You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
stale-issue-message: 'This issue is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 7 days'
32
37
stale-pr-message: 'This PR is stale because it has been open 60 days with no activity. Remove stale label or comment or this will be closed in 7 days'
* making location field as required for standard cluster ([#2495](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2495))
15
+
***gke-node-pool:** module to allow List configurations for fields ([#2496](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2496))
16
+
* support enabling default compute class in cluster autoscaler ([#2442](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2442))
17
+
18
+
### Features
19
+
20
+
* add auto_monitoring_config in GKE managed_prometheus ([#2420](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2420)) ([04c88e6](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/04c88e647f676f23530d6cbc43e38840592aa6d1))
* add support for transparent huge pages configs ([#2464](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2464)) ([8297521](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/8297521f91715f262919a85d9c51d1a13af1d1d9))
23
+
* support enabling default compute class in cluster autoscaler ([#2442](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2442)) ([3569f13](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/3569f13ca21a2c2b4981cd708350962050ae330c))
***gke-node-pool:** module to allow List configurations for fields ([#2496](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2496)) ([dc798c1](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/dc798c1dd7af055f1223915c949ac55cc23f89a4))
30
+
* making location field as required for standard cluster ([#2495](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/issues/2495)) ([5f7d53c](https://github.com/terraform-google-modules/terraform-google-kubernetes-engine/commit/5f7d53cd77dd593508856fd84472b7071bd7b779))
Copy file name to clipboardExpand all lines: README.md
+5-2Lines changed: 5 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -149,7 +149,7 @@ Then perform the following commands on the root folder:
149
149
| anonymous\_authentication\_config\_mode | Allows users to restrict or enable anonymous access to the cluster. Valid values are `ENABLED` and `LIMITED`. |`string`|`null`| no |
150
150
| authenticator\_security\_group | The name of the RBAC security group for use with Google security groups in Kubernetes RBAC. Group name must be in format gke-security-groups@yourdomain.com|`string`|`null`| no |
151
151
| boot\_disk\_kms\_key | The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool, if not overridden in `node_pools`. This should be of the form projects/[KEY\_PROJECT\_ID]/locations/[LOCATION]/keyRings/[RING\_NAME]/cryptoKeys/[KEY\_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption|`string`|`null`| no |
| cluster\_dns\_domain | The suffix used for all cluster service records. |`string`|`""`| no |
154
154
| cluster\_dns\_provider | Which in-cluster DNS provider should be used. PROVIDER\_UNSPECIFIED (default) or PLATFORM\_DEFAULT or CLOUD\_DNS. |`string`|`"PROVIDER_UNSPECIFIED"`| no |
155
155
| cluster\_dns\_scope | The scope of access to cluster DNS records. DNS\_SCOPE\_UNSPECIFIED (default) or CLUSTER\_SCOPE or VPC\_SCOPE. |`string`|`"DNS_SCOPE_UNSPECIFIED"`| no |
@@ -160,7 +160,6 @@ Then perform the following commands on the root folder:
160
160
| create\_service\_account | Defines if service account specified to run nodes should be created. |`bool`|`true`| no |
161
161
| database\_encryption | Application-layer Secrets Encryption settings. The object format is {state = string, key\_name = string}. Valid values of state are: "ENCRYPTED"; "DECRYPTED". key\_name is the name of a CloudKMS key. |`list(object({ state = string, key_name = string }))`| <pre>[<br> {<br> "key_name": "",<br> "state": "DECRYPTED"<br> }<br>]</pre> | no |
162
162
| datapath\_provider | The desired datapath provider for this cluster. By default, `DATAPATH_PROVIDER_UNSPECIFIED` enables the IPTables-based kube-proxy implementation. `ADVANCED_DATAPATH` enables Dataplane-V2 feature. |`string`|`"DATAPATH_PROVIDER_UNSPECIFIED"`| no |
163
-
| default\_compute\_class\_enabled | Enable Spot VMs as the default compute class for Node Auto-Provisioning |`bool`|`null`| no |
