/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include An object representing the VPC configuration to use for an Amazon EKS
* cluster.See Also:
AWS
* API Reference
Specify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline const Aws::VectorSpecify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline bool SubnetIdsHasBeenSet() const { return m_subnetIdsHasBeenSet; } /** *Specify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline void SetSubnetIds(const Aws::VectorSpecify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline void SetSubnetIds(Aws::VectorSpecify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& WithSubnetIds(const Aws::VectorSpecify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& WithSubnetIds(Aws::VectorSpecify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& AddSubnetIds(const Aws::String& value) { m_subnetIdsHasBeenSet = true; m_subnetIds.push_back(value); return *this; } /** *Specify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& AddSubnetIds(Aws::String&& value) { m_subnetIdsHasBeenSet = true; m_subnetIds.push_back(std::move(value)); return *this; } /** *Specify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account * elastic network interfaces in these subnets to allow communication between your * nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& AddSubnetIds(const char* value) { m_subnetIdsHasBeenSet = true; m_subnetIds.push_back(value); return *this; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline const Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline bool SecurityGroupIdsHasBeenSet() const { return m_securityGroupIdsHasBeenSet; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline void SetSecurityGroupIds(const Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline void SetSecurityGroupIds(Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline VpcConfigRequest& WithSecurityGroupIds(const Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline VpcConfigRequest& WithSecurityGroupIds(Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline VpcConfigRequest& AddSecurityGroupIds(const Aws::String& value) { m_securityGroupIdsHasBeenSet = true; m_securityGroupIds.push_back(value); return *this; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline VpcConfigRequest& AddSecurityGroupIds(Aws::String&& value) { m_securityGroupIdsHasBeenSet = true; m_securityGroupIds.push_back(std::move(value)); return *this; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use that allow communication between your * nodes and the Kubernetes control plane. If you don't specify any security * groups, then familiarize yourself with the difference between Amazon EKS * defaults for clusters deployed with Kubernetes. For more information, see Amazon * EKS security group considerations in the Amazon EKS User Guide * .
*/ inline VpcConfigRequest& AddSecurityGroupIds(const char* value) { m_securityGroupIdsHasBeenSet = true; m_securityGroupIds.push_back(value); return *this; } /** *Set this value to false
to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true
, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to false
to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true
, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to false
to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true
, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to false
to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true
, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to true
to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false
, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have nodes or Fargate pods in the cluster, then ensure that
* publicAccessCidrs
includes the necessary CIDR blocks for
* communication with the nodes or Fargate pods. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to true
to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false
, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have nodes or Fargate pods in the cluster, then ensure that
* publicAccessCidrs
includes the necessary CIDR blocks for
* communication with the nodes or Fargate pods. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to true
to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false
, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have nodes or Fargate pods in the cluster, then ensure that
* publicAccessCidrs
includes the necessary CIDR blocks for
* communication with the nodes or Fargate pods. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
Set this value to true
to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false
, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have nodes or Fargate pods in the cluster, then ensure that
* publicAccessCidrs
includes the necessary CIDR blocks for
* communication with the nodes or Fargate pods. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0
. If you've disabled private endpoint access and you have
* nodes or Fargate pods in the cluster, then ensure that you specify the necessary
* CIDR blocks. For more information, see Amazon
* EKS cluster endpoint access control in the Amazon EKS User Guide
* .