aws-cdk-lib 2.219.0__py3-none-any.whl → 2.220.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +12 -17
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.219.0.jsii.tgz → aws-cdk-lib@2.220.0.jsii.tgz} +0 -0
- aws_cdk/aws_applicationsignals/__init__.py +450 -2
- aws_cdk/aws_arcregionswitch/__init__.py +8 -0
- aws_cdk/aws_backup/__init__.py +29 -0
- aws_cdk/aws_batch/__init__.py +109 -7
- aws_cdk/aws_bedrock/__init__.py +44 -16
- aws_cdk/aws_bedrockagentcore/__init__.py +7872 -1718
- aws_cdk/aws_cloudfront/experimental/__init__.py +4 -0
- aws_cdk/aws_cloudfront_origins/__init__.py +87 -6
- aws_cdk/aws_cloudwatch/__init__.py +5 -5
- aws_cdk/aws_cognito/__init__.py +6 -4
- aws_cdk/aws_dax/__init__.py +12 -3
- aws_cdk/aws_directoryservice/__init__.py +29 -0
- aws_cdk/aws_ec2/__init__.py +99 -8
- aws_cdk/aws_ecs/__init__.py +342 -134
- aws_cdk/aws_eks/__init__.py +114 -9
- aws_cdk/aws_fsx/__init__.py +4 -4
- aws_cdk/aws_imagebuilder/__init__.py +397 -0
- aws_cdk/aws_iotsitewise/__init__.py +136 -80
- aws_cdk/aws_kinesis/__init__.py +95 -4
- aws_cdk/aws_lambda/__init__.py +43 -0
- aws_cdk/aws_lightsail/__init__.py +584 -0
- aws_cdk/aws_logs/__init__.py +57 -0
- aws_cdk/aws_lookoutmetrics/__init__.py +14 -2
- aws_cdk/aws_m2/__init__.py +59 -13
- aws_cdk/aws_medialive/__init__.py +108 -0
- aws_cdk/aws_mwaa/__init__.py +5 -5
- aws_cdk/aws_neptune/__init__.py +133 -70
- aws_cdk/aws_networkmanager/__init__.py +29 -0
- aws_cdk/aws_observabilityadmin/__init__.py +1227 -83
- aws_cdk/aws_omics/__init__.py +7 -1
- aws_cdk/aws_opensearchservice/__init__.py +6 -0
- aws_cdk/aws_pcs/__init__.py +224 -33
- aws_cdk/aws_pinpoint/__init__.py +58 -0
- aws_cdk/aws_quicksight/__init__.py +80 -0
- aws_cdk/aws_rds/__init__.py +29 -23
- aws_cdk/aws_refactorspaces/__init__.py +18 -6
- aws_cdk/aws_route53/__init__.py +130 -6
- aws_cdk/aws_s3/__init__.py +29 -2
- aws_cdk/aws_s3objectlambda/__init__.py +44 -12
- aws_cdk/aws_servicecatalog/__init__.py +25 -20
- aws_cdk/aws_ssmquicksetup/__init__.py +3 -3
- aws_cdk/aws_synthetics/__init__.py +21 -1
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/RECORD +51 -51
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.219.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_eks/__init__.py
CHANGED
|
@@ -158,6 +158,28 @@ eks.Cluster(self, "HelloEKS",
|
|
|
158
158
|
)
|
|
159
159
|
```
|
|
160
160
|
|
|
161
|
+
You can control what happens to the resources created by the cluster construct when they are no longer managed by CloudFormation by specifying a `removalPolicy`.
|
|
162
|
+
|
|
163
|
+
This can happen in one of three situations:
|
|
164
|
+
|
|
165
|
+
* The resource is removed from the template, so CloudFormation stops managing it;
|
|
166
|
+
* A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it;
|
|
167
|
+
* The stack is deleted, so CloudFormation stops managing all resources in it.
|
|
168
|
+
|
|
169
|
+
This affects the EKS cluster itself, the custom resource that created the cluster, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct.
|
|
170
|
+
|
|
171
|
+
```python
|
|
172
|
+
from aws_cdk.lambda_layer_kubectl_v33 import KubectlV33Layer
|
|
173
|
+
import aws_cdk as core
|
|
174
|
+
|
|
175
|
+
|
|
176
|
+
eks.Cluster(self, "HelloEKS",
|
|
177
|
+
version=eks.KubernetesVersion.V1_33,
|
|
178
|
+
kubectl_layer=KubectlV33Layer(self, "kubectl"),
|
|
179
|
+
removal_policy=core.RemovalPolicy.RETAIN
|
|
180
|
+
)
|
|
181
|
+
```
|
|
182
|
+
|
|
161
183
|
You can also use `FargateCluster` to provision a cluster that uses only fargate workers.
