Skip to content

Commit f40b55a

Browse files
committed
Updating SNAT variable documentation
1 parent fc825ed commit f40b55a

File tree

1 file changed

+4
-6
lines changed

1 file changed

+4
-6
lines changed

README.md

Lines changed: 4 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -68,9 +68,9 @@ For help, please consider the following venues (in order):
6868
For all Kubernetes releases, *we recommend installing the latest VPC CNI release*. The following table denotes our *oldest* recommended
6969
VPC CNI version for each actively supported Kubernetes release.
7070

71-
| Kubernetes Release | 1.33 | 1.32 | 1.31 | 1.30 | 1.29 | 1.28 | 1.27 | 1.26 |
72-
| ------------------ | -------- | -------- | -------- | -------- | -------- | -------- | -------- | -------- |
73-
| VPC CNI Version | v1.17.1+ | v1.17.1+ | v1.16.4+ | v1.16.0+ | v1.14.1+ | v1.13.4+ | v1.12.5+ | v1.12.0+ |
71+
| Kubernetes Release | 1.33 | 1.32 | 1.31 | 1.30 | 1.29 | 1.28 |
72+
| ------------------ | -------- | -------- | -------- | -------- | -------- | -------- |
73+
| VPC CNI Version | v1.17.1+ | v1.17.1+ | v1.16.4+ | v1.16.0+ | v1.14.1+ | v1.13.4+ |
7474

7575
## Version Upgrade
7676

@@ -236,9 +236,7 @@ Default: `false`
236236

237237
Specifies whether an external NAT gateway should be used to provide SNAT of secondary ENI IP addresses. If set to `true`, the
238238
SNAT `iptables` rule and off\-VPC IP rule are not applied, and these rules are removed if they have already been applied.
239-
Disable SNAT if you need to allow inbound communication to your pods from external VPNs, direct connections, and external VPCs,
240-
and your pods do not need to access the Internet directly via an Internet Gateway. However, your nodes must be running in a
241-
private subnet and connected to the internet through an AWS NAT Gateway or another external NAT device.
239+
SNAT can be disabled in scenarios where pods need direct access to external networks (such as VPN, Direct Connect, or other VPCs) without NAT translation, and where pods are not expected to require direct Internet access via an Internet Gateway. When SNAT is disabled, nodes are typically placed in private subnets, with outbound Internet connectivity provided through an AWS NAT Gateway or another external NAT device.
242240

243241
#### `AWS_VPC_K8S_CNI_RANDOMIZESNAT`
244242

0 commit comments

Comments
 (0)