@aws-sdk/client-eks 3.45.0 → 3.46.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (31) hide show
  1. package/CHANGELOG.md +18 -0
  2. package/README.md +10 -10
  3. package/dist-cjs/models/models_0.js +8 -3
  4. package/dist-cjs/protocols/Aws_restJson1.js +3 -0
  5. package/dist-cjs/runtimeConfig.js +0 -2
  6. package/dist-es/models/models_0.js +5 -0
  7. package/dist-es/protocols/Aws_restJson1.js +3 -1
  8. package/dist-es/runtimeConfig.js +0 -2
  9. package/dist-types/EKS.d.ts +112 -99
  10. package/dist-types/EKSClient.d.ts +10 -10
  11. package/dist-types/commands/CreateClusterCommand.d.ts +2 -1
  12. package/dist-types/commands/CreateFargateProfileCommand.d.ts +28 -24
  13. package/dist-types/commands/CreateNodegroupCommand.d.ts +9 -8
  14. package/dist-types/commands/DeleteClusterCommand.d.ts +2 -2
  15. package/dist-types/commands/DeleteFargateProfileCommand.d.ts +8 -7
  16. package/dist-types/commands/DeregisterClusterCommand.d.ts +2 -1
  17. package/dist-types/commands/DescribeUpdateCommand.d.ts +2 -2
  18. package/dist-types/commands/DisassociateIdentityProviderConfigCommand.d.ts +2 -2
  19. package/dist-types/commands/ListClustersCommand.d.ts +2 -1
  20. package/dist-types/commands/ListFargateProfilesCommand.d.ts +2 -2
  21. package/dist-types/commands/ListNodegroupsCommand.d.ts +3 -2
  22. package/dist-types/commands/ListUpdatesCommand.d.ts +2 -2
  23. package/dist-types/commands/RegisterClusterCommand.d.ts +9 -5
  24. package/dist-types/commands/TagResourceCommand.d.ts +3 -4
  25. package/dist-types/commands/UpdateClusterConfigCommand.d.ts +12 -11
  26. package/dist-types/commands/UpdateClusterVersionCommand.d.ts +3 -4
  27. package/dist-types/commands/UpdateNodegroupConfigCommand.d.ts +4 -5
  28. package/dist-types/commands/UpdateNodegroupVersionCommand.d.ts +7 -6
  29. package/dist-types/models/models_0.d.ts +252 -187
  30. package/dist-types/ts3.4/models/models_0.d.ts +10 -0
  31. package/package.json +37 -44
@@ -1,8 +1,8 @@
1
1
  import { MetadataBearer as $MetadataBearer, SmithyException as __SmithyException } from "@aws-sdk/types";
2
2
  /**
3
3
  * <p>You don't have permissions to perform the requested operation. The user or role that
4
- * is making the request must have at least one IAM permissions policy attached that
5
- * grants the required permissions. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access.html">Access
4
+ * is making the request must have at least one IAM permissions policy
5
+ * attached that grants the required permissions. For more information, see <a href="https://docs.aws.amazon.com/IAM/latest/UserGuide/access.html">Access
6
6
  * Management</a> in the <i>IAM User Guide</i>. </p>
7
7
  */
8
8
  export interface AccessDeniedException extends __SmithyException, $MetadataBearer {
@@ -103,8 +103,8 @@ export interface Addon {
103
103
  */
104
104
  modifiedAt?: Date;
105
105
  /**
106
- * <p>The Amazon Resource Name (ARN) of the IAM role that is bound to the Kubernetes service account used
107
- * by the add-on.</p>
106
+ * <p>The Amazon Resource Name (ARN) of the IAM role that is bound to the Kubernetes service
107
+ * account used by the add-on.</p>
108
108
  */
109
109
  serviceAccountRoleArn?: string;
110
110
  /**
@@ -195,15 +195,15 @@ export declare namespace AddonInfo {
195
195
  }
196
196
  export declare type AMITypes = "AL2_ARM_64" | "AL2_x86_64" | "AL2_x86_64_GPU" | "BOTTLEROCKET_ARM_64" | "BOTTLEROCKET_x86_64" | "CUSTOM";
197
197
  /**
198
- * <p>Identifies the Key Management Service (KMS) key used to encrypt the secrets.</p>
198
+ * <p>Identifies the Key Management Service (KMS) key used to encrypt the
199
+ * secrets.</p>
199
200
  */
200
201
  export interface Provider {
201
202
  /**
202
203
  * <p>Amazon Resource Name (ARN) or alias of the KMS key. The KMS key must be symmetric, created in the same
203
204
  * region as the cluster, and if the KMS key was created in a different account, the user
204
205
  * must have access to the KMS key. For more information, see <a href="https://docs.aws.amazon.com/kms/latest/developerguide/key-policy-modifying-external-accounts.html">Allowing
205
- * Users in Other Accounts to Use a KMS key</a> in the <i>Key Management Service
206
- * Developer Guide</i>.</p>
206
+ * Users in Other Accounts to Use a KMS key</a> in the <i>Key Management Service Developer Guide</i>.</p>
207
207
  */
208
208
  keyArn?: string;
209
209
  }
@@ -222,7 +222,8 @@ export interface EncryptionConfig {
222
222
  */
223
223
  resources?: string[];
224
224
  /**
225
- * <p>Key Management Service (KMS) key. Either the ARN or the alias can be used.</p>
225
+ * <p>Key Management Service (KMS) key. Either the ARN or the alias can be
226
+ * used.</p>
226
227
  */
227
228
  provider?: Provider;
228
229
  }
@@ -307,7 +308,7 @@ export interface ErrorDetail {
307
308
  * <p>
308
309
  * <b>OperationNotPermitted</b>: The service role
309
310
  * associated with the cluster doesn't have the required access permissions for
310
- * Amazon EKS.</p>
311
+ * Amazon EKS.</p>
311
312
  * </li>
312
313
  * <li>
313
314
  * <p>
@@ -648,8 +649,8 @@ export interface OidcIdentityProviderConfigRequest {
648
649
  /**
649
650
  * <p>The key value pairs that describe required claims in the identity token. If set, each
650
651
  * claim is verified to be present in the token with a matching value. For the maximum
651
- * number of claims that you can require, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/service-quotas.html">Amazon EKS service quotas</a> in the
652
- * <i>Amazon EKS User Guide</i>.</p>
652
+ * number of claims that you can require, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/service-quotas.html">Amazon EKS service
653
+ * quotas</a> in the <i>Amazon EKS User Guide</i>.</p>
653
654
  */
654
655
  requiredClaims?: {
655
656
  [key: string]: string;
@@ -709,11 +710,13 @@ export declare namespace AssociateIdentityProviderConfigResponse {
709
710
  const filterSensitiveLog: (obj: AssociateIdentityProviderConfigResponse) => any;
710
711
  }
711
712
  /**
712
- * <p>An Auto Scaling group that is associated with an Amazon EKS managed node group.</p>
713
+ * <p>An Auto Scaling group that is associated with an Amazon EKS managed node
714
+ * group.</p>
713
715
  */
714
716
  export interface AutoScalingGroup {
715
717
  /**
716
- * <p>The name of the Auto Scaling group associated with an Amazon EKS managed node group.</p>
718
+ * <p>The name of the Auto Scaling group associated with an Amazon EKS managed node
719
+ * group.</p>
717
720
  */
718
721
  name?: string;
719
722
  }
@@ -753,8 +756,8 @@ export interface CreateAddonRequest {
753
756
  */
754
757
  serviceAccountRoleArn?: string;
755
758
  /**
756
- * <p>How to resolve parameter value conflicts when migrating an existing add-on to an Amazon EKS
757
- * add-on.</p>
759
+ * <p>How to resolve parameter value conflicts when migrating an existing add-on to an
760
+ * Amazon EKS add-on.</p>
758
761
  */
759
762
  resolveConflicts?: ResolveConflicts | string;
760
763
  /**
@@ -789,16 +792,20 @@ export declare namespace CreateAddonResponse {
789
792
  */
790
793
  const filterSensitiveLog: (obj: CreateAddonResponse) => any;
791
794
  }
795
+ export declare enum IpFamily {
796
+ IPV4 = "ipv4",
797
+ IPV6 = "ipv6"
798
+ }
792
799
  /**
793
800
  * <p>The Kubernetes network configuration for the cluster.</p>
794
801
  */
795
802
  export interface KubernetesNetworkConfigRequest {
796
803
  /**
797
- * <p>The CIDR block to assign Kubernetes service IP addresses from. If you don't specify a
798
- * block, Kubernetes assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR
799
- * blocks. We recommend that you specify a block that does not overlap with resources in
800
- * other networks that are peered or connected to your VPC. The block must meet the
801
- * following requirements:</p>
804
+ * <p>Don't specify a value if you select <code>ipv6</code> for <b>ipFamily</b>. The CIDR block to assign Kubernetes service IP addresses from.