|
|
162
184
|
|
|
163
185
|
```python
|
|
@@ -2136,6 +2158,7 @@ from .. import (
|
|
|
2136
2158
|
ITaggable as _ITaggable_36806126,
|
|
2137
2159
|
ITaggableV2 as _ITaggableV2_4e6798f8,
|
|
2138
2160
|
NestedStack as _NestedStack_dd393a45,
|
|
2161
|
+
RemovalPolicy as _RemovalPolicy_9f93c814,
|
|
2139
2162
|
Resource as _Resource_45bc6135,
|
|
2140
2163
|
Size as _Size_7b441c34,
|
|
2141
2164
|
TagManager as _TagManager_0a598cb3,
|
|
@@ -11632,19 +11655,17 @@ class KubernetesVersion(
|
|
|
11632
11655
|
|
|
11633
11656
|
from aws_cdk.lambda_layer_kubectl_v33 import KubectlV33Layer
|
|
11634
11657
|
|
|
11635
|
-
# or
|
|
11636
|
-
# vpc: ec2.Vpc
|
|
11637
|
-
|
|
11638
11658
|
|
|
11639
|
-
eks.Cluster(self, "
|
|
11640
|
-
kubectl_memory=Size.gibibytes(4),
|
|
11659
|
+
cluster = eks.Cluster(self, "HelloEKS",
|
|
11641
11660
|
version=eks.KubernetesVersion.V1_33,
|
|
11661
|
+
default_capacity=0,
|
|
11642
11662
|
kubectl_layer=KubectlV33Layer(self, "kubectl")
|
|
11643
11663
|
)
|
|
11644
|
-
|
|
11645
|
-
|
|
11646
|
-
|
|
11647
|
-
|
|
11664
|
+
|
|
11665
|
+
cluster.add_nodegroup_capacity("custom-node-group",
|
|
11666
|
+
instance_types=[ec2.InstanceType("m5.large")],
|
|
11667
|
+
min_size=4,
|
|
11668
|
+
disk_size=100
|
|
11648
11669
|
)
|
|
11649
11670
|
'''
|
|
11650
11671
|
|
|
@@ -19813,6 +19834,7 @@ class Cluster(
|
|
|
19813
19834
|
prune: typing.Optional[builtins.bool] = None,
|
|
19814
19835
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
19815
19836
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
19837
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
19816
19838
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
19817
19839
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
19818
19840
|
version: KubernetesVersion,
|
|
@@ -19854,6 +19876,7 @@ class Cluster(
|
|
|
19854
19876
|
:param prune: Indicates whether Kubernetes resources added through ``addManifest()`` can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the ``kubectl apply`` operation with the ``--prune`` switch. Default: true
|
|
19855
19877
|
:param remote_node_networks: IPv4 CIDR blocks defining the expected address range of hybrid nodes that will join the cluster. Default: - none
|
|
19856
19878
|
:param remote_pod_networks: IPv4 CIDR blocks for Pods running Kubernetes webhooks on hybrid nodes. Default: - none
|
|
19879
|
+
:param removal_policy: The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation. This can happen in one of three situations: - The resource is removed from the template, so CloudFormation stops managing it; - A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it; - The stack is deleted, so CloudFormation stops managing all resources in it. This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct. Default: - Resources will be deleted.
|
|
19857
19880
|
:param secrets_encryption_key: KMS secret for envelope encryption for Kubernetes secrets. Default: - By default, Kubernetes stores all secret object data within etcd and all etcd volumes used by Amazon EKS are encrypted at the disk-level using AWS-Managed encryption keys.
|
|
19858
19881
|
:param service_ipv4_cidr: The CIDR block to assign Kubernetes service IP addresses from. Default: - Kubernetes assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
|
|
19859
19882
|
:param version: The Kubernetes version to run in the cluster.
|
|
@@ -19896,6 +19919,7 @@ class Cluster(
|
|
|
19896
19919
|
prune=prune,
|
|
19897
19920
|
remote_node_networks=remote_node_networks,
|
|
19898
19921
|
remote_pod_networks=remote_pod_networks,
|
|
19922
|
+
removal_policy=removal_policy,
|
|
19899
19923
|
secrets_encryption_key=secrets_encryption_key,
|
|
19900
19924
|
service_ipv4_cidr=service_ipv4_cidr,
|
|
19901
19925
|
version=version,
|
|
@@ -20843,6 +20867,7 @@ class Cluster(
|
|
|
20843
20867
|
"prune": "prune",
|
|
20844
20868
|
"remote_node_networks": "remoteNodeNetworks",
|
|
20845
20869
|
"remote_pod_networks": "remotePodNetworks",
|
|
20870
|
+
"removal_policy": "removalPolicy",
|
|
20846
20871
|
"secrets_encryption_key": "secretsEncryptionKey",
|
|
20847
20872
|
"service_ipv4_cidr": "serviceIpv4Cidr",
|
|
20848
20873
|
},
|
|
@@ -20878,6 +20903,7 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
20878
20903
|
prune: typing.Optional[builtins.bool] = None,
|
|
20879
20904
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
20880
20905
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
20906
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
20881
20907
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
20882
20908
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
20883
20909
|
) -> None:
|
|
@@ -20910,6 +20936,7 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
20910
20936
|
:param prune: Indicates whether Kubernetes resources added through ``addManifest()`` can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the ``kubectl apply`` operation with the ``--prune`` switch. Default: true
|
|
20911
20937
|
:param remote_node_networks: IPv4 CIDR blocks defining the expected address range of hybrid nodes that will join the cluster. Default: - none
|
|
20912
20938
|
:param remote_pod_networks: IPv4 CIDR blocks for Pods running Kubernetes webhooks on hybrid nodes. Default: - none
|
|
20939
|
+
:param removal_policy: The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation. This can happen in one of three situations: - The resource is removed from the template, so CloudFormation stops managing it; - A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it; - The stack is deleted, so CloudFormation stops managing all resources in it. This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct. Default: - Resources will be deleted.
