diff --git a/clients/client-eks/src/commands/AssociateEncryptionConfigCommand.ts b/clients/client-eks/src/commands/AssociateEncryptionConfigCommand.ts index 20657cc9f692..3cdd537dec9d 100644 --- a/clients/client-eks/src/commands/AssociateEncryptionConfigCommand.ts +++ b/clients/client-eks/src/commands/AssociateEncryptionConfigCommand.ts @@ -61,7 +61,7 @@ export interface AssociateEncryptionConfigCommandOutput extends AssociateEncrypt * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/AssociateIdentityProviderConfigCommand.ts b/clients/client-eks/src/commands/AssociateIdentityProviderConfigCommand.ts index 14721b76ca16..85c8adff9f92 100644 --- a/clients/client-eks/src/commands/AssociateIdentityProviderConfigCommand.ts +++ b/clients/client-eks/src/commands/AssociateIdentityProviderConfigCommand.ts @@ -75,7 +75,7 @@ export interface AssociateIdentityProviderConfigCommandOutput * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/CreateNodegroupCommand.ts b/clients/client-eks/src/commands/CreateNodegroupCommand.ts index f6a1d513b8f2..f0f62dc2baa4 100644 --- a/clients/client-eks/src/commands/CreateNodegroupCommand.ts +++ b/clients/client-eks/src/commands/CreateNodegroupCommand.ts @@ -93,6 +93,9 @@ export interface CreateNodegroupCommandOutput extends CreateNodegroupResponse, _ * maxUnavailable: Number("int"), * maxUnavailablePercentage: Number("int"), * }, + * nodeRepairConfig: { // NodeRepairConfig + * enabled: true || false, + * }, * capacityType: "ON_DEMAND" || "SPOT" || "CAPACITY_BLOCK", * version: "STRING_VALUE", * releaseVersion: "STRING_VALUE", @@ -161,6 +164,9 @@ export interface CreateNodegroupCommandOutput extends CreateNodegroupResponse, _ * // maxUnavailable: Number("int"), * // maxUnavailablePercentage: Number("int"), * // }, + * // nodeRepairConfig: { // NodeRepairConfig + * // enabled: true || false, + * // }, * // launchTemplate: { // LaunchTemplateSpecification * // name: "STRING_VALUE", * // version: "STRING_VALUE", diff --git a/clients/client-eks/src/commands/DeleteNodegroupCommand.ts b/clients/client-eks/src/commands/DeleteNodegroupCommand.ts index 96d951e2776b..a4087c07054a 100644 --- a/clients/client-eks/src/commands/DeleteNodegroupCommand.ts +++ b/clients/client-eks/src/commands/DeleteNodegroupCommand.ts @@ -103,6 +103,9 @@ export interface DeleteNodegroupCommandOutput extends DeleteNodegroupResponse, _ * // maxUnavailable: Number("int"), * // maxUnavailablePercentage: Number("int"), * // }, + * // nodeRepairConfig: { // NodeRepairConfig + * // enabled: true || false, + * // }, * // launchTemplate: { // LaunchTemplateSpecification * // name: "STRING_VALUE", * // version: "STRING_VALUE", diff --git a/clients/client-eks/src/commands/DescribeNodegroupCommand.ts b/clients/client-eks/src/commands/DescribeNodegroupCommand.ts index 554b94e55ce7..3f7989aaf18a 100644 --- a/clients/client-eks/src/commands/DescribeNodegroupCommand.ts +++ b/clients/client-eks/src/commands/DescribeNodegroupCommand.ts @@ -103,6 +103,9 @@ export interface DescribeNodegroupCommandOutput extends DescribeNodegroupRespons * // maxUnavailable: Number("int"), * // maxUnavailablePercentage: Number("int"), * // }, + * // nodeRepairConfig: { // NodeRepairConfig + * // enabled: true || false, + * // }, * // launchTemplate: { // LaunchTemplateSpecification * // name: "STRING_VALUE", * // version: "STRING_VALUE", diff --git a/clients/client-eks/src/commands/DescribeUpdateCommand.ts b/clients/client-eks/src/commands/DescribeUpdateCommand.ts index 93e8b51831ae..4bdc8fe64d72 100644 --- a/clients/client-eks/src/commands/DescribeUpdateCommand.ts +++ b/clients/client-eks/src/commands/DescribeUpdateCommand.ts @@ -53,7 +53,7 @@ export interface DescribeUpdateCommandOutput extends DescribeUpdateResponse, __M * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/DisassociateIdentityProviderConfigCommand.ts b/clients/client-eks/src/commands/DisassociateIdentityProviderConfigCommand.ts index 7f0e8d78d011..8d8a3bc461bd 100644 --- a/clients/client-eks/src/commands/DisassociateIdentityProviderConfigCommand.ts +++ b/clients/client-eks/src/commands/DisassociateIdentityProviderConfigCommand.ts @@ -63,7 +63,7 @@ export interface DisassociateIdentityProviderConfigCommandOutput * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/UpdateAddonCommand.ts b/clients/client-eks/src/commands/UpdateAddonCommand.ts index 60de1d9982e3..8ce8ebed5a0f 100644 --- a/clients/client-eks/src/commands/UpdateAddonCommand.ts +++ b/clients/client-eks/src/commands/UpdateAddonCommand.ts @@ -59,7 +59,7 @@ export interface UpdateAddonCommandOutput extends UpdateAddonResponse, __Metadat * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/UpdateClusterConfigCommand.ts b/clients/client-eks/src/commands/UpdateClusterConfigCommand.ts index 1ff1c4ccdd30..fddf1f82e015 100644 --- a/clients/client-eks/src/commands/UpdateClusterConfigCommand.ts +++ b/clients/client-eks/src/commands/UpdateClusterConfigCommand.ts @@ -131,7 +131,7 @@ export interface UpdateClusterConfigCommandOutput extends UpdateClusterConfigRes * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/UpdateClusterVersionCommand.ts b/clients/client-eks/src/commands/UpdateClusterVersionCommand.ts index 681f01ac91c5..8e6d6daceb0f 100644 --- a/clients/client-eks/src/commands/UpdateClusterVersionCommand.ts +++ b/clients/client-eks/src/commands/UpdateClusterVersionCommand.ts @@ -58,7 +58,7 @@ export interface UpdateClusterVersionCommandOutput extends UpdateClusterVersionR * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/UpdateNodegroupConfigCommand.ts b/clients/client-eks/src/commands/UpdateNodegroupConfigCommand.ts index ad2ffea51510..82da32f1d6e1 100644 --- a/clients/client-eks/src/commands/UpdateNodegroupConfigCommand.ts +++ b/clients/client-eks/src/commands/UpdateNodegroupConfigCommand.ts @@ -74,6 +74,9 @@ export interface UpdateNodegroupConfigCommandOutput extends UpdateNodegroupConfi * maxUnavailable: Number("int"), * maxUnavailablePercentage: Number("int"), * }, + * nodeRepairConfig: { // NodeRepairConfig + * enabled: true || false, + * }, * clientRequestToken: "STRING_VALUE", * }; * const command = new UpdateNodegroupConfigCommand(input); @@ -85,7 +88,7 @@ export interface UpdateNodegroupConfigCommandOutput extends UpdateNodegroupConfi * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/commands/UpdateNodegroupVersionCommand.ts b/clients/client-eks/src/commands/UpdateNodegroupVersionCommand.ts index 7ed608a2cf60..0f7a5fc0009e 100644 --- a/clients/client-eks/src/commands/UpdateNodegroupVersionCommand.ts +++ b/clients/client-eks/src/commands/UpdateNodegroupVersionCommand.ts @@ -76,7 +76,7 @@ export interface UpdateNodegroupVersionCommandOutput extends UpdateNodegroupVers * // type: "VersionUpdate" || "EndpointAccessUpdate" || "LoggingUpdate" || "ConfigUpdate" || "AssociateIdentityProviderConfig" || "DisassociateIdentityProviderConfig" || "AssociateEncryptionConfig" || "AddonUpdate" || "VpcConfigUpdate" || "AccessConfigUpdate" || "UpgradePolicyUpdate" || "ZonalShiftConfigUpdate" || "AutoModeUpdate", * // params: [ // UpdateParams * // { // UpdateParam - * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", + * // type: "Version" || "PlatformVersion" || "EndpointPrivateAccess" || "EndpointPublicAccess" || "ClusterLogging" || "DesiredSize" || "LabelsToAdd" || "LabelsToRemove" || "TaintsToAdd" || "TaintsToRemove" || "MaxSize" || "MinSize" || "ReleaseVersion" || "PublicAccessCidrs" || "LaunchTemplateName" || "LaunchTemplateVersion" || "IdentityProviderConfig" || "EncryptionConfig" || "AddonVersion" || "ServiceAccountRoleArn" || "ResolveConflicts" || "MaxUnavailable" || "MaxUnavailablePercentage" || "NodeRepairEnabled" || "ConfigurationValues" || "SecurityGroups" || "Subnets" || "AuthenticationMode" || "PodIdentityAssociations" || "UpgradePolicy" || "ZonalShiftConfig" || "ComputeConfig" || "StorageConfig" || "KubernetesNetworkConfig", * // value: "STRING_VALUE", * // }, * // ], diff --git a/clients/client-eks/src/models/models_0.ts b/clients/client-eks/src/models/models_0.ts index 17b6d9e67765..5876c17dd1f1 100644 --- a/clients/client-eks/src/models/models_0.ts +++ b/clients/client-eks/src/models/models_0.ts @@ -1047,6 +1047,7 @@ export const UpdateParamType = { MAX_UNAVAILABLE: "MaxUnavailable", MAX_UNAVAILABLE_PERCENTAGE: "MaxUnavailablePercentage", MIN_SIZE: "MinSize", + NODE_REPAIR_ENABLED: "NodeRepairEnabled", PLATFORM_VERSION: "PlatformVersion", POD_IDENTITY_ASSOCIATIONS: "PodIdentityAssociations", PUBLIC_ACCESS_CIDRS: "PublicAccessCidrs", @@ -1931,11 +1932,79 @@ export interface OutpostConfigRequest { /** *
