ClusterResourcesVpcConfigArgs

data class ClusterResourcesVpcConfigArgs(val endpointPrivateAccess: Output<Boolean>? = null, val endpointPublicAccess: Output<Boolean>? = null, val publicAccessCidrs: Output<List<String>>? = null, val securityGroupIds: Output<List<String>>? = null, val subnetIds: Output<List<String>>) : ConvertibleToJava<ClusterResourcesVpcConfigArgs>

An object representing the VPC configuration to use for an Amazon EKS cluster.

Constructors

Link copied to clipboard
constructor(endpointPrivateAccess: Output<Boolean>? = null, endpointPublicAccess: Output<Boolean>? = null, publicAccessCidrs: Output<List<String>>? = null, securityGroupIds: Output<List<String>>? = null, subnetIds: Output<List<String>>)

Properties

Link copied to clipboard
val endpointPrivateAccess: Output<Boolean>? = null

Set this value to true to enable private access for your cluster's Kubernetes API server endpoint. If you enable private access, Kubernetes API requests from within your cluster's VPC use the private VPC endpoint. The default value for this parameter is false, which disables private access for your Kubernetes API server. If you disable private access and you have nodes or AWS Fargate pods in the cluster, then ensure that publicAccessCidrs includes the necessary CIDR blocks for communication with the nodes or Fargate pods.

Link copied to clipboard
val endpointPublicAccess: Output<Boolean>? = null

Set this value to false to disable public access to your cluster's Kubernetes API server endpoint. If you disable public access, your cluster's Kubernetes API server can only receive requests from within the cluster VPC. The default value for this parameter is true, which enables public access for your Kubernetes API server.

Link copied to clipboard
val publicAccessCidrs: Output<List<String>>? = null

The CIDR blocks that are allowed access to your cluster's public Kubernetes API server endpoint. Communication to the endpoint from addresses outside of the CIDR blocks that you specify is denied. The default value is 0.0.0.0/0. If you've disabled private endpoint access and you have nodes or AWS Fargate pods in the cluster, then ensure that you specify the necessary CIDR blocks.

Link copied to clipboard
val securityGroupIds: Output<List<String>>? = null

Specify one or more security groups for the cross-account elastic network interfaces that Amazon EKS creates to use to allow communication between your worker nodes and the Kubernetes control plane. If you don't specify a security group, the default security group for your VPC is used.

Link copied to clipboard
val subnetIds: Output<List<String>>

Specify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account elastic network interfaces in these subnets to allow communication between your nodes and the Kubernetes control plane.

Functions

Link copied to clipboard
open override fun toJava(): ClusterResourcesVpcConfigArgs