aws-sdk-databasemigrationservice 1.48.0 → 1.49.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -673,6 +673,8 @@ module Aws::DatabaseMigrationService
673
673
  DocDbSettings.add_member(:extract_doc_id, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "ExtractDocId"))
674
674
  DocDbSettings.add_member(:docs_to_investigate, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "DocsToInvestigate"))
675
675
  DocDbSettings.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "KmsKeyId"))
676
+ DocDbSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
677
+ DocDbSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
676
678
  DocDbSettings.struct_class = Types::DocDbSettings
677
679
 
678
680
  DynamoDbSettings.add_member(:service_access_role_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "ServiceAccessRoleArn"))
@@ -769,6 +771,8 @@ module Aws::DatabaseMigrationService
769
771
  IBMDb2Settings.add_member(:current_lsn, Shapes::ShapeRef.new(shape: String, location_name: "CurrentLsn"))
770
772
  IBMDb2Settings.add_member(:max_k_bytes_per_read, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "MaxKBytesPerRead"))
771
773
  IBMDb2Settings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
774
+ IBMDb2Settings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
775
+ IBMDb2Settings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
772
776
  IBMDb2Settings.struct_class = Types::IBMDb2Settings
773
777
 
774
778
  ImportCertificateMessage.add_member(:certificate_identifier, Shapes::ShapeRef.new(shape: String, required: true, location_name: "CertificateIdentifier"))
@@ -858,6 +862,8 @@ module Aws::DatabaseMigrationService
858
862
  MicrosoftSQLServerSettings.add_member(:server_name, Shapes::ShapeRef.new(shape: String, location_name: "ServerName"))
859
863
  MicrosoftSQLServerSettings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
860
864
  MicrosoftSQLServerSettings.add_member(:use_bcp_full_load, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "UseBcpFullLoad"))
865
+ MicrosoftSQLServerSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
866
+ MicrosoftSQLServerSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
861
867
  MicrosoftSQLServerSettings.struct_class = Types::MicrosoftSQLServerSettings
862
868
 
863
869
  ModifyEndpointMessage.add_member(:endpoint_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "EndpointArn"))
@@ -955,6 +961,8 @@ module Aws::DatabaseMigrationService
955
961
  MongoDbSettings.add_member(:docs_to_investigate, Shapes::ShapeRef.new(shape: String, location_name: "DocsToInvestigate"))
956
962
  MongoDbSettings.add_member(:auth_source, Shapes::ShapeRef.new(shape: String, location_name: "AuthSource"))
957
963
  MongoDbSettings.add_member(:kms_key_id, Shapes::ShapeRef.new(shape: String, location_name: "KmsKeyId"))
964
+ MongoDbSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
965
+ MongoDbSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
958
966
  MongoDbSettings.struct_class = Types::MongoDbSettings
959
967
 
960
968
  MoveReplicationTaskMessage.add_member(:replication_task_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "ReplicationTaskArn"))
@@ -975,6 +983,8 @@ module Aws::DatabaseMigrationService
975
983
  MySQLSettings.add_member(:server_name, Shapes::ShapeRef.new(shape: String, location_name: "ServerName"))
976
984
  MySQLSettings.add_member(:server_timezone, Shapes::ShapeRef.new(shape: String, location_name: "ServerTimezone"))
977
985
  MySQLSettings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
986
+ MySQLSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
987
+ MySQLSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
978
988
  MySQLSettings.struct_class = Types::MySQLSettings
979
989
 
980
990
  NeptuneSettings.add_member(:service_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "ServiceAccessRoleArn"))
@@ -1016,6 +1026,8 @@ module Aws::DatabaseMigrationService
1016
1026
  OracleSettings.add_member(:security_db_encryption_name, Shapes::ShapeRef.new(shape: String, location_name: "SecurityDbEncryptionName"))
1017
1027
  OracleSettings.add_member(:server_name, Shapes::ShapeRef.new(shape: String, location_name: "ServerName"))
1018
1028
  OracleSettings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
1029
+ OracleSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
1030
+ OracleSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
1019
1031
  OracleSettings.struct_class = Types::OracleSettings
1020
1032
 
1021
1033
  OrderableReplicationInstance.add_member(:engine_version, Shapes::ShapeRef.new(shape: String, location_name: "EngineVersion"))
@@ -1055,6 +1067,8 @@ module Aws::DatabaseMigrationService
1055
1067
  PostgreSQLSettings.add_member(:server_name, Shapes::ShapeRef.new(shape: String, location_name: "ServerName"))
1056
1068
  PostgreSQLSettings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
1057
1069
  PostgreSQLSettings.add_member(:slot_name, Shapes::ShapeRef.new(shape: String, location_name: "SlotName"))
1070
+ PostgreSQLSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
1071
+ PostgreSQLSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
1058
1072
  PostgreSQLSettings.struct_class = Types::PostgreSQLSettings
1059
1073
 
