/**
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
* SPDX-License-Identifier: Apache-2.0.
*/
#pragma once
#include An object representing the VPC configuration to use for an Amazon EKS
* cluster.See Also:
AWS
* API Reference
Specify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline const Aws::VectorSpecify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline bool SubnetIdsHasBeenSet() const { return m_subnetIdsHasBeenSet; } /** *Specify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline void SetSubnetIds(const Aws::VectorSpecify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline void SetSubnetIds(Aws::VectorSpecify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& WithSubnetIds(const Aws::VectorSpecify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& WithSubnetIds(Aws::VectorSpecify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& AddSubnetIds(const Aws::String& value) { m_subnetIdsHasBeenSet = true; m_subnetIds.push_back(value); return *this; } /** *Specify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& AddSubnetIds(Aws::String&& value) { m_subnetIdsHasBeenSet = true; m_subnetIds.push_back(std::move(value)); return *this; } /** *Specify subnets for your Amazon EKS worker nodes. Amazon EKS creates * cross-account elastic network interfaces in these subnets to allow communication * between your worker nodes and the Kubernetes control plane.
*/ inline VpcConfigRequest& AddSubnetIds(const char* value) { m_subnetIdsHasBeenSet = true; m_subnetIds.push_back(value); return *this; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline const Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline bool SecurityGroupIdsHasBeenSet() const { return m_securityGroupIdsHasBeenSet; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline void SetSecurityGroupIds(const Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline void SetSecurityGroupIds(Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline VpcConfigRequest& WithSecurityGroupIds(const Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline VpcConfigRequest& WithSecurityGroupIds(Aws::VectorSpecify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline VpcConfigRequest& AddSecurityGroupIds(const Aws::String& value) { m_securityGroupIdsHasBeenSet = true; m_securityGroupIds.push_back(value); return *this; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline VpcConfigRequest& AddSecurityGroupIds(Aws::String&& value) { m_securityGroupIdsHasBeenSet = true; m_securityGroupIds.push_back(std::move(value)); return *this; } /** *Specify one or more security groups for the cross-account elastic network * interfaces that Amazon EKS creates to use to allow communication between your * worker nodes and the Kubernetes control plane. If you don't specify a security * group, the default security group for your VPC is used.
*/ inline VpcConfigRequest& AddSecurityGroupIds(const char* value) { m_securityGroupIdsHasBeenSet = true; m_securityGroupIds.push_back(value); return *this; } /** *Set this value to false to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to false to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to false to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to false to disable public access to your
* cluster's Kubernetes API server endpoint. If you disable public access, your
* cluster's Kubernetes API server can only receive requests from within the
* cluster VPC. The default value for this parameter is true, which
* enables public access for your Kubernetes API server. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to true to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have worker nodes or AWS Fargate pods in the cluster, then ensure
* that publicAccessCidrs includes the necessary CIDR blocks for
* communication with the worker nodes or Fargate pods. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to true to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have worker nodes or AWS Fargate pods in the cluster, then ensure
* that publicAccessCidrs includes the necessary CIDR blocks for
* communication with the worker nodes or Fargate pods. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to true to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have worker nodes or AWS Fargate pods in the cluster, then ensure
* that publicAccessCidrs includes the necessary CIDR blocks for
* communication with the worker nodes or Fargate pods. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
Set this value to true to enable private access for your
* cluster's Kubernetes API server endpoint. If you enable private access,
* Kubernetes API requests from within your cluster's VPC use the private VPC
* endpoint. The default value for this parameter is false, which
* disables private access for your Kubernetes API server. If you disable private
* access and you have worker nodes or AWS Fargate pods in the cluster, then ensure
* that publicAccessCidrs includes the necessary CIDR blocks for
* communication with the worker nodes or Fargate pods. For more information, see
* Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .
The CIDR blocks that are allowed access to your cluster's public Kubernetes
* API server endpoint. Communication to the endpoint from addresses outside of the
* CIDR blocks that you specify is denied. The default value is
* 0.0.0.0/0. If you've disabled private endpoint access and you have
* worker nodes or AWS Fargate pods in the cluster, then ensure that you specify
* the necessary CIDR blocks. For more information, see Amazon
* EKS Cluster Endpoint Access Control in the Amazon EKS User Guide
* .