cdktf-cdktf-provider-upcloud 15.1.2__py3-none-any.whl → 15.1.4__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of cdktf-cdktf-provider-upcloud might be problematic. Click here for more details.
- cdktf_cdktf_provider_upcloud/__init__.py +3 -3
- cdktf_cdktf_provider_upcloud/_jsii/__init__.py +2 -2
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.1.4.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud/data_upcloud_hosts/__init__.py +9 -9
- cdktf_cdktf_provider_upcloud/data_upcloud_ip_addresses/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_kubernetes_cluster/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_load_balancer_dns_challenge_domain/__init__.py +4 -4
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_mysql_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_opensearch_indices/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_postgresql_sessions/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_redis_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_database_valkey_sessions/__init__.py +22 -22
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_policies/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_managed_object_storage_regions/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_networks/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/data_upcloud_storage/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/data_upcloud_tags/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/data_upcloud_zone/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/data_upcloud_zones/__init__.py +7 -7
- cdktf_cdktf_provider_upcloud/firewall_rules/__init__.py +38 -38
- cdktf_cdktf_provider_upcloud/floating_ip_address/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/gateway/__init__.py +37 -37
- cdktf_cdktf_provider_upcloud/gateway_connection/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/gateway_connection_tunnel/__init__.py +61 -61
- cdktf_cdktf_provider_upcloud/kubernetes_cluster/__init__.py +34 -34
- cdktf_cdktf_provider_upcloud/kubernetes_node_group/__init__.py +58 -58
- cdktf_cdktf_provider_upcloud/loadbalancer/__init__.py +39 -39
- cdktf_cdktf_provider_upcloud/loadbalancer_backend/__init__.py +46 -46
- cdktf_cdktf_provider_upcloud/loadbalancer_backend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/loadbalancer_dynamic_certificate_bundle/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_rule/__init__.py +228 -228
- cdktf_cdktf_provider_upcloud/loadbalancer_frontend_tls_config/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/loadbalancer_manual_certificate_bundle/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/loadbalancer_resolver/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/loadbalancer_static_backend_member/__init__.py +25 -25
- cdktf_cdktf_provider_upcloud/managed_database_logical_database/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/managed_database_mysql/__init__.py +210 -210
- cdktf_cdktf_provider_upcloud/managed_database_opensearch/__init__.py +594 -594
- cdktf_cdktf_provider_upcloud/managed_database_postgresql/__init__.py +366 -366
- cdktf_cdktf_provider_upcloud/managed_database_redis/__init__.py +132 -132
- cdktf_cdktf_provider_upcloud/managed_database_user/__init__.py +65 -65
- cdktf_cdktf_provider_upcloud/managed_database_valkey/__init__.py +135 -135
- cdktf_cdktf_provider_upcloud/managed_object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/managed_object_storage_bucket/__init__.py +10 -10
- cdktf_cdktf_provider_upcloud/managed_object_storage_custom_domain/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_access_key/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/managed_object_storage_user_policy/__init__.py +16 -16
- cdktf_cdktf_provider_upcloud/network/__init__.py +33 -33
- cdktf_cdktf_provider_upcloud/network_peering/__init__.py +23 -23
- cdktf_cdktf_provider_upcloud/object_storage/__init__.py +30 -30
- cdktf_cdktf_provider_upcloud/provider/__init__.py +28 -28
- cdktf_cdktf_provider_upcloud/router/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/server/__init__.py +140 -140
- cdktf_cdktf_provider_upcloud/server_group/__init__.py +19 -19
- cdktf_cdktf_provider_upcloud/storage/__init__.py +51 -51
- cdktf_cdktf_provider_upcloud/storage_backup/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/storage_template/__init__.py +13 -13
- cdktf_cdktf_provider_upcloud/tag/__init__.py +16 -16
- {cdktf_cdktf_provider_upcloud-15.1.2.dist-info → cdktf_cdktf_provider_upcloud-15.1.4.dist-info}/METADATA +9 -9
- cdktf_cdktf_provider_upcloud-15.1.4.dist-info/RECORD +68 -0
- cdktf_cdktf_provider_upcloud/_jsii/provider-upcloud@15.1.2.jsii.tgz +0 -0
- cdktf_cdktf_provider_upcloud-15.1.2.dist-info/RECORD +0 -68
- {cdktf_cdktf_provider_upcloud-15.1.2.dist-info → cdktf_cdktf_provider_upcloud-15.1.4.dist-info}/LICENSE +0 -0
- {cdktf_cdktf_provider_upcloud-15.1.2.dist-info → cdktf_cdktf_provider_upcloud-15.1.4.dist-info}/WHEEL +0 -0
- {cdktf_cdktf_provider_upcloud-15.1.2.dist-info → cdktf_cdktf_provider_upcloud-15.1.4.dist-info}/top_level.txt +0 -0
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_cluster`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_cluster`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class KubernetesCluster(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.kubernetesCluster.KubernetesCluster",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -69,20 +69,20 @@ class KubernetesCluster(
|
|
|
69
69
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
70
70
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
71
71
|
) -> None:
|
|
72
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
72
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster upcloud_kubernetes_cluster} Resource.
