class Aws::EKS::Types::VpcConfigRequest

An object representing the VPC configuration to use for an Amazon EKS cluster.

@note When making an API call, you may pass VpcConfigRequest

data as a hash:

    {
      subnet_ids: ["String"],
      security_group_ids: ["String"],
      endpoint_public_access: false,
      endpoint_private_access: false,
      public_access_cidrs: ["String"],
    }

@!attribute [rw] subnet_ids

Specify subnets for your Amazon EKS nodes. Amazon EKS creates
cross-account elastic network interfaces in these subnets to allow
communication between your nodes and the Kubernetes control plane.
@return [Array<String>]

@!attribute [rw] security_group_ids

Specify one or more security groups for the cross-account elastic
network interfaces that Amazon EKS creates to use that allow
communication between your nodes and the Kubernetes control plane.
If you don't specify any security groups, then familiarize yourself
with the difference between Amazon EKS defaults for clusters
deployed with Kubernetes:

* 1\.14 Amazon EKS platform version `eks.2` and earlier

* 1\.14 Amazon EKS platform version `eks.3` and later

For more information, see [Amazon EKS security group
considerations][1] in the <i> <i>Amazon EKS User Guide</i> </i>.

[1]: https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html
@return [Array<String>]

@!attribute [rw] endpoint_public_access

Set this value to `false` to disable public access to your
cluster's Kubernetes API server endpoint. If you disable public
access, your cluster's Kubernetes API server can only receive
requests from within the cluster VPC. The default value for this
parameter is `true`, which enables public access for your Kubernetes
API server. For more information, see [Amazon EKS cluster endpoint
access control][1] in the <i> <i>Amazon EKS User Guide</i> </i>.

[1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html
@return [Boolean]

@!attribute [rw] endpoint_private_access

Set this value to `true` to enable private access for your
cluster's Kubernetes API server endpoint. If you enable private
access, Kubernetes API requests from within your cluster's VPC use
the private VPC endpoint. The default value for this parameter is
`false`, which disables private access for your Kubernetes API
server. If you disable private access and you have nodes or Fargate
pods in the cluster, then ensure that `publicAccessCidrs` includes
the necessary CIDR blocks for communication with the nodes or
Fargate pods. For more information, see [Amazon EKS cluster endpoint
access control][1] in the <i> <i>Amazon EKS User Guide</i> </i>.

[1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html
@return [Boolean]

@!attribute [rw] public_access_cidrs

The CIDR blocks that are allowed access to your cluster's public
Kubernetes API server endpoint. Communication to the endpoint from
addresses outside of the CIDR blocks that you specify is denied. The
default value is `0.0.0.0/0`. If you've disabled private endpoint
access and you have nodes or Fargate pods in the cluster, then
ensure that you specify the necessary CIDR blocks. For more
information, see [Amazon EKS cluster endpoint access control][1] in
the <i> <i>Amazon EKS User Guide</i> </i>.

[1]: https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html
@return [Array<String>]

@see docs.aws.amazon.com/goto/WebAPI/eks-2017-11-01/VpcConfigRequest AWS API Documentation

Constants

SENSITIVE