|
|
20913
20940
|
:param secrets_encryption_key: KMS secret for envelope encryption for Kubernetes secrets. Default: - By default, Kubernetes stores all secret object data within etcd and all etcd volumes used by Amazon EKS are encrypted at the disk-level using AWS-Managed encryption keys.
|
|
20914
20941
|
:param service_ipv4_cidr: The CIDR block to assign Kubernetes service IP addresses from. Default: - Kubernetes assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
|
|
20915
20942
|
|
|
@@ -20983,6 +21010,7 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
20983
21010
|
remote_pod_networks=[eks.RemotePodNetwork(
|
|
20984
21011
|
cidrs=["cidrs"]
|
|
20985
21012
|
)],
|
|
21013
|
+
removal_policy=cdk.RemovalPolicy.DESTROY,
|
|
20986
21014
|
role=role,
|
|
20987
21015
|
secrets_encryption_key=key_ref,
|
|
20988
21016
|
security_group=security_group,
|
|
@@ -21029,6 +21057,7 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
21029
21057
|
check_type(argname="argument prune", value=prune, expected_type=type_hints["prune"])
|
|
21030
21058
|
check_type(argname="argument remote_node_networks", value=remote_node_networks, expected_type=type_hints["remote_node_networks"])
|
|
21031
21059
|
check_type(argname="argument remote_pod_networks", value=remote_pod_networks, expected_type=type_hints["remote_pod_networks"])
|
|
21060
|
+
check_type(argname="argument removal_policy", value=removal_policy, expected_type=type_hints["removal_policy"])
|
|
21032
21061
|
check_type(argname="argument secrets_encryption_key", value=secrets_encryption_key, expected_type=type_hints["secrets_encryption_key"])
|
|
21033
21062
|
check_type(argname="argument service_ipv4_cidr", value=service_ipv4_cidr, expected_type=type_hints["service_ipv4_cidr"])
|
|
21034
21063
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
@@ -21085,6 +21114,8 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
21085
21114
|
self._values["remote_node_networks"] = remote_node_networks
|
|
21086
21115
|
if remote_pod_networks is not None:
|
|
21087
21116
|
self._values["remote_pod_networks"] = remote_pod_networks
|
|
21117
|
+
if removal_policy is not None:
|
|
21118
|
+
self._values["removal_policy"] = removal_policy
|
|
21088
21119
|
if secrets_encryption_key is not None:
|
|
21089
21120
|
self._values["secrets_encryption_key"] = secrets_encryption_key
|
|
21090
21121
|
if service_ipv4_cidr is not None:
|
|
@@ -21393,6 +21424,24 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
21393
21424
|
result = self._values.get("remote_pod_networks")
|
|
21394
21425
|
return typing.cast(typing.Optional[typing.List[RemotePodNetwork]], result)
|
|
21395
21426
|
|
|
21427
|
+
@builtins.property
|
|
21428
|
+
def removal_policy(self) -> typing.Optional[_RemovalPolicy_9f93c814]:
|
|
21429
|
+
'''The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation.
|
|
21430
|
+
|
|
21431
|
+
This can happen in one of three situations:
|
|
21432
|
+
|
|
21433
|
+
- The resource is removed from the template, so CloudFormation stops managing it;
|
|
21434
|
+
- A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it;
|
|
21435
|
+
- The stack is deleted, so CloudFormation stops managing all resources in it.
|
|
21436
|
+
|
|
21437
|
+
This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC
|
|
21438
|
+
and any other CloudFormation resources managed by this construct.
|
|
21439
|
+
|
|
21440
|
+
:default: - Resources will be deleted.
|
|
21441
|
+
'''
|
|
21442
|
+
result = self._values.get("removal_policy")
|
|
21443
|
+
return typing.cast(typing.Optional[_RemovalPolicy_9f93c814], result)
|
|
21444
|
+
|
|
21396
21445
|
@builtins.property
|
|
21397
21446
|
def secrets_encryption_key(self) -> typing.Optional[_IKeyRef_1e82344b]:
|
|
21398
21447
|
'''KMS secret for envelope encryption for Kubernetes secrets.
