gcloud container clusters create-auto
NAME
[--anonymous-authentication-config
=ANONYMOUS_AUTHENTICATION_CONFIG
] [--async
] [--auto-monitoring-scope
=AUTO_MONITORING_SCOPE
] [--autoprovisioning-enable-insecure-kubelet-readonly-port
] [--autoprovisioning-network-tags
=TAGS
,[TAGS
,…]] [--autoprovisioning-resource-manager-tags
=[KEY
=VALUE
,…]] [--binauthz-evaluation-mode
=BINAUTHZ_EVALUATION_MODE
] [--boot-disk-kms-key
=BOOT_DISK_KMS_KEY
] [--cluster-ipv4-cidr
=CLUSTER_IPV4_CIDR
] [--cluster-secondary-range-name
=NAME
] [--cluster-version
=CLUSTER_VERSION
] [--containerd-config-from-file
=PATH_TO_FILE
] [--create-subnetwork
=[KEY
=VALUE
,…]] [--database-encryption-key
=DATABASE_ENCRYPTION_KEY
] [--disable-l4-lb-firewall-reconciliation
] [--enable-authorized-networks-on-private-endpoint
] [--enable-auto-ipam
] [--enable-backup-restore
] [--enable-cilium-clusterwide-network-policy
] [--enable-confidential-nodes
] [--enable-dns-access
] [--enable-fleet
] [--enable-google-cloud-access
] [--enable-ip-access
] [--enable-kubernetes-unstable-apis
=API
,[API
,…]] [--enable-legacy-lustre-port
] [--enable-lustre-csi-driver
] [--enable-master-global-access
] [--enable-multi-networking
] [--enable-ray-cluster-logging
] [--enable-ray-cluster-monitoring
] [--enable-ray-operator
] [--enable-secret-manager
] [--fleet-project
=PROJECT_ID_OR_NUMBER
] [--hpa-profile
=HPA_PROFILE
] [--labels
=[KEY
=VALUE
,…]] [--logging
=[COMPONENT
,…]] [--monitoring
=[COMPONENT
,…]] [--network
=NETWORK
] [--private-endpoint-subnetwork
=NAME
] [--release-channel
=CHANNEL
] [--security-group
=SECURITY_GROUP
] [--security-posture
=SECURITY_POSTURE
] [--services-ipv4-cidr
=CIDR
] [--services-secondary-range-name
=NAME
] [--subnetwork
=SUBNETWORK
] [--tier
=TIER
] [--workload-policies
=WORKLOAD_POLICIES
] [--workload-vulnerability-scanning
=WORKLOAD_VULNERABILITY_SCANNING
] [--additive-vpc-scope-dns-domain
=ADDITIVE_VPC_SCOPE_DNS_DOMAIN
| --disable-additive-vpc-scope
] [--aggregation-ca
=CA_POOL_PATH
--cluster-ca
=CA_POOL_PATH
--control-plane-disk-encryption-key
=KEY
--etcd-api-ca
=CA_POOL_PATH
--etcd-peer-ca
=CA_POOL_PATH
--gkeops-etcd-backup-encryption-key
=KEY
--service-account-signing-keys
=KEY_VERSION
,[KEY_VERSION
,…] --service-account-verification-keys
=KEY_VERSION
,[KEY_VERSION
,…]] [--dataplane-v2-observability-mode
=DATAPLANE_V2_OBSERVABILITY_MODE
| --disable-dataplane-v2-flow-observability
| --enable-dataplane-v2-flow-observability
] [--enable-insecure-binding-system-authenticated
--enable-insecure-binding-system-unauthenticated
] [--enable-master-authorized-networks
--master-authorized-networks
=NETWORK
,[NETWORK
,…]] [--enable-private-endpoint
--enable-private-nodes
--master-ipv4-cidr
=MASTER_IPV4_CIDR
] [--location
=LOCATION
| --region
=REGION
| --zone
=ZONE
, -z
ZONE
] [--scopes
=[SCOPE
,…]; default="gke-default" --service-account
=SERVICE_ACCOUNT
] [GCLOUD_WIDE_FLAG …
]
gcloud container clusters create-auto sample-cluster
NAME
The name may contain only lowercase alphanumerics and '-', must start with a letter and end with an alphanumeric, and must be no longer than 40 characters.