A network CIDR that can contain hybrid nodes.
+ *These CIDR blocks define the expected IP address range of the hybrid nodes that join + * the cluster. These blocks are typically determined by your network administrator.
+ *Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example,
+ * 10.2.0.0/16
).
It must satisfy the following requirements:
+ *Each block must be within an IPv4
RFC-1918 network range. Minimum
+ * allowed size is /24, maximum allowed size is /8. Publicly-routable addresses
+ * aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS + * resources, or the block of the Kubernetes service IP range.
+ *Each block must have a route to the VPC that uses the VPC CIDR blocks, not + * public IPs or Elastic IPs. There are many options including Transit Gateway, + * Site-to-Site VPN, or Direct Connect.
+ *Each host must allow outbound connection to the EKS cluster control plane on
+ * TCP ports 443
and 10250
.
Each host must allow inbound connection from the EKS cluster control plane on + * TCP port 10250 for logs, exec and port-forward operations.
+ * Each host must allow TCP and UDP network connectivity to and from other hosts
+ * that are running CoreDNS
on UDP port 53
for service and pod DNS
+ * names.
A network CIDR that can contain hybrid nodes.
+ *These CIDR blocks define the expected IP address range of the hybrid nodes that join + * the cluster. These blocks are typically determined by your network administrator.
+ *Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example,
+ * 10.2.0.0/16
).
It must satisfy the following requirements:
+ *Each block must be within an IPv4
RFC-1918 network range. Minimum
+ * allowed size is /24, maximum allowed size is /8. Publicly-routable addresses
+ * aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS + * resources, or the block of the Kubernetes service IP range.
+ *Each block must have a route to the VPC that uses the VPC CIDR blocks, not + * public IPs or Elastic IPs. There are many options including Transit Gateway, + * Site-to-Site VPN, or Direct Connect.
+ *Each host must allow outbound connection to the EKS cluster control plane on
+ * TCP ports 443
and 10250
.
Each host must allow inbound connection from the EKS cluster control plane on + * TCP port 10250 for logs, exec and port-forward operations.
+ * Each host must allow TCP and UDP network connectivity to and from other hosts
+ * that are running CoreDNS
on UDP port 53
for service and pod DNS
+ * names.
A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.
+ *These CIDR blocks are determined by configuring your Container Network Interface (CNI) + * plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't + * available for on-premises and edge locations.
+ *Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example,
+ * 10.2.0.0/16
).
It must satisfy the following requirements:
+ *Each block must be within an IPv4
RFC-1918 network range. Minimum
+ * allowed size is /24, maximum allowed size is /8. Publicly-routable addresses
+ * aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS + * resources, or the block of the Kubernetes service IP range.
+ *A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.
+ *These CIDR blocks are determined by configuring your Container Network Interface (CNI) + * plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't + * available for on-premises and edge locations.
+ *Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example,
+ * 10.2.0.0/16
).
It must satisfy the following requirements:
+ *Each block must be within an IPv4
RFC-1918 network range. Minimum
+ * allowed size is /24, maximum allowed size is /8. Publicly-routable addresses
+ * aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS + * resources, or the block of the Kubernetes service IP range.
