Cluster is the Schema for the Clusters API. Manages an EKS Cluster
Type
CRD
Group
eks.aws.upbound.io
Version
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
ClusterSpec defines the desired state of Cluster
No description provided.
Configuration block for the access config associated with your cluster, see Amazon EKS Access Entries.
List of the desired control plane logging to enable. For more information, see Amazon EKS Control Plane Logging.
Configuration block with encryption configuration for the cluster. Only available on Kubernetes 1.13 and above clusters created after March 6, 2020. Detailed below.
Configuration block with kubernetes network configuration for the cluster. Detailed below.
Configuration block representing the configuration of your local Amazon EKS cluster on an AWS Outpost. This block isn't available for creating Amazon EKS clusters on the AWS cloud.
An object representing the placement configuration for all the control plane instances of your local Amazon EKS cluster on AWS Outpost. The control_plane_placement configuration block supports the following arguments:
The ARN of the Outpost that you want to use for your local Amazon EKS cluster on Outposts. This argument is a list of arns, but only a single Outpost ARN is supported currently.
Reference to a Role in iam to populate roleArn.
Policies for referencing.
Selector for a Role in iam to populate roleArn.
Policies for selection.
Configuration block for the VPC associated with your cluster. Amazon EKS VPC resources have specific requirements to work properly with Kubernetes. For more information, see Cluster VPC Considerations and Cluster Security Group Considerations in the Amazon EKS User Guide. Detailed below. Also contains attributes detailed in the Attributes section.
List of CIDR blocks. Indicates which CIDR blocks can access the Amazon EKS public API server endpoint when enabled. EKS defaults this to a list with 0.0.0.0/0.
References to SecurityGroup in ec2 to populate securityGroupIds.
Policies for referencing.
Selector for a list of SecurityGroup in ec2 to populate securityGroupIds.
Policies for selection.
account elastic network interfaces that Amazon EKS creates to use to allow communication between your worker nodes and the Kubernetes control plane.
References to Subnet in ec2 to populate subnetIds.
Policies for referencing.
Selector for a list of Subnet in ec2 to populate subnetIds.
Policies for selection.
account elastic network interfaces in these subnets to allow communication between your worker nodes and the Kubernetes control plane.
THIS IS A BETA FIELD. It will be honored unless the Management Policies feature flag is disabled. InitProvider holds the same fields as ForProvider, with the exception of Identifier and other resource reference fields. The fields that are in InitProvider are merged into ForProvider when the resource is created. The same fields are also added to the terraform ignore_changes hook, to avoid updating them after creation. This is useful for fields that are required on creation, but we do not desire to update them after creation, for example because of an external controller is managing them, like an autoscaler.
Configuration block for the access config associated with your cluster, see Amazon EKS Access Entries.
List of the desired control plane logging to enable. For more information, see Amazon EKS Control Plane Logging.
Configuration block with encryption configuration for the cluster. Only available on Kubernetes 1.13 and above clusters created after March 6, 2020. Detailed below.
Configuration block with kubernetes network configuration for the cluster. Detailed below.
Configuration block representing the configuration of your local Amazon EKS cluster on an AWS Outpost. This block isn't available for creating Amazon EKS clusters on the AWS cloud.
An object representing the placement configuration for all the control plane instances of your local Amazon EKS cluster on AWS Outpost. The control_plane_placement configuration block supports the following arguments:
The ARN of the Outpost that you want to use for your local Amazon EKS cluster on Outposts. This argument is a list of arns, but only a single Outpost ARN is supported currently.
Reference to a Role in iam to populate roleArn.
Policies for referencing.
Selector for a Role in iam to populate roleArn.
Policies for selection.
Configuration block for the VPC associated with your cluster. Amazon EKS VPC resources have specific requirements to work properly with Kubernetes. For more information, see Cluster VPC Considerations and Cluster Security Group Considerations in the Amazon EKS User Guide. Detailed below. Also contains attributes detailed in the Attributes section.
List of CIDR blocks. Indicates which CIDR blocks can access the Amazon EKS public API server endpoint when enabled. EKS defaults this to a list with 0.0.0.0/0.
References to SecurityGroup in ec2 to populate securityGroupIds.
Policies for referencing.
Selector for a list of SecurityGroup in ec2 to populate securityGroupIds.
Policies for selection.
account elastic network interfaces that Amazon EKS creates to use to allow communication between your worker nodes and the Kubernetes control plane.
References to Subnet in ec2 to populate subnetIds.
Policies for referencing.
Selector for a list of Subnet in ec2 to populate subnetIds.
Policies for selection.
account elastic network interfaces in these subnets to allow communication between your worker nodes and the Kubernetes control plane.
THIS IS A BETA FIELD. It is on by default but can be opted out through a Crossplane feature flag. ManagementPolicies specify the array of actions Crossplane is allowed to take on the managed and external resources. This field is planned to replace the DeletionPolicy field in a future release. Currently, both could be set independently and non-default values would be honored if the feature flag is enabled. If both are custom, the DeletionPolicy field will be ignored. See the design doc for more information: https://github.com/crossplane/crossplane/blob/499895a25d1a1a0ba1604944ef98ac7a1a71f197/design/design-doc-observe-only-resources.md?plain=1#L223 and this one: https://github.com/crossplane/crossplane/blob/444267e84783136daa93568b364a5f01228cacbe/design/one-pager-ignore-changes.md
ProviderConfigReference specifies how the provider that will be used to create, observe, update, and delete this managed resource should be configured.
