File tree 27 files changed +57
-10
lines changed
beta-autopilot-private-cluster
beta-autopilot-public-cluster
beta-private-cluster-update-variant
beta-public-cluster-update-variant
private-cluster-update-variant
27 files changed +57
-10
lines changed Original file line number Diff line number Diff line change @@ -155,6 +155,7 @@ Then perform the following commands on the root folder:
155
155
| disable\_ legacy\_ metadata\_ endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | ` bool ` | ` true ` | no |
156
156
| dns\_ cache | The status of the NodeLocal DNSCache addon. | ` bool ` | ` false ` | no |
157
157
| enable\_ binary\_ authorization | Enable BinAuthZ Admission controller | ` bool ` | ` false ` | no |
158
+ | enable\_ confidential\_ nodes | An optional flag to enable confidential node config. | ` bool ` | ` false ` | no |
158
159
| enable\_ cost\_ allocation | Enables Cost Allocation Feature and the cluster name and namespace of your GKE workloads appear in the labels field of the billing export to BigQuery | ` bool ` | ` false ` | no |
159
160
| enable\_ kubernetes\_ alpha | Whether to enable Kubernetes Alpha features for this cluster. Note that when this option is enabled, the cluster cannot be upgraded and will be automatically deleted after 30 days. | ` bool ` | ` false ` | no |
160
161
| enable\_ mesh\_ certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. | ` bool ` | ` false ` | no |
Original file line number Diff line number Diff line change @@ -70,14 +70,13 @@ resource "google_container_cluster" "primary" {
70
70
enabled = var.enable_cost_allocation
71
71
}
72
72
}
73
- {% if beta_cluster %}
73
+
74
74
dynamic "confidential_nodes" {
75
75
for_each = local.confidential_node_config
76
76
content {
77
77
enabled = confidential_nodes.value.enabled
78
78
}
79
79
}
80
- {% endif %}
81
80
82
81
subnetwork = "projects/${local.network_project_id}/regions/${local.region}/subnetworks/${var.subnetwork}"
83
82
Original file line number Diff line number Diff line change @@ -219,6 +219,7 @@ locals {
219
219
cluster_workload_identity_config = ! local.workload_identity_enabled ? [] : var.identity_namespace == "enabled" ? [{
220
220
workload_pool = "${var.project_id}.svc.id.goog" }] : [{ workload_pool = var.identity_namespace
221
221
}]
222
+ confidential_node_config = var.enable_confidential_nodes == true ? [{ enabled = true }] : []
222
223
{% if autopilot_cluster != true %}
223
224
cluster_mesh_certificates_config = local.workload_identity_enabled ? [{
224
225
enable_certificates = var.enable_mesh_certificates
@@ -234,7 +235,6 @@ locals {
234
235
{% endif %}
235
236
cluster_pod_security_policy_enabled = local.cluster_output_pod_security_policy_enabled
236
237
cluster_intranode_visibility_enabled = local.cluster_output_intranode_visbility_enabled
237
- confidential_node_config = var.enable_confidential_nodes == true ? [{ enabled = true }] : []
238
238
239
239
# /BETA features
240
240
{% endif %}
Original file line number Diff line number Diff line change @@ -544,12 +544,12 @@ variable "shadow_firewall_rules_log_config" {
544
544
}
545
545
}
546
546
547
- {% if beta_cluster %}
548
547
variable "enable_confidential_nodes" {
549
548
type = bool
550
549
description = "An optional flag to enable confidential node config."
551
550
default = false
552
551
}
552
+ {% if beta_cluster %}
553
553
554
554
variable "workload_vulnerability_mode" {
555
555
description = "(beta) Vulnerability mode."