805
+ * If you don't specify a block, Kubernetes assigns addresses from either the 10.100.0.0/16
806
+ * or 172.20.0.0/16 CIDR blocks. We recommend that you specify a block that does not
807
+ * overlap with resources in other networks that are peered or connected to your VPC. The
808
+ * block must meet the following requirements:</p>
802
809
  * <ul>
803
810
  * <li>
804
811
  * <p>Within one of the following private IP address blocks: 10.0.0.0/8,
@@ -818,6 +825,22 @@ export interface KubernetesNetworkConfigRequest {
818
825
  * </important>
819
826
  */
820
827
  serviceIpv4Cidr?: string;
828
+ /**
829
+ * <p>Specify which IP version is used to assign Kubernetes Pod and Service IP addresses. If
830
+ * you don't specify a value, <code>ipv4</code> is used by default. You can only specify an
831
+ * IP family when you create a cluster and can't change this value once the cluster is
832
+ * created. If you specify <code>ipv6</code>, the VPC and subnets that you specify for
833
+ * cluster creation must have both IPv4 and IPv6 CIDR blocks assigned to them. </p>
834
+ * <p>You can only specify <code>ipv6</code> for 1.21 and later clusters that use version
835
+ * 1.10.0 or later of the Amazon VPC CNI add-on. If you specify <code>ipv6</code>, then ensure
836
+ * that your VPC meets the requirements and that you're familiar with the considerations
837
+ * listed in <a href="https://docs.aws.amazon.com/eks/latest/userguide/cni-ipv6.html">Assigning
838
+ * IPv6 addresses to Pods and Services</a> in the Amazon EKS User Guide. If
839
+ * you specify <code>ipv6</code>, Kubernetes assigns Service and Pod addresses from the
840
+ * unique local address range (fc00::/7). You can't specify a custom IPv6 CIDR
841
+ * block.</p>
842
+ */
843
+ ipFamily?: IpFamily | string;
821
844
  }
822
845
  export declare namespace KubernetesNetworkConfigRequest {
823
846
  /**
@@ -842,9 +865,8 @@ export interface LogSetup {
842
865
  */
843
866
  types?: (LogType | string)[];
844
867
  /**
845
- * <p>If a log type is enabled, that log type exports its control plane logs to CloudWatch Logs. If a
846
- * log type isn't enabled, that log type doesn't export its control plane logs. Each
847
- * individual log type can be enabled or disabled independently.</p>
868
+ * <p>If a log type is enabled, that log type exports its control plane logs to CloudWatch Logs. If a log type isn't enabled, that log type doesn't export its control
869
+ * plane logs. Each individual log type can be enabled or disabled independently.</p>
848
870
  */
849
871
  enabled?: boolean;
850
872
  }
@@ -870,20 +892,22 @@ export declare namespace Logging {
870
892
  const filterSensitiveLog: (obj: Logging) => any;
871
893
  }
872
894
  /**
873
- * <p>An object representing the VPC configuration to use for an Amazon EKS cluster.</p>
895
+ * <p>An object representing the VPC configuration to use for an Amazon EKS
896
+ * cluster.</p>
874
897
  */
875
898
  export interface VpcConfigRequest {
876
899
  /**
877
- * <p>Specify subnets for your Amazon EKS nodes. Amazon EKS creates cross-account elastic network
878
- * interfaces in these subnets to allow communication between your nodes and the Kubernetes
879
- * control plane.</p>
900
+ * <p>Specify subnets for your Amazon EKS nodes. Amazon EKS creates
901
+ * cross-account elastic network interfaces in these subnets to allow communication between
902
+ * your nodes and the Kubernetes control plane.</p>
880
903
  */
881
904
  subnetIds?: string[];
882
905
  /**
883
906
  * <p>Specify one or more security groups for the cross-account elastic network interfaces
884
- * that Amazon EKS creates to use that allow communication between your nodes and the Kubernetes
885
- * control plane. If you don't specify any security groups, then familiarize yourself with
886
- * the difference between Amazon EKS defaults for clusters deployed with Kubernetes:</p>
907
+ * that Amazon EKS creates to use that allow communication between your nodes and
908
+ * the Kubernetes control plane. If you don't specify any security groups, then familiarize
909
+ * yourself with the difference between Amazon EKS defaults for clusters deployed
910
+ * with Kubernetes:</p>
887
911
  * <ul>
888
912
  * <li>
889
913
  * <p>1.14 Amazon EKS platform version <code>eks.2</code> and earlier</p>
@@ -903,8 +927,8 @@ export interface VpcConfigRequest {
903
927
  * Kubernetes API server endpoint. If you disable public access, your cluster's Kubernetes
904
928
  * API server can only receive requests from within the cluster VPC. The default value for
905
929
  * this parameter is <code>true</code>, which enables public access for your Kubernetes API
906
- * server. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster
907
- * endpoint access control</a> in the <i>
930
+ * server. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster endpoint access control</a> in the
931
+ * <i>
908
932
  * <i>Amazon EKS User Guide</i>
909
933
  * </i>.</p>
910
934
  */
@@ -914,10 +938,11 @@ export interface VpcConfigRequest {
914
938
  * Kubernetes API server endpoint. If you enable private access, Kubernetes API requests
915
939
  * from within your cluster's VPC use the private VPC endpoint. The default value for this
916
940
  * parameter is <code>false</code>, which disables private access for your Kubernetes API
917
- * server. If you disable private access and you have nodes or Fargate pods in the
918
- * cluster, then ensure that <code>publicAccessCidrs</code> includes the necessary CIDR
919
- * blocks for communication with the nodes or Fargate pods. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster
920
- * endpoint access control</a> in the <i>
941
+ * server. If you disable private access and you have nodes or Fargate
942
+ * pods in the cluster, then ensure that <code>publicAccessCidrs</code> includes the
943
+ * necessary CIDR blocks for communication with the nodes or Fargate pods.