|
|
@@ -21463,6 +21512,7 @@ class ClusterOptions(CommonClusterOptions):
|
|
|
21463
21512
|
"prune": "prune",
|
|
21464
21513
|
"remote_node_networks": "remoteNodeNetworks",
|
|
21465
21514
|
"remote_pod_networks": "remotePodNetworks",
|
|
21515
|
+
"removal_policy": "removalPolicy",
|
|
21466
21516
|
"secrets_encryption_key": "secretsEncryptionKey",
|
|
21467
21517
|
"service_ipv4_cidr": "serviceIpv4Cidr",
|
|
21468
21518
|
"bootstrap_cluster_creator_admin_permissions": "bootstrapClusterCreatorAdminPermissions",
|
|
@@ -21505,6 +21555,7 @@ class ClusterProps(ClusterOptions):
|
|
|
21505
21555
|
prune: typing.Optional[builtins.bool] = None,
|
|
21506
21556
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
21507
21557
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
21558
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
21508
21559
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
21509
21560
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
21510
21561
|
bootstrap_cluster_creator_admin_permissions: typing.Optional[builtins.bool] = None,
|
|
@@ -21544,6 +21595,7 @@ class ClusterProps(ClusterOptions):
|
|
|
21544
21595
|
:param prune: Indicates whether Kubernetes resources added through ``addManifest()`` can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the ``kubectl apply`` operation with the ``--prune`` switch. Default: true
|
|
21545
21596
|
:param remote_node_networks: IPv4 CIDR blocks defining the expected address range of hybrid nodes that will join the cluster. Default: - none
|
|
21546
21597
|
:param remote_pod_networks: IPv4 CIDR blocks for Pods running Kubernetes webhooks on hybrid nodes. Default: - none
|
|
21598
|
+
:param removal_policy: The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation. This can happen in one of three situations: - The resource is removed from the template, so CloudFormation stops managing it; - A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it; - The stack is deleted, so CloudFormation stops managing all resources in it. This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct. Default: - Resources will be deleted.
|
|
21547
21599
|
:param secrets_encryption_key: KMS secret for envelope encryption for Kubernetes secrets. Default: - By default, Kubernetes stores all secret object data within etcd and all etcd volumes used by Amazon EKS are encrypted at the disk-level using AWS-Managed encryption keys.
|
|
21548
21600
|
:param service_ipv4_cidr: The CIDR block to assign Kubernetes service IP addresses from. Default: - Kubernetes assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
|
|
21549
21601
|
:param bootstrap_cluster_creator_admin_permissions: Whether or not IAM principal of the cluster creator was set as a cluster admin access entry during cluster creation time. Changing this value after the cluster has been created will result in the cluster being replaced. Default: true
|
|
@@ -21606,6 +21658,7 @@ class ClusterProps(ClusterOptions):
|
|
|
21606
21658
|
check_type(argname="argument prune", value=prune, expected_type=type_hints["prune"])
|
|
21607
21659
|
check_type(argname="argument remote_node_networks", value=remote_node_networks, expected_type=type_hints["remote_node_networks"])
|
|
21608
21660
|
check_type(argname="argument remote_pod_networks", value=remote_pod_networks, expected_type=type_hints["remote_pod_networks"])
|
|
21661
|
+
check_type(argname="argument removal_policy", value=removal_policy, expected_type=type_hints["removal_policy"])
|
|
21609
21662
|
check_type(argname="argument secrets_encryption_key", value=secrets_encryption_key, expected_type=type_hints["secrets_encryption_key"])
|
|
21610
21663
|
check_type(argname="argument service_ipv4_cidr", value=service_ipv4_cidr, expected_type=type_hints["service_ipv4_cidr"])
|
|
21611
21664
|
check_type(argname="argument bootstrap_cluster_creator_admin_permissions", value=bootstrap_cluster_creator_admin_permissions, expected_type=type_hints["bootstrap_cluster_creator_admin_permissions"])
|
|
@@ -21669,6 +21722,8 @@ class ClusterProps(ClusterOptions):
|
|
|
21669
21722
|
self._values["remote_node_networks"] = remote_node_networks
|
|
21670
21723
|
if remote_pod_networks is not None:
|
|
21671
21724
|
self._values["remote_pod_networks"] = remote_pod_networks
|
|
21725
|
+
if removal_policy is not None:
|
|
21726
|
+
self._values["removal_policy"] = removal_policy
|
|
21672
21727
|
if secrets_encryption_key is not None:
|
|
21673
21728
|
self._values["secrets_encryption_key"] = secrets_encryption_key
|
|
21674
21729
|
if service_ipv4_cidr is not None:
|
|
@@ -21991,6 +22046,24 @@ class ClusterProps(ClusterOptions):
|
|
|
21991
22046
|
result = self._values.get("remote_pod_networks")
|
|
21992
22047
|
return typing.cast(typing.Optional[typing.List[RemotePodNetwork]], result)
|
|
21993
22048
|
|
|
22049
|
+
@builtins.property
|
|
22050
|
+
def removal_policy(self) -> typing.Optional[_RemovalPolicy_9f93c814]:
|
|
22051
|
+
'''The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation.