Original file line number Diff line number Diff line change @@ -65,6 +65,13 @@ resource "google_container_cluster" "primary" {
65
65
}
66
66
}
67
67
68
+ dynamic "confidential_nodes" {
69
+ for_each = local. confidential_node_config
70
+ content {
71
+ enabled = confidential_nodes. value . enabled
72
+ }
73
+ }
74
+
68
75
subnetwork = " projects/${ local . network_project_id } /regions/${ local . region } /subnetworks/${ var . subnetwork } "
69
76
70
77
default_snat_status {
Original file line number Diff line number Diff line change @@ -162,6 +162,7 @@ locals {
162
162
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
163
163
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
164
164
}]
165
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
165
166
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
166
167
enable_certificates = var.enable_mesh_certificates
167
168
}] : []
Original file line number Diff line number Diff line change @@ -56,6 +56,7 @@ resource "google_container_cluster" "primary" {
56
56
enabled = var. enable_cost_allocation
57
57
}
58
58
}
59
+
59
60
dynamic "confidential_nodes" {
60
61
for_each = local. confidential_node_config
61
62
content {
Original file line number Diff line number Diff line change @@ -121,13 +121,13 @@ locals {
121
121
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
122
122
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
123
123
}]
124
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
124
125
125
126
# BETA features
126
127
cluster_istio_enabled = ! local. cluster_output_istio_disabled
127
128
cluster_dns_cache_enabled = var. dns_cache
128
129
cluster_pod_security_policy_enabled = local. cluster_output_pod_security_policy_enabled
129
130
cluster_intranode_visibility_enabled = local. cluster_output_intranode_visbility_enabled
130
- confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
131
131
132
132
# /BETA features
133
133
Original file line number Diff line number Diff line change @@ -56,6 +56,7 @@ resource "google_container_cluster" "primary" {
56
56
enabled = var. enable_cost_allocation
57
57
}
58
58
}
59
+
59
60
dynamic "confidential_nodes" {
60
61
for_each = local. confidential_node_config
61
62
content {
Original file line number Diff line number Diff line change @@ -120,13 +120,13 @@ locals {
120
120
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
121
121
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
122
122
}]
123
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
123
124
124
125
# BETA features
125
126
cluster_istio_enabled = ! local. cluster_output_istio_disabled
126
127
cluster_dns_cache_enabled = var. dns_cache
127
128
cluster_pod_security_policy_enabled = local. cluster_output_pod_security_policy_enabled
128
129
cluster_intranode_visibility_enabled = local. cluster_output_intranode_visbility_enabled
129
- confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
130
130
131
131
# /BETA features
132
132
Original file line number Diff line number Diff line change @@ -64,6 +64,7 @@ resource "google_container_cluster" "primary" {
64
64
enabled = var. enable_cost_allocation
65
65
}
66
66
}
67
+
67
68
dynamic "confidential_nodes" {
68
69
for_each = local. confidential_node_config
69
70
content {
Original file line number Diff line number Diff line change @@ -181,6 +181,7 @@ locals {
181
181
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
182
182
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
183
183
}]
184
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
184
185
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
185
186
enable_certificates = var.enable_mesh_certificates
186
187
}] : []
@@ -191,7 +192,6 @@ locals {
191
192
cluster_telemetry_type_is_set = var. cluster_telemetry_type != null
192
193
cluster_pod_security_policy_enabled = local. cluster_output_pod_security_policy_enabled
193
194
cluster_intranode_visibility_enabled = local. cluster_output_intranode_visbility_enabled
194
- confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
195
195
196
196
# /BETA features
197
197
Original file line number Diff line number Diff line change @@ -64,6 +64,7 @@ resource "google_container_cluster" "primary" {
64
64
enabled = var. enable_cost_allocation
65
65
}
66
66
}
67
+
67
68
dynamic "confidential_nodes" {
68
69
for_each = local. confidential_node_config
69
70
content {
Original file line number Diff line number Diff line change @@ -181,6 +181,7 @@ locals {
181
181
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
182
182
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
183
183
}]
184
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
184
185
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
185
186
enable_certificates = var.enable_mesh_certificates
186
187
}] : []
@@ -191,7 +192,6 @@ locals {
191
192
cluster_telemetry_type_is_set = var. cluster_telemetry_type != null
192
