GradientEdge CDK Utils
    Preparing search index...
    interface EksClusterProps {
        albController?: AlbControllerOptions;
        appCapacity: number;
        appContainerPort: number;
        authenticationMode?: AuthenticationMode;
        awscliLayer?: ILayerVersion;
        bootstrapClusterCreatorAdminPermissions?: boolean;
        bootstrapSelfManagedAddons?: boolean;
        clusterHandlerEnvironment?: { [key: string]: string };
        clusterHandlerSecurityGroup?: ISecurityGroup;
        clusterLogging?: ClusterLoggingTypes[];
        clusterName?: string;
        coreDnsComputeType?: CoreDnsComputeType;
        defaultCapacity?: number;
        defaultCapacityInstance?: InstanceType;
        defaultCapacityType?: DefaultCapacityType;
        endpointAccess?: EndpointAccess;
        ipFamily?: IpFamily;
        kubectlEnvironment?: { [key: string]: string };
        kubectlLambdaRole?: IRole;
        kubectlLayer: ILayerVersion;
        kubectlMemory?: Size;
        mastersRole?: IRole;
        onEventLayer?: ILayerVersion;
        outputClusterName?: boolean;
        outputConfigCommand?: boolean;
        outputMastersRoleArn?: boolean;
        placeClusterHandlerInVpc?: boolean;
        prune?: boolean;
        remoteNodeNetworks?: RemoteNodeNetwork[];
        remotePodNetworks?: RemotePodNetwork[];
        removalPolicy?: RemovalPolicy;
        role?: IRole;
        secretsEncryptionKey?: IKeyRef;
        securityGroup?: ISecurityGroup;
        serviceIpv4Cidr?: string;
        tags?: { [key: string]: string };
        version: KubernetesVersion;
        vpc?: IVpc;
        vpcSubnets?: SubnetSelection[];
    }

    Hierarchy

    • ClusterProps
      • EksClusterProps
    Index

    Properties

    albController?: AlbControllerOptions

    Install the AWS Load Balancer Controller onto the cluster.

    - The controller is not installed.
    
    appCapacity: number
    appContainerPort: number
    authenticationMode?: AuthenticationMode

    The desired authentication mode for the cluster.

    AuthenticationMode.CONFIG_MAP
    
    awscliLayer?: ILayerVersion

    An AWS Lambda layer that contains the aws CLI.

    The handler expects the layer to include the following executables:

    /opt/awscli/aws
    
    - a default layer with the AWS CLI 1.x
    
    bootstrapClusterCreatorAdminPermissions?: boolean

    Whether or not IAM principal of the cluster creator was set as a cluster admin access entry during cluster creation time.

    Changing this value after the cluster has been created will result in the cluster being replaced.

    true
    
    bootstrapSelfManagedAddons?: boolean

    If you set this value to False when creating a cluster, the default networking add-ons will not be installed. The default networking addons include vpc-cni, coredns, and kube-proxy. Use this option when you plan to install third-party alternative add-ons or self-manage the default networking add-ons.

    Changing this value after the cluster has been created will result in the cluster being replaced.

    true
    
    clusterHandlerEnvironment?: { [key: string]: string }

    Custom environment variables when interacting with the EKS endpoint to manage the cluster lifecycle.

    - No environment variables.
    
    clusterHandlerSecurityGroup?: ISecurityGroup

    A security group to associate with the Cluster Handler's Lambdas. The Cluster Handler's Lambdas are responsible for calling AWS's EKS API.

    Requires placeClusterHandlerInVpc to be set to true.

    - No security group.
    
    clusterLogging?: ClusterLoggingTypes[]

    The cluster log types which you want to enable.

    - none
    
    clusterName?: string

    Name for the cluster.

    - Automatically generated name
    
    coreDnsComputeType?: CoreDnsComputeType

    Controls the "eks.amazonaws.com/compute-type" annotation in the CoreDNS configuration on your cluster to determine which compute type to use for CoreDNS.

    CoreDnsComputeType.EC2 (for FargateCluster the default is FARGATE)

    defaultCapacity?: number

    Number of instances to allocate as an initial capacity for this cluster. Instance type can be configured through defaultCapacityInstanceType, which defaults to m5.large.

    Use cluster.addAutoScalingGroupCapacity to add additional customized capacity. Set this to 0 is you wish to avoid the initial capacity allocation.

    2
    
    defaultCapacityInstance?: InstanceType

    The instance type to use for the default capacity. This will only be taken into account if defaultCapacity is > 0.

    m5.large
    
    defaultCapacityType?: DefaultCapacityType

    The default capacity type for the cluster.