+ *The list of network CIDRs that can contain hybrid nodes.
+ *These CIDR blocks define the expected IP address range of the hybrid nodes that join + * the cluster. These blocks are typically determined by your network administrator.
+ *Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example,
+ * 10.2.0.0/16
).
It must satisfy the following requirements:
+ *Each block must be within an IPv4
RFC-1918 network range. Minimum
+ * allowed size is /24, maximum allowed size is /8. Publicly-routable addresses
+ * aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS + * resources, or the block of the Kubernetes service IP range.
+ *Each block must have a route to the VPC that uses the VPC CIDR blocks, not + * public IPs or Elastic IPs. There are many options including Transit Gateway, + * Site-to-Site VPN, or Direct Connect.
+ *Each host must allow outbound connection to the EKS cluster control plane on
+ * TCP ports 443
and 10250
.
Each host must allow inbound connection from the EKS cluster control plane on + * TCP port 10250 for logs, exec and port-forward operations.
+ * Each host must allow TCP and UDP network connectivity to and from other hosts
+ * that are running CoreDNS
on UDP port 53
for service and pod DNS
+ * names.
The list of network CIDRs that can contain pods that run Kubernetes webhooks on hybrid nodes.
+ *These CIDR blocks are determined by configuring your Container Network Interface (CNI) + * plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't + * available for on-premises and edge locations.
+ *Enter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example,
+ * 10.2.0.0/16
).
It must satisfy the following requirements:
+ *Each block must be within an IPv4
RFC-1918 network range. Minimum
+ * allowed size is /24, maximum allowed size is /8. Publicly-routable addresses
+ * aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS + * resources, or the block of the Kubernetes service IP range.
+ *The node auto repair configuration for the node group.
+ * @public + */ +export interface NodeRepairConfig { + /** + *Specifies whether to enable node auto repair for the node group. Node auto repair is + * disabled by default.
+ * @public + */ + enabled?: boolean | undefined; +} + /** *An object representing the remote access configuration for the managed node * group.
@@ -3712,6 +3879,12 @@ export interface CreateNodegroupRequest { */ updateConfig?: NodegroupUpdateConfig | undefined; + /** + *The node auto repair configuration for the node group.
+ * @public + */ + nodeRepairConfig?: NodeRepairConfig | undefined; + /** *The capacity type for your node group.
* @public @@ -4127,6 +4300,12 @@ export interface Nodegroup { */ updateConfig?: NodegroupUpdateConfig | undefined; + /** + *The node auto repair configuration for the node group.
+ * @public + */ + nodeRepairConfig?: NodeRepairConfig | undefined; + /** *If a launch template was used to create the node group, then this is the launch * template that was used.
@@ -7011,6 +7190,12 @@ export interface UpdateNodegroupConfigRequest { */ updateConfig?: NodegroupUpdateConfig | undefined; + /** + *The node auto repair configuration for the node group.
+ * @public + */ + nodeRepairConfig?: NodeRepairConfig | undefined; + /** *A unique, case-sensitive identifier that you provide to ensure * the idempotency of the request.
diff --git a/clients/client-eks/src/protocols/Aws_restJson1.ts b/clients/client-eks/src/protocols/Aws_restJson1.ts index f804f45912a3..8616d4036c3c 100644 --- a/clients/client-eks/src/protocols/Aws_restJson1.ts +++ b/clients/client-eks/src/protocols/Aws_restJson1.ts @@ -214,6 +214,7 @@ import { Nodegroup, NodegroupScalingConfig, NodegroupUpdateConfig, + NodeRepairConfig, NotFoundException, OidcIdentityProviderConfigRequest, OutpostConfigRequest, @@ -490,6 +491,7 @@ export const se_CreateNodegroupCommand = async ( instanceTypes: (_) => _json(_), labels: (_) => _json(_), launchTemplate: (_) => _json(_), + nodeRepairConfig: (_) => _json(_), nodeRole: [], nodegroupName: [], releaseVersion: [], @@ -1418,6 +1420,7 @@ export const se_UpdateNodegroupConfigCommand = async ( take(input, { clientRequestToken: [true, (_) => _ ?? generateIdempotencyToken()], labels: (_) => _json(_), + nodeRepairConfig: (_) => _json(_), scalingConfig: (_) => _json(_), taints: (_) => _json(_), updateConfig: (_) => _json(_), @@ -3058,6 +3061,8 @@ const de_UnsupportedAvailabilityZoneExceptionRes = async ( // se_NodegroupUpdateConfig omitted. +// se_NodeRepairConfig omitted. + // se_OidcIdentityProviderConfigRequest omitted. // se_OutpostConfigRequest omitted. @@ -3489,6 +3494,7 @@ const de_Nodegroup = (output: any, context: __SerdeContext): Nodegroup => { labels: _json, launchTemplate: _json, modifiedAt: (_: any) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))), + nodeRepairConfig: _json, nodeRole: __expectString, nodegroupArn: __expectString, nodegroupName: __expectString, @@ -3513,6 +3519,8 @@ const de_Nodegroup = (output: any, context: __SerdeContext): Nodegroup => { // de_NodegroupUpdateConfig omitted. +// de_NodeRepairConfig omitted. + // de_OIDC omitted. // de_OidcIdentityProviderConfig omitted. diff --git a/codegen/sdk-codegen/aws-models/eks.json b/codegen/sdk-codegen/aws-models/eks.json index 6124a3b58443..778c4d3db9ac 100644 --- a/codegen/sdk-codegen/aws-models/eks.json +++ b/codegen/sdk-codegen/aws-models/eks.json @@ -3838,6 +3838,12 @@ "smithy.api#documentation": "The node group update configuration.
