@aws-quickstart/eks-blueprints
    Preparing search index...

    Interface AutomodeClusterProviderProps

    interface AutomodeClusterProviderProps {
        albController?: AlbControllerOptions;
        clusterLogging?: ClusterLoggingTypes[];
        clusterName?: string;
        coreDnsComputeType?: CoreDnsComputeType;
        endpointAccess?: EndpointAccess;
        extraNodePools?: { [key: string]: NodePoolV1Spec };
        id?: string;
        ipFamily?: IpFamily;
        kubectlProviderOptions?: KubectlProviderOptions;
        mastersRole?: IRole;
        nodePools?: string[];
        nodeRole?: IRole;
        prune?: boolean;
        role?: IRole;
        secretsEncryptionKey?: IKey;
        securityGroup?: ISecurityGroup;
        serviceIpv4Cidr?: string;
        tags?: { [key: string]: string };
        version?: KubernetesVersion;
        vpc?: IVpc;
        vpcSubnets?: SubnetSelection[];
    }

    Hierarchy

    • Partial<eks.ClusterCommonOptions>
      • AutomodeClusterProviderProps
    Index

    Properties

    albController?: AlbControllerOptions

    Install the AWS Load Balancer Controller onto the cluster.

    - The controller is not installed.
    
    clusterLogging?: ClusterLoggingTypes[]

    The cluster log types which you want to enable.

    - none
    
    clusterName?: string

    Name for the cluster.

    - Automatically generated name
    
    coreDnsComputeType?: CoreDnsComputeType

    Controls the "eks.amazonaws.com/compute-type" annotation in the CoreDNS configuration on your cluster to determine which compute type to use for CoreDNS.

    CoreDnsComputeType.EC2 (for FargateCluster the default is FARGATE)

    endpointAccess?: EndpointAccess

    Configure access to the Kubernetes API server endpoint..

    EndpointAccess.PUBLIC_AND_PRIVATE
    
    extraNodePools?: { [key: string]: NodePoolV1Spec }
    id?: string
    ipFamily?: IpFamily

    Specify which IP family is used to assign Kubernetes pod and service IP addresses.

    kubectlProviderOptions?: KubectlProviderOptions

    Options for creating the kubectl provider - a lambda function that executes kubectl and helm against the cluster. If defined, kubectlLayer is a required property.

    If not defined, kubectl provider will not be created by default.

    mastersRole?: IRole

    An IAM role that will be added to the system:masters Kubernetes RBAC group.

    nodePools?: string[]

    @default: ['system,'general-purpose']

    nodeRole?: IRole

    @default: generated by CDK

    prune?: boolean

    Indicates whether Kubernetes resources added through addManifest() can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the kubectl apply operation with the --prune switch.

    true
    
    role?: IRole

    Role that provides permissions for the Kubernetes control plane to make calls to AWS API operations on your behalf.

    - A role is automatically created for you
    
    secretsEncryptionKey?: IKey

    KMS secret for envelope encryption for Kubernetes secrets.

    - By default, Kubernetes stores all secret object data within etcd and
    all etcd volumes used by Amazon EKS are encrypted at the disk-level
    using AWS-Managed encryption keys.
    securityGroup?: ISecurityGroup

    Security Group to use for Control Plane ENIs

    - A security group is automatically created
    
    serviceIpv4Cidr?: string

    The CIDR block to assign Kubernetes service IP addresses from.

    - Kubernetes assigns addresses from either the
    10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
    tags?: { [key: string]: string }

    The tags assigned to the EKS cluster

    - none
    
    version?: KubernetesVersion

    The Kubernetes version to run in the cluster

    vpc?: IVpc

    The VPC in which to create the Cluster.

    • a VPC with default configuration will be created and can be accessed through cluster.vpc.
    vpcSubnets?: SubnetSelection[]

    Where to place EKS Control Plane ENIs

    For example, to only select private subnets, supply the following:

    vpcSubnets: [{ subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS }]

    - All public and private subnets