|
|
73
73
|
|
|
74
74
|
:param scope: The scope in which to define this construct.
|
|
75
75
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
76
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
77
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
78
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
79
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
80
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
81
|
-
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
82
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
83
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
84
|
-
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
85
|
-
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
76
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
77
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
78
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
79
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
80
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
81
|
+
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
82
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
83
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
84
|
+
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
|
|
85
|
+
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
86
86
|
:param connection:
|
|
87
87
|
:param count:
|
|
88
88
|
:param depends_on:
|
|
@@ -130,7 +130,7 @@ class KubernetesCluster(
|
|
|
130
130
|
|
|
131
131
|
:param scope: The scope in which to define this construct.
|
|
132
132
|
:param import_to_id: The construct id used in the generated config for the KubernetesCluster to import.
|
|
133
|
-
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
133
|
+
:param import_from_id: The id of the existing KubernetesCluster that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#import import section} in the documentation of this resource for the id to use
|
|
134
134
|
:param provider: ? Optional instance of the provider where the KubernetesCluster to import is found.
|
|
135
135
|
'''
|
|
136
136
|
if __debug__:
|
|
@@ -433,16 +433,16 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
433
433
|
:param lifecycle:
|
|
434
434
|
:param provider:
|
|
435
435
|
:param provisioners:
|
|
436
|
-
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
437
|
-
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
438
|
-
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
439
|
-
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
440
|
-
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
441
|
-
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
442
|
-
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
443
|
-
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
444
|
-
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
445
|
-
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
436
|
+
:param control_plane_ip_filter: IP addresses or IP ranges in CIDR format which are allowed to access the cluster control plane. To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
437
|
+
:param name: Cluster name. Needs to be unique within the account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
438
|
+
:param network: Network ID for the cluster to run in. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
439
|
+
:param zone: Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
440
|
+
:param labels: User defined key-value pairs to classify the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
441
|
+
:param plan: The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
442
|
+
:param private_node_groups: Enable private node groups. Private node groups requires a network that is routed through NAT gateway. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
443
|
+
:param storage_encryption: Set default storage encryption strategy for all nodes in the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
444
|
+
:param upgrade_strategy_type: The upgrade strategy to use when changing the cluster ``version``. If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
|
|
445
|
+
:param version: Kubernetes version ID, e.g. ``1.31``. You can list available version IDs with ``upctl kubernetes versions``. Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
446
446
|
'''
|
|
447
447
|
if isinstance(lifecycle, dict):
|
|
448
448
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -568,7 +568,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
568
568
|
|
|
569
569
|
To allow access from any source, use ``["0.0.0.0/0"]``. To deny access from all sources, use ``[]``. Values set here do not restrict access to node groups or exposed Kubernetes services.
|
|
570
570
|
|
|
571
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
571
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#control_plane_ip_filter KubernetesCluster#control_plane_ip_filter}
|
|
572
572
|
'''
|
|
573
573
|
result = self._values.get("control_plane_ip_filter")
|
|
574
574
|
assert result is not None, "Required property 'control_plane_ip_filter' is missing"
|
|
@@ -578,7 +578,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
578
578
|
def name(self) -> builtins.str:
|
|
579
579
|
'''Cluster name. Needs to be unique within the account.