|
|
22052
|
+
|
|
22053
|
+
This can happen in one of three situations:
|
|
22054
|
+
|
|
22055
|
+
- The resource is removed from the template, so CloudFormation stops managing it;
|
|
22056
|
+
- A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it;
|
|
22057
|
+
- The stack is deleted, so CloudFormation stops managing all resources in it.
|
|
22058
|
+
|
|
22059
|
+
This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC
|
|
22060
|
+
and any other CloudFormation resources managed by this construct.
|
|
22061
|
+
|
|
22062
|
+
:default: - Resources will be deleted.
|
|
22063
|
+
'''
|
|
22064
|
+
result = self._values.get("removal_policy")
|
|
22065
|
+
return typing.cast(typing.Optional[_RemovalPolicy_9f93c814], result)
|
|
22066
|
+
|
|
21994
22067
|
@builtins.property
|
|
21995
22068
|
def secrets_encryption_key(self) -> typing.Optional[_IKeyRef_1e82344b]:
|
|
21996
22069
|
'''KMS secret for envelope encryption for Kubernetes secrets.
|
|
@@ -22160,6 +22233,7 @@ class FargateCluster(
|
|
|
22160
22233
|
prune: typing.Optional[builtins.bool] = None,
|
|
22161
22234
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22162
22235
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22236
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
22163
22237
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
22164
22238
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
22165
22239
|
version: KubernetesVersion,
|
|
@@ -22194,6 +22268,7 @@ class FargateCluster(
|
|
|
22194
22268
|
:param prune: Indicates whether Kubernetes resources added through ``addManifest()`` can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the ``kubectl apply`` operation with the ``--prune`` switch. Default: true
|
|
22195
22269
|
:param remote_node_networks: IPv4 CIDR blocks defining the expected address range of hybrid nodes that will join the cluster. Default: - none
|
|
22196
22270
|
:param remote_pod_networks: IPv4 CIDR blocks for Pods running Kubernetes webhooks on hybrid nodes. Default: - none
|
|
22271
|
+
:param removal_policy: The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation. This can happen in one of three situations: - The resource is removed from the template, so CloudFormation stops managing it; - A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it; - The stack is deleted, so CloudFormation stops managing all resources in it. This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct. Default: - Resources will be deleted.
|
|
22197
22272
|
:param secrets_encryption_key: KMS secret for envelope encryption for Kubernetes secrets. Default: - By default, Kubernetes stores all secret object data within etcd and all etcd volumes used by Amazon EKS are encrypted at the disk-level using AWS-Managed encryption keys.
|
|
22198
22273
|
:param service_ipv4_cidr: The CIDR block to assign Kubernetes service IP addresses from. Default: - Kubernetes assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
|
|
22199
22274
|
:param version: The Kubernetes version to run in the cluster.
|
|
@@ -22230,6 +22305,7 @@ class FargateCluster(
|
|
|
22230
22305
|
prune=prune,
|
|
22231
22306
|
remote_node_networks=remote_node_networks,
|
|
22232
22307
|
remote_pod_networks=remote_pod_networks,
|
|
22308
|
+
removal_policy=removal_policy,
|
|
22233
22309
|
secrets_encryption_key=secrets_encryption_key,
|
|
22234
22310
|
service_ipv4_cidr=service_ipv4_cidr,
|
|
22235
22311
|
version=version,
|
|
@@ -22288,6 +22364,7 @@ class FargateCluster(
|
|
|
22288
22364
|
"prune": "prune",
|
|
22289
22365
|
"remote_node_networks": "remoteNodeNetworks",
|
|
22290
22366
|
"remote_pod_networks": "remotePodNetworks",
|
|
22367
|
+
"removal_policy": "removalPolicy",
|
|
22291
22368
|
"secrets_encryption_key": "secretsEncryptionKey",
|
|
22292
22369
|
"service_ipv4_cidr": "serviceIpv4Cidr",
|
|
22293
22370
|
"default_profile": "defaultProfile",
|
|
@@ -22324,6 +22401,7 @@ class FargateClusterProps(ClusterOptions):
|
|
|
22324
22401
|
prune: typing.Optional[builtins.bool] = None,
|
|
22325
22402
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22326
22403
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22404
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
22327
22405
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
22328
22406
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
22329
22407
|
default_profile: typing.Optional[typing.Union[FargateProfileOptions, typing.Dict[builtins.str, typing.Any]]] = None,
|
|
@@ -22357,6 +22435,7 @@ class FargateClusterProps(ClusterOptions):
|
|
|
22357
22435
|
:param prune: Indicates whether Kubernetes resources added through ``addManifest()`` can be automatically pruned. When this is enabled (default), prune labels will be allocated and injected to each resource. These labels will then be used when issuing the ``kubectl apply`` operation with the ``--prune`` switch. Default: true
|
|
22358
22436
|
:param remote_node_networks: IPv4 CIDR blocks defining the expected address range of hybrid nodes that will join the cluster. Default: - none
|
|
22359
22437
|
:param remote_pod_networks: IPv4 CIDR blocks for Pods running Kubernetes webhooks on hybrid nodes. Default: - none
|
|
22438
|
+
:param removal_policy: The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation. This can happen in one of three situations: - The resource is removed from the template, so CloudFormation stops managing it; - A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it; - The stack is deleted, so CloudFormation stops managing all resources in it. This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC and any other CloudFormation resources managed by this construct. Default: - Resources will be deleted.