--anonymous-authentication-config
=ANONYMOUS_AUTHENTICATION_CONFIG
ANONYMOUS_AUTHENTICATION_CONFIG
must be one of:
ENABLED
LIMITED
--async
--auto-monitoring-scope
=AUTO_MONITORING_SCOPE
AUTO_MONITORING_SCOPE
must be one of: ALL
, NONE
.
--autoprovisioning-enable-insecure-kubelet-readonly-port
If not set, the value from nodePoolDefaults.nodeConfigDefaults will be used.
To disable the readonly port --no-autoprovisioning-enable-insecure-kubelet-readonly-port
.
--autoprovisioning-network-tags
=TAGS
,[TAGS
,…]
Examples:
gcloud container clusters create-auto example-cluster --autoprovisioning-network-tags=tag1,tag2
New nodes in auto-provisioned node pools, including ones created by resize or recreate, will have these tags on the Compute Engine API instance object and can be used in firewall rules. See https://cloud.google.com/sdk/gcloud/reference/compute/firewall-rules/create for examples.
--autoprovisioning-resource-manager-tags
=[KEY
=VALUE
,…]
Examples:
gcloud container clusters create-auto example-cluster --autoprovisioning-resource-manager-tags=tagKeys/1234=tagValues/2345
gcloud container clusters create-auto example-cluster --autoprovisioning-resource-manager-tags=my-project/key1=value1
gcloud container clusters create-auto example-cluster --autoprovisioning-resource-manager-tags=12345/key1=value1,23456/key2=value2
gcloud container clusters create-auto example-cluster --autoprovisioning-resource-manager-tags=
All nodes in an Autopilot cluster or all auto-provisioned nodes in a Standard cluster, including nodes that are resized or re-created, will have the specified tags on the corresponding Instance object in the Compute Engine API. You can reference these tags in network firewall policy rules. For instructions, see https://cloud.google.com/firewall/docs/use-tags-for-firewalls.
--binauthz-evaluation-mode
=BINAUTHZ_EVALUATION_MODE
BINAUTHZ_EVALUATION_MODE
must be one of: disabled
, project-singleton-policy-enforce
.
--boot-disk-kms-key
=BOOT_DISK_KMS_KEY
--cluster-ipv4-cidr
=CLUSTER_IPV4_CIDR
If you omit this option, a range is chosen automatically. The automatically chosen range is randomly selected from 10.0.0.0/8 and will not include IP address ranges allocated to VMs, existing routes, or ranges allocated to other clusters. The automatically chosen range might conflict with reserved IP addresses, dynamic routes, or routes within VPCs that peer with this cluster. You should specify --cluster-ipv4-cidr
to prevent conflicts.
This field is not applicable in a Shared VPC setup where the IP address range for the pods must be specified with --cluster-secondary-range-name
--cluster-secondary-range-name
=NAME
Cannot be used with '--create-subnetwork' option.
--cluster-version
=CLUSTER_VERSION
The default Kubernetes version is available using the following command.
gcloud container get-server-config
--containerd-config-from-file
=PATH_TO_FILE
For detailed information on the configuration usage, please refer to https://cloud.google.com/kubernetes-engine/docs/how-to/customize-containerd-configuration.
Note: Updating the containerd configuration of an existing cluster or node pool requires recreation of the existing nodes, which might cause disruptions in running workloads.
Use a full or relative path to a local file containing the value of containerd_config.
--create-subnetwork
=[KEY
=VALUE
,…]
'name' specifies the name of the subnetwork to be created.
'range' specifies the IP range for the new subnetwork. This can either be a netmask size (e.g. '/20') or a CIDR range (e.g. '10.0.0.0/20'). If a netmask size is specified, the IP is automatically taken from the free space in the cluster's network.
Examples:
Create a new subnetwork with a default name and size.
gcloud container clusters create-auto --create-subnetwork ""
Create a new subnetwork named "my-subnet" with netmask of size 21.
gcloud container clusters create-auto --create-subnetwork name=my-subnet,range=/21
Create a new subnetwork with a default name with the primary range of 10.100.0.0/16.
gcloud container clusters create-auto --create-subnetwork range=10.100.0.0/16
Create a new subnetwork with the name "my-subnet" with a default range.
gcloud container clusters create-auto --create-subnetwork name=my-subnet
Cannot be used in conjunction with '--subnetwork' option.
