AWS::EKS::Cluster
Creates an Amazon EKS control plane.
The Amazon EKS control plane consists of control plane instances that run the
Kubernetes software, such as etcd and the API server. The control plane
runs in an account managed by Amazon, and the Kubernetes API is exposed by
the Amazon EKS API server endpoint. Each Amazon EKS cluster control
plane is single tenant and unique. It runs on its own set of Amazon EC2
instances.
The cluster control plane is provisioned across multiple Availability Zones and
fronted by an Elastic Load Balancing
Network Load Balancer. Amazon EKS also provisions elastic network interfaces in
your VPC subnets to provide connectivity from the control plane instances to the nodes
(for example, to support kubectl exec, logs, and
proxy data flows).
Amazon EKS nodes run in your Amazon account and connect to your cluster's control plane over the Kubernetes API server endpoint and a certificate file that is created for your cluster.
In most cases, it takes several minutes to create a cluster. After you create an Amazon EKS cluster, you must configure your Kubernetes tooling to communicate with the API server and launch nodes into your cluster. For more information, see Managing Cluster Authentication and Launching Amazon EKS nodes in the Amazon EKS User Guide.
Syntax
To declare this entity in your Amazon CloudFormation template, use the following syntax:
JSON
{ "Type" : "AWS::EKS::Cluster", "Properties" : { "EncryptionConfig" :[ EncryptionConfig, ... ], "KubernetesNetworkConfig" :KubernetesNetworkConfig, "Logging" :Logging, "Name" :String, "OutpostConfig" :OutpostConfig, "ResourcesVpcConfig" :ResourcesVpcConfig, "RoleArn" :String, "Tags" :[ Tag, ... ], "Version" :String} }
YAML
Type: AWS::EKS::Cluster Properties: EncryptionConfig:- EncryptionConfigKubernetesNetworkConfig:KubernetesNetworkConfigLogging:LoggingName:StringOutpostConfig:OutpostConfigResourcesVpcConfig:ResourcesVpcConfigRoleArn:StringTags:- TagVersion:String
Properties
EncryptionConfig-
The encryption configuration for the cluster.
Required: No
Type: List of EncryptionConfig
Maximum:
1Update requires: Replacement
KubernetesNetworkConfig-
The Kubernetes network configuration for the cluster.
Required: No
Type: KubernetesNetworkConfig
Update requires: Replacement
Logging-
The logging configuration for your cluster.
Required: No
Type: Logging
Update requires: No interruption
Name-
The unique name to give to your cluster.
Required: No
Type: String
Minimum:
1Maximum:
100Pattern:
^[0-9A-Za-z][A-Za-z0-9\-_]*Update requires: Replacement
OutpostConfig-
An object representing the configuration of your local Amazon EKS cluster on an Amazon Outpost. This object isn't available for clusters on the Amazon cloud.
Required: No
Type: OutpostConfig
Update requires: Replacement
ResourcesVpcConfig-
The VPC configuration that's used by the cluster control plane. Amazon EKS VPC resources have specific requirements to work properly with Kubernetes. For more information, see Cluster VPC Considerations and Cluster Security Group Considerations in the Amazon EKS User Guide. You must specify at least two subnets. You can specify up to five security groups, but we recommend that you use a dedicated security group for your cluster control plane.
Important
Updates require replacement of the
SecurityGroupIdsandSubnetIdssub-properties.Required: Yes
Type: ResourcesVpcConfig
Update requires: No interruption
RoleArn-
The Amazon Resource Name (ARN) of the IAM role that provides permissions for the Kubernetes control plane to make calls to Amazon API operations on your behalf. For more information, see Amazon EKS Service IAM Role in the Amazon EKS User Guide .
Required: Yes
Type: String
Update requires: Replacement
Tags-
The metadata that you apply to the cluster to assist with categorization and organization. Each tag consists of a key and an optional value, both of which you define. Cluster tags don't propagate to any other resources associated with the cluster.