|
|
580
580
|
|
|
581
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
581
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#name KubernetesCluster#name}
|
|
582
582
|
'''
|
|
583
583
|
result = self._values.get("name")
|
|
584
584
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -588,7 +588,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
588
588
|
def network(self) -> builtins.str:
|
|
589
589
|
'''Network ID for the cluster to run in.
|
|
590
590
|
|
|
591
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
591
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#network KubernetesCluster#network}
|
|
592
592
|
'''
|
|
593
593
|
result = self._values.get("network")
|
|
594
594
|
assert result is not None, "Required property 'network' is missing"
|
|
@@ -598,7 +598,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
598
598
|
def zone(self) -> builtins.str:
|
|
599
599
|
'''Zone in which the Kubernetes cluster will be hosted, e.g. ``de-fra1``. You can list available zones with ``upctl zone list``.
|
|
600
600
|
|
|
601
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
601
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#zone KubernetesCluster#zone}
|
|
602
602
|
'''
|
|
603
603
|
result = self._values.get("zone")
|
|
604
604
|
assert result is not None, "Required property 'zone' is missing"
|
|
@@ -608,7 +608,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
608
608
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
609
609
|
'''User defined key-value pairs to classify the cluster.
|
|
610
610
|
|
|
611
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
611
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#labels KubernetesCluster#labels}
|
|
612
612
|
'''
|
|
613
613
|
result = self._values.get("labels")
|
|
614
614
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -617,7 +617,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
617
617
|
def plan(self) -> typing.Optional[builtins.str]:
|
|
618
618
|
'''The pricing plan used for the cluster. You can list available plans with ``upctl kubernetes plans``.
|
|
619
619
|
|
|
620
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
620
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#plan KubernetesCluster#plan}
|
|
621
621
|
'''
|
|
622
622
|
result = self._values.get("plan")
|
|
623
623
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -628,7 +628,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
628
628
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
629
629
|
'''Enable private node groups. Private node groups requires a network that is routed through NAT gateway.
|
|
630
630
|
|
|
631
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
631
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#private_node_groups KubernetesCluster#private_node_groups}
|
|
632
632
|
'''
|
|
633
633
|
result = self._values.get("private_node_groups")
|
|
634
634
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -637,7 +637,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
637
637
|
def storage_encryption(self) -> typing.Optional[builtins.str]:
|
|
638
638
|
'''Set default storage encryption strategy for all nodes in the cluster.
|
|
639
639
|
|
|
640
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
640
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#storage_encryption KubernetesCluster#storage_encryption}
|
|
641
641
|
'''
|
|
642
642
|
result = self._values.get("storage_encryption")
|
|
643
643
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -648,7 +648,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
648
648
|
|
|
649
649
|
If not set, ``manual`` strategy will be used by default. When using ``manual`` strategy, you must replace the existing node-groups to update them.
|
|
650
650
|
|
|
651
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
651
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#upgrade_strategy_type KubernetesCluster#upgrade_strategy_type}
|
|
652
652
|
'''
|
|
653
653
|
result = self._values.get("upgrade_strategy_type")
|
|
654
654
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -659,7 +659,7 @@ class KubernetesClusterConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
659
659
|
|
|
660
660
|
Note that when changing the cluster version, ``upgrade_strategy`` will be taken into account.
|
|
661
661
|
|
|
662
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
662
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_cluster#version KubernetesCluster#version}
|
|
663
663
|
'''
|
|
664
664
|
result = self._values.get("version")
|
|
665
665
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
r'''
|
|
2
2
|
# `upcloud_kubernetes_node_group`
|
|
3
3
|
|
|
4
|
-
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
4
|
+
Refer to the Terraform Registry for docs: [`upcloud_kubernetes_node_group`](https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group).