--database-encryption-key
=DATABASE_ENCRYPTION_KEY
Enable database encryption that will be used to encrypt Kubernetes Secrets at the application layer. The key provided should be the resource ID in the format of projects/[KEY_PROJECT_ID]/locations/[LOCATION]/keyRings/[RING_NAME]/cryptoKeys/[KEY_NAME]
. For more information, see https://cloud.google.com/kubernetes-engine/docs/how-to/encrypting-secrets.
--disable-l4-lb-firewall-reconciliation
--enable-auto-ipam
--enable-backup-restore
--enable-cilium-clusterwide-network-policy
--enable-confidential-nodes
--enable-dns-access
DNS-based control plane access is recommended.
--enable-fleet
--fleet-project=FLEET_HOST_PROJECT
. Example: $ gcloud container clusters create-auto --enable-fleet
--enable-google-cloud-access
--enable-ip-access
--enable-kubernetes-unstable-apis
=API
,[API
,…]
--enable-legacy-lustre-port
--enable-lustre-csi-driver
--enable-master-global-access
--enable-multi-networking
--enable-ray-cluster-logging
--enable-ray-cluster-monitoring
--enable-ray-operator
--enable-secret-manager
To disable in an existing cluster, explicitly set flag to --no-enable-secret-manager
--fleet-project
=PROJECT_ID_OR_NUMBER
Example: $ gcloud container clusters create-auto --fleet-project=my-project
--hpa-profile
=HPA_PROFILE
--labels
=[KEY
=VALUE
,…]
Examples:
gcloud container clusters create-auto example-cluster --labels=label_a=value1,label_b=,label_c=value3
--logging
=[COMPONENT
,…]
SYSTEM
, WORKLOAD
, API_SERVER
, CONTROLLER_MANAGER
, SCHEDULER
The default is SYSTEM,WORKLOAD
. If this flag is set, then SYSTEM
must be included.
For more information, see https://cloud.google.com/kubernetes-engine/docs/concepts/about-logs#available-logs
Examples:
gcloud container clusters create-auto --logging=SYSTEM
gcloud container clusters create-auto --logging=SYSTEM,WORKLOAD
gcloud container clusters create-auto --logging=SYSTEM,WORKLOAD,API_SERVER,CONTROLLER_MANAGER,SCHEDULER
--monitoring
=[COMPONENT
,…]
SYSTEM
, WORKLOAD
(Deprecated), NONE
, API_SERVER
, CONTROLLER_MANAGER
, SCHEDULER
, DAEMONSET
, DEPLOYMENT
, HPA
, POD
, STATEFULSET
, STORAGE
, CADVISOR
, KUBELET
, DCGM
, JOBSET
For more information, see https://cloud.google.com/kubernetes-engine/docs/how-to/configure-metrics#available-metrics
Examples:
gcloud container clusters create-auto --monitoring=SYSTEM,API_SERVER,POD,DCGM
gcloud container clusters create-auto --monitoring=SYSTEM
--network
=NETWORK
--private-endpoint-subnetwork
=NAME
--release-channel
=CHANNEL
If left unspecified and a version is specified, the cluster is enrolled in the most mature release channel where the version is available (first checking STABLE, then REGULAR, and finally RAPID). Otherwise, if no release channel and no version is specified, the cluster is enrolled in the REGULAR channel with its default version. When a cluster is subscribed to a release channel, Google maintains both the master version and the node version. Node auto-upgrade is enabled by default for release channel clusters and can be controlled via upgrade-scope exclusions.
CHANNEL
must be one of:
extended
rapid
WARNING: Versions available in the 'rapid' channel may be subject to unresolved issues with no known workaround and are not subject to any SLAs.
regular
stable
--security-group
=SECURITY_GROUP
To include group membership as part of the claims issued by Google during authentication, a group must be designated as a security group by including it as a direct member of this group.
If unspecified, no groups will be returned for use with RBAC.
--security-posture
=SECURITY_POSTURE
To enable advanced mode explicitly set the flag to --security-posture=enterprise
.
To enable in standard mode explicitly set the flag to --security-posture=standard
To disable in an existing cluster, explicitly set the flag to --security-posture=disabled
.
