Skip to content

Commit 767b48a

Browse files
author
AWS
committed
Amazon Elastic Kubernetes Service Update: Add NodeRepairConfig in CreateNodegroupRequest and UpdateNodegroupConfigRequest
1 parent a241e4f commit 767b48a

File tree

2 files changed

+35
-6
lines changed

2 files changed

+35
-6
lines changed
Lines changed: 6 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,6 @@
1+
{
2+
"type": "feature",
3+
"category": "Amazon Elastic Kubernetes Service",
4+
"contributor": "",
5+
"description": "Add NodeRepairConfig in CreateNodegroupRequest and UpdateNodegroupConfigRequest"
6+
}

services/eks/src/main/resources/codegen-resources/service-2.json

Lines changed: 29 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -2279,6 +2279,10 @@
22792279
"shape":"NodegroupUpdateConfig",
22802280
"documentation":"<p>The node group update configuration.</p>"
22812281
},
2282+
"nodeRepairConfig":{
2283+
"shape":"NodeRepairConfig",
2284+
"documentation":"<p>The node auto repair configuration for the node group.</p>"
2285+
},
22822286
"capacityType":{
22832287
"shape":"CapacityTypes",
22842288
"documentation":"<p>The capacity type for your node group.</p>"
@@ -4341,6 +4345,16 @@
43414345
},
43424346
"documentation":"<p>Information about an Amazon EKS add-on from the Amazon Web Services Marketplace.</p>"
43434347
},
4348+
"NodeRepairConfig":{
4349+
"type":"structure",
4350+
"members":{
4351+
"enabled":{
4352+
"shape":"BoxedBoolean",
4353+
"documentation":"<p>Specifies whether to enable node auto repair for the node group. Node auto repair is disabled by default.</p>"
4354+
}
4355+
},
4356+
"documentation":"<p>The node auto repair configuration for the node group.</p>"
4357+
},
43444358
"Nodegroup":{
43454359
"type":"structure",
43464360
"members":{
@@ -4428,6 +4442,10 @@
44284442
"shape":"NodegroupUpdateConfig",
44294443
"documentation":"<p>The node group update configuration.</p>"
44304444
},
4445+
"nodeRepairConfig":{
4446+
"shape":"NodeRepairConfig",
4447+
"documentation":"<p>The node auto repair configuration for the node group.</p>"
4448+
},
44314449
"launchTemplate":{
44324450
"shape":"LaunchTemplateSpecification",
44334451
"documentation":"<p>If a launch template was used to create the node group, then this is the launch template that was used.</p>"
@@ -4863,11 +4881,11 @@
48634881
"members":{
48644882
"remoteNodeNetworks":{
48654883
"shape":"RemoteNodeNetworkList",
4866-
"documentation":"<p>The list of network CIDRs that can contain hybrid nodes.</p>"
4884+
"documentation":"<p>The list of network CIDRs that can contain hybrid nodes.</p> <p>These CIDR blocks define the expected IP address range of the hybrid nodes that join the cluster. These blocks are typically determined by your network administrator. </p> <p>Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, <code> 10.2.0.0/16</code>).</p> <p>It must satisfy the following requirements:</p> <ul> <li> <p>Each block must be within an <code>IPv4</code> RFC-1918 network range. Minimum allowed size is /24, maximum allowed size is /8. Publicly-routable addresses aren't supported.</p> </li> <li> <p>Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.</p> </li> <li> <p>Each block must have a route to the VPC that uses the VPC CIDR blocks, not public IPs or Elastic IPs. There are many options including Transit Gateway, Site-to-Site VPN, or Direct Connect.</p> </li> <li> <p>Each host must allow outbound connection to the EKS cluster control plane on TCP ports <code>443</code> and <code>10250</code>.</p> </li> <li> <p>Each host must allow inbound connection from the EKS cluster control plane on TCP port 10250 for logs, exec and port-forward operations.</p> </li> <li> <p> Each host must allow TCP and UDP network connectivity to and from other hosts that are running <code>CoreDNS</code> on UDP port <code>53</code> for service and pod DNS names.</p> </li> </ul>"
48674885
},
48684886
"remotePodNetworks":{
48694887
"shape":"RemotePodNetworkList",
4870-
"documentation":"<p>The list of network CIDRs that can contain pods that run Kubernetes webhooks on hybrid nodes.</p>"
4888+
"documentation":"<p>The list of network CIDRs that can contain pods that run Kubernetes webhooks on hybrid nodes.</p> <p>These CIDR blocks are determined by configuring your Container Network Interface (CNI) plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't available for on-premises and edge locations.</p> <p>Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, <code> 10.2.0.0/16</code>).</p> <p>It must satisfy the following requirements:</p> <ul> <li> <p>Each block must be within an <code>IPv4</code> RFC-1918 network range. Minimum allowed size is /24, maximum allowed size is /8. Publicly-routable addresses aren't supported.</p> </li> <li> <p>Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.</p> </li> </ul>"
48714889
}
48724890
},
48734891
"documentation":"<p>The configuration in the cluster for EKS Hybrid Nodes. You can't change or update this configuration after the cluster is created.</p>"
@@ -4891,10 +4909,10 @@
48914909
"members":{
48924910
"cidrs":{
48934911
"shape":"StringList",
4894-
"documentation":"<p>A network CIDR that can contain hybrid nodes.</p>"
4912+
"documentation":"<p>A network CIDR that can contain hybrid nodes.</p> <p>These CIDR blocks define the expected IP address range of the hybrid nodes that join the cluster. These blocks are typically determined by your network administrator. </p> <p>Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, <code> 10.2.0.0/16</code>).</p> <p>It must satisfy the following requirements:</p> <ul> <li> <p>Each block must be within an <code>IPv4</code> RFC-1918 network range. Minimum allowed size is /24, maximum allowed size is /8. Publicly-routable addresses aren't supported.</p> </li> <li> <p>Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.</p> </li> <li> <p>Each block must have a route to the VPC that uses the VPC CIDR blocks, not public IPs or Elastic IPs. There are many options including Transit Gateway, Site-to-Site VPN, or Direct Connect.</p> </li> <li> <p>Each host must allow outbound connection to the EKS cluster control plane on TCP ports <code>443</code> and <code>10250</code>.</p> </li> <li> <p>Each host must allow inbound connection from the EKS cluster control plane on TCP port 10250 for logs, exec and port-forward operations.</p> </li> <li> <p> Each host must allow TCP and UDP network connectivity to and from other hosts that are running <code>CoreDNS</code> on UDP port <code>53</code> for service and pod DNS names.</p> </li> </ul>"
48954913
}
48964914
},
4897-
"documentation":"<p>A network CIDR that can contain hybrid nodes.</p>"
4915+
"documentation":"<p>A network CIDR that can contain hybrid nodes.</p> <p>These CIDR blocks define the expected IP address range of the hybrid nodes that join the cluster. These blocks are typically determined by your network administrator. </p> <p>Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, <code> 10.2.0.0/16</code>).</p> <p>It must satisfy the following requirements:</p> <ul> <li> <p>Each block must be within an <code>IPv4</code> RFC-1918 network range. Minimum allowed size is /24, maximum allowed size is /8. Publicly-routable addresses aren't supported.</p> </li> <li> <p>Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.</p> </li> <li> <p>Each block must have a route to the VPC that uses the VPC CIDR blocks, not public IPs or Elastic IPs. There are many options including Transit Gateway, Site-to-Site VPN, or Direct Connect.</p> </li> <li> <p>Each host must allow outbound connection to the EKS cluster control plane on TCP ports <code>443</code> and <code>10250</code>.</p> </li> <li> <p>Each host must allow inbound connection from the EKS cluster control plane on TCP port 10250 for logs, exec and port-forward operations.</p> </li> <li> <p> Each host must allow TCP and UDP network connectivity to and from other hosts that are running <code>CoreDNS</code> on UDP port <code>53</code> for service and pod DNS names.</p> </li> </ul>"
48984916
},
48994917
"RemoteNodeNetworkList":{
49004918
"type":"list",
@@ -4906,10 +4924,10 @@
49064924
"members":{
49074925
"cidrs":{
49084926
"shape":"StringList",
4909-
"documentation":"<p>A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.</p>"
4927+
"documentation":"<p>A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.</p> <p>These CIDR blocks are determined by configuring your Container Network Interface (CNI) plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't available for on-premises and edge locations.</p> <p>Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, <code> 10.2.0.0/16</code>).</p> <p>It must satisfy the following requirements:</p> <ul> <li> <p>Each block must be within an <code>IPv4</code> RFC-1918 network range. Minimum allowed size is /24, maximum allowed size is /8. Publicly-routable addresses aren't supported.</p> </li> <li> <p>Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.</p> </li> </ul>"
49104928
}
49114929
},
4912-
"documentation":"<p>A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.</p>"
4930+
"documentation":"<p>A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.</p> <p>These CIDR blocks are determined by configuring your Container Network Interface (CNI) plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't available for on-premises and edge locations.</p> <p>Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, <code> 10.2.0.0/16</code>).</p> <p>It must satisfy the following requirements:</p> <ul> <li> <p>Each block must be within an <code>IPv4</code> RFC-1918 network range. Minimum allowed size is /24, maximum allowed size is /8. Publicly-routable addresses aren't supported.</p> </li> <li> <p>Each block cannot overlap with the range of the VPC CIDR blocks for your EKS resources, or the block of the Kubernetes service IP range.</p> </li> </ul>"
49134931
},
49144932
"RemotePodNetworkList":{
49154933
"type":"list",
@@ -5520,6 +5538,10 @@
55205538
"shape":"NodegroupUpdateConfig",
55215539
"documentation":"<p>The node group update configuration.</p>"
55225540
},
5541+
"nodeRepairConfig":{
5542+
"shape":"NodeRepairConfig",
5543+
"documentation":"<p>The node auto repair configuration for the node group.</p>"
5544+
},
55235545
"clientRequestToken":{
55245546
"shape":"String",
55255547
"documentation":"<p>A unique, case-sensitive identifier that you provide to ensure the idempotency of the request.</p>",
@@ -5621,6 +5643,7 @@
56215643
"ResolveConflicts",
56225644
"MaxUnavailable",
56235645
"MaxUnavailablePercentage",
5646+
"NodeRepairEnabled",
56245647
"ConfigurationValues",
56255648
"SecurityGroups",
56265649
"Subnets",

0 commit comments

Comments
 (0)