bea21771f655e6f7d40e2b84a7ccedb6b706bd861ad34f2a71e8)
|
|
251
251
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
252
|
-
jsii.set(self, "labels", value)
|
|
252
|
+
jsii.set(self, "labels", value) # pyright: ignore[reportArgumentType]
|
|
253
253
|
|
|
254
254
|
@builtins.property
|
|
255
255
|
@jsii.member(jsii_name="name")
|
|
@@ -261,7 +261,7 @@ class KubernetesCluster(
|
|
|
261
261
|
if __debug__:
|
|
262
262
|
type_hints = typing.get_type_hints(_typecheckingstub__c69847aa2809c05a6052b083ccd5ca5d9c7dc69ef91c872bb1912acd0884cf14)
|
|
263
263
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
264
|
-
jsii.set(self, "name", value)
|
|
264
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
265
265
|
|
|
266
266
|
@builtins.property
|
|
267
267
|
@jsii.member(jsii_name="network")
|
|
@@ -273,7 +273,7 @@ class KubernetesCluster(
|
|
|
273
273
|
if __debug__:
|
|
274
274
|
type_hints = typing.get_type_hints(_typecheckingstub__b6a7b0ed76a96de39c59699be8d67bc580fdf1c14ae64b9711ac30f3d69ae37c)
|
|
275
275
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
276
|
-
jsii.set(self, "network", value)
|
|
276
|
+
jsii.set(self, "network", value) # pyright: ignore[reportArgumentType]
|
|
277
277
|
|
|
278
278
|
@builtins.property
|
|
279
279
|
@jsii.member(jsii_name="plan")
|
|
@@ -285,7 +285,7 @@ class KubernetesCluster(
|
|
|
285
285
|
if __debug__:
|
|
286
286
|
type_hints = typing.get_type_hints(_typecheckingstub__04fa3a378e45d0014b1d148124a7ea27e53d6fce1e52acbce0b79a572d803d02)
|
|
287
287
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
288
|
-
jsii.set(self, "plan", value)
|
|
288
|
+
jsii.set(self, "plan", value) # pyright: ignore[reportArgumentType]
|
|
289
289
|
|
|
290
290
|
@builtins.property
|
|
291
291
|
@jsii.member(jsii_name="privateNodeGroups")
|
|
@@ -302,7 +302,7 @@ class KubernetesCluster(
|
|
|
302
302
|
if __debug__:
|
|
303
303
|
type_hints = typing.get_type_hints(_typecheckingstub__f49f70d8405be1fa26fe8c061357eb2ec81b867b995db8ff053c4f9a5fdca1b9)
|
|
304
304
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
305
|
-
jsii.set(self, "privateNodeGroups", value)
|
|
305
|
+
jsii.set(self, "privateNodeGroups", value) # pyright: ignore[reportArgumentType]
|
|
306
306
|
|
|
307
307
|
@builtins.property
|
|
308
308
|
@jsii.member(jsii_name="storageEncryption")
|
|
@@ -314,7 +314,7 @@ class KubernetesCluster(
|
|
|
314
314
|
if __debug__:
|
|
315
315
|
type_hints = typing.get_type_hints(_typecheckingstub__cedce06cdd644121d16e8723f1b12d6b73c8a3982cac05b297172fec86ac6b6c)
|
|
316
316
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
317
|
-
jsii.set(self, "storageEncryption", value)
|
|
317
|
+
jsii.set(self, "storageEncryption", value) # pyright: ignore[reportArgumentType]
|
|
318
318
|
|
|
319
319
|
@builtins.property
|
|
320
320
|
@jsii.member(jsii_name="version")
|
|
@@ -326,7 +326,7 @@ class KubernetesCluster(
|
|
|
326
326
|
if __debug__:
|
|
327
327
|
type_hints = typing.get_type_hints(_typecheckingstub__776ba3ef3b832d50876fe4a1d205b0bbe70e283570bc607f5f3709b3061f153f)
|
|
328
328
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
329
|
-
jsii.set(self, "version", value)
|
|
329
|
+
jsii.set(self, "version", value) # pyright: ignore[reportArgumentType]
|
|
330
330
|
|
|
331
331
|
@builtins.property
|
|
332
332
|
@jsii.member(jsii_name="zone")
|
|
@@ -338,7 +338,7 @@ class KubernetesCluster(
|
|
|
338
338
|
if __debug__:
|
|
339
339
|
type_hints = typing.get_type_hints(_typecheckingstub__70f488b5c223cfa038f56985e1d22e4c38a93cbe80f0a3a2fb36e7395578336e)
|
|
340
340
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
341
|
-
jsii.set(self, "zone", value)
|
|
341
|
+
jsii.set(self, "zone", value) # pyright: ignore[reportArgumentType]
|
|
342
342
|
|
|
343
343
|
|
|
344
344
|
@jsii.data_type(
|
|
@@ -392,15 +392,15 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
392
392
|
:param lifecycle:
|
|
393
393
|
:param provider:
|
|
394
394
|
:param provisioners:
|
|
395
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
396
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
397
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
398
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
399
|
-
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
400
|
-
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
401
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
402
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
403
|
-
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
395
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
396
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
397
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
398