Policies for referencing.
PublishConnectionDetailsTo specifies the connection secret config which contains a name, metadata and a reference to secret store config to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource.
WriteConnectionSecretToReference specifies the namespace and name of a Secret to which any connection details for this managed resource should be written. Connection details frequently include the endpoint, username, and password required to connect to the managed resource. This field is planned to be replaced in a future release in favor of PublishConnectionDetailsTo. Currently, both could be set independently and connection details would be published to both without affecting each other.
ClusterStatus defines the observed state of Cluster.
No description provided.
Configuration block for the access config associated with your cluster, see Amazon EKS Access Entries.
Attribute block containing certificate-authority-data for your cluster. Detailed below.
List of the desired control plane logging to enable. For more information, see Amazon EKS Control Plane Logging.
Configuration block with encryption configuration for the cluster. Only available on Kubernetes 1.13 and above clusters created after March 6, 2020. Detailed below.
Attribute block containing identity provider information for your cluster. Only available on Kubernetes version 1.13 and 1.14 clusters created or upgraded on or after September 3, 2019. Detailed below.
Configuration block with kubernetes network configuration for the cluster. Detailed below.
Configuration block representing the configuration of your local Amazon EKS cluster on an AWS Outpost. This block isn't available for creating Amazon EKS clusters on the AWS cloud.
An object representing the placement configuration for all the control plane instances of your local Amazon EKS cluster on AWS Outpost. The control_plane_placement configuration block supports the following arguments:
The ARN of the Outpost that you want to use for your local Amazon EKS cluster on Outposts. This argument is a list of arns, but only a single Outpost ARN is supported currently.
Configuration block for the VPC associated with your cluster. Amazon EKS VPC resources have specific requirements to work properly with Kubernetes. For more information, see Cluster VPC Considerations and Cluster Security Group Considerations in the Amazon EKS User Guide. Detailed below. Also contains attributes detailed in the Attributes section.
List of CIDR blocks. Indicates which CIDR blocks can access the Amazon EKS public API server endpoint when enabled. EKS defaults this to a list with 0.0.0.0/0.
account elastic network interfaces that Amazon EKS creates to use to allow communication between your worker nodes and the Kubernetes control plane.
account elastic network interfaces in these subnets to allow communication between your worker nodes and the Kubernetes control plane.
Conditions of the resource.
sample-eks-cluster
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
metadata:
annotations:
meta.upbound.io/example-id: eks/v1beta1/cluster
uptest.upbound.io/timeout: "2400"
labels:
testing.upbound.io/example-name: example-clusterauth
name: sample-eks-cluster
spec:
forProvider:
region: us-west-1
roleArnRef:
name: sample-eks-cluster
vpcConfig:
- subnetIdRefs:
- name: sample-subnet1
- name: sample-subnet2
access-entry
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
metadata:
annotations:
meta.upbound.io/example-id: eks/v1beta1/accessentry
uptest.upbound.io/timeout: "2400"
labels:
testing.upbound.io/example-name: access-entry
name: access-entry
spec:
forProvider:
accessConfig:
- authenticationMode: API_AND_CONFIG_MAP
bootstrapClusterCreatorAdminPermissions: true
region: us-east-2
roleArnRef:
name: access-entry-eks-cluster
vpcConfig:
- subnetIdRefs:
- name: sample-subnet1
- name: sample-subnet2
eks-cluster-pia
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
metadata:
annotations:
meta.upbound.io/example-id: eks/v1beta1/podidentityassociation
uptest.upbound.io/timeout: "2400"
labels:
testing.upbound.io/example-name: example-pia
name: eks-cluster-pia
spec:
forProvider:
region: us-west-1
roleArnSelector:
matchLabels:
testing.upbound.io/example-name: example-pia
vpcConfig:
- subnetIdRefs:
- name: sample-subnet1
- name: sample-subnet2
sample-eks-cluster
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
metadata:
annotations:
meta.upbound.io/example-id: eks/v1beta1/fargateprofile
uptest.upbound.io/timeout: "2400"
labels:
testing.upbound.io/example-name: example
name: sample-eks-cluster
spec:
forProvider:
region: us-west-1
roleArnRef:
name: sample-eks-cluster
vpcConfig:
- subnetIdRefs:
- name: sample-subnet1
- name: sample-subnet2
sample-eks-cluster
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
metadata:
annotations:
meta.upbound.io/example-id: eks/v1beta1/addon
uptest.upbound.io/timeout: "2400"
labels:
testing.upbound.io/example-name: example
name: sample-eks-cluster
spec:
forProvider:
region: us-west-1
roleArnRef:
name: sample-eks-cluster
vpcConfig:
- subnetIdRefs:
- name: sample-subnet1
- name: sample-subnet2
sample-eks-cluster
apiVersion: eks.aws.upbound.io/v1beta1
kind: Cluster
metadata:
annotations:
meta.upbound.io/example-id: eks/v1beta1/cluster
uptest.upbound.io/timeout: "2400"
labels:
testing.upbound.io/example-name: example
name: sample-eks-cluster
spec:
forProvider:
region: us-west-1
roleArnRef:
name: sample-eks-cluster
vpcConfig:
- subnetIdRefs:
- name: sample-subnet1
- name: sample-subnet2