@@ -63,12 +63,12 @@ This example defines an Amazon EKS cluster with the following configuration:
63
63
* A Kubernetes pod with a container based on the [ paulbouwer/hello-kubernetes] ( https://github.com/paulbouwer/hello-kubernetes ) image.
64
64
65
65
``` ts
66
- import { KubectlV28Layer } from ' @aws-cdk/lambda-layer-kubectl-v28 ' ;
66
+ import { KubectlV29Layer } from ' @aws-cdk/lambda-layer-kubectl-v29 ' ;
67
67
68
68
// provisioning a cluster
69
69
const cluster = new eks .Cluster (this , ' hello-eks' , {
70
- version: eks .KubernetesVersion .V1_28 ,
71
- kubectlLayer: new KubectlV28Layer (this , ' kubectl' ),
70
+ version: eks .KubernetesVersion .V1_29 ,
71
+ kubectlLayer: new KubectlV29Layer (this , ' kubectl' ),
72
72
});
73
73
74
74
// apply a kubernetes manifest to the cluster
@@ -134,15 +134,15 @@ Creating a new cluster is done using the `Cluster` or `FargateCluster` construct
134
134
135
135
``` ts
136
136
new eks .Cluster (this , ' HelloEKS' , {
137
- version: eks .KubernetesVersion .V1_28 ,
137
+ version: eks .KubernetesVersion .V1_29 ,
138
138
});
139
139
```
140
140
141
141
You can also use ` FargateCluster ` to provision a cluster that uses only fargate workers.
142
142
143
143
``` ts
144
144
new eks .FargateCluster (this , ' HelloEKS' , {
145
- version: eks .KubernetesVersion .V1_28 ,
145
+ version: eks .KubernetesVersion .V1_29 ,
146
146
});
147
147
```
148
148
@@ -166,7 +166,7 @@ At cluster instantiation time, you can customize the number of instances and the
166
166
167
167
``` ts
168
168
new eks .Cluster (this , ' HelloEKS' , {
169
- version: eks .KubernetesVersion .V1_28 ,
169
+ version: eks .KubernetesVersion .V1_29 ,
170
170
defaultCapacity: 5 ,
171
171
defaultCapacityInstance: ec2 .InstanceType .of (ec2 .InstanceClass .M5 , ec2 .InstanceSize .SMALL ),
172
172
});
@@ -178,7 +178,7 @@ Additional customizations are available post instantiation. To apply them, set t
178
178
179
179
``` ts
180
180
const cluster = new eks .Cluster (this , ' HelloEKS' , {
181
- version: eks .KubernetesVersion .V1_28 ,
181
+ version: eks .KubernetesVersion .V1_29 ,
182
182
defaultCapacity: 0 ,
183
183
});
184
184
@@ -262,7 +262,7 @@ const eksClusterNodeGroupRole = new iam.Role(this, 'eksClusterNodeGroupRole', {
262
262
});
263
263
264
264
const cluster = new eks .Cluster (this , ' HelloEKS' , {
265
- version: eks .KubernetesVersion .V1_28 ,
265
+ version: eks .KubernetesVersion .V1_29 ,
266
266
defaultCapacity: 0 ,
267
267
});
268
268
@@ -405,7 +405,7 @@ The following code defines an Amazon EKS cluster with a default Fargate Profile
405
405
406
406
``` ts
407
407
const cluster = new eks .FargateCluster (this , ' MyCluster' , {
408
- version: eks .KubernetesVersion .V1_28 ,
408
+ version: eks .KubernetesVersion .V1_29 ,
409
409
});
410
410
```
411
411
@@ -482,7 +482,7 @@ You can also configure the cluster to use an auto-scaling group as the default c
482
482
483
483
``` ts
484
484
const cluster = new eks .Cluster (this , ' HelloEKS' , {
485
- version: eks .KubernetesVersion .V1_28 ,
485
+ version: eks .KubernetesVersion .V1_29 ,
486
486
defaultCapacityType: eks .DefaultCapacityType .EC2 ,
487
487
});
488
488
```
@@ -586,7 +586,7 @@ You can configure the [cluster endpoint access](https://docs.aws.amazon.com/eks/
586
586
587
587
``` ts
588
588
const cluster = new eks .Cluster (this , ' hello-eks' , {
589
- version: eks .KubernetesVersion .V1_28 ,
589
+ version: eks .KubernetesVersion .V1_29 ,
590
590
endpointAccess: eks .EndpointAccess .PRIVATE , // No access outside of your VPC.