944
+ * For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster endpoint access control</a> in
945
+ * the <i>
921
946
  * <i>Amazon EKS User Guide</i>
922
947
  * </i>.</p>
923
948
  */
@@ -926,9 +951,10 @@ export interface VpcConfigRequest {
926
951
  * <p>The CIDR blocks that are allowed access to your cluster's public Kubernetes API server
927
952
  * endpoint. Communication to the endpoint from addresses outside of the CIDR blocks that
928
953
  * you specify is denied. The default value is <code>0.0.0.0/0</code>. If you've disabled
929
- * private endpoint access and you have nodes or Fargate pods in the cluster, then ensure
930
- * that you specify the necessary CIDR blocks. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster
931
- * endpoint access control</a> in the <i>
954
+ * private endpoint access and you have nodes or Fargate pods in the
955
+ * cluster, then ensure that you specify the necessary CIDR blocks. For more information,
956
+ * see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster endpoint access control</a> in the
957
+ * <i>
932
958
  * <i>Amazon EKS User Guide</i>
933
959
  * </i>.</p>
934
960
  */
@@ -951,10 +977,9 @@ export interface CreateClusterRequest {
951
977
  */
952
978
  version?: string;
953
979
  /**
954
- * <p>The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control
955
- * plane to make calls to Amazon Web Services API operations on your behalf. For more information, see
956
- * <a href="https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html">Amazon EKS
957
- * Service IAM Role</a> in the <i>
980
+ * <p>The Amazon Resource Name (ARN) of the IAM role that provides permissions for the
981
+ * Kubernetes control plane to make calls to Amazon Web Services API operations on your
982
+ * behalf. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/service_IAM_role.html">Amazon EKS Service IAM Role</a> in the <i>
958
983
  * <i>Amazon EKS User Guide</i>
959
984
  * </i>.</p>
960
985
  */
@@ -974,14 +999,15 @@ export interface CreateClusterRequest {
974
999
  kubernetesNetworkConfig?: KubernetesNetworkConfigRequest;
975
1000
  /**
976
1001
  * <p>Enable or disable exporting the Kubernetes control plane logs for your cluster to
977
- * CloudWatch Logs. By default, cluster control plane logs aren't exported to CloudWatch Logs. For more
978
- * information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html">Amazon EKS Cluster control plane logs</a> in the
1002
+ * CloudWatch Logs. By default, cluster control plane logs aren't exported to
1003
+ * CloudWatch Logs. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html">Amazon EKS Cluster control plane logs</a> in the
979
1004
  * <i>
980
1005
  * <i>Amazon EKS User Guide</i>
981
1006
  * </i>.</p>
982
1007
  * <note>
983
- * <p>CloudWatch Logs ingestion, archive storage, and data scanning rates apply to exported
984
- * control plane logs. For more information, see <a href="http://aws.amazon.com/cloudwatch/pricing/">CloudWatch Pricing</a>.</p>
1008
+ * <p>CloudWatch Logs ingestion, archive storage, and data scanning rates apply to
1009
+ * exported control plane logs. For more information, see <a href="http://aws.amazon.com/cloudwatch/pricing/">CloudWatch
1010
+ * Pricing</a>.</p>
985
1011
  * </note>
986
1012
  */
987
1013
  logging?: Logging;
@@ -1039,8 +1065,8 @@ export interface ConnectorConfigResponse {
1039
1065
  */
1040
1066
  activationCode?: string;
1041
1067
  /**
1042
- * <p>The expiration time of the connected cluster. The cluster's YAML file must be applied through the native
1043
- * provider.</p>
1068
+ * <p>The expiration time of the connected cluster. The cluster's YAML file must be applied
1069
+ * through the native provider.</p>
1044
1070
  */
1045
1071
  activationExpiry?: Date;
1046
1072
  /**
@@ -1048,7 +1074,8 @@ export interface ConnectorConfigResponse {
1048
1074
  */
1049
1075
  provider?: string;
1050
1076
  /**
1051
- * <p>The Amazon Resource Name (ARN) of the role to communicate with services from the connected Kubernetes cluster.</p>
1077
+ * <p>The Amazon Resource Name (ARN) of the role to communicate with services from the connected Kubernetes
1078
+ * cluster.</p>
1052
1079
  */
1053
1080
  roleArn?: string;
1054
1081
  }
@@ -1091,16 +1118,34 @@ export declare namespace Identity {
1091
1118
  const filterSensitiveLog: (obj: Identity) => any;
1092
1119
  }
1093
1120
  /**
1094
- * <p>The Kubernetes network configuration for the cluster.</p>
1121
+ * <p>The Kubernetes network configuration for the cluster. The response contains a value
1122
+ * for <b>serviceIpv6Cidr</b> or <b>serviceIpv4Cidr</b>, but not both. </p>
1095
1123
  */
1096
1124
  export interface KubernetesNetworkConfigResponse {
1097
1125
  /**
1098
- * <p>The CIDR block that Kubernetes service IP addresses are assigned from. If you didn't
1099
- * specify a CIDR block when you created the cluster, then Kubernetes assigns addresses
1100
- * from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks. If this was specified, then
1101
- * it was specified when the cluster was created and it cannot be changed.</p>
1126
+ * <p>The CIDR block that Kubernetes Pod and Service IP addresses are assigned from.
1127
+ * Kubernetes assigns addresses from an IPv4 CIDR block assigned to a subnet that the node
1128
+ * is in. If you didn't specify a CIDR block when you created the cluster, then Kubernetes
1129
+ * assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks. If this
1130
+ * was specified, then it was specified when the cluster was created and it can't be
1131
+ * changed.</p>
1102
1132
  */
1103
1133
  serviceIpv4Cidr?: string;
1134
+ /**
1135
+ * <p>The CIDR block that Kubernetes Pod and Service IP addresses are assigned from if you
1136
+ * created a 1.21 or later cluster with version 1.10.0 or later of the Amazon VPC CNI add-on and
1137
+ * specified <code>ipv6</code> for <b>ipFamily</b> when you
1138
+ * created the cluster. Kubernetes assigns addresses from the unique local address range
1139
+ * (fc00::/7).</p>
1140
+ */
1141
+ serviceIpv6Cidr?: string;
1142
+ /**
1143
+ * <p>The IP family used to assign Kubernetes Pod and Service IP addresses. The IP family is
1144
+ * always <code>ipv4</code>, unless you have a <code>1.21</code> or later cluster running
1145
+ * version 1.10.0 or later of the Amazon VPC CNI add-on and specified <code>ipv6</code> when you
1146
+ * created the cluster. </p>
1147
+ */
1148
+ ipFamily?: IpFamily | string;
1104
1149
  }
1105
1150
  export declare namespace KubernetesNetworkConfigResponse {
1106
1151
  /**
@@ -1109,7 +1154,8 @@ export declare namespace KubernetesNetworkConfigResponse {
1109
1154
  const filterSensitiveLog: (obj: KubernetesNetworkConfigResponse) => any;
1110
1155
  }
1111
1156
  /**
1112
- * <p>An object representing an Amazon EKS cluster VPC configuration response.</p>
1157
+ * <p>An object representing an Amazon EKS cluster VPC configuration
1158
+ * response.</p>
1113
1159
  */
1114
1160
  export interface VpcConfigResponse {
1115
1161
  /**
@@ -1123,8 +1169,9 @@ export interface VpcConfigResponse {
1123
1169
  */
1124
1170
  securityGroupIds?: string[];
1125
1171
  /**
1126
- * <p>The cluster security group that was created by Amazon EKS for the cluster. Managed node
1127
- * groups use this security group for control-plane-to-data-plane communication.</p>
1172
+ * <p>The cluster security group that was created by Amazon EKS for the cluster.
