interface ResourcesVpcConfigProperty
Language | Type name |
---|---|
.NET | Amazon.CDK.AWS.EKS.CfnCluster.ResourcesVpcConfigProperty |
Go | github.com/aws/aws-cdk-go/awscdk/v2/awseks#CfnCluster_ResourcesVpcConfigProperty |
Java | software.amazon.awscdk.services.eks.CfnCluster.ResourcesVpcConfigProperty |
Python | aws_cdk.aws_eks.CfnCluster.ResourcesVpcConfigProperty |
TypeScript | aws-cdk-lib » aws_eks » CfnCluster » ResourcesVpcConfigProperty |
An object representing the VPC configuration to use for an Amazon EKS cluster.
When updating a resource, you must include these properties if the previous CloudFormation template of the resource had them:
EndpointPublicAccess
EndpointPrivateAccess
PublicAccessCidrs
Example
// The code below shows an example of how to instantiate this type.
// The values are placeholders you should change.
import { aws_eks as eks } from 'aws-cdk-lib';
const resourcesVpcConfigProperty: eks.CfnCluster.ResourcesVpcConfigProperty = {
subnetIds: ['subnetIds'],
// the properties below are optional
endpointPrivateAccess: false,
endpointPublicAccess: false,
publicAccessCidrs: ['publicAccessCidrs'],
securityGroupIds: ['securityGroupIds'],
};
Properties
Name | Type | Description |
---|---|---|
subnet | string[] | Specify subnets for your Amazon EKS nodes. |
endpoint | boolean | IResolvable | Set this value to true to enable private access for your cluster's Kubernetes API server endpoint. |
endpoint | boolean | IResolvable | Set this value to false to disable public access to your cluster's Kubernetes API server endpoint. |
public | string[] | The CIDR blocks that are allowed access to your cluster's public Kubernetes API server endpoint. |
security | string[] | Specify one or more security groups for the cross-account elastic network interfaces that Amazon EKS creates to use that allow communication between your nodes and the Kubernetes control plane. |
subnetIds
Type:
string[]
Specify subnets for your Amazon EKS nodes.
Amazon EKS creates cross-account elastic network interfaces in these subnets to allow communication between your nodes and the Kubernetes control plane.
endpointPrivateAccess?
Type:
boolean |
IResolvable
(optional)
Set this value to true
to enable private access for your cluster's Kubernetes API server endpoint.
If you enable private access, Kubernetes API requests from within your cluster's VPC use the private VPC endpoint. The default value for this parameter is false
, which disables private access for your Kubernetes API server. If you disable private access and you have nodes or AWS Fargate pods in the cluster, then ensure that publicAccessCidrs
includes the necessary CIDR blocks for communication with the nodes or Fargate pods. For more information, see Amazon EKS cluster endpoint access control in the Amazon EKS User Guide .
endpointPublicAccess?
Type:
boolean |
IResolvable
(optional)
Set this value to false
to disable public access to your cluster's Kubernetes API server endpoint.
If you disable public access, your cluster's Kubernetes API server can only receive requests from within the cluster VPC. The default value for this parameter is true
, which enables public access for your Kubernetes API server. For more information, see Amazon EKS cluster endpoint access control in the Amazon EKS User Guide .
publicAccessCidrs?
Type:
string[]
(optional)
The CIDR blocks that are allowed access to your cluster's public Kubernetes API server endpoint.
Communication to the endpoint from addresses outside of the CIDR blocks that you specify is denied. The default value is 0.0.0.0/0
. If you've disabled private endpoint access, make sure that you specify the necessary CIDR blocks for every node and AWS Fargate Pod
in the cluster. For more information, see Amazon EKS cluster endpoint access control in the Amazon EKS User Guide .
securityGroupIds?
Type:
string[]
(optional)
Specify one or more security groups for the cross-account elastic network interfaces that Amazon EKS creates to use that allow communication between your nodes and the Kubernetes control plane.
If you don't specify any security groups, then familiarize yourself with the difference between Amazon EKS defaults for clusters deployed with Kubernetes. For more information, see Amazon EKS security group considerations in the Amazon EKS User Guide .