164
163
| default\_max\_pods\_per\_node | The maximum number of pods to schedule per node |`number`|`110`| no |
165
164
| deletion\_protection | Whether or not to allow Terraform to destroy the cluster. |`bool`|`true`| no |
166
165
| description | The description of the cluster |`string`|`""`| no |
@@ -225,6 +224,7 @@ Then perform the following commands on the root folder:
225
224
| maintenance\_recurrence | Frequency of the recurring maintenance window in RFC5545 format. |`string`|`""`| no |
226
225
| maintenance\_start\_time | Time window specified for daily or recurring maintenance operations in RFC3339 format |`string`|`"05:00"`| no |
227
226
| master\_authorized\_networks | List of master authorized networks. If none are provided, disallow external access (except the cluster node IPs, which GKE automatically whitelists). |`list(object({ cidr_block = string, display_name = string }))`|`[]`| no |
227
+
| monitoring\_auto\_monitoring\_config\_scope | Whether or not to enable GKE Auto-Monitoring. Supported values include: ALL, NONE |`string`|`"NONE"`| no |
228
228
| monitoring\_enable\_managed\_prometheus | Configuration for Managed Service for Prometheus. Whether or not the managed collection is enabled. |`bool`|`null`| no |
229
229
| monitoring\_enable\_observability\_metrics | Whether or not the advanced datapath metrics are enabled. |`bool`|`false`| no |
230
230
| monitoring\_enable\_observability\_relay | Whether or not the advanced datapath relay is enabled. |`bool`|`false`| no |
@@ -237,6 +237,7 @@ Then perform the following commands on the root folder:
237
237
| network\_policy\_provider | The network policy provider. |`string`|`"CALICO"`| no |
238
238
| network\_project\_id | The project ID of the shared VPC's host (for shared vpc support) |`string`|`""`| no |
239
239
| network\_tags | (Optional) - List of network tags applied to autopilot and auto-provisioned node pools. |`list(string)`|`[]`| no |
240
+
| network\_tier\_config | Network tier configuration for the cluster |`string`|`null`| no |
240
241
| node\_metadata | Specifies how node metadata is exposed to the workload running on the node |`string`|`"GKE_METADATA"`| no |
241
242
| node\_pools | List of maps containing node pools |`list(map(any))`| <pre>[<br> {<br> "name": "default-node-pool"<br> }<br>]</pre> | no |
242
243
| node\_pools\_cgroup\_mode | Map of strings containing cgroup node config by node-pool name |`map(string)`| <pre>{<br> "all": "",<br> "default-node-pool": ""<br>}</pre> | no |
@@ -250,6 +251,8 @@ Then perform the following commands on the root folder:
250
251
| node\_pools\_resource\_manager\_tags | Map of maps containing resource manager tags by node-pool name |`map(map(string))`| <pre>{<br> "all": {},<br> "default-node-pool": {}<br>}</pre> | no |
251
252
| node\_pools\_tags | Map of lists containing node network tags by node-pool name |`map(list(string))`| <pre>{<br> "all": [],<br> "default-node-pool": []<br>}</pre> | no |
252
253
| node\_pools\_taints | Map of lists containing node taints by node-pool name |`map(list(object({ key = string, value = string, effect = string })))`| <pre>{<br> "all": [],<br> "default-node-pool": []<br>}</pre> | no |
254
+
| node\_pools\_transparent\_hugepage\_defrag | Map of strings containing transparent hugepage defrag node config by node-pool name |`map(string)`| <pre>{<br> "all": "",<br> "default-node-pool": ""<br>}</pre> | no |
255
+
| node\_pools\_transparent\_hugepage\_enabled | Map of strings containing transparent hugepage enabled node config by node-pool name |`map(string)`| <pre>{<br> "all": "",<br> "default-node-pool": ""<br>}</pre> | no |
253
256
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. |`list(string)`| <pre>[<br> "10.0.0.0/8",<br> "172.16.0.0/12",<br> "192.168.0.0/16"<br>]</pre> | no |
254
257
| notification\_config\_topic | The desired Pub/Sub topic to which notifications will be sent by GKE. Format is projects/{project}/topics/{topic}. |`string`|`""`| no |
255
258
| notification\_filter\_event\_type | Choose what type of notifications you want to receive. If no filters are applied, you'll receive all notification types. Can be used to filter what notifications are sent. Accepted values are UPGRADE\_AVAILABLE\_EVENT, UPGRADE\_EVENT, and SECURITY\_BULLETIN\_EVENT. |`list(string)`|`[]`| no |
0 commit comments