For more information on enablement, see https://cloud.google.com/kubernetes-engine/docs/concepts/about-security-posture-dashboard#feature-enablement.
SECURITY_POSTURE
must be one of: disabled
, standard
, enterprise
.
--services-ipv4-cidr
=CIDR
Can be specified as a netmask size (e.g. '/20') or as in CIDR notion (e.g. '10.100.0.0/20'). If given as a netmask size, the IP range will be chosen automatically from the available space in the network.
If unspecified, the services CIDR range will be chosen with a default mask size.
--services-secondary-range-name
=NAME
Cannot be used with '--create-subnetwork' option.
--subnetwork
=SUBNETWORK
Cannot be used with the "--create-subnetwork" option.
--tier
=TIER
TIER
must be one of: standard
, enterprise
.
--workload-policies
=WORKLOAD_POLICIES
Examples:
gcloud container clusters create-auto example-cluster --workload-policies=allow-net-admin
The only supported workload policy is 'allow-net-admin'.
--workload-vulnerability-scanning
=WORKLOAD_VULNERABILITY_SCANNING
To enable Advanced vulnerability insights mode explicitly set the flag to --workload-vulnerability-scanning=enterprise
.
To enable in standard mode explicitly set the flag to --workload-vulnerability-scanning=standard
.
To disable in an existing cluster, explicitly set the flag to --workload-vulnerability-scanning=disabled
.
For more information on enablement, see https://cloud.google.com/kubernetes-engine/docs/concepts/about-security-posture-dashboard#feature-enablement.
WORKLOAD_VULNERABILITY_SCANNING
must be one of: disabled
, standard
, enterprise
.
--additive-vpc-scope-dns-domain
=ADDITIVE_VPC_SCOPE_DNS_DOMAIN
--disable-additive-vpc-scope
--aggregation-ca
=CA_POOL_PATH
--cluster-ca
=CA_POOL_PATH
--control-plane-disk-encryption-key
=KEY
--etcd-api-ca
=CA_POOL_PATH
--etcd-peer-ca
=CA_POOL_PATH
--gkeops-etcd-backup-encryption-key
=KEY
--service-account-signing-keys
=KEY_VERSION
,[KEY_VERSION
,…]
--service-account-verification-keys
=KEY_VERSION
,[KEY_VERSION
,…]
--dataplane-v2-observability-mode
=DATAPLANE_V2_OBSERVABILITY_MODE
DISABLED
.
Advanced Datapath Observability allows for a real-time view into pod-to-pod traffic within your cluster.
Examples:
gcloud container clusters create-auto --dataplane-v2-observability-mode=DISABLED
gcloud container clusters create-auto --dataplane-v2-observability-mode=INTERNAL_VPC_LB
gcloud container clusters create-auto --dataplane-v2-observability-mode=EXTERNAL_LB
Flag --dataplane-v2-observability-mode has been removed.
DATAPLANE_V2_OBSERVABILITY_MODE
must be one of:
DISABLED
EXTERNAL_LB
INTERNAL_VPC_LB
--disable-dataplane-v2-flow-observability
--enable-dataplane-v2-flow-observability
--enable-insecure-binding-system-authenticated
system:authenticated
as a subject in ClusterRoleBindings and RoleBindings. Allowing bindings that reference system:authenticated
is a security risk and is not recommended.
To disallow binding system:authenticated
in a cluster, explicitly set the --no-enable-insecure-binding-system-authenticated
flag instead.
--enable-insecure-binding-system-unauthenticated
system:unauthenticated
and system:anonymous
as subjects in ClusterRoleBindings and RoleBindings. Allowing bindings that reference system:unauthenticated
and system:anonymous
are a security risk and is not recommended.
To disallow binding system:authenticated
in a cluster, explicitly set the --no-enable-insecure-binding-system-unauthenticated
flag instead.
--enable-master-authorized-networks
--master-authorized-networks
flag) to connect to Kubernetes master through HTTPS. Besides these blocks, the following have access as well:
1) The private network the cluster connects to if `--enable-private-nodes` is specified. 2) Google Compute Engine Public IPs if `--enable-private-nodes` is not specified.
Use --no-enable-master-authorized-networks
to disable. When disabled, public internet (0.0.0.0/0) is allowed to connect to Kubernetes master through HTTPS.