" } }, + "nodeRepairConfig": { + "target": "com.amazonaws.eks#NodeRepairConfig", + "traits": { + "smithy.api#documentation": "The node auto repair configuration for the node group.
" + } + }, "capacityType": { "target": "com.amazonaws.eks#CapacityTypes", "traits": { @@ -8387,6 +8393,20 @@ "smithy.api#documentation": "Information about an Amazon EKS add-on from the Amazon Web Services Marketplace.
" } }, + "com.amazonaws.eks#NodeRepairConfig": { + "type": "structure", + "members": { + "enabled": { + "target": "com.amazonaws.eks#BoxedBoolean", + "traits": { + "smithy.api#documentation": "Specifies whether to enable node auto repair for the node group. Node auto repair is \n disabled by default.
" + } + } + }, + "traits": { + "smithy.api#documentation": "The node auto repair configuration for the node group.
" + } + }, "com.amazonaws.eks#Nodegroup": { "type": "structure", "members": { @@ -8516,6 +8536,12 @@ "smithy.api#documentation": "The node group update configuration.
" } }, + "nodeRepairConfig": { + "target": "com.amazonaws.eks#NodeRepairConfig", + "traits": { + "smithy.api#documentation": "The node auto repair configuration for the node group.
" + } + }, "launchTemplate": { "target": "com.amazonaws.eks#LaunchTemplateSpecification", "traits": { @@ -9370,13 +9396,13 @@ "remoteNodeNetworks": { "target": "com.amazonaws.eks#RemoteNodeNetworkList", "traits": { - "smithy.api#documentation": "The list of network CIDRs that can contain hybrid nodes.
" + "smithy.api#documentation": "The list of network CIDRs that can contain hybrid nodes.
\nThese CIDR blocks define the expected IP address range of the hybrid nodes that join\n the cluster. These blocks are typically determined by your network administrator.
\nEnter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, \n 10.2.0.0/16
).
It must satisfy the following requirements:
\nEach block must be within an IPv4
RFC-1918 network range. Minimum\n allowed size is /24, maximum allowed size is /8. Publicly-routable addresses\n aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS\n resources, or the block of the Kubernetes service IP range.
\nEach block must have a route to the VPC that uses the VPC CIDR blocks, not\n public IPs or Elastic IPs. There are many options including Transit Gateway,\n Site-to-Site VPN, or Direct Connect.
\nEach host must allow outbound connection to the EKS cluster control plane on\n TCP ports 443
and 10250
.
Each host must allow inbound connection from the EKS cluster control plane on\n TCP port 10250 for logs, exec and port-forward operations.
\n Each host must allow TCP and UDP network connectivity to and from other hosts\n that are running CoreDNS
on UDP port 53
for service and pod DNS\n names.
The list of network CIDRs that can contain pods that run Kubernetes webhooks on hybrid nodes.
" + "smithy.api#documentation": "The list of network CIDRs that can contain pods that run Kubernetes webhooks on hybrid nodes.
\nThese CIDR blocks are determined by configuring your Container Network Interface (CNI)\n plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't\n available for on-premises and edge locations.
\nEnter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, \n 10.2.0.0/16
).