|
|
22360
22439
|
:param secrets_encryption_key: KMS secret for envelope encryption for Kubernetes secrets. Default: - By default, Kubernetes stores all secret object data within etcd and all etcd volumes used by Amazon EKS are encrypted at the disk-level using AWS-Managed encryption keys.
|
|
22361
22440
|
:param service_ipv4_cidr: The CIDR block to assign Kubernetes service IP addresses from. Default: - Kubernetes assigns addresses from either the 10.100.0.0/16 or 172.20.0.0/16 CIDR blocks
|
|
22362
22441
|
:param default_profile: Fargate Profile to create along with the cluster. Default: - A profile called "default" with 'default' and 'kube-system' selectors will be created if this is left undefined.
|
|
@@ -22406,6 +22485,7 @@ class FargateClusterProps(ClusterOptions):
|
|
|
22406
22485
|
check_type(argname="argument prune", value=prune, expected_type=type_hints["prune"])
|
|
22407
22486
|
check_type(argname="argument remote_node_networks", value=remote_node_networks, expected_type=type_hints["remote_node_networks"])
|
|
22408
22487
|
check_type(argname="argument remote_pod_networks", value=remote_pod_networks, expected_type=type_hints["remote_pod_networks"])
|
|
22488
|
+
check_type(argname="argument removal_policy", value=removal_policy, expected_type=type_hints["removal_policy"])
|
|
22409
22489
|
check_type(argname="argument secrets_encryption_key", value=secrets_encryption_key, expected_type=type_hints["secrets_encryption_key"])
|
|
22410
22490
|
check_type(argname="argument service_ipv4_cidr", value=service_ipv4_cidr, expected_type=type_hints["service_ipv4_cidr"])
|
|
22411
22491
|
check_type(argname="argument default_profile", value=default_profile, expected_type=type_hints["default_profile"])
|
|
@@ -22463,6 +22543,8 @@ class FargateClusterProps(ClusterOptions):
|
|
|
22463
22543
|
self._values["remote_node_networks"] = remote_node_networks
|
|
22464
22544
|
if remote_pod_networks is not None:
|
|
22465
22545
|
self._values["remote_pod_networks"] = remote_pod_networks
|
|
22546
|
+
if removal_policy is not None:
|
|
22547
|
+
self._values["removal_policy"] = removal_policy
|
|
22466
22548
|
if secrets_encryption_key is not None:
|
|
22467
22549
|
self._values["secrets_encryption_key"] = secrets_encryption_key
|
|
22468
22550
|
if service_ipv4_cidr is not None:
|
|
@@ -22773,6 +22855,24 @@ class FargateClusterProps(ClusterOptions):
|
|
|
22773
22855
|
result = self._values.get("remote_pod_networks")
|
|
22774
22856
|
return typing.cast(typing.Optional[typing.List[RemotePodNetwork]], result)
|
|
22775
22857
|
|
|
22858
|
+
@builtins.property
|
|
22859
|
+
def removal_policy(self) -> typing.Optional[_RemovalPolicy_9f93c814]:
|
|
22860
|
+
'''The removal policy applied to all CloudFormation resources created by this construct when they are no longer managed by CloudFormation.
|
|
22861
|
+
|
|
22862
|
+
This can happen in one of three situations:
|
|
22863
|
+
|
|
22864
|
+
- The resource is removed from the template, so CloudFormation stops managing it;
|
|
22865
|
+
- A change to the resource is made that requires it to be replaced, so CloudFormation stops managing it;
|
|
22866
|
+
- The stack is deleted, so CloudFormation stops managing all resources in it.
|
|
22867
|
+
|
|
22868
|
+
This affects the EKS cluster itself, associated IAM roles, node groups, security groups, VPC
|
|
22869
|
+
and any other CloudFormation resources managed by this construct.
|
|
22870
|
+
|
|
22871
|
+
:default: - Resources will be deleted.
|
|
22872
|
+
'''
|
|
22873
|
+
result = self._values.get("removal_policy")
|
|
22874
|
+
return typing.cast(typing.Optional[_RemovalPolicy_9f93c814], result)
|
|
22875
|
+
|
|
22776
22876
|
@builtins.property
|
|
22777
22877
|
def secrets_encryption_key(self) -> typing.Optional[_IKeyRef_1e82344b]:
|
|
22778
22878
|
'''KMS secret for envelope encryption for Kubernetes secrets.