    NODEGROUP
    
    endpointAccess?: EndpointAccess

    Configure access to the Kubernetes API server endpoint..

    EndpointAccess.PUBLIC_AND_PRIVATE
    
    ipFamily?: IpFamily

    Specify which IP family is used to assign Kubernetes pod and service IP addresses.

    kubectlEnvironment?: { [key: string]: string }

    Environment variables for the kubectl execution. Only relevant for kubectl enabled clusters.

    - No environment variables.
    
    kubectlLambdaRole?: IRole

    The IAM role to pass to the Kubectl Lambda Handler.

    - Default Lambda IAM Execution Role
    
    kubectlLayer: ILayerVersion

    An AWS Lambda Layer which includes kubectl and Helm.

    This layer is used by the kubectl handler to apply manifests and install helm charts. You must pick an appropriate releases of one of the @aws-cdk/layer-kubectl-vXX packages, that works with the version of Kubernetes you have chosen.

    The handler expects the layer to include the following executables:

    /opt/helm/helm
    /opt/kubectl/kubectl
    kubectlMemory?: Size

    Amount of memory to allocate to the provider's lambda function.

    Size.gibibytes(1)
    
    mastersRole?: IRole

    An IAM role that will be added to the system:masters Kubernetes RBAC group.

    onEventLayer?: ILayerVersion

    An AWS Lambda Layer which includes the NPM dependency proxy-agent. This layer is used by the onEvent handler to route AWS SDK requests through a proxy.

    By default, the provider will use the layer included in the "aws-lambda-layer-node-proxy-agent" SAR application which is available in all commercial regions.

    To deploy the layer locally define it in your app as follows:

    const layer = new lambda.LayerVersion(this, 'proxy-agent-layer', {
    code: lambda.Code.fromAsset(`${__dirname}/layer.zip`),
    compatibleRuntimes: [lambda.Runtime.NODEJS_LATEST],
    });
    - a layer bundled with this module.
    
    outputClusterName?: boolean

    Determines whether a CloudFormation output with the name of the cluster will be synthesized.

    false
    
    outputConfigCommand?: boolean

    Determines whether a CloudFormation output with the aws eks update-kubeconfig command will be synthesized. This command will include the cluster name and the ARN of the masters IAM role.

    Note: If mastersRole is not specified, this property will be ignored and no config command will be emitted.

    outputMastersRoleArn?: boolean

    Determines whether a CloudFormation output with the ARN of the "masters" IAM role will be synthesized (if mastersRole is specified).

    false
    
    placeClusterHandlerInVpc?: boolean

    If set to true, the cluster handler functions will be placed in the private subnets of the cluster vpc, subject to the vpcSubnets selection strategy.

    false
    
    prune?: boolean

    Indicates whether Kubernetes resources added through addManifest() can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the kubectl apply operation with the --prune switch.

    true
    
    remoteNodeNetworks?: RemoteNodeNetwork[]

    IPv4 CIDR blocks defining the expected address range of hybrid nodes that will join the cluster.

    - none
    
    remotePodNetworks?: RemotePodNetwork[]

    IPv4 CIDR blocks for Pods running Kubernetes webhooks on hybrid nodes.

    - none
    
    removalPolicy?: RemovalPolicy

    The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation.

    This can happen in one of three situations:

    • The resource is removed from the template, so CloudFormation stops managing it;
    • A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it;
    • The stack is deleted, so CloudFormation stops managing all resources in it.

    This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct.

    - Resources will be deleted.
    
    role?: IRole

    Role that provides permissions for the Kubernetes control plane to make calls to AWS API operations on your behalf.

    - A role is automatically created for you
    
    secretsEncryptionKey?: IKeyRef

    KMS secret for envelope encryption for Kubernetes secrets.

    - By default, Kubernetes stores all secret object data within etcd and
    all etcd volumes used by Amazon EKS are encrypted at the disk-level
    using AWS-Managed encryption keys.
    securityGroup?: ISecurityGroup

    Security Group to use for Control Plane ENIs

    - A security group is automatically created
    
    serviceIpv4Cidr?: string

    The CIDR block to assign Kubernetes service IP addresses from.

    - Kubernetes assigns addresses from either the
    10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
    tags?: { [key: string]: string }

    The tags assigned to the EKS cluster

    - none
    
    version: KubernetesVersion

    The Kubernetes version to run in the cluster

    vpc?: IVpc

    The VPC in which to create the Cluster.

    • a VPC with default configuration will be created and can be accessed through cluster.vpc.
    vpcSubnets?: SubnetSelection[]

    Where to place EKS Control Plane ENIs

    For example, to only select private subnets, supply the following:

    vpcSubnets: [{ subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS }]

    - All public and private subnets