Note
You must have the
eks:TagResourceandeks:UntagResourcepermissions for your IAM principal to manage the Amazon CloudFormation stack. If you don't have these permissions, there might be unexpected behavior with stack-level tags propagating to the resource during resource creation and update.Required: No
Type: List of Tag
Update requires: No interruption
Version-
The desired Kubernetes version for your cluster. If you don't specify a value here, the default version available in Amazon EKS is used.
Note
The default version might not be the latest version available.
Required: No
Type: String
Update requires: No interruption
Return values
Ref
When you pass the logical ID of this resource to the intrinsic Reffunction, Refreturns the resource name. For example:
{ "Ref": "myCluster" }
For the Amazon EKS cluster myCluster, Ref returns
the name of the cluster.
For more information about using the Reffunction, see Ref.
Fn::GetAtt
The Fn::GetAttintrinsic function returns a value for a specified attribute of this type. The following are the available attributes and sample return values.
For more information about using the Fn::GetAttintrinsic function, see Fn::GetAtt.
Arn-
The ARN of the cluster, such as
arn:aws:eks:us-west-2:666666666666:cluster/prod. CertificateAuthorityData-
The
certificate-authority-datafor your cluster. ClusterSecurityGroupId-
The cluster security group that was created by Amazon EKS for the cluster. Managed node groups use this security group for control plane to data plane communication.
This parameter is only returned by Amazon EKS clusters that support managed node groups. For more information, see Managed node groups in the Amazon EKS User Guide.
EncryptionConfigKeyArn-
Amazon Resource Name (ARN) or alias of the customer master key (CMK).
Endpoint-
The endpoint for your Kubernetes API server, such as
https://5E1D0CEXAMPLEA591B746AFC5AB30262.yl4.us-west-2.eks.amazonaws.com. Id-
The ID of your local Amazon EKS cluster on an Amazon Outpost. This property isn't available for an Amazon EKS cluster on the Amazon cloud.
KubernetesNetworkConfig.ServiceIpv6Cidr-
The CIDR block that Kubernetes Service IP addresses are assigned from if you created a
1.21or later cluster with version>1.10.1or later of the Amazon VPC CNI add-on and specifiedipv6for ipFamily when you created the cluster. Kubernetes assigns Service addresses from the unique local address range (fc00::/7) because you can't specify a customIPv6CIDR block when you create the cluster. OpenIdConnectIssuerUrl-
The issuer URL for the OIDC identity provider.
Examples
Create a cluster
The following example creates an Amazon EKS cluster named
Prod.
JSON
{ "EKSCluster": { "Type": "AWS::EKS::Cluster", "Properties": { "Name": "Prod", "Version": "1.20", "RoleArn": "arn:aws:iam::012345678910:role/eks-service-role-AWSServiceRoleForAmazonEKS-EXAMPLEBQ4PI", "ResourcesVpcConfig": { "SecurityGroupIds": [ "sg-6979fe18" ], "SubnetIds": [ "subnet-6782e71e", "subnet-e7e761ac" ], "EndpointPublicAccess": false, "EndpointPrivateAccess": true, "PublicAccessCidrs": [ "1.1.1.2/32" ] }, "Logging": { "ClusterLogging": { "EnabledTypes": [ { "Type": "api" }, { "Type": "audit" } ] } }, "Tags": [ { "Key": "key", "Value": "val" } ] } } }
YAML
EKSCluster: Type: AWS::EKS::Cluster Properties: Name: Prod Version: "1.20" RoleArn: "arn:aws:iam::012345678910:role/eks-service-role-AWSServiceRoleForAmazonEKS-EXAMPLEBQ4PI" ResourcesVpcConfig: SecurityGroupIds: - sg-6979fe18 SubnetIds: - subnet-6782e71e - subnet-e7e761ac EndpointPublicAccess: false EndpointPrivateAccess: true PublicAccessCidrs: [ "1.1.1.2/32" ] Logging: ClusterLogging: EnabledTypes: - Type: api - Type: audit Tags: - Key: "key" Value: "val"
See also
-
Clusters in the Amazon EKS User Guide.
-
CreateClusterin the Amazon EKS API Reference.