You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
| <aname="input_activate_apis"></a> [activate\_apis](#input\_activate\_apis)| List of Google APIs activated in new or existing project. |`list(string)`| <pre>[<br> "compute.googleapis.com",<br> "container.googleapis.com"<br>]</pre> | no |
102
+
| <aname="input_activate_apis"></a> [activate\_apis](#input\_activate\_apis)| List of Google APIs activated in new or existing project. |`list(string)`| <pre>[<br/> "compute.googleapis.com",<br/> "container.googleapis.com"<br/>]</pre> | no |
103
103
| <aname="input_artifact_registry_name"></a> [artifact\_registry\_name](#input\_artifact\_registry\_name)| The name of the artifact registry repository |`string`|`"my-repository"`| no |
104
104
| <aname="input_billing_account"></a> [billing\_account](#input\_billing\_account)| YOU NEED TO HAVE PERMISSION TO BILLING ACCOUNT, The billing account to witch the new project should be connected. Required if `create_project` set to `true`. |`string`|`""`| no |
105
105
| <aname="input_cluster_deletion_protection"></a> [cluster\_deletion\_protection](#input\_cluster\_deletion\_protection)| Whether or not to allow Terraform to destroy the cluster. Unless this field is set to false in Terraform state, a terraform destroy or terraform apply that would delete the cluster will fail. |`bool`|`true`| no |
106
106
| <aname="input_create_artifact_registry"></a> [create\_artifact\_registry](#input\_create\_artifact\_registry)| Whether to create Artifact Registry for docker images |`bool`|`false`| no |
107
107
| <aname="input_create_project"></a> [create\_project](#input\_create\_project)| Defines if create the project. All resources are created this project. If `false` - the project\_id is required. |`bool`|`false`| no |
108
-
| <aname="input_default_node_pools_oauth_scopes"></a> [default\_node\_pools\_oauth\_scopes](#input\_default\_node\_pools\_oauth\_scopes)| Default node pool oauth scopes added to all node pools |`list(string)`| <pre>[<br> "https://www.googleapis.com/auth/cloud-platform"<br>]</pre> | no |
108
+
| <aname="input_default_node_pools_oauth_scopes"></a> [default\_node\_pools\_oauth\_scopes](#input\_default\_node\_pools\_oauth\_scopes)| Default node pool oauth scopes added to all node pools |`list(string)`| <pre>[<br/> "https://www.googleapis.com/auth/cloud-platform"<br/>]</pre> | no |
109
109
| <aname="input_default_pool_machine_type"></a> [default\_pool\_machine\_type](#input\_default\_pool\_machine\_type)| In some cases the GKE won't be created unless the default pool uses specific machine type (for example confidential nodes) so we have to set the type even if the default pool is removed. |`string`|`"e2-small"`| no |
110
110
| <aname="input_disable_services_on_destroy"></a> [disable\_services\_on\_destroy](#input\_disable\_services\_on\_destroy)| Whether project services will be disabled when the resources are destroyed. |`bool`|`true`| no |
111
111
| <aname="input_enable_autopilot"></a> [enable\_autopilot](#input\_enable\_autopilot)| Whether to enable Autopilot feature |`bool`|`null`| no |
@@ -114,7 +114,7 @@ No requirements.
114
114
| <aname="input_enable_private_nodes"></a> [enable\_private\_nodes](#input\_enable\_private\_nodes)| Defines if use private nodes. Implies creation of cloud NAT service so nodes and pods can access public internet. |`bool`|`true`| no |
115
115
| <aname="input_gcr_location"></a> [gcr\_location](#input\_gcr\_location)| Location of the GCR bucket. |`string`|`"EU"`| no |
116
116
| <aname="input_k8s_network_base"></a> [k8s\_network\_base](#input\_k8s\_network\_base)| The IP CIDR base for pods and services secondary networks. Must not overlap with `subnet_network`. Must be a `/16` network. |`string`| n/a | yes |
117
-
| <aname="input_master_authorized_networks"></a> [master\_authorized\_networks](#input\_master\_authorized\_networks)| Allows accessing masters only from defined networks. If `enable_private_endpoint` is `true` it must not be any public CIDR block. |`list(map(string))`| <pre>[<br> {<br> "cidr_block": "0.0.0.0/0",<br> "display_name": "ALL"<br> }<br>]</pre> | no |
117
+
| <aname="input_master_authorized_networks"></a> [master\_authorized\_networks](#input\_master\_authorized\_networks)| Allows accessing masters only from defined networks. If `enable_private_endpoint` is `true` it must not be any public CIDR block. |`list(map(string))`| <pre>[<br/> {<br/> "cidr_block": "0.0.0.0/0",<br/> "display_name": "ALL"<br/> }<br/>]</pre> | no |
118
118
| <aname="input_master_ipv4_cidr_block"></a> [master\_ipv4\_cidr\_block](#input\_master\_ipv4\_cidr\_block)| The /28 CIDR block for masters when using private cluster. |`string`|`"172.16.0.0/28"`| no |
119
119
| <aname="input_node_pools"></a> [node\_pools](#input\_node\_pools)| The object which describes the node pools. The structure is described in the README file. |`any`|`{}`| no |
120
120
| <aname="input_org_id"></a> [org\_id](#input\_org\_id)| GCP organization id. Required if `create_project` is `true`. |`string`|`""`| no |
0 commit comments