|
|
@@ -25046,6 +25146,7 @@ def _typecheckingstub__786576ad54eacdb9ab8e92277c0fd07f813bc56d4243937f3b5a85c0c
|
|
|
25046
25146
|
prune: typing.Optional[builtins.bool] = None,
|
|
25047
25147
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25048
25148
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25149
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
25049
25150
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
25050
25151
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
25051
25152
|
version: KubernetesVersion,
|
|
@@ -25286,6 +25387,7 @@ def _typecheckingstub__0b45b97fda36b43e872f90f9fe4cde65de855b50b3acfd236c1f400ef
|
|
|
25286
25387
|
prune: typing.Optional[builtins.bool] = None,
|
|
25287
25388
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25288
25389
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25390
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
25289
25391
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
25290
25392
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
25291
25393
|
) -> None:
|
|
@@ -25321,6 +25423,7 @@ def _typecheckingstub__ce7a73a63de29ba5e5b5cd5cabde7aca1c4bc7d119de52fc4c0f11d99
|
|
|
25321
25423
|
prune: typing.Optional[builtins.bool] = None,
|
|
25322
25424
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25323
25425
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25426
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
25324
25427
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
25325
25428
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
25326
25429
|
bootstrap_cluster_creator_admin_permissions: typing.Optional[builtins.bool] = None,
|
|
@@ -25358,6 +25461,7 @@ def _typecheckingstub__ae166d791f5d5176f3386726c22bc44afedf5d336437a3513e3740387
|
|
|
25358
25461
|
prune: typing.Optional[builtins.bool] = None,
|
|
25359
25462
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25360
25463
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25464
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
25361
25465
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
25362
25466
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
25363
25467
|
version: KubernetesVersion,
|
|
@@ -25401,6 +25505,7 @@ def _typecheckingstub__f11c7f989209f6213cb855d2846bb0b2b79a6a2b85eb0d65939e981df
|
|
|
25401
25505
|
prune: typing.Optional[builtins.bool] = None,
|
|
25402
25506
|
remote_node_networks: typing.Optional[typing.Sequence[typing.Union[RemoteNodeNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25403
25507
|
remote_pod_networks: typing.Optional[typing.Sequence[typing.Union[RemotePodNetwork, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
25508
|
+
removal_policy: typing.Optional[_RemovalPolicy_9f93c814] = None,
|
|
25404
25509
|
secrets_encryption_key: typing.Optional[_IKeyRef_1e82344b] = None,
|
|
25405
25510
|
service_ipv4_cidr: typing.Optional[builtins.str] = None,
|
|
25406
25511
|
default_profile: typing.Optional[typing.Union[FargateProfileOptions, typing.Dict[builtins.str, typing.Any]]] = None,
|
aws_cdk/aws_fsx/__init__.py
CHANGED
|
@@ -5282,7 +5282,7 @@ class CfnFileSystem(
|
|
|
5282
5282
|
:param automatic_backup_retention_days: The number of days to retain automatic backups. Setting this property to ``0`` disables automatic backups. You can retain automatic backups for a maximum of 90 days. The default is ``30`` .
|
|
5283
5283
|
:param daily_automatic_backup_start_time: A recurring daily time, in the format ``HH:MM`` . ``HH`` is the zero-padded hour of the day (0-23), and ``MM`` is the zero-padded minute of the hour. For example, ``05:00`` specifies 5 AM daily.
|
|
5284
5284
|
:param disk_iops_configuration: The SSD IOPS configuration for the FSx for ONTAP file system.
|
|
5285
|
-
:param endpoint_ip_address_range: (Multi-AZ only) Specifies the
|
|
5285
|
+
:param endpoint_ip_address_range: (Multi-AZ only) Specifies the IPv4 address range in which the endpoints to access your file system will be created. By default in the Amazon FSx API, Amazon FSx selects an unused IP address range for you from the 198.19.* range. By default in the Amazon FSx console, Amazon FSx chooses the last 64 IP addresses from the VPC’s primary CIDR range to use as the endpoint IP address range for the file system. You can have overlapping endpoint IP addresses for file systems deployed in the same VPC/route tables, as long as they don't overlap with any subnet.
|
|
5286
5286
|
:param fsx_admin_password: The ONTAP administrative password for the ``fsxadmin`` user with which you administer your file system using the NetApp ONTAP CLI and REST API.
|
|
5287
5287
|
:param ha_pairs: Specifies how many high-availability (HA) pairs of file servers will power your file system. First-generation file systems are powered by 1 HA pair. Second-generation multi-AZ file systems are powered by 1 HA pair. Second generation single-AZ file systems are powered by up to 12 HA pairs. The default value is 1. The value of this property affects the values of ``StorageCapacity`` , ``Iops`` , and ``ThroughputCapacity`` . For more information, see `High-availability (HA) pairs <https://docs.aws.amazon.com/fsx/latest/ONTAPGuide/administering-file-systems.html#HA-pairs>`_ in the FSx for ONTAP user guide. Block storage protocol support (iSCSI and NVMe over TCP) is disabled on file systems with more than 6 HA pairs. For more information, see `Using block storage protocols <https://docs.aws.amazon.com/fsx/latest/ONTAPGuide/supported-fsx-clients.html#using-block-storage>`_ . Amazon FSx responds with an HTTP status code 400 (Bad Request) for the following conditions: - The value of ``HAPairs`` is less than 1 or greater than 12. - The value of ``HAPairs`` is greater than 1 and the value of ``DeploymentType`` is ``SINGLE_AZ_1`` , ``MULTI_AZ_1`` , or ``MULTI_AZ_2`` .