591
591
});
592
592
```
@@ -608,7 +608,7 @@ To deploy the controller on your EKS cluster, configure the `albController` prop
608
608
609
609
``` ts
610
610
new eks .Cluster (this , ' HelloEKS' , {
611
- version: eks .KubernetesVersion .V1_28 ,
611
+ version: eks .KubernetesVersion .V1_29 ,
612
612
albController: {
613
613
version: eks .AlbControllerVersion .V2_6_2 ,
614
614
},
@@ -651,7 +651,7 @@ You can specify the VPC of the cluster using the `vpc` and `vpcSubnets` properti
651
651
declare const vpc: ec2 .Vpc ;
652
652
653
653
new eks .Cluster (this , ' HelloEKS' , {
654
- version: eks .KubernetesVersion .V1_28 ,
654
+ version: eks .KubernetesVersion .V1_29 ,
655
655
vpc ,
656
656
vpcSubnets: [{ subnetType: ec2 .SubnetType .PRIVATE_WITH_EGRESS }],
657
657
});
@@ -698,7 +698,7 @@ You can configure the environment of the Cluster Handler functions by specifying
698
698
``` ts
699
699
declare const proxyInstanceSecurityGroup: ec2 .SecurityGroup ;
700
700
const cluster = new eks .Cluster (this , ' hello-eks' , {
701
- version: eks .KubernetesVersion .V1_28 ,
701
+ version: eks .KubernetesVersion .V1_29 ,
702
702
clusterHandlerEnvironment: {
703
703
https_proxy: ' http://proxy.myproxy.com' ,
704
704
},
@@ -740,7 +740,7 @@ for (let subnet of subnets) {
740
740
}
741
741
742
742
const cluster = new eks .Cluster (this , ' hello-eks' , {
743
- version: eks .KubernetesVersion .V1_28 ,
743
+ version: eks .KubernetesVersion .V1_29 ,
744
744
vpc: vpc ,
745
745
ipFamily: eks .IpFamily .IP_V6 ,
746
746
vpcSubnets: [{ subnets: vpc .publicSubnets }],
@@ -775,7 +775,7 @@ You can configure the environment of this function by specifying it at cluster i
775
775
776
776
``` ts
777
777
const cluster = new eks .Cluster (this , ' hello-eks' , {
778
- version: eks .KubernetesVersion .V1_28 ,
778
+ version: eks .KubernetesVersion .V1_29 ,
779
779
kubectlEnvironment: {
780
780
' http_proxy' : ' http://proxy.myproxy.com' ,
781
781
},
@@ -795,11 +795,11 @@ Depending on which version of kubernetes you're targeting, you will need to use
795
795
the ` @aws-cdk/lambda-layer-kubectl-vXY ` packages.
796
796
797
797
``` ts
798
- import { KubectlV28Layer } from ' @aws-cdk/lambda-layer-kubectl-v28 ' ;
798
+ import { KubectlV29Layer } from ' @aws-cdk/lambda-layer-kubectl-v29 ' ;
799
799
800
800
const cluster = new eks .Cluster (this , ' hello-eks' , {
801
- version: eks .KubernetesVersion .V1_28 ,
802
- kubectlLayer: new KubectlV28Layer (this , ' kubectl' ),
801
+ version: eks .KubernetesVersion .V1_29 ,
802
+ kubectlLayer: new KubectlV29Layer (this , ' kubectl' ),
803
803
});
804
804
```
805
805
@@ -834,7 +834,7 @@ const cluster1 = new eks.Cluster(this, 'MyCluster', {
834
834
kubectlLayer: layer ,
835
835
vpc ,
836
836
clusterName: ' cluster-name' ,
837
- version: eks .KubernetesVersion .V1_28 ,
837
+ version: eks .KubernetesVersion .V1_29 ,
838
838
});
839
839
840
840
// or
@@ -852,7 +852,7 @@ By default, the kubectl provider is configured with 1024MiB of memory. You can u
852
852
``` ts
853
853
new eks .Cluster (this , ' MyCluster' , {
854
854
kubectlMemory: Size .gibibytes (4 ),
855
- version: eks .KubernetesVersion .V1_28 ,
855
+ version: eks .KubernetesVersion .V1_29 ,
856
856
});
857
857
858
858
// or