193
cluster_pod_security_policy_enabled = local. cluster_output_pod_security_policy_enabled
193
194
cluster_intranode_visibility_enabled = local. cluster_output_intranode_visbility_enabled
194
- confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
195
195
196
196
# /BETA features
197
197
Original file line number Diff line number Diff line change @@ -64,6 +64,7 @@ resource "google_container_cluster" "primary" {
64
64
enabled = var. enable_cost_allocation
65
65
}
66
66
}
67
+
67
68
dynamic "confidential_nodes" {
68
69
for_each = local. confidential_node_config
69
70
content {
Original file line number Diff line number Diff line change @@ -180,6 +180,7 @@ locals {
180
180
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
181
181
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
182
182
}]
183
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
183
184
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
184
185
enable_certificates = var.enable_mesh_certificates
185
186
}] : []
@@ -190,7 +191,6 @@ locals {
190
191
cluster_telemetry_type_is_set = var. cluster_telemetry_type != null
191
192
cluster_pod_security_policy_enabled = local. cluster_output_pod_security_policy_enabled
192
193
cluster_intranode_visibility_enabled = local. cluster_output_intranode_visbility_enabled
193
- confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
194
194
195
195
# /BETA features
196
196
Original file line number Diff line number Diff line change @@ -64,6 +64,7 @@ resource "google_container_cluster" "primary" {
64
64
enabled = var. enable_cost_allocation
65
65
}
66
66
}
67
+
67
68
dynamic "confidential_nodes" {
68
69
for_each = local. confidential_node_config
69
70
content {
Original file line number Diff line number Diff line change @@ -180,6 +180,7 @@ locals {
180
180
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
181
181
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
182
182
}]
183
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
183
184
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
184
185
enable_certificates = var.enable_mesh_certificates
185
186
}] : []
@@ -190,7 +191,6 @@ locals {
190
191
cluster_telemetry_type_is_set = var. cluster_telemetry_type != null
191
192
cluster_pod_security_policy_enabled = local. cluster_output_pod_security_policy_enabled
192
193
cluster_intranode_visibility_enabled = local. cluster_output_intranode_visbility_enabled
193
- confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
194
194
195
195
# /BETA features
196
196
Original file line number Diff line number Diff line change @@ -184,6 +184,7 @@ Then perform the following commands on the root folder:
184
184
| disable\_ legacy\_ metadata\_ endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | ` bool ` | ` true ` | no |
185
185
| dns\_ cache | The status of the NodeLocal DNSCache addon. | ` bool ` | ` false ` | no |
186
186
| enable\_ binary\_ authorization | Enable BinAuthZ Admission controller | ` bool ` | ` false ` | no |
187
+ | enable\_ confidential\_ nodes | An optional flag to enable confidential node config. | ` bool ` | ` false ` | no |
187
188
| enable\_ cost\_ allocation | Enables Cost Allocation Feature and the cluster name and namespace of your GKE workloads appear in the labels field of the billing export to BigQuery | ` bool ` | ` false ` | no |
188
189
| enable\_ kubernetes\_ alpha | Whether to enable Kubernetes Alpha features for this cluster. Note that when this option is enabled, the cluster cannot be upgraded and will be automatically deleted after 30 days. | ` bool ` | ` false ` | no |
189
190
| enable\_ mesh\_ certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. | ` bool ` | ` false ` | no |
Original file line number Diff line number Diff line change @@ -65,6 +65,13 @@ resource "google_container_cluster" "primary" {
65
65
}
66
66
}
67
67
68
+ dynamic "confidential_nodes" {
69
+ for_each = local. confidential_node_config
70
+ content {
71
+ enabled = confidential_nodes. value . enabled
72
+ }
73
+ }
74
+
68
75
subnetwork = " projects/${ local . network_project_id } /regions/${ local . region } /subnetworks/${ var . subnetwork } "
69
76
70
77
default_snat_status {
Original file line number Diff line number Diff line change @@ -163,6 +163,7 @@ locals {
163
163
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
164
164
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
165
165
}]
166
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
166
167
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
167
168
enable_certificates = var.enable_mesh_certificates
168
169
}] : []
Original file line number Diff line number Diff line change @@ -513,6 +513,11 @@ variable "shadow_firewall_rules_log_config" {
513
513
}
514
514
}
515
515
516
+ variable "enable_confidential_nodes" {
517
+ type = bool
518
+ description = " An optional flag to enable confidential node config."