1173
+ * Managed node groups use this security group for control-plane-to-data-plane
1174
+ * communication.</p>
1128
1175
  */
1129
1176
  clusterSecurityGroupId?: string;
1130
1177
  /**
@@ -1132,19 +1179,21 @@ export interface VpcConfigResponse {
1132
1179
  */
1133
1180
  vpcId?: string;
1134
1181
  /**
1135
- * <p>This parameter indicates whether the Amazon EKS public API server endpoint is enabled. If
1136
- * the Amazon EKS public API server endpoint is disabled, your cluster's Kubernetes API server
1137
- * can only receive requests that originate from within the cluster VPC.</p>
1182
+ * <p>This parameter indicates whether the Amazon EKS public API server endpoint is
1183
+ * enabled. If the Amazon EKS public API server endpoint is disabled, your
1184
+ * cluster's Kubernetes API server can only receive requests that originate from within the
1185
+ * cluster VPC.</p>
1138
1186
  */
1139
1187
  endpointPublicAccess?: boolean;
1140
1188
  /**
1141
- * <p>This parameter indicates whether the Amazon EKS private API server endpoint is enabled. If
1142
- * the Amazon EKS private API server endpoint is enabled, Kubernetes API requests that originate
1143
- * from within your cluster's VPC use the private VPC endpoint instead of traversing the
1144
- * internet. If this value is disabled and you have nodes or Fargate pods in the cluster,
1145
- * then ensure that <code>publicAccessCidrs</code> includes the necessary CIDR blocks for
1146
- * communication with the nodes or Fargate pods. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster
1147
- * endpoint access control</a> in the <i>
1189
+ * <p>This parameter indicates whether the Amazon EKS private API server endpoint is
1190
+ * enabled. If the Amazon EKS private API server endpoint is enabled, Kubernetes
1191
+ * API requests that originate from within your cluster's VPC use the private VPC endpoint
1192
+ * instead of traversing the internet. If this value is disabled and you have nodes or
1193
+ * Fargate pods in the cluster, then ensure that
1194
+ * <code>publicAccessCidrs</code> includes the necessary CIDR blocks for communication
1195
+ * with the nodes or Fargate pods. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster endpoint access control</a> in the
1196
+ * <i>
1148
1197
  * <i>Amazon EKS User Guide</i>
1149
1198
  * </i>.</p>
1150
1199
  */
@@ -1153,9 +1202,9 @@ export interface VpcConfigResponse {
1153
1202
  * <p>The CIDR blocks that are allowed access to your cluster's public Kubernetes API server
1154
1203
  * endpoint. Communication to the endpoint from addresses outside of the listed CIDR blocks
1155
1204
  * is denied. The default value is <code>0.0.0.0/0</code>. If you've disabled private
1156
- * endpoint access and you have nodes or Fargate pods in the cluster, then ensure that the
1157
- * necessary CIDR blocks are listed. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster
1158
- * endpoint access control</a> in the <i>
1205
+ * endpoint access and you have nodes or Fargate pods in the cluster,
1206
+ * then ensure that the necessary CIDR blocks are listed. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html">Amazon EKS cluster endpoint access control</a> in the
1207
+ * <i>
1159
1208
  * <i>Amazon EKS User Guide</i>
1160
1209
  * </i>.</p>
1161
1210
  */
@@ -1193,15 +1242,16 @@ export interface Cluster {
1193
1242
  */
1194
1243
  endpoint?: string;
1195
1244
  /**
1196
- * <p>The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control
1197
- * plane to make calls to Amazon Web Services API operations on your behalf.</p>
1245
+ * <p>The Amazon Resource Name (ARN) of the IAM role that provides permissions for the
1246
+ * Kubernetes control plane to make calls to Amazon Web Services API operations on your
1247
+ * behalf.</p>
1198
1248
  */
1199
1249
  roleArn?: string;
1200
1250
  /**
1201
- * <p>The VPC configuration used by the cluster control plane. Amazon EKS VPC resources have
1202
- * specific requirements to work properly with Kubernetes. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html">Cluster VPC
1203
- * Considerations</a> and <a href="https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html">Cluster Security Group Considerations</a> in the
1204
- * <i>Amazon EKS User Guide</i>.</p>
1251
+ * <p>The VPC configuration used by the cluster control plane. Amazon EKS VPC
1252
+ * resources have specific requirements to work properly with Kubernetes. For more
1253
+ * information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/network_reqs.html">Cluster VPC Considerations</a> and <a href="https://docs.aws.amazon.com/eks/latest/userguide/sec-group-reqs.html">Cluster Security
1254
+ * Group Considerations</a> in the <i>Amazon EKS User Guide</i>.</p>
1205
1255
  */
1206
1256
  resourcesVpcConfig?: VpcConfigResponse;
1207
1257
  /**
@@ -1230,8 +1280,8 @@ export interface Cluster {
1230
1280
  */
1231
1281
  clientRequestToken?: string;
1232
1282
  /**
1233
- * <p>The platform version of your Amazon EKS cluster. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/platform-versions.html">Platform
1234
- * Versions</a> in the <i>
1283
+ * <p>The platform version of your Amazon EKS cluster. For more information, see
1284
+ * <a href="https://docs.aws.amazon.com/eks/latest/userguide/platform-versions.html">Platform Versions</a> in the <i>
1235
1285
  * <i>Amazon EKS User Guide</i>
1236
1286
  * </i>.</p>
1237
1287
  */
@@ -1310,8 +1360,9 @@ export declare namespace ServiceUnavailableException {
1310
1360
  }
1311
1361
  /**
1312
1362
  * <p>At least one of your specified cluster subnets is in an Availability Zone that does
1313
- * not support Amazon EKS. The exception output specifies the supported Availability Zones for
1314
- * your account, from which you can choose subnets for your cluster.</p>
1363
+ * not support Amazon EKS. The exception output specifies the supported
1364
+ * Availability Zones for your account, from which you can choose subnets for your
1365
+ * cluster.</p>
1315
1366
  */
1316
1367
  export interface UnsupportedAvailabilityZoneException extends __SmithyException, $MetadataBearer {
1317
1368
  name: "UnsupportedAvailabilityZoneException";
@@ -1365,27 +1416,28 @@ export interface CreateFargateProfileRequest {
1365
1416
  */
1366
1417
  fargateProfileName: string | undefined;
1367
1418
  /**
1368
- * <p>The name of the Amazon EKS cluster to apply the Fargate profile to.</p>
1419
+ * <p>The name of the Amazon EKS cluster to apply the Fargate profile
1420
+ * to.</p>
1369
1421
  */
1370
1422
  clusterName: string | undefined;
1371
