BastionHostLinuxProps

class aws_cdk.aws_ec2.BastionHostLinuxProps(*, vpc, availability_zone=None, instance_name=None, instance_type=None, security_group=None, subnet_selection=None)

Bases: object

__init__(*, vpc, availability_zone=None, instance_name=None, instance_type=None, security_group=None, subnet_selection=None)

Properties of the bastion host.

Parameters
  • vpc (IVpc) – VPC to launch the instance in.

  • availability_zone (Optional[str]) – In which AZ to place the instance within the VPC. Default: - Random zone.

  • instance_name (Optional[str]) – The name of the instance. Default: ‘BastionHost’

  • instance_type (Optional[InstanceType]) – Type of instance to launch. Default: ‘t3.nano’

  • security_group (Optional[ISecurityGroup]) – Security Group to assign to this instance. Default: - create new security group with no inbound and all outbound traffic allowed

  • subnet_selection (Optional[SubnetSelection]) – Select the subnets to run the bastion host in. Set this to PUBLIC if you need to connect to this instance via the internet and cannot use SSM. You have to allow port 22 manually by using the connections field. Default: - private subnets of the supplied VPC

stability :stability: experimental

Attributes

availability_zone

In which AZ to place the instance within the VPC.

default :default: - Random zone.

stability :stability: experimental

Return type

Optional[str]

instance_name

The name of the instance.

default :default: ‘BastionHost’

stability :stability: experimental

Return type

Optional[str]

instance_type

Type of instance to launch.

default :default: ‘t3.nano’

stability :stability: experimental

Return type

Optional[InstanceType]

security_group

Security Group to assign to this instance.

default :default: - create new security group with no inbound and all outbound traffic allowed

stability :stability: experimental

Return type

Optional[ISecurityGroup]

subnet_selection

Select the subnets to run the bastion host in. Set this to PUBLIC if you need to connect to this instance via the internet and cannot use SSM. You have to allow port 22 manually by using the connections field.

default :default: - private subnets of the supplied VPC

stability :stability: experimental

Return type

Optional[SubnetSelection]

vpc

VPC to launch the instance in.

stability :stability: experimental

Return type

IVpc