|
|
5
5
|
'''
|
|
6
6
|
from pkgutil import extend_path
|
|
7
7
|
__path__ = extend_path(__path__, __name__)
|
|
@@ -44,7 +44,7 @@ class KubernetesNodeGroup(
|
|
|
44
44
|
metaclass=jsii.JSIIMeta,
|
|
45
45
|
jsii_type="@cdktf/provider-upcloud.kubernetesNodeGroup.KubernetesNodeGroup",
|
|
46
46
|
):
|
|
47
|
-
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
47
|
+
'''Represents a {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group}.'''
|
|
48
48
|
|
|
49
49
|
def __init__(
|
|
50
50
|
self,
|
|
@@ -71,22 +71,22 @@ class KubernetesNodeGroup(
|
|
|
71
71
|
provider: typing.Optional[_cdktf_9a9027ec.TerraformProvider] = None,
|
|
72
72
|
provisioners: typing.Optional[typing.Sequence[typing.Union[typing.Union[_cdktf_9a9027ec.FileProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.LocalExecProvisioner, typing.Dict[builtins.str, typing.Any]], typing.Union[_cdktf_9a9027ec.RemoteExecProvisioner, typing.Dict[builtins.str, typing.Any]]]]] = None,
|
|
73
73
|
) -> None:
|
|
74
|
-
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
74
|
+
'''Create a new {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group upcloud_kubernetes_node_group} Resource.
|
|
75
75
|
|
|
76
76
|
:param scope: The scope in which to define this construct.
|
|
77
77
|
:param id: The scoped construct ID. Must be unique amongst siblings in the same scope
|
|
78
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
79
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
80
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
81
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
82
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
83
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
84
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
85
|
-
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
86
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
87
|
-
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
88
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
89
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
78
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
79
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
80
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
81
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
82
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
83
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
84
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
85
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
86
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
87
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
88
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
89
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
90
90
|
:param connection:
|
|
91
91
|
:param count:
|
|
92
92
|
:param depends_on:
|
|
@@ -136,7 +136,7 @@ class KubernetesNodeGroup(
|
|
|
136
136
|
|
|
137
137
|
:param scope: The scope in which to define this construct.
|
|
138
138
|
:param import_to_id: The construct id used in the generated config for the KubernetesNodeGroup to import.
|
|
139
|
-
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
139
|
+
:param import_from_id: The id of the existing KubernetesNodeGroup that should be imported. Refer to the {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#import import section} in the documentation of this resource for the id to use
|
|
140
140
|
:param provider: ? Optional instance of the provider where the KubernetesNodeGroup to import is found.
|
|
141
141
|
'''
|
|
142
142
|
if __debug__:
|
|
@@ -497,18 +497,18 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
497
497
|
:param lifecycle:
|
|
498
498
|
:param provider:
|
|
499
499
|
:param provisioners:
|
|
500
|
-
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
501
|
-
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
502
|
-
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
503
|
-
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
504
|
-
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
505
|
-
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
506
|
-
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
507
|
-
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
508
|
-
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
509
|
-
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
510
|
-
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
511
|
-
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
500
|
+
:param cluster: UUID of the cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
501
|
+
:param name: The name of the node group. Needs to be unique within a cluster. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
502
|
+
:param node_count: Amount of nodes to provision in the node group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
503
|
+
:param plan: The server plan used for the node group. You can list available plans with ``upctl server plans``. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
504
|
+
:param anti_affinity: If set to true, nodes in this group will be placed on separate compute hosts. Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
505
|
+
:param custom_plan: custom_plan block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
506
|
+
:param kubelet_args: kubelet_args block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
507
|
+
:param labels: User defined key-value pairs to classify the node_group. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
508
|
+
:param ssh_keys: You can optionally select SSH keys to be added as authorized keys to the nodes in this node group. This allows you to connect to the nodes via SSH once they are running. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
509
|
+
:param storage_encryption: The storage encryption strategy to use for the nodes in this group. If not set, the cluster's storage encryption strategy will be used, if applicable. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
510
|
+
:param taint: taint block. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
511
|
+
:param utility_network_access: If set to false, nodes in this group will not have access to utility network. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
512
512
|
'''
|
|
513
513
|
if isinstance(lifecycle, dict):
|
|
514
514
|
lifecycle = _cdktf_9a9027ec.TerraformResourceLifecycle(**lifecycle)
|
|
@@ -638,7 +638,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
638
638
|
def cluster(self) -> builtins.str:
|
|
639
639
|
'''UUID of the cluster.