519
+ default = false
520
+ }
516
521
517
522
variable "security_posture_mode" {
518
523
description = " Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`."
Original file line number Diff line number Diff line change @@ -162,6 +162,7 @@ Then perform the following commands on the root folder:
162
162
| disable\_ legacy\_ metadata\_ endpoints | Disable the /0.1/ and /v1beta1/ metadata server endpoints on the node. Changing this value will cause all node pools to be recreated. | ` bool ` | ` true ` | no |
163
163
| dns\_ cache | The status of the NodeLocal DNSCache addon. | ` bool ` | ` false ` | no |
164
164
| enable\_ binary\_ authorization | Enable BinAuthZ Admission controller | ` bool ` | ` false ` | no |
165
+ | enable\_ confidential\_ nodes | An optional flag to enable confidential node config. | ` bool ` | ` false ` | no |
165
166
| enable\_ cost\_ allocation | Enables Cost Allocation Feature and the cluster name and namespace of your GKE workloads appear in the labels field of the billing export to BigQuery | ` bool ` | ` false ` | no |
166
167
| enable\_ kubernetes\_ alpha | Whether to enable Kubernetes Alpha features for this cluster. Note that when this option is enabled, the cluster cannot be upgraded and will be automatically deleted after 30 days. | ` bool ` | ` false ` | no |
167
168
| enable\_ mesh\_ certificates | Controls the issuance of workload mTLS certificates. When enabled the GKE Workload Identity Certificates controller and node agent will be deployed in the cluster. Requires Workload Identity. | ` bool ` | ` false ` | no |
Original file line number Diff line number Diff line change @@ -65,6 +65,13 @@ resource "google_container_cluster" "primary" {
65
65
}
66
66
}
67
67
68
+ dynamic "confidential_nodes" {
69
+ for_each = local. confidential_node_config
70
+ content {
71
+ enabled = confidential_nodes. value . enabled
72
+ }
73
+ }
74
+
68
75
subnetwork = " projects/${ local . network_project_id } /regions/${ local . region } /subnetworks/${ var . subnetwork } "
69
76
70
77
default_snat_status {
Original file line number Diff line number Diff line change @@ -163,6 +163,7 @@ locals {
163
163
cluster_workload_identity_config = ! local. workload_identity_enabled ? [] : var. identity_namespace == " enabled" ? [{
164
164
workload_pool = " ${ var . project_id } .svc.id.goog" }] : [{ workload_pool = var.identity_namespace
165
165
}]
166
+ confidential_node_config = var. enable_confidential_nodes == true ? [{ enabled = true }] : []
166
167
cluster_mesh_certificates_config = local. workload_identity_enabled ? [{
167
168
enable_certificates = var.enable_mesh_certificates
168
169
}] : []
Original file line number Diff line number Diff line change @@ -513,6 +513,11 @@ variable "shadow_firewall_rules_log_config" {
513
513
}
514
514
}
515
515
516
+ variable "enable_confidential_nodes" {
517
+ type = bool
518
+ description = " An optional flag to enable confidential node config."
519
+ default = false
520
+ }
516
521
517
522
variable "security_posture_mode" {
518
523
description = " Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`."
Original file line number Diff line number Diff line change @@ -483,6 +483,11 @@ variable "shadow_firewall_rules_log_config" {
483
483
}
484
484
}
485
485
486
+ variable "enable_confidential_nodes" {
487
+ type = bool
488
+ description = " An optional flag to enable confidential node config."
489
+ default = false
490
+ }
486
491
487
492
variable "security_posture_mode" {
488
493
description = " Security posture mode. Accepted values are `DISABLED` and `BASIC`. Defaults to `DISABLED`."
You can’t perform that action at this time.
0 commit comments