Networking
This chapter includes information about how Eksctl creates Virtual Private Cloud (VPC) networks for EKS clusters.
Topics:
-
-
Modify the VPC CIDR range and configure IPv6 addressing
-
Use an existing VPC
-
Customize the VPC, subnets, security groups, and NAT gateways for the new EKS cluster
-
-
-
Use private subnets for the initial nodegroup to isolate it from the public internet
-
Customize subnet topology by listing multiple subnets per availability zone and specifying subnets in nodegroup configurations
-
Restrict nodegroups to specific named subnets in the VPC configuration
-
When using private subnets for nodegroups, set
privateNetworkingtotrue -
Provide a complete subnet specification with both
publicandprivateconfigurations in the VPC spec -
Only one of
subnetsoravailabilityZonescan be provided in nodegroup configuration
-
-
-
Manage public and private access to the Kubernetes API server endpoints in an EKS cluster
-
Restrict access to the EKS Kubernetes public API endpoint by specifying allowed CIDR ranges
-
Update the API server endpoint access configuration and public access CIDR restrictions for an existing cluster
-
-
Updating control plane subnets and security groups
-
Update the subnets used by the EKS control plane for a cluster
-
-
-
Specify the IP version (IPv4 or IPv6) to be used when creating a VPC with EKS cluster
-