|
|
640
640
|
|
|
641
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
641
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#cluster KubernetesNodeGroup#cluster}
|
|
642
642
|
'''
|
|
643
643
|
result = self._values.get("cluster")
|
|
644
644
|
assert result is not None, "Required property 'cluster' is missing"
|
|
@@ -648,7 +648,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
648
648
|
def name(self) -> builtins.str:
|
|
649
649
|
'''The name of the node group. Needs to be unique within a cluster.
|
|
650
650
|
|
|
651
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
651
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#name KubernetesNodeGroup#name}
|
|
652
652
|
'''
|
|
653
653
|
result = self._values.get("name")
|
|
654
654
|
assert result is not None, "Required property 'name' is missing"
|
|
@@ -658,7 +658,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
658
658
|
def node_count(self) -> jsii.Number:
|
|
659
659
|
'''Amount of nodes to provision in the node group.
|
|
660
660
|
|
|
661
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
661
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#node_count KubernetesNodeGroup#node_count}
|
|
662
662
|
'''
|
|
663
663
|
result = self._values.get("node_count")
|
|
664
664
|
assert result is not None, "Required property 'node_count' is missing"
|
|
@@ -668,7 +668,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
668
668
|
def plan(self) -> builtins.str:
|
|
669
669
|
'''The server plan used for the node group. You can list available plans with ``upctl server plans``.
|
|
670
670
|
|
|
671
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
671
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#plan KubernetesNodeGroup#plan}
|
|
672
672
|
'''
|
|
673
673
|
result = self._values.get("plan")
|
|
674
674
|
assert result is not None, "Required property 'plan' is missing"
|
|
@@ -682,7 +682,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
682
682
|
|
|
683
683
|
Please note that anti-affinity policy is considered 'best effort' and enabling it does not fully guarantee that the nodes will end up on different hardware.
|
|
684
684
|
|
|
685
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
685
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#anti_affinity KubernetesNodeGroup#anti_affinity}
|
|
686
686
|
'''
|
|
687
687
|
result = self._values.get("anti_affinity")
|
|
688
688
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -693,7 +693,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
693
693
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]]:
|
|
694
694
|
'''custom_plan block.
|
|
695
695
|
|
|
696
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
696
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#custom_plan KubernetesNodeGroup#custom_plan}
|
|
697
697
|
'''
|
|
698
698
|
result = self._values.get("custom_plan")
|
|
699
699
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupCustomPlan"]]], result)
|
|
@@ -704,7 +704,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
704
704
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]]:
|
|
705
705
|
'''kubelet_args block.
|
|
706
706
|
|
|
707
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
707
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#kubelet_args KubernetesNodeGroup#kubelet_args}
|
|
708
708
|
'''
|
|
709
709
|
result = self._values.get("kubelet_args")
|
|
710
710
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupKubeletArgs"]]], result)
|
|
@@ -713,7 +713,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
713
713
|
def labels(self) -> typing.Optional[typing.Mapping[builtins.str, builtins.str]]:
|
|
714
714
|
'''User defined key-value pairs to classify the node_group.
|
|
715
715
|
|
|
716
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
716
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#labels KubernetesNodeGroup#labels}
|
|
717
717
|
'''
|
|
718
718
|
result = self._values.get("labels")
|
|
719
719
|
return typing.cast(typing.Optional[typing.Mapping[builtins.str, builtins.str]], result)
|
|
@@ -724,7 +724,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
724
724
|
|
|
725
725
|
This allows you to connect to the nodes via SSH once they are running.
|
|
726
726
|
|
|
727
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
727
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#ssh_keys KubernetesNodeGroup#ssh_keys}
|
|
728
728
|
'''
|
|
729
729
|
result = self._values.get("ssh_keys")
|
|
730
730
|
return typing.cast(typing.Optional[typing.List[builtins.str]], result)
|
|
@@ -735,7 +735,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
735
735
|
|
|
736
736
|
If not set, the cluster's storage encryption strategy will be used, if applicable.
|
|
737
737
|
|
|
738
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
738
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_encryption KubernetesNodeGroup#storage_encryption}
|
|
739
739
|
'''
|
|
740
740
|
result = self._values.get("storage_encryption")
|
|
741
741
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -746,7 +746,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
746
746
|
) -> typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]]:
|
|
747
747
|
'''taint block.
|
|
748
748
|
|
|
749
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
749
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#taint KubernetesNodeGroup#taint}
|
|
750
750
|
'''
|
|
751
751
|
result = self._values.get("taint")
|
|
752
752
|
return typing.cast(typing.Optional[typing.Union[_cdktf_9a9027ec.IResolvable, typing.List["KubernetesNodeGroupTaint"]]], result)
|
|
@@ -757,7 +757,7 @@ class KubernetesNodeGroupConfig(_cdktf_9a9027ec.TerraformMetaArguments):
|
|
|
757
757
|
) -> typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]]:
|
|
758
758
|
'''If set to false, nodes in this group will not have access to utility network.
|
|
759
759
|
|
|
760
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
760
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#utility_network_access KubernetesNodeGroup#utility_network_access}
|
|
761
761
|
'''
|
|
762
762
|
result = self._values.get("utility_network_access")
|
|
763
763
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _cdktf_9a9027ec.IResolvable]], result)
|
|
@@ -794,10 +794,10 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
794
794
|
storage_tier: typing.Optional[builtins.str] = None,
|
|
795
795
|
) -> None:
|
|
796
796
|
'''
|
|
797
|
-
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
798
|
-
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
799
|
-
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
800
|
-
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
797
|
+
:param cores: The number of CPU cores dedicated to individual node group nodes when using custom plan. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
798
|
+
:param memory: The amount of memory in megabytes to assign to individual node group node when using custom plan. Value needs to be divisible by 1024. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
799
|
+
:param storage_size: The size of the storage device in gigabytes. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
800
|
+
:param storage_tier: The storage tier to use. Defaults to maxiops. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
801
801
|
'''
|
|
802
802
|
if __debug__:
|
|
803
803
|
type_hints = typing.get_type_hints(_typecheckingstub__73a7225f6a5b39ce9f22f470a4b39f4020d9c2babc3a4001d90f5a255e45917c)
|
|
@@ -817,7 +817,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
817
817
|
def cores(self) -> jsii.Number:
|
|
818
818
|
'''The number of CPU cores dedicated to individual node group nodes when using custom plan.
|
|
819
819
|
|
|
820
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
820
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#cores KubernetesNodeGroup#cores}
|
|
821
821
|
'''
|
|
822
822
|
result = self._values.get("cores")
|
|
823
823
|
assert result is not None, "Required property 'cores' is missing"
|
|
@@ -829,7 +829,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
829
829
|
|
|
830
830
|
Value needs to be divisible by 1024.
|
|
831
831
|
|
|
832
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
832
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#memory KubernetesNodeGroup#memory}
|
|
833
833
|
'''
|
|
834
834
|
result = self._values.get("memory")
|
|
835
835
|
assert result is not None, "Required property 'memory' is missing"
|
|
@@ -839,7 +839,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
839
839
|
def storage_size(self) -> jsii.Number:
|
|
840
840
|
'''The size of the storage device in gigabytes.
|
|
841
841
|
|
|
842
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
842
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_size KubernetesNodeGroup#storage_size}
|
|
843
843
|
'''
|
|
844
844
|
result = self._values.get("storage_size")
|
|
845
845
|
assert result is not None, "Required property 'storage_size' is missing"
|
|
@@ -849,7 +849,7 @@ class KubernetesNodeGroupCustomPlan:
|
|
|
849
849
|
def storage_tier(self) -> typing.Optional[builtins.str]:
|
|
850
850
|
'''The storage tier to use. Defaults to maxiops.