1423
  /**
1372
1424
  * <p>The Amazon Resource Name (ARN) of the pod execution role to use for pods that match the selectors in
1373
- * the Fargate profile. The pod execution role allows Fargate infrastructure to register with
1374
- * your cluster as a node, and it provides read access to Amazon ECR image repositories. For
1375
- * more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-execution-role.html">Pod Execution Role</a> in the
1376
- * <i>Amazon EKS User Guide</i>.</p>
1425
+ * the Fargate profile. The pod execution role allows Fargate
1426
+ * infrastructure to register with your cluster as a node, and it provides read access to
1427
+ * Amazon ECR image repositories. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/pod-execution-role.html">Pod
1428
+ * Execution Role</a> in the <i>Amazon EKS User Guide</i>.</p>
1377
1429
  */
1378
1430
  podExecutionRoleArn: string | undefined;
1379
1431
  /**
1380
- * <p>The IDs of subnets to launch your pods into. At this time, pods running on Fargate are
1381
- * not assigned public IP addresses, so only private subnets (with no direct route to an
1382
- * Internet Gateway) are accepted for this parameter.</p>
1432
+ * <p>The IDs of subnets to launch your pods into. At this time, pods running on Fargate are not assigned public IP addresses, so only private subnets (with
1433
+ * no direct route to an Internet Gateway) are accepted for this parameter.</p>
1383
1434
  */
1384
1435
  subnets?: string[];
1385
1436
  /**
1386
- * <p>The selectors to match for pods to use this Fargate profile. Each selector must have an
1387
- * associated namespace. Optionally, you can also specify labels for a namespace. You may
1388
- * specify up to five selectors in a Fargate profile.</p>
1437
+ * <p>The selectors to match for pods to use this Fargate profile. Each
1438
+ * selector must have an associated namespace. Optionally, you can also specify labels for
1439
+ * a namespace. You may specify up to five selectors in a Fargate
1440
+ * profile.</p>
1389
1441
  */
1390
1442
  selectors?: FargateProfileSelector[];
1391
1443
  /**
@@ -1423,11 +1475,13 @@ export interface FargateProfile {
1423
1475
  */
1424
1476
  fargateProfileArn?: string;
1425
1477
  /**
1426
- * <p>The name of the Amazon EKS cluster that the Fargate profile belongs to.</p>
1478
+ * <p>The name of the Amazon EKS cluster that the Fargate profile
1479
+ * belongs to.</p>
1427
1480
  */
1428
1481
  clusterName?: string;
1429
1482
  /**
1430
- * <p>The Unix epoch timestamp in seconds for when the Fargate profile was created.</p>
1483
+ * <p>The Unix epoch timestamp in seconds for when the Fargate profile was
1484
+ * created.</p>
1431
1485
  */
1432
1486
  createdAt?: Date;
1433
1487
  /**
@@ -1492,8 +1546,8 @@ export declare type CapacityTypes = "ON_DEMAND" | "SPOT";
1492
1546
  * </a>, or the node group deployment or
1493
1547
  * update will fail. For more information about launch templates, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_CreateLaunchTemplate.html">
1494
1548
  * <code>CreateLaunchTemplate</code>
1495
- * </a> in the Amazon EC2 API Reference.
1496
- * For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
1549
+ * </a> in the Amazon EC2 API
1550
+ * Reference. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
1497
1551
  * <p>Specify either <code>name</code> or <code>id</code>, but not both.</p>
1498
1552
  */
1499
1553
  export interface LaunchTemplateSpecification {
@@ -1523,16 +1577,15 @@ export declare namespace LaunchTemplateSpecification {
1523
1577
  */
1524
1578
  export interface RemoteAccessConfig {
1525
1579
  /**
1526
- * <p>The Amazon EC2 SSH key that provides access for SSH communication with the nodes in the
1527
- * managed node group. For more information, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html">Amazon EC2 key
1528
- * pairs and Linux instances</a> in the <i>Amazon Elastic Compute Cloud User Guide for Linux Instances</i>.</p>
1580
+ * <p>The Amazon EC2 SSH key that provides access for SSH communication with the
1581
+ * nodes in the managed node group. For more information, see <a href="https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-key-pairs.html">Amazon EC2 key pairs and Linux instances</a> in the <i>Amazon Elastic Compute Cloud User Guide for Linux Instances</i>.</p>
1529
1582
  */
1530
1583
  ec2SshKey?: string;
1531
1584
  /**
1532
1585
  * <p>The security groups that are allowed SSH access (port 22) to the nodes. If you specify
1533
- * an Amazon EC2 SSH key but do not specify a source security group when you create a managed
1534
- * node group, then port 22 on the nodes is opened to the internet (0.0.0.0/0). For more
1535
- * information, see <a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.html">Security Groups for Your VPC</a> in the
1586
+ * an Amazon EC2 SSH key but do not specify a source security group when you create
1587
+ * a managed node group, then port 22 on the nodes is opened to the internet (0.0.0.0/0).
1588
+ * For more information, see <a href="https://docs.aws.amazon.com/vpc/latest/userguide/VPC_SecurityGroups.html">Security Groups for Your VPC</a> in the
1536
1589
  * <i>Amazon Virtual Private Cloud User Guide</i>.</p>
1537
1590
  */
1538
1591
  sourceSecurityGroups?: string[];
@@ -1556,13 +1609,12 @@ export interface NodegroupScalingConfig {
1556
1609
  minSize?: number;
1557
1610
  /**
1558
1611
  * <p>The maximum number of nodes that the managed node group can scale out to. For
1559
- * information about the maximum number that you can specify, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/service-quotas.html">Amazon EKS service
1560
- * quotas</a> in the <i>Amazon EKS User Guide</i>.</p>
1612
+ * information about the maximum number that you can specify, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/service-quotas.html">Amazon EKS service quotas</a> in the <i>Amazon EKS User Guide</i>.</p>
1561
1613
  */
1562
1614
  maxSize?: number;
1563
1615
  /**
1564
1616
  * <p>The current number of nodes that the managed node group should maintain.</p>
1565
- * <important>
1617
+ * <important>
1566
1618
  * <p>If you use Cluster Autoscaler, you shouldn't change the desiredSize value
1567
1619
  * directly, as this can cause the Cluster Autoscaler to suddenly scale up or scale
1568
1620
  * down.</p>
@@ -1623,14 +1675,15 @@ export declare namespace Taint {
1623
1675
  */
1624
1676
  export interface NodegroupUpdateConfig {
1625
1677
  /**
1626
- * <p>The maximum number of nodes unavailable at once during a version update. Nodes will be updated in parallel.
