You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
container: fixed a bug where `cluster_autoscaling.auto_provisioning_defaults.service_account` can not be set when `enable_autopilot = true` for `google_container_cluster`
// This field is Optional + Computed because we automatically set the
328
335
// enabled value to false if the block is not returned in API responses.
329
-
Optional: true,
330
-
Computed: true,
331
-
Description: `Per-cluster configuration of Node Auto-Provisioning with Cluster Autoscaler to automatically adjust the size of the cluster and create/delete node pools based on the current needs of the cluster's workload. See the guide to using Node Auto-Provisioning for more details.`,
332
-
ConflictsWith: []string{"enable_autopilot"},
336
+
Optional: true,
337
+
Computed: true,
338
+
Description: `Per-cluster configuration of Node Auto-Provisioning with Cluster Autoscaler to automatically adjust the size of the cluster and create/delete node pools based on the current needs of the cluster's workload. See the guide to using Node Auto-Provisioning for more details.`,
333
339
Elem: &schema.Resource{
334
340
Schema: map[string]*schema.Schema{
335
341
"enabled": {
336
-
Type: schema.TypeBool,
337
-
Required: true,
338
-
Description: `Whether node auto-provisioning is enabled. Resource limits for cpu and memory must be defined to enable node auto-provisioning.`,
342
+
Type: schema.TypeBool,
343
+
Optional: true,
344
+
Computed: true,
345
+
ConflictsWith: []string{"enable_autopilot"},
346
+
Description: `Whether node auto-provisioning is enabled. Resource limits for cpu and memory must be defined to enable node auto-provisioning.`,
339
347
},
340
348
"resource_limits": {
341
-
Type: schema.TypeList,
342
-
Optional: true,
343
-
Description: `Global constraints for machine resources in the cluster. Configuring the cpu and memory types is required if node auto-provisioning is enabled. These limits will apply to node pool autoscaling in addition to node auto-provisioning.`,
349
+
Type: schema.TypeList,
350
+
Optional: true,
351
+
ConflictsWith: []string{"enable_autopilot"},
352
+
DiffSuppressFunc: suppressDiffForAutopilot,
353
+
Description: `Global constraints for machine resources in the cluster. Configuring the cpu and memory types is required if node auto-provisioning is enabled. These limits will apply to node pool autoscaling in addition to node auto-provisioning.`,
@@ -503,11 +504,11 @@ Minimum CPU platform to be used for NAP created node pools. The instance may be
503
504
specified or newer CPU platform. Applicable values are the friendly names of CPU platforms, such
504
505
as "Intel Haswell" or "Intel Sandy Bridge".
505
506
506
-
*`oauth_scopes` - (Optional) Scopes that are used by NAP when creating node pools. Use the "https://www.googleapis.com/auth/cloud-platform" scope to grant access to all APIs. It is recommended that you set `service_account` to a non-default service account and grant IAM roles to that service account for only the resources that it needs.
507
+
*`oauth_scopes` - (Optional) Scopes that are used by NAP and GKE Autopilot when creating node pools. Use the "https://www.googleapis.com/auth/cloud-platform" scope to grant access to all APIs. It is recommended that you set `service_account` to a non-default service account and grant IAM roles to that service account for only the resources that it needs.
507
508
508
509
-> `monitoring.write` is always enabled regardless of user input. `monitoring` and `logging.write` may also be enabled depending on the values for `monitoring_service` and `logging_service`.
509
510
510
-
*`service_account` - (Optional) The Google Cloud Platform Service Account to be used by the node VMs.
511
+
*`service_account` - (Optional) The Google Cloud Platform Service Account to be used by the node VMs created by GKE Autopilot or NAP.
511
512
512
513
*`boot_disk_kms_key` - (Optional) The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
0 commit comments