|
|
5288
5288
|
:param preferred_subnet_id: Required when ``DeploymentType`` is set to ``MULTI_AZ_1`` or ``MULTI_AZ_2`` . This specifies the subnet in which you want the preferred file server to be located.
|
|
@@ -5412,7 +5412,7 @@ class CfnFileSystem(
|
|
|
5412
5412
|
|
|
5413
5413
|
@builtins.property
|
|
5414
5414
|
def endpoint_ip_address_range(self) -> typing.Optional[builtins.str]:
|
|
5415
|
-
'''(Multi-AZ only) Specifies the
|
|
5415
|
+
'''(Multi-AZ only) Specifies the IPv4 address range in which the endpoints to access your file system will be created.
|
|
5416
5416
|
|
|
5417
5417
|
By default in the Amazon FSx API, Amazon FSx selects an unused IP address range for you from the 198.19.* range. By default in the Amazon FSx console, Amazon FSx chooses the last 64 IP addresses from the VPC’s primary CIDR range to use as the endpoint IP address range for the file system. You can have overlapping endpoint IP addresses for file systems deployed in the same VPC/route tables, as long as they don't overlap with any subnet.
|
|
5418
5418
|
|
|
@@ -5581,7 +5581,7 @@ class CfnFileSystem(
|
|
|
5581
5581
|
:param copy_tags_to_volumes: A Boolean value indicating whether tags for the file system should be copied to volumes. This value defaults to ``false`` . If it's set to ``true`` , all tags for the file system are copied to volumes where the user doesn't specify tags. If this value is ``true`` , and you specify one or more tags, only the specified tags are copied to volumes. If you specify one or more tags when creating the volume, no tags are copied from the file system, regardless of this value.
|
|
5582
5582
|
:param daily_automatic_backup_start_time: A recurring daily time, in the format ``HH:MM`` . ``HH`` is the zero-padded hour of the day (0-23), and ``MM`` is the zero-padded minute of the hour. For example, ``05:00`` specifies 5 AM daily.
|
|
5583
5583
|
:param disk_iops_configuration: The SSD IOPS (input/output operations per second) configuration for an Amazon FSx for NetApp ONTAP, Amazon FSx for Windows File Server, or FSx for OpenZFS file system. By default, Amazon FSx automatically provisions 3 IOPS per GB of storage capacity. You can provision additional IOPS per GB of storage. The configuration consists of the total number of provisioned SSD IOPS and how it is was provisioned, or the mode (by the customer or by Amazon FSx).
|
|
5584
|
-
:param endpoint_ip_address_range: (Multi-AZ only) Specifies the
|
|
5584
|
+
:param endpoint_ip_address_range: (Multi-AZ only) Specifies the IPv4 address range in which the endpoints to access your file system will be created. By default in the Amazon FSx API and Amazon FSx console, Amazon FSx selects an available /28 IP address range for you from one of the VPC's CIDR ranges. You can have overlapping endpoint IP addresses for file systems deployed in the same VPC/route tables, as long as they don't overlap with any subnet.
|
|
5585
5585
|
:param endpoint_ipv6_address_range: (Multi-AZ only) Specifies the IP address range in which the endpoints to access your file system will be created. By default in the Amazon FSx API and Amazon FSx console, Amazon FSx selects an available /118 IP address range for you from one of the VPC's CIDR ranges. You can have overlapping endpoint IP addresses for file systems deployed in the same VPC/route tables, as long as they don't overlap with any subnet.
|
|
5586
5586
|
:param options: To delete a file system if there are child volumes present below the root volume, use the string ``DELETE_CHILD_VOLUMES_AND_SNAPSHOTS`` . If your file system has child volumes and you don't use this option, the delete request will fail.
|
|
5587
5587
|
:param preferred_subnet_id: Required when ``DeploymentType`` is set to ``MULTI_AZ_1`` . This specifies the subnet in which you want the preferred file server to be located.
|
|
@@ -5772,7 +5772,7 @@ class CfnFileSystem(
|
|
|
5772
5772
|
|
|
5773
5773
|
@builtins.property
|
|
5774
5774
|
def endpoint_ip_address_range(self) -> typing.Optional[builtins.str]:
|
|
5775
|
-
'''(Multi-AZ only) Specifies the
|
|
5775
|
+
'''(Multi-AZ only) Specifies the IPv4 address range in which the endpoints to access your file system will be created.
|
|
5776
5776
|
|
|
5777
5777
|
By default in the Amazon FSx API and Amazon FSx console, Amazon FSx selects an available /28 IP address range for you from one of the VPC's CIDR ranges. You can have overlapping endpoint IP addresses for file systems deployed in the same VPC/route tables, as long as they don't overlap with any subnet.
|
|
5778
5778
|
|