1627
- * This value or <code>maxUnavailablePercentage</code> is required to have a value.The maximum number
1628
- * is 100.</p>
1678
+ * <p>The maximum number of nodes unavailable at once during a version update. Nodes will be
1679
+ * updated in parallel. This value or <code>maxUnavailablePercentage</code> is required to
1680
+ * have a value.The maximum number is 100.</p>
1629
1681
  */
1630
1682
  maxUnavailable?: number;
1631
1683
  /**
1632
- * <p>The maximum percentage of nodes unavailable during a version update. This percentage of nodes will be
1633
- * updated in parallel, up to 100 nodes at once. This value or <code>maxUnavailable</code> is required to have a value.</p>
1684
+ * <p>The maximum percentage of nodes unavailable during a version update. This percentage
1685
+ * of nodes will be updated in parallel, up to 100 nodes at once. This value or
1686
+ * <code>maxUnavailable</code> is required to have a value.</p>
1634
1687
  */
1635
1688
  maxUnavailablePercentage?: number;
1636
1689
  }
@@ -1686,9 +1739,10 @@ export interface CreateNodegroupRequest {
1686
1739
  * <p>The AMI type for your node group. GPU instance types should use the
1687
1740
  * <code>AL2_x86_64_GPU</code> AMI type. Non-GPU instances should use the
1688
1741
  * <code>AL2_x86_64</code> AMI type. Arm instances should use the
1689
- * <code>AL2_ARM_64</code> AMI type. All types use the Amazon EKS optimized Amazon Linux 2 AMI.
1690
- * If you specify <code>launchTemplate</code>, and your launch template uses a custom AMI, then don't specify <code>amiType</code>,
1691
- * or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
1742
+ * <code>AL2_ARM_64</code> AMI type. All types use the Amazon EKS optimized
1743
+ * Amazon Linux 2 AMI. If you specify <code>launchTemplate</code>, and your launch template uses a custom AMI,
1744
+ * then don't specify <code>amiType</code>, or the node group deployment
1745
+ * will fail. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
1692
1746
  */
1693
1747
  amiType?: AMITypes | string;
1694
1748
  /**
@@ -1698,15 +1752,15 @@ export interface CreateNodegroupRequest {
1698
1752
  */
1699
1753
  remoteAccess?: RemoteAccessConfig;
1700
1754
  /**
1701
- * <p>The Amazon Resource Name (ARN) of the IAM role to associate with your node group. The Amazon EKS worker
1702
- * node <code>kubelet</code> daemon makes calls to Amazon Web Services APIs on your behalf. Nodes receive
1703
- * permissions for these API calls through an IAM instance profile and associated
1704
- * policies. Before you can launch nodes and register them into a cluster, you must create
1705
- * an IAM role for those nodes to use when they are launched. For more information, see
1706
- * <a href="https://docs.aws.amazon.com/eks/latest/userguide/worker_node_IAM_role.html">Amazon EKS node IAM role</a> in the <i>
1755
+ * <p>The Amazon Resource Name (ARN) of the IAM role to associate with your node group. The
1756
+ * Amazon EKS worker node <code>kubelet</code> daemon makes calls to Amazon Web Services APIs on your behalf. Nodes receive permissions for these API calls
1757
+ * through an IAM instance profile and associated policies. Before you can
1758
+ * launch nodes and register them into a cluster, you must create an IAM
1759
+ * role for those nodes to use when they are launched. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/worker_node_IAM_role.html">Amazon EKS node IAM role</a> in the
1760
+ * <i>
1707
1761
  * <i>Amazon EKS User Guide</i>
1708
- * </i>.
1709
- * If you specify <code>launchTemplate</code>, then don't specify <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_IamInstanceProfile.html">
1762
+ * </i>. If you specify <code>launchTemplate</code>, then don't specify
1763
+ * <a href="https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_IamInstanceProfile.html">
1710
1764
  * <code>IamInstanceProfile</code>
1711
1765
  * </a> in your launch template,
1712
1766
  * or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
@@ -1760,12 +1814,11 @@ export interface CreateNodegroupRequest {
1760
1814
  */
1761
1815
  version?: string;
1762
1816
  /**
1763
- * <p>The AMI version of the Amazon EKS optimized AMI to use with your node group. By default,
1764
- * the latest available AMI version for the node group's current Kubernetes version is
1765
- * used. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/eks-linux-ami-versions.html">Amazon EKS
1766
- * optimized Amazon Linux 2 AMI versions</a> in the <i>Amazon EKS User Guide</i>. If you specify <code>launchTemplate</code>,
1767
- * and your launch template uses a custom AMI, then don't specify <code>releaseVersion</code>, or the node group
1768
- * deployment will fail. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
1817
+ * <p>The AMI version of the Amazon EKS optimized AMI to use with your node group.
1818
+ * By default, the latest available AMI version for the node group's current Kubernetes
1819
+ * version is used. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/eks-linux-ami-versions.html">Amazon EKS optimized Amazon Linux 2 AMI versions</a> in the <i>Amazon EKS User Guide</i>.
1820
+ * If you specify <code>launchTemplate</code>, and your launch template uses a custom AMI, then don't specify <code>releaseVersion</code>,
1821
+ * or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
1769
1822
  */
1770
1823
  releaseVersion?: string;
1771
1824
  }
@@ -1804,40 +1857,40 @@ export interface Issue {
1804
1857
  * <ul>
1805
1858
  * <li>
1806
1859
  * <p>
1807
- * <b>AccessDenied</b>: Amazon EKS or one or more of your
1808
- * managed nodes is failing to authenticate or authorize with your Kubernetes
1809
- * cluster API server.</p>
1860
+ * <b>AccessDenied</b>: Amazon EKS or one or
1861
+ * more of your managed nodes is failing to authenticate or authorize with your
1862
+ * Kubernetes cluster API server.</p>
1810
1863
  * </li>
1811
1864
  * <li>
1812
1865
  * <p>
1813
- * <b>AsgInstanceLaunchFailures</b>: Your Auto Scaling group is
1814
- * experiencing failures while attempting to launch instances.</p>
1866
+ * <b>AsgInstanceLaunchFailures</b>: Your Auto Scaling group is experiencing failures while attempting to launch
1867
+ * instances.</p>
1815
1868
  * </li>
1816
1869
  * <li>
1817
1870
  * <p>
1818
1871
  * <b>AutoScalingGroupNotFound</b>: We couldn't find
1819
- * the Auto Scaling group associated with the managed node group. You may be able to
1820
- * recreate an Auto Scaling group with the same settings to recover.</p>
1872
+ * the Auto Scaling group associated with the managed node group. You may be
1873
+ * able to recreate an Auto Scaling group with the same settings to
1874
+ * recover.</p>
1821
1875
  * </li>
1822
1876
  * <li>
1823
1877
  * <p>
1824
- * <b>ClusterUnreachable</b>: Amazon EKS or one or more of
1825
- * your managed nodes is unable to to communicate with your Kubernetes cluster API
1826
- * server. This can happen if there are network disruptions or if API servers are
1827
- * timing out processing requests. </p>
1878
+ * <b>ClusterUnreachable</b>: Amazon EKS or one
1879
+ * or more of your managed nodes is unable to to communicate with your Kubernetes
