class Aws::EKS::Types::VpcConfigResponse
An object representing an Amazon EKS
cluster VPC configuration response.
@!attribute [rw] subnet_ids
The subnets associated with your cluster. @return [Array<String>]
@!attribute [rw] security_group_ids
The security groups associated with the cross-account elastic network interfaces that are used to allow communication between your nodes and the Kubernetes control plane. @return [Array<String>]
@!attribute [rw] cluster_security_group_id
The cluster security group that was created by Amazon EKS for the cluster. Managed node groups use this security group for control-plane-to-data-plane communication. @return [String]
@!attribute [rw] vpc_id
The VPC associated with your cluster. @return [String]
@!attribute [rw] endpoint_public_access
This parameter indicates whether the Amazon EKS public API server endpoint is enabled. If the Amazon EKS public API server endpoint is disabled, your cluster's Kubernetes API server can only receive requests that originate from within the cluster VPC. @return [Boolean]
@!attribute [rw] endpoint_private_access
This parameter indicates whether the Amazon EKS private API server endpoint is enabled. If the Amazon EKS private API server endpoint is enabled, Kubernetes API requests that originate from within your cluster's VPC use the private VPC endpoint instead of traversing the internet. If this value is disabled and you have nodes or Fargate pods in the cluster, then ensure that `publicAccessCidrs` includes the necessary CIDR blocks for communication with the nodes or Fargate pods. For more information, see [Amazon EKS cluster endpoint access control][1] in the <i> <i>Amazon EKS User Guide</i> </i>. [1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html @return [Boolean]
@!attribute [rw] public_access_cidrs
The CIDR blocks that are allowed access to your cluster's public Kubernetes API server endpoint. Communication to the endpoint from addresses outside of the listed CIDR blocks is denied. The default value is `0.0.0.0/0`. If you've disabled private endpoint access and you have nodes or Fargate pods in the cluster, then ensure that the necessary CIDR blocks are listed. For more information, see [Amazon EKS cluster endpoint access control][1] in the <i> <i>Amazon EKS User Guide</i> </i>. [1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html @return [Array<String>]
@see docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/VpcConfigResponse AWS API Documentation
Constants
- SENSITIVE