You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
#### container:v1
The following keys were added:
- schemas.ConfidentialNodes.properties.confidentialInstanceType.type (Total Keys: 1)
#### container:v1beta1
The following keys were added:
- schemas.ConfidentialNodes.properties.confidentialInstanceType.type (Total Keys: 1)
Copy file name to clipboardExpand all lines: docs/dyn/container_v1.projects.locations.clusters.html
+9
Original file line number
Diff line number
Diff line change
@@ -406,6 +406,7 @@ <h3>Method Details</h3>
406
406
},
407
407
],
408
408
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Configuration of Confidential Nodes. All the nodes in the cluster will be Confidential VM once enabled.
409
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
409
410
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
410
411
},
411
412
"controlPlaneEndpointsConfig": { # Configuration for all of the cluster's control plane endpoints. # Configuration for all cluster's control plane endpoints.
@@ -667,6 +668,7 @@ <h3>Method Details</h3>
667
668
},
668
669
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
669
670
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
671
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
670
672
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
671
673
},
672
674
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -944,6 +946,7 @@ <h3>Method Details</h3>
944
946
},
945
947
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
946
948
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
949
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
947
950
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
948
951
},
949
952
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -1601,6 +1604,7 @@ <h3>Method Details</h3>
1601
1604
},
1602
1605
],
1603
1606
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Configuration of Confidential Nodes. All the nodes in the cluster will be Confidential VM once enabled.
1607
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
1604
1608
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
1605
1609
},
1606
1610
"controlPlaneEndpointsConfig": { # Configuration for all of the cluster's control plane endpoints. # Configuration for all cluster's control plane endpoints.
@@ -1862,6 +1866,7 @@ <h3>Method Details</h3>
1862
1866
},
1863
1867
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
1864
1868
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
1869
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
1865
1870
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
1866
1871
},
1867
1872
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -2139,6 +2144,7 @@ <h3>Method Details</h3>
2139
2144
},
2140
2145
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
2141
2146
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
2147
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
2142
2148
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
2143
2149
},
2144
2150
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -2660,6 +2666,7 @@ <h3>Method Details</h3>
2660
2666
},
2661
2667
],
2662
2668
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Configuration of Confidential Nodes. All the nodes in the cluster will be Confidential VM once enabled.
2669
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
2663
2670
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
2664
2671
},
2665
2672
"controlPlaneEndpointsConfig": { # Configuration for all of the cluster's control plane endpoints. # Configuration for all cluster's control plane endpoints.
@@ -2921,6 +2928,7 @@ <h3>Method Details</h3>
2921
2928
},
2922
2929
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
2923
2930
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
2931
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
2924
2932
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
2925
2933
},
2926
2934
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -3198,6 +3206,7 @@ <h3>Method Details</h3>
3198
3206
},
3199
3207
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
3200
3208
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
3209
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
3201
3210
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
3202
3211
},
3203
3212
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
Copy file name to clipboardExpand all lines: docs/dyn/container_v1.projects.locations.clusters.nodePools.html
+4
Original file line number
Diff line number
Diff line change
@@ -196,6 +196,7 @@ <h3>Method Details</h3>
196
196
},
197
197
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
198
198
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
199
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
199
200
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
200
201
},
201
202
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -673,6 +674,7 @@ <h3>Method Details</h3>
673
674
},
674
675
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
675
676
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
677
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
676
678
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
677
679
},
678
680
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -977,6 +979,7 @@ <h3>Method Details</h3>
977
979
},
978
980
"bootDiskKmsKey": "A String", # The Customer Managed Encryption Key used to encrypt the boot disk attached to each node in the node pool. This should be of the form projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]. For more information about protecting resources with Cloud KMS Keys please see: https://cloud.google.com/compute/docs/disks/customer-managed-encryption
979
981
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
982
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
980
983
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
981
984
},
982
985
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # Parameters for containerd customization.
@@ -1576,6 +1579,7 @@ <h3>Method Details</h3>
1576
1579
],
1577
1580
"clusterId": "A String", # Deprecated. The name of the cluster to upgrade. This field has been deprecated and replaced by the name field.
1578
1581
"confidentialNodes": { # ConfidentialNodes is configuration for the confidential nodes feature, which makes nodes run on confidential VMs. # Confidential nodes config. All the nodes in the node pool will be Confidential VM once enabled.
1582
+
"confidentialInstanceType": "A String", # Defines the type of technology used by the confidential node.
1579
1583
"enabled": True or False, # Whether Confidential Nodes feature is enabled.
1580
1584
},
1581
1585
"containerdConfig": { # ContainerdConfig contains configuration to customize containerd. # The desired containerd config for nodes in the node pool. Initiates an upgrade operation that recreates the nodes with the new config.
0 commit comments