1880
+ * cluster API server. This can happen if there are network disruptions or if API
1881
+ * servers are timing out processing requests. </p>
1828
1882
  * </li>
1829
1883
  * <li>
1830
1884
  * <p>
1831
1885
  * <b>Ec2LaunchTemplateNotFound</b>: We couldn't find
1832
- * the Amazon EC2 launch template for your managed node group. You may be able to
1833
- * recreate a launch template with the same settings to recover.</p>
1886
+ * the Amazon EC2 launch template for your managed node group. You may be
1887
+ * able to recreate a launch template with the same settings to recover.</p>
1834
1888
  * </li>
1835
1889
  * <li>
1836
1890
  * <p>
1837
- * <b>Ec2LaunchTemplateVersionMismatch</b>: The Amazon EC2
1838
- * launch template version for your managed node group does not match the version
1839
- * that Amazon EKS created. You may be able to revert to the version that Amazon EKS created
1840
- * to recover.</p>
1891
+ * <b>Ec2LaunchTemplateVersionMismatch</b>: The Amazon EC2 launch template version for your managed node group does not
1892
+ * match the version that Amazon EKS created. You may be able to revert to
1893
+ * the version that Amazon EKS created to recover.</p>
1841
1894
  * </li>
1842
1895
  * <li>
1843
1896
  * <p>
@@ -1854,30 +1907,31 @@ export interface Issue {
1854
1907
  * <li>
1855
1908
  * <p>
1856
1909
  * <b>Ec2SubnetInvalidConfiguration</b>: One or more
1857
- * Amazon EC2 subnets specified for a node group do not automatically assign public IP
1858
- * addresses to instances launched into it. If you want your instances to be
1859
- * assigned a public IP address, then you need to enable the <code>auto-assign
1860
- * public IP address</code> setting for the subnet. See <a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-ip-addressing.html#subnet-public-ip">Modifying
1910
+ * Amazon EC2 subnets specified for a node group do not automatically
1911
+ * assign public IP addresses to instances launched into it. If you want your
1912
+ * instances to be assigned a public IP address, then you need to enable the
1913
+ * <code>auto-assign public IP address</code> setting for the subnet. See
1914
+ * <a href="https://docs.aws.amazon.com/vpc/latest/userguide/vpc-ip-addressing.html#subnet-public-ip">Modifying
1861
1915
  * the public IPv4 addressing attribute for your subnet</a> in the Amazon
1862
1916
  * VPC User Guide.</p>
1863
1917
  * </li>
1864
1918
  * <li>
1865
1919
  * <p>
1866
1920
  * <b>IamInstanceProfileNotFound</b>: We couldn't find
1867
- * the IAM instance profile for your managed node group. You may be able to
1868
- * recreate an instance profile with the same settings to recover.</p>
1921
+ * the IAM instance profile for your managed node group. You may be
1922
+ * able to recreate an instance profile with the same settings to recover.</p>
1869
1923
  * </li>
1870
1924
  * <li>
1871
1925
  * <p>
1872
1926
  * <b>IamNodeRoleNotFound</b>: We couldn't find the
1873
- * IAM role for your managed node group. You may be able to recreate an IAM role
1874
- * with the same settings to recover.</p>
1927
+ * IAM role for your managed node group. You may be able to
1928
+ * recreate an IAM role with the same settings to recover.</p>
1875
1929
  * </li>
1876
1930
  * <li>
1877
1931
  * <p>
1878
- * <b>InstanceLimitExceeded</b>: Your Amazon Web Services account is
1879
- * unable to launch any more instances of the specified instance type. You may be
1880
- * able to request an Amazon EC2 instance limit increase to recover.</p>
1932
+ * <b>InstanceLimitExceeded</b>: Your Amazon Web Services account is unable to launch any more instances of the specified instance
1933
+ * type. You may be able to request an Amazon EC2 instance limit increase
1934
+ * to recover.</p>
1881
1935
  * </li>
1882
1936
  * <li>
1883
1937
  * <p>
@@ -1975,8 +2029,8 @@ export interface Nodegroup {
1975
2029
  /**
1976
2030
  * <p>If the node group was deployed using a launch template with a custom AMI, then this is
1977
2031
  * the AMI ID that was specified in the launch template. For node groups that weren't
1978
- * deployed using a launch template, this is the version of the Amazon EKS optimized AMI that
1979
- * the node group was deployed with.</p>
2032
+ * deployed using a launch template, this is the version of the Amazon EKS
2033
+ * optimized AMI that the node group was deployed with.</p>
1980
2034
  */
1981
2035
  releaseVersion?: string;
1982
2036
  /**
@@ -2026,16 +2080,17 @@ export interface Nodegroup {
2026
2080
  */
2027
2081
  amiType?: AMITypes | string;
2028
2082
  /**
2029
- * <p>The IAM role associated with your node group. The Amazon EKS node <code>kubelet</code>
2030
- * daemon makes calls to Amazon Web Services APIs on your behalf. Nodes receive permissions for these API
2031
- * calls through an IAM instance profile and associated policies.</p>
2083
+ * <p>The IAM role associated with your node group. The Amazon EKS
2084
+ * node <code>kubelet</code> daemon makes calls to Amazon Web Services APIs on your behalf.
2085
+ * Nodes receive permissions for these API calls through an IAM instance
2086
+ * profile and associated policies.</p>
2032
2087
  */
2033
2088
  nodeRole?: string;
2034
2089
  /**
2035
2090
  * <p>The Kubernetes labels applied to the nodes in the node group.</p>
2036
2091
  * <note>
2037
- * <p>Only labels that are applied with the Amazon EKS API are shown here. There may be other
2038
- * Kubernetes labels applied to the nodes in this group.</p>
2092
+ * <p>Only labels that are applied with the Amazon EKS API are shown here. There
2093
+ * may be other Kubernetes labels applied to the nodes in this group.</p>
2039
2094
  * </note>
2040
2095
  */
2041
2096
  labels?: {
@@ -2043,9 +2098,9 @@ export interface Nodegroup {
2043
2098
  };
2044
2099
  /**
2045
2100
  * <p>The Kubernetes taints to be applied to the nodes in the node group when they are
2046
- * created. Effect is one of <code>No_Schedule</code>, <code>Prefer_No_Schedule</code>, or <code>No_Execute</code>. Kubernetes taints
2047
- * can be used together with tolerations to control how workloads are scheduled to your
2048
- * nodes.</p>
2101
+ * created. Effect is one of <code>No_Schedule</code>, <code>Prefer_No_Schedule</code>, or
2102
+ * <code>No_Execute</code>. Kubernetes taints can be used together with tolerations to
2103
+ * control how workloads are scheduled to your nodes.</p>
2049
2104
  */
2050
2105
  taints?: Taint[];
2051
2106
  /**
@@ -2113,7 +2168,8 @@ export interface DeleteAddonRequest {
2113
2168
  */
2114
2169
  addonName: string | undefined;
2115
2170
  /**
2116
- * <p>Specifying this option preserves the add-on software on your cluster but Amazon EKS stops managing any settings for the add-on. If an IAM account is associated with the add-on, it is not removed.</p>
2171
+ * <p>Specifying this option preserves the add-on software on your cluster but Amazon EKS stops managing any settings for the add-on. If an IAM
2172
+ * account is associated with the add-on, it is not removed.</p>
2117
2173
  */
2118
2174
  preserve?: boolean;
2119
2175
  }
@@ -2162,7 +2218,8 @@ export declare namespace DeleteClusterResponse {
2162
2218
  }
2163
