forked from vmware/terraform-provider-vcd
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Merge branch 'main' into network-pools
Signed-off-by: Giuseppe Maxia <[email protected]>
- Loading branch information
Showing
77 changed files
with
6,149 additions
and
1,102 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1 @@ | ||
* Add support for **Container Service Extension v4.1** by updating the installation guide [GH-1063] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,3 @@ | ||
* Resource `vcd_org_vdc` deprecates `edge_cluster_id` in favor of new resource | ||
`vcd_org_vdc_nsxt_network_profile` that can configure NSX-T Edge Clusters and default Segment | ||
Profile Templates for NSX-T VDCs [GH-1120] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,13 @@ | ||
* **New Data Source:** `vcd_nsxt_segment_ip_discovery_profile` to read NSX-T IP Discovery Segment Profiles [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_segment_mac_discovery_profile` to read NSX-T MAC Discovery Segment Profiles [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_segment_spoof_guard_profile` to read NSX-T Spoof Guard Profiles [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_segment_qos_profile` to read NSX-T QoS Profiles [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_segment_security_profile` to read NSX-T Segment Security Profiles [GH-1120] | ||
* **New Resource:** `vcd_nsxt_segment_profile_template` to manage NSX-T Segment Profile Templates [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_segment_profile_template` to read NSX-T Segment Profile Templates [GH-1120] | ||
* **New Resource:** `vcd_nsxt_global_default_segment_profile_template` to manage NSX-T Global Default Segment Profile Templates [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_global_default_segment_profile_template` to read NSX-T Global Default Segment Profile Templates [GH-1120] | ||
* **New Resource:** `vcd_org_vdc_nsxt_network_profile` to manage default Segment Profile Templates for NSX-T VDCs [GH-1120] | ||
* **New Data Source:** `vcd_org_vdc_nsxt_network_profile` to read default Segment Profile Templates for NSX-T VDCs [GH-1120] | ||
* **New Resource:** `vcd_nsxt_network_segment_profile` to manage individual Segment Profiles or Segment Profile Templates for NSX-T Org VDC Networks [GH-1120] | ||
* **New Data Source:** `vcd_nsxt_network_segment_profile` to read individual Segment Profiles or Segment Profile Templates for NSX-T Org VDC Networks [GH-1120] |
5 changes: 5 additions & 0 deletions
5
examples/container-service-extension-3.1.x/3.8-cse-3.1.x-install.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5 changes: 5 additions & 0 deletions
5
examples/container-service-extension-3.1.x/terraform.tfvars.example
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
5 changes: 5 additions & 0 deletions
5
examples/container-service-extension-3.1.x/variables-provider.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
111 changes: 0 additions & 111 deletions
111
examples/container-service-extension-4.0/install/step1/3.10-cse-4.0-install-step1.tf
This file was deleted.
Oops, something went wrong.
27 changes: 0 additions & 27 deletions
27
examples/container-service-extension-4.0/install/step1/terraform.tfvars.example
This file was deleted.
Oops, something went wrong.
56 changes: 0 additions & 56 deletions
56
examples/container-service-extension-4.0/install/step1/variables.tf
This file was deleted.
Oops, something went wrong.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
File renamed without changes.