|
|
851
851
|
|
|
852
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
852
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#storage_tier KubernetesNodeGroup#storage_tier}
|
|
853
853
|
'''
|
|
854
854
|
result = self._values.get("storage_tier")
|
|
855
855
|
return typing.cast(typing.Optional[builtins.str], result)
|
|
@@ -1080,8 +1080,8 @@ class KubernetesNodeGroupCustomPlanOutputReference(
|
|
|
1080
1080
|
class KubernetesNodeGroupKubeletArgs:
|
|
1081
1081
|
def __init__(self, *, key: builtins.str, value: builtins.str) -> None:
|
|
1082
1082
|
'''
|
|
1083
|
-
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1084
|
-
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1083
|
+
:param key: Kubelet argument key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1084
|
+
:param value: Kubelet argument value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1085
1085
|
'''
|
|
1086
1086
|
if __debug__:
|
|
1087
1087
|
type_hints = typing.get_type_hints(_typecheckingstub__842da686c29c5adfe37f8e21bb7186ee26ad8d4d70cd1e8579de468f13543803)
|
|
@@ -1096,7 +1096,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1096
1096
|
def key(self) -> builtins.str:
|
|
1097
1097
|
'''Kubelet argument key.
|
|
1098
1098
|
|
|
1099
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1099
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1100
1100
|
'''
|
|
1101
1101
|
result = self._values.get("key")
|
|
1102
1102
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1106,7 +1106,7 @@ class KubernetesNodeGroupKubeletArgs:
|
|
|
1106
1106
|
def value(self) -> builtins.str:
|
|
1107
1107
|
'''Kubelet argument value.
|
|
1108
1108
|
|
|
1109
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1109
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1110
1110
|
'''
|
|
1111
1111
|
result = self._values.get("value")
|
|
1112
1112
|
assert result is not None, "Required property 'value' is missing"
|
|
@@ -1309,9 +1309,9 @@ class KubernetesNodeGroupTaint:
|
|
|
1309
1309
|
value: builtins.str,
|
|
1310
1310
|
) -> None:
|
|
1311
1311
|
'''
|
|
1312
|
-
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1313
|
-
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1314
|
-
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1312
|
+
:param effect: Taint effect. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1313
|
+
:param key: Taint key. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1314
|
+
:param value: Taint value. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1315
1315
|
'''
|
|
1316
1316
|
if __debug__:
|
|
1317
1317
|
type_hints = typing.get_type_hints(_typecheckingstub__ea59ebf2232eca6d3573e469ce94ebcc61818a93352ae4370837428874ad8b8e)
|
|
@@ -1328,7 +1328,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1328
1328
|
def effect(self) -> builtins.str:
|
|
1329
1329
|
'''Taint effect.
|
|
1330
1330
|
|
|
1331
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1331
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#effect KubernetesNodeGroup#effect}
|
|
1332
1332
|
'''
|
|
1333
1333
|
result = self._values.get("effect")
|
|
1334
1334
|
assert result is not None, "Required property 'effect' is missing"
|
|
@@ -1338,7 +1338,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1338
1338
|
def key(self) -> builtins.str:
|
|
1339
1339
|
'''Taint key.
|
|
1340
1340
|
|
|
1341
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1341
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#key KubernetesNodeGroup#key}
|
|
1342
1342
|
'''
|
|
1343
1343
|
result = self._values.get("key")
|
|
1344
1344
|
assert result is not None, "Required property 'key' is missing"
|
|
@@ -1348,7 +1348,7 @@ class KubernetesNodeGroupTaint:
|
|
|
1348
1348
|
def value(self) -> builtins.str:
|
|
1349
1349
|
'''Taint value.
|
|
1350
1350
|
|
|
1351
|
-
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.
|
|
1351
|
+
Docs at Terraform Registry: {@link https://registry.terraform.io/providers/upcloudltd/upcloud/5.23.4/docs/resources/kubernetes_node_group#value KubernetesNodeGroup#value}
|
|
1352
1352
|
'''
|
|
1353
1353
|
result = self._values.get("value")
|
|
1354
1354
|
assert result is not None, "Required property 'value' is missing"
|