Interface ContainerAwsClusterNetworking

  • All Superinterfaces:
    software.amazon.jsii.JsiiSerializable
    All Known Implementing Classes:
    ContainerAwsClusterNetworking.Jsii$Proxy

    @Generated(value="jsii-pacmak/1.102.0 (build e354887)",
               date="2024-08-31T03:59:19.154Z")
    @Stability(Stable)
    public interface ContainerAwsClusterNetworking
    extends software.amazon.jsii.JsiiSerializable
    • Method Detail

      • getPodAddressCidrBlocks

        @Stability(Stable)
        @NotNull
        List<String> getPodAddressCidrBlocks()
        All pods in the cluster are assigned an RFC1918 IPv4 address from these ranges.

        Only a single range is supported. This field cannot be changed after creation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/container_aws_cluster#pod_address_cidr_blocks ContainerAwsCluster#pod_address_cidr_blocks}

      • getServiceAddressCidrBlocks

        @Stability(Stable)
        @NotNull
        List<String> getServiceAddressCidrBlocks()
        All services in the cluster are assigned an RFC1918 IPv4 address from these ranges.

        Only a single range is supported. This field cannot be changed after creation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/container_aws_cluster#service_address_cidr_blocks ContainerAwsCluster#service_address_cidr_blocks}

      • getVpcId

        @Stability(Stable)
        @NotNull
        String getVpcId()
        The VPC associated with the cluster.

        All component clusters (i.e. control plane and node pools) run on a single VPC. This field cannot be changed after creation. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/container_aws_cluster#vpc_id ContainerAwsCluster#vpc_id}

      • getPerNodePoolSgRulesDisabled

        @Stability(Stable)
        @Nullable
        default Object getPerNodePoolSgRulesDisabled()
        Disable the per node pool subnet security group rules on the control plane security group.

        When set to true, you must also provide one or more security groups that ensure node pools are able to send requests to the control plane on TCP/443 and TCP/8132. Failure to do so may result in unavailable node pools. Docs at Terraform Registry: {@link https://registry.terraform.io/providers/hashicorp/google/5.43.1/docs/resources/container_aws_cluster#per_node_pool_sg_rules_disabled ContainerAwsCluster#per_node_pool_sg_rules_disabled}