services/private-gke/generic/gke/containercluster.yaml (63 lines of code) (raw):

# Copyright 2022 Google LLC # # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # # http://www.apache.org/licenses/LICENSE-2.0 # # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. ######### apiVersion: container.cnrm.cloud.google.com/v1beta1 kind: ContainerCluster metadata: # kpt-merge: ${NAMESPACE}/${CLUSTER_NAME} name: sandbox # kpt-set: ${cluster-name} namespace: config-control # kpt-set: ${project-namespace} annotations: cnrm.cloud.google.com/remove-default-node-pool: "true" cnrm.cloud.google.com/project-id: "sandbox-00000" # kpt-set: ${project-id} spec: addonsConfig: configConnectorConfig: enabled: false dnsCacheConfig: enabled: true networkPolicyConfig: disabled: false description: dev-cluster # kpt-set: ${cluster-description} enableBinaryAuthorization: true enableIntranodeVisibility: true enableShieldedNodes: true initialNodeCount: 1 ipAllocationPolicy: clusterSecondaryRangeName: podrange # kpt-set: ${gke-pod-range-name} servicesSecondaryRangeName: servicesrange # kpt-set: ${gke-services-range-name} location: northamerica-northeast1 # kpt-set: ${location} maintenancePolicy: dailyMaintenanceWindow: startTime: 01:00 masterAuthorizedNetworksConfig: cidrBlocks: # kpt-set: ${auth-network} - cidrBlock: 0.0.0.0/32 displayName: private-net networkPolicy: enabled: true networkRef: name: sandbox-net # kpt-set: ${network-name} subnetworkRef: name: sandbox-subnet # kpt-set: ${subnetwork-name} networkingMode: VPC_NATIVE notificationConfig: pubsub: enabled: true topicRef: name: sandbox-pubsub # kpt-set: ${cluster-name}-pubsub resourceUsageExportConfig: bigqueryDestination: datasetId: gkemetering # kpt-set: ${cluster-name}gkemetering enableNetworkEgressMetering: true enableResourceConsumptionMetering: true podSecurityPolicyConfig: enabled: false privateClusterConfig: enablePrivateEndpoint: false enablePrivateNodes: true masterIpv4CidrBlock: 172.16.0.0/28 verticalPodAutoscaling: enabled: true workloadIdentityConfig: # Workload Identity supports only a single namespace based on your project name. # Replace ${PROJECT_ID?} below with your project ID. identityNamespace: sandbox-00000.svc.id.goog # kpt-set: ${project-id}.svc.id.goog nodeConfig: shieldedInstanceConfig: enableIntegrityMonitoring: true enableSecureBoot: true