89 changes: 89 additions & 0 deletions
89
examples/container-service-extension/v4.1/entities/vcdkeconfig.json.template
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,89 @@ | ||
{ | ||
"profiles": [ | ||
{ | ||
"name": "production", | ||
"active": true, | ||
"serverConfig": { | ||
"rdePollIntervalInMin": 1, | ||
"heartbeatWatcherTimeoutInMin": 10, | ||
"staleHeartbeatIntervalInMin": 30 | ||
}, | ||
"K8Config": { | ||
"certificateAuthorities": [ | ||
${k8s_cluster_certificates} | ||
], | ||
"cni": { | ||
"name": "antrea", | ||
"version": "" | ||
}, | ||
"cpi": { | ||
"name": "cpi for cloud director", | ||
"version": "${cpi_version}" | ||
}, | ||
"csi": [ | ||
{ | ||
"name": "csi for cloud director", | ||
"version": "${csi_version}" | ||
} | ||
], | ||
"mhc": { | ||
"maxUnhealthyNodes": ${max_unhealthy_node_percentage}, | ||
"nodeStartupTimeout": "${node_startup_timeout}", | ||
"nodeNotReadyTimeout": "${node_not_ready_timeout}", | ||
"nodeUnknownTimeout": "${node_unknown_timeout}" | ||
}, | ||
"rdeProjectorVersion": "0.6.0" | ||
}, | ||
"vcdConfig": { | ||
"sysLogger": { | ||
"host": "${syslog_host}", | ||
"port": "${syslog_port}" | ||
} | ||
}, | ||
"githubConfig": { | ||
"githubPersonalAccessToken": "" | ||
}, | ||
"bootstrapClusterConfig": { | ||
"capiEcosystem": { | ||
"infraProvider": { | ||
"name": "capvcd", | ||
"version": "v${capvcd_version}", | ||
"capvcdRde": { | ||
"nss": "capvcdCluster", | ||
"vendor": "vmware", | ||
"version": "1.2.0" | ||
} | ||
}, | ||
"coreCapiVersion": "v1.4.0", | ||
"bootstrapProvider": { | ||
"name": "CAPBK", | ||
"version": "v1.4.0" | ||
}, | ||
"controlPlaneProvider": { | ||
"name": "KCP", | ||
"version": "v1.4.0" | ||
}, | ||
"certManagerVersion": "v1.11.1" | ||
}, | ||
"certificateAuthorities": [ | ||
${bootstrap_vm_certificates} | ||
], | ||
"clusterctl": { | ||
"version": "v1.4.0", | ||
"clusterctlyaml": "" | ||
}, | ||
"dockerVersion": "", | ||
"kindVersion": "v0.19.0", | ||
"kindestNodeVersion": "v1.27.1", | ||
"kubectlVersion": "", | ||
"proxyConfig": { | ||
"noProxy": "${no_proxy}", | ||
"httpProxy": "${http_proxy}", | ||
"httpsProxy": "${https_proxy}" | ||
}, | ||
"sizingPolicy": "${bootstrap_vm_sizing_policy}" | ||
}, | ||
"containerRegistryUrl": "${container_registry_url}" | ||
} | ||
] | ||
} |
34 changes: 34 additions & 0 deletions
34
...ples/container-service-extension/v4.1/install/step1/3.11-cse-install-1-provider-config.tf
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,34 @@ | ||
# ------------------------------------------------------------------------------------------------------------ | ||
# CSE v4.1 installation, step 1: | ||
# | ||
# * Please read the guide present at https://registry.terraform.io/providers/vmware/vcd/latest/docs/guides/container_service_extension_4_x_install | ||
# before applying this configuration. | ||
# | ||
# * The installation process is split into two steps as the first one creates a CSE admin user that needs to be | ||
# used in a "provider" block in the second one. | ||
# | ||
# * Rename "terraform.tfvars.example" to "terraform.tfvars" and adapt the values to your needs. | ||
# Other than that, this snippet should be applied as it is. | ||
# ------------------------------------------------------------------------------------------------------------ | ||
|
||
# VCD Provider configuration. It must be at least v3.11.0 and configured with a System administrator account. | ||
terraform { | ||
required_providers { | ||
vcd = { | ||
source = "vmware/vcd" | ||
version = ">= 3.11" | ||
} | ||
} | ||
} | ||
|
||
provider "vcd" { | ||
url = "${var.vcd_url}/api" | ||
user = var.administrator_user | ||
password = var.administrator_password | ||
auth_type = "integrated" | ||
sysorg = var.administrator_org | ||
org = var.administrator_org | ||
allow_unverified_ssl = var.insecure_login | ||
logging = true | ||
logging_file = "cse_install_step1.log" | ||
} |
Oops, something went wrong.