-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support confidential nodepools #1386
Comments
@jawnsy happy to review a PR exposing this! |
It seems impossible to implement it right now because a confidential node is not supported by google_container_node_pool resource. Here is the related provider issue: hashicorp/terraform-provider-google#13127 |
@apeabody, I think this can be closed as its supported already |
Thanks, added in #1815 |
as of today, the latest release v32.0.4 lacks of capability of nodepool level enablement of confidential nodes |
Since v30 is the release that confidential node goes GA, can this confidential nodepool support backported to v30? |
TL;DR
We currently support confidential clusters (a cluster-level setting that enforces that all nodepools are confidential VMs), but do not support the setting at a per-nodepool level. We could add a new node_pool setting (e.g.
enable_confidential_nodes
) to enable this on a per-nodepool basis, similar to theenable_secure_boot
setting)Terraform Resources
No response
Detailed design
No response
Additional information
GKE supports mixed clusters where some nodepools are confidential instances (n2d or c2d) but others run on other instances (n1, n2, c2, t2d), but the submodule does not support this.
The text was updated successfully, but these errors were encountered: