|
13 | 13 | "uid":"eks-2017-11-01"
|
14 | 14 | },
|
15 | 15 | "operations":{
|
| 16 | + "AssociateEncryptionConfig":{ |
| 17 | + "name":"AssociateEncryptionConfig", |
| 18 | + "http":{ |
| 19 | + "method":"POST", |
| 20 | + "requestUri":"/clusters/{name}/encryption-config/associate" |
| 21 | + }, |
| 22 | + "input":{"shape":"AssociateEncryptionConfigRequest"}, |
| 23 | + "output":{"shape":"AssociateEncryptionConfigResponse"}, |
| 24 | + "errors":[ |
| 25 | + {"shape":"InvalidParameterException"}, |
| 26 | + {"shape":"ClientException"}, |
| 27 | + {"shape":"ServerException"}, |
| 28 | + {"shape":"ResourceInUseException"}, |
| 29 | + {"shape":"ResourceNotFoundException"}, |
| 30 | + {"shape":"InvalidRequestException"} |
| 31 | + ], |
| 32 | + "documentation":"<p>Associate encryption configuration to an existing cluster.</p> <p>You can use this API to enable encryption on existing clusters which do not have encryption already enabled. This allows you to implement a defense-in-depth security strategy without migrating applications to new EKS clusters.</p>" |
| 33 | + }, |
16 | 34 | "AssociateIdentityProviderConfig":{
|
17 | 35 | "name":"AssociateIdentityProviderConfig",
|
18 | 36 | "http":{
|
|
66 | 84 | {"shape":"ServiceUnavailableException"},
|
67 | 85 | {"shape":"UnsupportedAvailabilityZoneException"}
|
68 | 86 | ],
|
69 |
| - "documentation":"<p>Creates an Amazon EKS control plane. </p> <p>The Amazon EKS control plane consists of control plane instances that run the Kubernetes software, such as <code>etcd</code> and the API server. The control plane runs in an account managed by AWS, and the Kubernetes API is exposed via the Amazon EKS API server endpoint. Each Amazon EKS cluster control plane is single-tenant and unique and runs on its own set of Amazon EC2 instances.</p> <p>The cluster control plane is provisioned across multiple Availability Zones and fronted by an Elastic Load Balancing Network Load Balancer. Amazon EKS also provisions elastic network interfaces in your VPC subnets to provide connectivity from the control plane instances to the nodes (for example, to support <code>kubectl exec</code>, <code>logs</code>, and <code>proxy</code> data flows).</p> <p>Amazon EKS nodes run in your AWS account and connect to your cluster's control plane via the Kubernetes API server endpoint and a certificate file that is created for your cluster.</p> <p>You can use the <code>endpointPublicAccess</code> and <code>endpointPrivateAccess</code> parameters to enable or disable public and private access to your cluster's Kubernetes API server endpoint. By default, public access is enabled, and private access is disabled. For more information, see <a href=\"https://docs.aws.amazon.com/eks/latest/userguide/cluster-endpoint.html\">Amazon EKS Cluster Endpoint Access Control</a> in the <i> <i>Amazon EKS User Guide</i> </i>. </p> <p>You can use the <code>logging</code> parameter to enable or disable exporting the Kubernetes control plane logs for your cluster to CloudWatch Logs. By default, cluster control plane logs aren't exported to CloudWatch Logs. For more information, see <a href=\"https://docs.aws.amazon.com/eks/latest/userguide/control-plane-logs.html\">Amazon EKS Cluster Control Plane Logs</a> in the <i> <i>Amazon EKS User Guide</i> </i>.</p> <note> <p>CloudWatch Logs ingestion, archive storage, and data scanning rates apply to exported control plane logs. For more information, see <a href=\"http://aws.amazon.com/cloudwatch/pricing/\">Amazon CloudWatch Pricing</a>.</p> </note> <p>Cluster creation typically takes between 10 and 15 minutes. After you create an Amazon EKS cluster, you must configure your Kubernetes tooling to communicate with the API server and launch nodes into your cluster. For more information, see <a href=\"https://docs.aws.amazon.com/eks/latest/userguide/managing-auth.html\">Managing Cluster Authentication</a> and <a href=\"https://docs.aws.amazon.com/eks/latest/userguide/launch-workers.html\">Launching Amazon EKS nodes</a> in the <i>Amazon EKS User Guide</i>.</p>" |
| 87 | + "documentation":"<p>Creates an Amazon EKS control plane. </p> <p>The Amazon EKS control plane consists of control plane instances that run the Kubernetes software, such as <code>etcd</code> and the API server. The control plane runs in an account managed by AWS, and the Kubernetes API is exposed via the Amazon EKS API server endpoint. Each Amazon EKS cluster control plane is single-tenant and unique and runs on its own set of Amazon EC2 instances.</p> <p>The cluster control plane is provisioned across multiple Availability Zones and fronted by an Elastic Load Balancing Network Load Balancer. Amazon EKS also provisions elastic network interfaces in your VPC subnets to provide connectivity from the control plane instances to the nodes (for example, to support <code>kubectl exec</code>, <code>logs</code>, and <code>proxy</code> data flows).</p> <p>Amazon EKS nodes run in your AWS account and connect to your cluster's control plane via the Kubernetes API server endpoint and a certificate file that is created for your cluster.</p> <p>Cluster creation typically takes several minutes. After you create an Amazon EKS cluster, you must configure your Kubernetes tooling to communicate with the API server and launch nodes into your cluster. For more information, see <a href=\"https://docs.aws.amazon.com/eks/latest/userguide/managing-auth.html\">Managing Cluster Authentication</a> and <a href=\"https://docs.aws.amazon.com/eks/latest/userguide/launch-workers.html\">Launching Amazon EKS nodes</a> in the <i>Amazon EKS User Guide</i>.</p>" |
70 | 88 | },
|
71 | 89 | "CreateFargateProfile":{
|
72 | 90 | "name":"CreateFargateProfile",
|
|
690 | 708 | "type":"list",
|
691 | 709 | "member":{"shape":"AddonInfo"}
|
692 | 710 | },
|
| 711 | + "AssociateEncryptionConfigRequest":{ |
| 712 | + "type":"structure", |
| 713 | + "required":[ |
| 714 | + "clusterName", |
| 715 | + "encryptionConfig" |
| 716 | + ], |
| 717 | + "members":{ |
| 718 | + "clusterName":{ |
| 719 | + "shape":"String", |
| 720 | + "documentation":"<p>The name of the cluster that you are associating with encryption configuration.</p>", |
| 721 | + "location":"uri", |
| 722 | + "locationName":"name" |
| 723 | + }, |
| 724 | + "encryptionConfig":{ |
| 725 | + "shape":"EncryptionConfigList", |
| 726 | + "documentation":"<p>The configuration you are using for encryption.</p>" |
| 727 | + }, |
| 728 | + "clientRequestToken":{ |
| 729 | + "shape":"String", |
| 730 | + "documentation":"<p>The client request token you are using with the encryption configuration.</p>", |
| 731 | + "idempotencyToken":true |
| 732 | + } |
| 733 | + } |
| 734 | + }, |
| 735 | + "AssociateEncryptionConfigResponse":{ |
| 736 | + "type":"structure", |
| 737 | + "members":{ |
| 738 | + "update":{"shape":"Update"} |
| 739 | + } |
| 740 | + }, |
693 | 741 | "AssociateIdentityProviderConfigRequest":{
|
694 | 742 | "type":"structure",
|
695 | 743 | "required":[
|
|
2885 | 2933 | "ReleaseVersion",
|
2886 | 2934 | "PublicAccessCidrs",
|
2887 | 2935 | "IdentityProviderConfig",
|
| 2936 | + "EncryptionConfig", |
2888 | 2937 | "AddonVersion",
|
2889 | 2938 | "ServiceAccountRoleArn",
|
2890 | 2939 | "ResolveConflicts"
|
|
2912 | 2961 | "ConfigUpdate",
|
2913 | 2962 | "AssociateIdentityProviderConfig",
|
2914 | 2963 | "DisassociateIdentityProviderConfig",
|
| 2964 | + "AssociateEncryptionConfig", |
2915 | 2965 | "AddonUpdate"
|
2916 | 2966 | ]
|
2917 | 2967 | },
|
|
0 commit comments