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
399
|
+
:param labels: Key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
400
|
+
:param plan: The pricing plan used for the cluster. Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
401
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
402
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
403
|
+
:param version: Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
404
404
|
'''
|
|
405
405
|
if isinstance(lifecycle, dict):
|
|
406
406
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -523,7 +523,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
523
523
|
|
|
524
524
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
525
525
|
|
|
526
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
526
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
527
527
|
'''
|
|
528
528
|
result = self._values.get("control_plane_ip_filter")
|
|
529
529
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -533,7 +533,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
533
533
|
def name(self) -> builtins.str:
|
|
534
534
|
'''Cluster name. Needs to be unique within the account.
|
|
535
535
|
|
|
536
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
536
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
537
537
|
'''
|
|
538
538
|
result = self._values.get("name")
|
|
539
539
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -543,7 +543,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
543
543
|
def network(self) -> builtins.str:
|
|
544
544
|
'''Network ID for the cluster to run in.
|
|
545
545
|
|
|
546
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
546
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
547
547
|
'''
|
|
548
548
|
result = self._values.get("network")
|
|
549
549
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -553,7 +553,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
553
553
|
def zone(self) -> builtins.str:
|
|
554
554
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
555
555
|
|
|
556
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
556
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
557
557
|
'''
|
|
558
558
|
result = self._values.get("zone")
|
|
559
559
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -563,7 +563,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
563
563
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
564
564
|
'''Key-value pairs to classify the cluster.
|
|
565
565
|
|
|
566
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
566
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
567
567
|
'''
|
|
568
568
|
result = self._values.get("labels")
|
|
569
569
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -574,7 +574,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
574
574
|
|
|
575
575
|
Default plan is ``development``. You can list available plans with ``upctl kubernetes plans``.
|
|
576
576
|
|
|
577
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
577
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
578
578
|
'''
|
|
579
579
|
result = self._values.get("plan")
|
|
580
580
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -585,7 +585,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
585
585
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
586
586
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
587
587
|
|
|
588
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
588
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
589
589
|
'''
|
|
590
590
|
result = self._values.get("private_node_groups")
|
|
591
591
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -594,7 +594,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
594
594
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
595
595
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
596
596
|
|
|
597
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
597
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
598
598
|
'''
|
|
599
599
|
result = self._values.get("storage_encryption")
|
|
600
600
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -603,7 +603,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
603
603
|
def version(self) -> typing.Optional[builtins.str]:
|
|
604
604
|
'''Kubernetes version ID, e.g. ``1.28``. You can list available version IDs with ``upctl kubernetes versions``.
|
|
605
605
|
|
|
606
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.
|
|
606
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.9.1/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
607
607
|
'''
|
|
608
608
|
result = self._values.get("version")
|
|
609
609
|
return typing.cast(typing.Optional[builtins.str], result)
|