@@ -40,7 +40,7 @@ type GkeprivateConfig struct {
40
40
// (Beta) Configure the Cloud Run load balancer type.
41
41
//
42
42
// External by default. Set to `LOAD_BALANCER_TYPE_INTERNAL` to configure as an internal load balancer.
43
- CloudrunLoadBalancerType interface {} `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"`
43
+ CloudrunLoadBalancerType * string `field:"optional" json:"cloudrunLoadBalancerType" yaml:"cloudrunLoadBalancerType"`
44
44
// Cluster autoscaling configuration.
45
45
//
46
46
// See [more details](https://cloud.google.com/kubernetes-engine/docs/reference/rest/v1beta1/projects.locations.clusters#clusterautoscaling)
@@ -134,7 +134,7 @@ type GkeprivateConfig struct {
134
134
EnableNetworkEgressExport * bool `field:"optional" json:"enableNetworkEgressExport" yaml:"enableNetworkEgressExport"`
135
135
// enabled - Enable the PodSecurityPolicy controller for this cluster.
136
136
//
137
- // If enabled, pods must be valid under a PodSecurityPolicy to be created.
137
+ // If enabled, pods must be valid under a PodSecurityPolicy to be created. Pod Security Policy was removed from GKE clusters with version >= 1.25.0.
138
138
EnablePodSecurityPolicy * bool `field:"optional" json:"enablePodSecurityPolicy" yaml:"enablePodSecurityPolicy"`
139
139
// (Beta) Whether the master's internal IP address is used as the cluster endpoint.
140
140
EnablePrivateEndpoint * bool `field:"optional" json:"enablePrivateEndpoint" yaml:"enablePrivateEndpoint"`
@@ -168,9 +168,15 @@ type GkeprivateConfig struct {
168
168
// Default: 1000.
169
169
//
170
170
FirewallPriority * float64 `field:"optional" json:"firewallPriority" yaml:"firewallPriority"`
171
- // (Beta) Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver.
171
+ // The gateway api channel of this cluster.
172
+ //
173
+ // Accepted values are `CHANNEL_STANDARD` and `CHANNEL_DISABLED`.
174
+ GatewayApiChannel * string `field:"optional" json:"gatewayApiChannel" yaml:"gatewayApiChannel"`
175
+ // Whether this cluster should enable the Google Compute Engine Persistent Disk Container Storage Interface (CSI) Driver.
176
+ // Default: true.
177
+ //
172
178
GcePdCsiDriver * bool `field:"optional" json:"gcePdCsiDriver" yaml:"gcePdCsiDriver"`
173
- // (Beta) Whether Backup for GKE agent is enabled for this cluster.
179
+ // Whether Backup for GKE agent is enabled for this cluster.
174
180
GkeBackupAgentConfig * bool `field:"optional" json:"gkeBackupAgentConfig" yaml:"gkeBackupAgentConfig"`
175
181
// Grants created cluster-specific service account storage.objectViewer and artifactregistry.reader roles.
176
182
GrantRegistryAccess * bool `field:"optional" json:"grantRegistryAccess" yaml:"grantRegistryAccess"`
@@ -250,7 +256,7 @@ type GkeprivateConfig struct {
250
256
MasterIpv4CidrBlock * string `field:"optional" json:"masterIpv4CidrBlock" yaml:"masterIpv4CidrBlock"`
251
257
// List of services to monitor: SYSTEM_COMPONENTS, WORKLOADS (provider version >= 3.89.0). Empty list is default GKE configuration.
252
258
MonitoringEnabledComponents * []* string `field:"optional" json:"monitoringEnabledComponents" yaml:"monitoringEnabledComponents"`
253
- // (Beta) Configuration for Managed Service for Prometheus.
259
+ // Configuration for Managed Service for Prometheus.
254
260
//
255
261
// Whether or not the managed collection is enabled.
