Hi there! Are you looking for the official Deno documentation? Try docs.deno.com for all your Deno learning needs.

CreateClusterRequest

import type { CreateClusterRequest } from "https://aws-api.deno.dev/v0.3/services/eks.ts?docs=full";
interface CreateClusterRequest {
clientRequestToken?: string | null;
encryptionConfig?: EncryptionConfig[] | null;
kubernetesNetworkConfig?: KubernetesNetworkConfigRequest | null;
logging?: Logging | null;
name: string;
resourcesVpcConfig: VpcConfigRequest;
roleArn: string;
tags?: {
[key: string]: string | null | undefined;
}
| null;
version?: string | null;
}

§Properties

§
clientRequestToken?: string | null
[src]

Unique, case-sensitive identifier that you provide to ensure the idempotency of the request.

§
encryptionConfig?: EncryptionConfig[] | null
[src]

The encryption configuration for the cluster.

§
kubernetesNetworkConfig?: KubernetesNetworkConfigRequest | null
[src]

The Kubernetes network configuration for the cluster.

§
logging?: Logging | null
[src]

Enable or disable exporting the Kubernetes control plane logs for your cluster to CloudWatch Logs. By default, cluster control plane logs aren't exported to CloudWatch Logs. For more information, see Amazon EKS Cluster control plane logs in the Amazon EKS User Guide.

Note: CloudWatch Logs ingestion, archive storage, and data scanning rates apply to exported control plane logs. For more information, see CloudWatch Pricing.

§
name: string
[src]

The unique name to give to your cluster.

§
resourcesVpcConfig: VpcConfigRequest
[src]

The VPC configuration that's used by the cluster control plane. Amazon EKS VPC resources have specific requirements to work properly with Kubernetes. For more information, see Cluster VPC Considerations and Cluster Security Group Considerations in the Amazon EKS User Guide. You must specify at least two subnets. You can specify up to five security groups. However, we recommend that you use a dedicated security group for your cluster control plane.

§
roleArn: string
[src]

The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control plane to make calls to Amazon Web Services API operations on your behalf. For more information, see Amazon EKS Service IAM Role in the Amazon EKS User Guide.

§
tags?: {
[key: string]: string | null | undefined;
}
| null
[src]

The metadata to apply to the cluster to assist with categorization and organization. Each tag consists of a key and an optional value. You define both.

§
version?: string | null
[src]

The desired Kubernetes version for your cluster. If you don't specify a value here, the latest version available in Amazon EKS is used.