You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -170,7 +170,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
170
170
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
171
171
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
172
172
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
173
-
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks down `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
173
+
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
174
174
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
175
175
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
176
176
| upstream\_nameservers | If specified, the values replace the nameservers taken by default from the node’s /etc/resolv.conf | list |`<list>`| no |
Copy file name to clipboardExpand all lines: autogen/README.md
+3-1
Original file line number
Diff line number
Diff line change
@@ -195,12 +195,14 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
195
195
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
196
196
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
197
197
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
198
-
| region | The region to host the cluster in (required) | string |n/a|yes|
198
+
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
199
199
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
200
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
200
201
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
201
202
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
202
203
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
203
204
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
205
+
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
204
206
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
205
207
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
206
208
| upstream\_nameservers | If specified, the values replace the nameservers taken by default from the node’s /etc/resolv.conf | list |`<list>`| no |
Copy file name to clipboardExpand all lines: modules/beta-private-cluster-update-variant/README.md
+6-1
Original file line number
Diff line number
Diff line change
@@ -188,12 +188,14 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
188
188
| non\_masquerade\_cidrs | List of strings in CIDR notation that specify the IP address ranges that do not use IP masquerading. | list(string) |`<list>`| no |
189
189
| pod\_security\_policy\_config | enabled - Enable the PodSecurityPolicy controller for this cluster. If enabled, pods must be valid under a PodSecurityPolicy to be created. | list |`<list>`| no |
190
190
| project\_id | The project ID to host the cluster in (required) | string | n/a | yes |
191
-
| region | The region to host the cluster in (required) | string |n/a|yes|
191
+
| region | The region to host the cluster in (optional if zonal cluster / required if regional) | string |`"null"`|no|
192
192
| regional | Whether is a regional cluster (zonal cluster if set false. WARNING: changing this after cluster creation is destructive!) | bool |`"true"`| no |
193
+
| registry\_project\_id | Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project. | string |`""`| no |
193
194
| remove\_default\_node\_pool | Remove default node pool while setting up the cluster | bool |`"false"`| no |
194
195
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
195
196
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
196
197
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
198
+
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
197
199
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
198
200
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
199
201
| upstream\_nameservers | If specified, the values replace the nameservers taken by default from the node’s /etc/resolv.conf | list |`<list>`| no |
@@ -258,6 +260,9 @@ following project roles:
258
260
- roles/iam.serviceAccountUser
259
261
- roles/resourcemanager.projectIamAdmin (only required if `service_account` is set to `create`)
260
262
263
+
Additionally, if `service_account` is set to `create` and `grant_registry_access` is requested, the service account requires the following role on the `registry_project_id` project:
264
+
- roles/resourcemanager.projectIamAdmin
265
+
261
266
### Enable APIs
262
267
In order to operate with the Service Account you must activate the following APIs on the project where the Service Account was created:
description="Project holding the Google Container Registry. If empty, we use the cluster project. If grant_registry_access is true, storage.objectViewer role is assigned on this project."
274
+
default=""
275
+
}
276
+
270
277
variable"service_account" {
271
278
type=string
272
279
description="The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created."
Copy file name to clipboardExpand all lines: modules/beta-private-cluster/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -195,7 +195,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
195
195
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
196
196
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
197
197
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
198
-
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks down `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
198
+
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
199
199
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
200
200
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
201
201
| upstream\_nameservers | If specified, the values replace the nameservers taken by default from the node’s /etc/resolv.conf | list |`<list>`| no |
Copy file name to clipboardExpand all lines: modules/beta-public-cluster/README.md
+1-1
Original file line number
Diff line number
Diff line change
@@ -186,7 +186,7 @@ In either case, upgrading to module version `v1.0.0` will trigger a recreation o
186
186
| resource\_usage\_export\_dataset\_id | The dataset id for which network egress metering for this cluster will be enabled. If enabled, a daemonset will be created in the cluster to meter network egress traffic. | string |`""`| no |
187
187
| sandbox\_enabled | (Beta) Enable GKE Sandbox (Do not forget to set `image_type` = `COS_CONTAINERD` and `node_version` = `1.12.7-gke.17` or later to use it). | bool |`"false"`| no |
188
188
| service\_account | The service account to run nodes as if not overridden in `node_pools`. The create_service_account variable default value (true) will cause a cluster-specific service account to be created. | string |`""`| no |
189
-
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks down `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
189
+
| skip\_provisioners | Flag to skip all local-exec provisioners. It breaks `stub_domains` and `upstream_nameservers` variables functionality. | bool |`"false"`| no |
190
190
| stub\_domains | Map of stub domains and their resolvers to forward DNS queries for a certain domain to an external DNS server | map(list(string)) |`<map>`| no |
191
191
| subnetwork | The subnetwork to host the cluster in (required) | string | n/a | yes |
192
192
| upstream\_nameservers | If specified, the values replace the nameservers taken by default from the node’s /etc/resolv.conf | list |`<list>`| no |
0 commit comments