Properties for the generic cluster provider, containing definitions of managed node groups, auto-scaling groups, fargate profiles.

interface GenericClusterProviderProps {
    albController?: AlbControllerOptions;
    authenticationMode?: AuthenticationMode;
    autoscalingNodeGroups?: AutoscalingNodeGroup[];
    awscliLayer?: ILayerVersion;
    clusterHandlerEnvironment?: {
        [key: string]: string;
    };
    clusterHandlerSecurityGroup?: ISecurityGroup;
    clusterLogging?: ControlPlaneLogType[];
    clusterName?: string;
    coreDnsComputeType?: CoreDnsComputeType;
    endpointAccess?: EndpointAccess;
    fargateProfiles?: {
        [key: string]: eks.FargateProfileOptions;
    };
    ipFamily?: IpFamily;
    isolatedCluster?: boolean;
    kubectlEnvironment?: {
        [key: string]: string;
    };
    kubectlLayer?: ILayerVersion;
    kubectlMemory?: Size;
    managedNodeGroups?: ManagedNodeGroup[];
    mastersRole?: IRole;
    onEventLayer?: ILayerVersion;
    outputClusterName?: boolean;
    outputConfigCommand?: boolean;
    outputMastersRoleArn?: boolean;
    placeClusterHandlerInVpc?: boolean;
    privateCluster?: boolean;
    prune?: boolean;
    role?: IRole;
    secretsEncryptionKey?: IKey;
    securityGroup?: ISecurityGroup;
    serviceIpv4Cidr?: string;
    tags?: {
        [key: string]: string;
    };
    version?: KubernetesVersion;
    vpc?: IVpc;
    vpcSubnets?: SubnetSelection[];
}

Hierarchy

  • Partial<eks.ClusterOptions>
    • GenericClusterProviderProps

Properties

albController?: AlbControllerOptions

Install the AWS Load Balancer Controller onto the cluster.

- The controller is not installed.
authenticationMode?: AuthenticationMode

The desired authentication mode for the cluster.

AuthenticationMode.CONFIG_MAP
autoscalingNodeGroups?: AutoscalingNodeGroup[]

Array of autoscaling node groups.

awscliLayer?: ILayerVersion

An AWS Lambda layer that contains the aws CLI.

The handler expects the layer to include the following executables:

/opt/awscli/aws
- a default layer with the AWS CLI 1.x
clusterHandlerEnvironment?: {
    [key: string]: string;
}

Custom environment variables when interacting with the EKS endpoint to manage the cluster lifecycle.

- No environment variables.
clusterHandlerSecurityGroup?: ISecurityGroup

A security group to associate with the Cluster Handler's Lambdas. The Cluster Handler's Lambdas are responsible for calling AWS's EKS API.

Requires placeClusterHandlerInVpc to be set to true.

- No security group.
clusterLogging?: ControlPlaneLogType[]

The cluster log types which you want to enable.

- none
clusterName?: string

Name for the cluster.

- Automatically generated name
coreDnsComputeType?: CoreDnsComputeType

Controls the "eks.amazonaws.com/compute-type" annotation in the CoreDNS configuration on your cluster to determine which compute type to use for CoreDNS.

CoreDnsComputeType.EC2 (for FargateCluster the default is FARGATE)

endpointAccess?: EndpointAccess

Configure access to the Kubernetes API server endpoint..

EndpointAccess.PUBLIC_AND_PRIVATE
fargateProfiles?: {
    [key: string]: eks.FargateProfileOptions;
}

Fargate profiles

ipFamily?: IpFamily

Specify which IP family is used to assign Kubernetes pod and service IP addresses.

isolatedCluster?: boolean

Whether cluster has internet access.

kubectlEnvironment?: {
    [key: string]: string;
}

Environment variables for the kubectl execution. Only relevant for kubectl enabled clusters.

- No environment variables.
kubectlLayer?: ILayerVersion

An AWS Lambda Layer which includes kubectl and Helm.

This layer is used by the kubectl handler to apply manifests and install helm charts. You must pick an appropriate releases of one of the @aws-cdk/layer-kubectl-vXX packages, that works with the version of Kubernetes you have chosen. If you don't supply this value kubectl 1.20 will be used, but that version is most likely too old.

The handler expects the layer to include the following executables:

/opt/helm/helm
/opt/kubectl/kubectl
- a default layer with Kubectl 1.20.
kubectlMemory?: Size

Amount of memory to allocate to the provider's lambda function.

Size.gibibytes(1)
managedNodeGroups?: ManagedNodeGroup[]

Array of managed node groups.

mastersRole?: IRole

An IAM role that will be added to the system:masters Kubernetes RBAC group.

onEventLayer?: ILayerVersion

An AWS Lambda Layer which includes the NPM dependency proxy-agent. This layer is used by the onEvent handler to route AWS SDK requests through a proxy.

By default, the provider will use the layer included in the "aws-lambda-layer-node-proxy-agent" SAR application which is available in all commercial regions.

To deploy the layer locally define it in your app as follows:

const layer = new lambda.LayerVersion(this, 'proxy-agent-layer', {
code: lambda.Code.fromAsset(`${__dirname}/layer.zip`),
compatibleRuntimes: [lambda.Runtime.NODEJS_LATEST],
});
- a layer bundled with this module.
outputClusterName?: boolean

Determines whether a CloudFormation output with the name of the cluster will be synthesized.

false
outputConfigCommand?: boolean

Determines whether a CloudFormation output with the aws eks update-kubeconfig command will be synthesized. This command will include the cluster name and, if applicable, the ARN of the masters IAM role.

true
outputMastersRoleArn?: boolean

Determines whether a CloudFormation output with the ARN of the "masters" IAM role will be synthesized (if mastersRole is specified).

false
placeClusterHandlerInVpc?: boolean

If set to true, the cluster handler functions will be placed in the private subnets of the cluster vpc, subject to the vpcSubnets selection strategy.

false
privateCluster?: boolean

Whether API server is private.

prune?: boolean

Indicates whether Kubernetes resources added through addManifest() can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the kubectl apply operation with the --prune switch.

true
role?: IRole

Role that provides permissions for the Kubernetes control plane to make calls to AWS API operations on your behalf.

- A role is automatically created for you
secretsEncryptionKey?: IKey

KMS secret for envelope encryption for Kubernetes secrets.

- By default, Kubernetes stores all secret object data within etcd and
all etcd volumes used by Amazon EKS are encrypted at the disk-level
using AWS-Managed encryption keys.
securityGroup?: ISecurityGroup

Security Group to use for Control Plane ENIs

- A security group is automatically created
serviceIpv4Cidr?: string

The CIDR block to assign Kubernetes service IP addresses from.

- Kubernetes assigns addresses from either the
10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
tags?: {
    [key: string]: string;
}

Tags for the cluster

version?: KubernetesVersion

The Kubernetes version to run in the cluster

vpc?: IVpc

The VPC in which to create the Cluster.

  • a VPC with default configuration will be created and can be accessed through cluster.vpc.
vpcSubnets?: SubnetSelection[]

Where to place EKS Control Plane ENIs

For example, to only select private subnets, supply the following:

vpcSubnets: [{ subnetType: ec2.SubnetType.PRIVATE_WITH_EGRESS }]

- All public and private subnets