@@ -891,7 +891,7 @@ When you create a cluster, you can specify a `mastersRole`. The `Cluster` constr
891
891
``` ts
892
892
declare const role: iam .Role ;
893
893
new eks .Cluster (this , ' HelloEKS' , {
894
- version: eks .KubernetesVersion .V1_28 ,
894
+ version: eks .KubernetesVersion .V1_29 ,
895
895
mastersRole: role ,
896
896
});
897
897
```
@@ -941,7 +941,7 @@ You can use the `secretsEncryptionKey` to configure which key the cluster will u
941
941
const secretsKey = new kms .Key (this , ' SecretsKey' );
942
942
const cluster = new eks .Cluster (this , ' MyCluster' , {
943
943
secretsEncryptionKey: secretsKey ,
944
- version: eks .KubernetesVersion .V1_28 ,
944
+ version: eks .KubernetesVersion .V1_29 ,
945
945
});
946
946
```
947
947
@@ -951,7 +951,7 @@ You can also use a similar configuration for running a cluster built using the F
951
951
const secretsKey = new kms .Key (this , ' SecretsKey' );
952
952
const cluster = new eks .FargateCluster (this , ' MyFargateCluster' , {
953
953
secretsEncryptionKey: secretsKey ,
954
- version: eks .KubernetesVersion .V1_28 ,
954
+ version: eks .KubernetesVersion .V1_29 ,
955
955
});
956
956
```
957
957
@@ -995,7 +995,7 @@ To access the Kubernetes resources from the console, make sure your viewing prin
995
995
in the ` aws-auth ` ConfigMap. Some options to consider:
996
996
997
997
``` ts
998
- import { KubectlV28Layer } from ' @aws-cdk/lambda-layer-kubectl-v28 ' ;
998
+ import { KubectlV29Layer } from ' @aws-cdk/lambda-layer-kubectl-v29 ' ;
999
999
declare const cluster: eks .Cluster ;
1000
1000
declare const your_current_role: iam .Role ;
1001
1001
declare const vpc: ec2 .Vpc ;
@@ -1015,7 +1015,7 @@ your_current_role.addToPolicy(new iam.PolicyStatement({
1015
1015
1016
1016
``` ts
1017
1017
// Option 2: create your custom mastersRole with scoped assumeBy arn as the Cluster prop. Switch to this role from the AWS console.
1018
- import { KubectlV28Layer } from ' @aws-cdk/lambda-layer-kubectl-v28 ' ;
1018
+ import { KubectlV29Layer } from ' @aws-cdk/lambda-layer-kubectl-v29 ' ;
1019
1019
declare const vpc: ec2 .Vpc ;
1020
1020
1021
1021
const mastersRole = new iam .Role (this , ' MastersRole' , {
@@ -1024,8 +1024,8 @@ const mastersRole = new iam.Role(this, 'MastersRole', {
1024
1024
1025
1025
const cluster = new eks .Cluster (this , ' EksCluster' , {
1026
1026
vpc ,
1027
- version: eks .KubernetesVersion .V1_28 ,
1028
- kubectlLayer: new KubectlV28Layer (this , ' KubectlLayer' ),
1027
+ version: eks .KubernetesVersion .V1_29 ,
1028
+ kubectlLayer: new KubectlV29Layer (this , ' KubectlLayer' ),
1029
1029
mastersRole ,
1030
1030
});
1031
1031
@@ -1309,7 +1309,7 @@ when a cluster is defined:
1309
1309
1310
1310
``` ts
1311
1311
new eks .Cluster (this , ' MyCluster' , {
1312
- version: eks .KubernetesVersion .V1_28 ,
1312
+ version: eks .KubernetesVersion .V1_29 ,
1313
1313
prune: false ,
1314
1314
});
1315
1315
```
@@ -1696,7 +1696,7 @@ property. For example:
1696
1696
``` ts
1697
1697
const cluster = new eks .Cluster (this , ' Cluster' , {
1698
1698
// ...
1699
- version: eks .KubernetesVersion .V1_28 ,
1699
+ version: eks .KubernetesVersion .V1_29 ,
1700
1700
clusterLogging: [
1701
1701
eks .ClusterLoggingTypes .API ,
1702
1702
eks .ClusterLoggingTypes .AUTHENTICATOR ,
0 commit comments