2219
  export interface DeleteFargateProfileRequest {
2164
2220
  /**
2165
- * <p>The name of the Amazon EKS cluster associated with the Fargate profile to delete.</p>
2221
+ * <p>The name of the Amazon EKS cluster associated with the Fargate
2222
+ * profile to delete.</p>
2166
2223
  */
2167
2224
  clusterName: string | undefined;
2168
2225
  /**
@@ -2190,7 +2247,8 @@ export declare namespace DeleteFargateProfileResponse {
2190
2247
  }
2191
2248
  export interface DeleteNodegroupRequest {
2192
2249
  /**
2193
- * <p>The name of the Amazon EKS cluster that is associated with your node group.</p>
2250
+ * <p>The name of the Amazon EKS cluster that is associated with your node
2251
+ * group.</p>
2194
2252
  */
2195
2253
  clusterName: string | undefined;
2196
2254
  /**
@@ -2353,7 +2411,8 @@ export declare namespace DescribeClusterResponse {
2353
2411
  }
2354
2412
  export interface DescribeFargateProfileRequest {
2355
2413
  /**
2356
- * <p>The name of the Amazon EKS cluster associated with the Fargate profile.</p>
2414
+ * <p>The name of the Amazon EKS cluster associated with the Fargate
2415
+ * profile.</p>
2357
2416
  */
2358
2417
  clusterName: string | undefined;
2359
2418
  /**
@@ -2766,7 +2825,8 @@ export declare namespace ListFargateProfilesRequest {
2766
2825
  }
2767
2826
  export interface ListFargateProfilesResponse {
2768
2827
  /**
2769
- * <p>A list of all of the Fargate profiles associated with the specified cluster.</p>
2828
+ * <p>A list of all of the Fargate profiles associated with the specified
2829
+ * cluster.</p>
2770
2830
  */
2771
2831
  fargateProfileNames?: string[];
2772
2832
  /**
@@ -2837,7 +2897,8 @@ export declare namespace ListIdentityProviderConfigsResponse {
2837
2897
  }
2838
2898
  export interface ListNodegroupsRequest {
2839
2899
  /**
2840
- * <p>The name of the Amazon EKS cluster that you would like to list node groups in.</p>
2900
+ * <p>The name of the Amazon EKS cluster that you would like to list node groups
2901
+ * in.</p>
2841
2902
  */
2842
2903
  clusterName: string | undefined;
2843
2904
  /**
@@ -3016,7 +3077,8 @@ export declare enum ConnectorConfigProvider {
3016
3077
  */
3017
3078
  export interface ConnectorConfigRequest {
3018
3079
  /**
3019
- * <p>The Amazon Resource Name (ARN) of the role that is authorized to request the connector configuration.</p>
3080
+ * <p>The Amazon Resource Name (ARN) of the role that is authorized to request the connector
3081
+ * configuration.</p>
3020
3082
  */
3021
3083
  roleArn: string | undefined;
3022
3084
  /**
@@ -3040,7 +3102,8 @@ export interface RegisterClusterRequest {
3040
3102
  */
3041
3103
  connectorConfig: ConnectorConfigRequest | undefined;
3042
3104
  /**
3043
- * <p>Unique, case-sensitive identifier that you provide to ensure the idempotency of the request.</p>
3105
+ * <p>Unique, case-sensitive identifier that you provide to ensure the idempotency of the
3106
+ * request.</p>
3044
3107
  */
3045
3108
  clientRequestToken?: string;
3046
3109
  /**
@@ -3200,19 +3263,21 @@ export interface UpdateClusterConfigRequest {
3200
3263
  */
3201
3264
  name: string | undefined;
3202
3265
  /**
3203
- * <p>An object representing the VPC configuration to use for an Amazon EKS cluster.</p>
3266
+ * <p>An object representing the VPC configuration to use for an Amazon EKS
3267
+ * cluster.</p>
3204
3268
  */
3205
3269
  resourcesVpcConfig?: VpcConfigRequest;
3206
3270
  /**
3207
3271
  * <p>Enable or disable exporting the Kubernetes control plane logs for your cluster to
3208
- * CloudWatch Logs. By default, cluster control plane logs aren't exported to CloudWatch Logs. For more
3209
- * information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html">Amazon EKS cluster control plane logs</a> in the
3272
+ * CloudWatch Logs. By default, cluster control plane logs aren't exported to
3273
+ * CloudWatch Logs. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html">Amazon EKS cluster control plane logs</a> in the
3210
3274
  * <i>
3211
3275
  * <i>Amazon EKS User Guide</i>
3212
3276
  * </i>.</p>
3213
3277
  * <note>
3214
- * <p>CloudWatch Logs ingestion, archive storage, and data scanning rates apply to exported
3215
- * control plane logs. For more information, see <a href="http://aws.amazon.com/cloudwatch/pricing/">CloudWatch Pricing</a>.</p>
3278
+ * <p>CloudWatch Logs ingestion, archive storage, and data scanning rates apply to
3279
+ * exported control plane logs. For more information, see <a href="http://aws.amazon.com/cloudwatch/pricing/">CloudWatch
3280
+ * Pricing</a>.</p>
3216
3281
  * </note>
3217
3282
  */
3218
3283
  logging?: Logging;
@@ -3315,7 +3380,8 @@ export declare namespace UpdateTaintsPayload {
3315
3380
  }
3316
3381
  export interface UpdateNodegroupConfigRequest {
3317
3382
  /**
3318
- * <p>The name of the Amazon EKS cluster that the managed node group resides in.</p>
3383
+ * <p>The name of the Amazon EKS cluster that the managed node group resides
3384
+ * in.</p>
3319
3385
  */
3320
3386
  clusterName: string | undefined;
3321
3387
  /**
@@ -3366,8 +3432,8 @@ export declare namespace UpdateNodegroupConfigResponse {
3366
3432
  }
3367
3433
  export interface UpdateNodegroupVersionRequest {
3368
3434
  /**
3369
- * <p>The name of the Amazon EKS cluster that is associated with the managed node group to
3370
- * update.</p>
3435
+ * <p>The name of the Amazon EKS cluster that is associated with the managed node
3436
+ * group to update.</p>
3371
3437
  */
3372
3438
  clusterName: string | undefined;
3373
3439
  /**
@@ -3384,12 +3450,11 @@ export interface UpdateNodegroupVersionRequest {
3384
3450
  */
3385
3451
  version?: string;
3386
3452
  /**
3387
- * <p>The AMI version of the Amazon EKS optimized AMI to use for the update. By default, the
3388
- * latest available AMI version for the node group's Kubernetes version is used. For more
3389
- * information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/eks-linux-ami-versions.html">Amazon EKS optimized Amazon Linux 2 AMI versions </a> in the
3390
- * <i>Amazon EKS User Guide</i>. If you specify <code>launchTemplate</code>, and your launch template uses a custom AMI, then don't specify
3391
- * <code>releaseVersion</code>, or the node group update will fail.
3392
- * For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
3453
+ * <p>The AMI version of the Amazon EKS optimized AMI to use for the update. By
3454
+ * default, the latest available AMI version for the node group's Kubernetes version is
3455
+ * used. For more information, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/eks-linux-ami-versions.html">Amazon EKS optimized Amazon Linux 2 AMI versions </a> in the <i>Amazon EKS User Guide</i>.
3456
+ * If you specify <code>launchTemplate</code>, and your launch template uses a custom AMI, then don't specify <code>releaseVersion</code>,
3457
+ * or the node group update will fail. For more information about using launch templates with Amazon EKS, see <a href="https://docs.aws.amazon.com/eks/latest/userguide/launch-templates.html">Launch template support</a> in the Amazon EKS User Guide.</p>
3393
3458
  */
3394
3459
  releaseVersion?: string;
3395
3460
  /**