--master-authorized-networks
=NETWORK
,[NETWORK
,…]
--enable-master-authorized-networks
is also specified.
--enable-private-endpoint
--enable-private-nodes
--master-ipv4-cidr
=MASTER_IPV4_CIDR
--location
=LOCATION
--region
=REGION
--zone
=ZONE
, -z
ZONE
--scopes
=[SCOPE
,…]; default="gke-default"
Examples:
gcloud container clusters create-auto example-cluster --scopes=https://www.googleapis.com/auth/devstorage.read_only
gcloud container clusters create-auto example-cluster --scopes=bigquery,storage-rw,compute-ro
Multiple scopes can be specified, separated by commas. Various scopes are automatically added based on feature usage. Such scopes are not added if an equivalent scope already exists.
monitoring-write
: always added to ensure metrics can be writtenlogging-write
: added if Cloud Logging is enabled (--enable-cloud-logging
/--logging
)monitoring
: added if Cloud Monitoring is enabled (--enable-cloud-monitoring
/--monitoring
)gke-default
: added for Autopilot clusters that use the default service accountcloud-platform
: added for Autopilot clusters that use any other service accountSCOPE can be either the full URI of the scope or an alias. Default
scopes are assigned to all instances. Available aliases are:
Alias URI bigquery https://www.googleapis.com/auth/bigquery cloud-platform https://www.googleapis.com/auth/cloud-platform cloud-source-repos https://www.googleapis.com/auth/source.full_control cloud-source-repos-ro https://www.googleapis.com/auth/source.read_only compute-ro https://www.googleapis.com/auth/compute.readonly compute-rw https://www.googleapis.com/auth/compute datastore https://www.googleapis.com/auth/datastore default https://www.googleapis.com/auth/devstorage.read_only https://www.googleapis.com/auth/logging.write https://www.googleapis.com/auth/monitoring.write https://www.googleapis.com/auth/pubsub https://www.googleapis.com/auth/service.management.readonly https://www.googleapis.com/auth/servicecontrol https://www.googleapis.com/auth/trace.append gke-default https://www.googleapis.com/auth/devstorage.read_only https://www.googleapis.com/auth/logging.write https://www.googleapis.com/auth/monitoring https://www.googleapis.com/auth/service.management.readonly https://www.googleapis.com/auth/servicecontrol https://www.googleapis.com/auth/trace.append logging-write https://www.googleapis.com/auth/logging.write monitoring https://www.googleapis.com/auth/monitoring monitoring-read https://www.googleapis.com/auth/monitoring.read monitoring-write https://www.googleapis.com/auth/monitoring.write pubsub https://www.googleapis.com/auth/pubsub service-control https://www.googleapis.com/auth/servicecontrol service-management https://www.googleapis.com/auth/service.management.readonly sql (deprecated) https://www.googleapis.com/auth/sqlservice sql-admin https://www.googleapis.com/auth/sqlservice.admin storage-full https://www.googleapis.com/auth/devstorage.full_control storage-ro https://www.googleapis.com/auth/devstorage.read_only storage-rw https://www.googleapis.com/auth/devstorage.read_write taskqueue https://www.googleapis.com/auth/taskqueue trace https://www.googleapis.com/auth/trace.append userinfo-email https://www.googleapis.com/auth/userinfo.emailDEPRECATION WARNING: https://www.googleapis.com/auth/sqlservice account scope and
sql
alias do not provide SQL instance management capabilities and have been deprecated. Please, use https://www.googleapis.com/auth/sqlservice.admin or sql-admin
to manage your Google SQL Service instances.
--service-account
=SERVICE_ACCOUNT
--access-token-file
, --account
, --billing-project
, --configuration
, --flags-file
, --flatten
, --format
, --help
, --impersonate-service-account
, --log-http
, --project
, --quiet
, --trace-token
, --user-output-enabled
, --verbosity
.
Run $ gcloud help
for details.
gcloud alpha container clusters create-auto
gcloud beta container clusters create-auto
RetroSearch is an open source project built by @garambo | Open a GitHub Issue
Search and Browse the WWW like it's 1997 | Search results from DuckDuckGo
HTML:
3.2
| Encoding:
UTF-8
| Version:
0.7.4