It must satisfy the following requirements:
\nEach block must be within an IPv4
RFC-1918 network range. Minimum\n allowed size is /24, maximum allowed size is /8. Publicly-routable addresses\n aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS\n resources, or the block of the Kubernetes service IP range.
\nA network CIDR that can contain hybrid nodes.
" + "smithy.api#documentation": "A network CIDR that can contain hybrid nodes.
\nThese CIDR blocks define the expected IP address range of the hybrid nodes that join\n the cluster. These blocks are typically determined by your network administrator.
\nEnter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, \n 10.2.0.0/16
).
It must satisfy the following requirements:
\nEach block must be within an IPv4
RFC-1918 network range. Minimum\n allowed size is /24, maximum allowed size is /8. Publicly-routable addresses\n aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS\n resources, or the block of the Kubernetes service IP range.
\nEach block must have a route to the VPC that uses the VPC CIDR blocks, not\n public IPs or Elastic IPs. There are many options including Transit Gateway,\n Site-to-Site VPN, or Direct Connect.
\nEach host must allow outbound connection to the EKS cluster control plane on\n TCP ports 443
and 10250
.
Each host must allow inbound connection from the EKS cluster control plane on\n TCP port 10250 for logs, exec and port-forward operations.
\n Each host must allow TCP and UDP network connectivity to and from other hosts\n that are running CoreDNS
on UDP port 53
for service and pod DNS\n names.
A network CIDR that can contain hybrid nodes.
" + "smithy.api#documentation": "A network CIDR that can contain hybrid nodes.
\nThese CIDR blocks define the expected IP address range of the hybrid nodes that join\n the cluster. These blocks are typically determined by your network administrator.
\nEnter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, \n 10.2.0.0/16
).
It must satisfy the following requirements:
\nEach block must be within an IPv4
RFC-1918 network range. Minimum\n allowed size is /24, maximum allowed size is /8. Publicly-routable addresses\n aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS\n resources, or the block of the Kubernetes service IP range.
\nEach block must have a route to the VPC that uses the VPC CIDR blocks, not\n public IPs or Elastic IPs. There are many options including Transit Gateway,\n Site-to-Site VPN, or Direct Connect.
\nEach host must allow outbound connection to the EKS cluster control plane on\n TCP ports 443
and 10250
.
Each host must allow inbound connection from the EKS cluster control plane on\n TCP port 10250 for logs, exec and port-forward operations.
\n Each host must allow TCP and UDP network connectivity to and from other hosts\n that are running CoreDNS
on UDP port 53
for service and pod DNS\n names.
A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.
" + "smithy.api#documentation": "A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.
\nThese CIDR blocks are determined by configuring your Container Network Interface (CNI)\n plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't\n available for on-premises and edge locations.
\nEnter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, \n 10.2.0.0/16
).
It must satisfy the following requirements:
\nEach block must be within an IPv4
RFC-1918 network range. Minimum\n allowed size is /24, maximum allowed size is /8. Publicly-routable addresses\n aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS\n resources, or the block of the Kubernetes service IP range.
\nA network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.
" + "smithy.api#documentation": "A network CIDR that can contain pods that run Kubernetes webhooks on hybrid nodes.
\nThese CIDR blocks are determined by configuring your Container Network Interface (CNI)\n plugin. We recommend the Calico CNI or Cilium CNI. Note that the Amazon VPC CNI plugin for Kubernetes isn't\n available for on-premises and edge locations.
\nEnter one or more IPv4 CIDR blocks in decimal dotted-quad notation (for example, \n 10.2.0.0/16
).
It must satisfy the following requirements:
\nEach block must be within an IPv4
RFC-1918 network range. Minimum\n allowed size is /24, maximum allowed size is /8. Publicly-routable addresses\n aren't supported.
Each block cannot overlap with the range of the VPC CIDR blocks for your EKS\n resources, or the block of the Kubernetes service IP range.
\nThe node group update configuration.
" } }, + "nodeRepairConfig": { + "target": "com.amazonaws.eks#NodeRepairConfig", + "traits": { + "smithy.api#documentation": "The node auto repair configuration for the node group.
" + } + }, "clientRequestToken": { "target": "com.amazonaws.eks#String", "traits": { @@ -10889,6 +10921,12 @@ "smithy.api#enumValue": "MaxUnavailablePercentage" } }, + "NODE_REPAIR_ENABLED": { + "target": "smithy.api#Unit", + "traits": { + "smithy.api#enumValue": "NodeRepairEnabled" + } + }, "CONFIGURATION_VALUES": { "target": "smithy.api#Unit", "traits": {