256
262
MonitoringEnableManagedPrometheus * bool `field:"optional" json:"monitoringEnableManagedPrometheus" yaml:"monitoringEnableManagedPrometheus"`
@@ -297,6 +303,11 @@ type GkeprivateConfig struct {
297
303
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
298
304
//
299
305
NodePoolsOauthScopes * map [string ]* []* string `field:"optional" json:"nodePoolsOauthScopes" yaml:"nodePoolsOauthScopes"`
306
+ // Map of maps containing resource labels by node-pool name.
307
+ // Default: [object Object]
308
+ // The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
309
+ //
310
+ NodePoolsResourceLabels * map [string ]* map [string ]* string `field:"optional" json:"nodePoolsResourceLabels" yaml:"nodePoolsResourceLabels"`
300
311
// Map of lists containing node network tags by node-pool name.
301
312
// Default: [object Object]
302
313
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
@@ -329,7 +340,9 @@ type GkeprivateConfig struct {
329
340
RegistryProjectIds * []* string `field:"optional" json:"registryProjectIds" yaml:"registryProjectIds"`
330
341
// The release channel of this cluster.
331
342
//
332
- // Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `UNSPECIFIED`.
343
+ // Accepted values are `UNSPECIFIED`, `RAPID`, `REGULAR` and `STABLE`. Defaults to `REGULAR`.
344
+ // Default: REGULAR.
345
+ //
333
346
ReleaseChannel * string `field:"optional" json:"releaseChannel" yaml:"releaseChannel"`
334
347
// Remove default node pool while setting up the cluster.
335
348
RemoveDefaultNodePool * bool `field:"optional" json:"removeDefaultNodePool" yaml:"removeDefaultNodePool"`
@@ -339,20 +352,26 @@ type GkeprivateConfig struct {
339
352
SandboxEnabled * bool `field:"optional" json:"sandboxEnabled" yaml:"sandboxEnabled"`
340
353
// The service account to run nodes as if not overridden in `node_pools`.
341
354
//
342
- // The create_service_account variable default value (true) will cause a cluster-specific service account to be created.
355
+ // The create_service_account variable default value (true) will cause a cluster-specific service account to be created. This service account should already exists and it will be used by the node pools. If you wish to only override the service account name, you can use service_account_name variable.
343
356
ServiceAccount * string `field:"optional" json:"serviceAccount" yaml:"serviceAccount"`
357
+ // The name of the service account that will be created if create_service_account is true.
358
+ //
359
+ // If you wish to use an existing service account, use service_account variable.
360
+ ServiceAccountName * string `field:"optional" json:"serviceAccountName" yaml:"serviceAccountName"`
344
361
// Whether external ips specified by a service will be allowed in this cluster.
345
362
ServiceExternalIps * bool `field:"optional" json:"serviceExternalIps" yaml:"serviceExternalIps"`
363
+ // The log_config for shadow firewall rules.
364
+ //
365
+ // You can set this variable to `null` to disable logging.
366
+ // Default: [object Object].
367
+ //
368
+ ShadowFirewallRulesLogConfig interface {} `field:"optional" json:"shadowFirewallRulesLogConfig" yaml:"shadowFirewallRulesLogConfig"`
346
369
// The firewall priority of GKE shadow firewall rules.
347
370
//
348
371
// The priority should be less than default firewall, which is 1000.
349
372
// Default: 999.
350
373
//
351
374
ShadowFirewallRulesPriority * float64 `field:"optional" json:"shadowFirewallRulesPriority" yaml:"shadowFirewallRulesPriority"`
352
- // Flag to skip all local-exec provisioners.
353
- //
354
- // It breaks `stub_domains` and `upstream_nameservers` variables functionality.
355
- SkipProvisioners * bool `field:"optional" json:"skipProvisioners" yaml:"skipProvisioners"`
356
375
// Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server.
357
376
// Default: [object Object]
358
377
// The property type contains a map, they have special handling, please see {@link cdk.tf /module-map-inputs the docs}
0 commit comments