1060
1074
  RebootReplicationInstanceMessage.add_member(:replication_instance_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "ReplicationInstanceArn"))
@@ -1092,6 +1106,8 @@ module Aws::DatabaseMigrationService
1092
1106
  RedshiftSettings.add_member(:truncate_columns, Shapes::ShapeRef.new(shape: BooleanOptional, location_name: "TruncateColumns"))
1093
1107
  RedshiftSettings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
1094
1108
  RedshiftSettings.add_member(:write_buffer_size, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "WriteBufferSize"))
1109
+ RedshiftSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
1110
+ RedshiftSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
1095
1111
  RedshiftSettings.struct_class = Types::RedshiftSettings
1096
1112
 
1097
1113
  RefreshSchemasMessage.add_member(:endpoint_arn, Shapes::ShapeRef.new(shape: String, required: true, location_name: "EndpointArn"))
@@ -1379,6 +1395,8 @@ module Aws::DatabaseMigrationService
1379
1395
  SybaseSettings.add_member(:port, Shapes::ShapeRef.new(shape: IntegerOptional, location_name: "Port"))
1380
1396
  SybaseSettings.add_member(:server_name, Shapes::ShapeRef.new(shape: String, location_name: "ServerName"))
1381
1397
  SybaseSettings.add_member(:username, Shapes::ShapeRef.new(shape: String, location_name: "Username"))
1398
+ SybaseSettings.add_member(:secrets_manager_access_role_arn, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerAccessRoleArn"))
1399
+ SybaseSettings.add_member(:secrets_manager_secret_id, Shapes::ShapeRef.new(shape: String, location_name: "SecretsManagerSecretId"))
1382
1400
  SybaseSettings.struct_class = Types::SybaseSettings
1383
1401
 
1384
1402
  TableListToReload.member = Shapes::ShapeRef.new(shape: TableToReload)
@@ -393,6 +393,8 @@ module Aws::DatabaseMigrationService
393
393
  # docs_to_investigate: "String",
394
394
  # auth_source: "String",
395
395
  # kms_key_id: "String",
396
+ # secrets_manager_access_role_arn: "String",
397
+ # secrets_manager_secret_id: "String",
396
398
  # },
397
399
  # kinesis_settings: {
398
400
  # stream_arn: "String",
@@ -461,6 +463,8 @@ module Aws::DatabaseMigrationService
461
463
  # truncate_columns: false,
462
464
  # username: "String",
463
465
  # write_buffer_size: 1,
466
+ # secrets_manager_access_role_arn: "String",
467
+ # secrets_manager_secret_id: "String",
464
468
  # },
465
469
  # postgre_sql_settings: {
466
470
  # after_connect_script: "String",
@@ -475,6 +479,8 @@ module Aws::DatabaseMigrationService
475
479
  # server_name: "String",
476
480
  # username: "String",
477
481
  # slot_name: "String",
482
+ # secrets_manager_access_role_arn: "String",
483
+ # secrets_manager_secret_id: "String",
478
484
  # },
479
485
  # my_sql_settings: {
480
486
  # after_connect_script: "String",
@@ -488,6 +494,8 @@ module Aws::DatabaseMigrationService
488
494
  # server_name: "String",
489
495
  # server_timezone: "String",
490
496
  # username: "String",
497
+ # secrets_manager_access_role_arn: "String",
498
+ # secrets_manager_secret_id: "String",
491
499
  # },
492
500
  # oracle_settings: {
493
501
  # add_supplemental_logging: false,
@@ -520,6 +528,8 @@ module Aws::DatabaseMigrationService
520
528
  # security_db_encryption_name: "String",
521
529
  # server_name: "String",
522
530
  # username: "String",
531
+ # secrets_manager_access_role_arn: "String",
532
+ # secrets_manager_secret_id: "String",
523
533
  # },
524
534
  # sybase_settings: {
525
535
  # database_name: "String",
@@ -527,6 +537,8 @@ module Aws::DatabaseMigrationService
527
537
  # port: 1,
528
538
  # server_name: "String",
529
539
  # username: "String",
540
+ # secrets_manager_access_role_arn: "String",
541
+ # secrets_manager_secret_id: "String",
530
542
  # },
531
543
  # microsoft_sql_server_settings: {
532
544
  # port: 1,
@@ -539,6 +551,8 @@ module Aws::DatabaseMigrationService
539
551
  # server_name: "String",
540
552
  # username: "String",
541
553
  # use_bcp_full_load: false,
554
+ # secrets_manager_access_role_arn: "String",
555
+ # secrets_manager_secret_id: "String",
542
556
  # },
543
557
  # ibm_db_2_settings: {
544
558
  # database_name: "String",
@@ -549,6 +563,8 @@ module Aws::DatabaseMigrationService
549
563
  # current_lsn: "String",
550
564
  # max_k_bytes_per_read: 1,
551
565
  # username: "String",
566
+ # secrets_manager_access_role_arn: "String",
567
+ # secrets_manager_secret_id: "String",
552
568
  # },
553
569
  # resource_identifier: "String",
554
570
  # doc_db_settings: {
@@ -561,6 +577,8 @@ module Aws::DatabaseMigrationService
561
577
  # extract_doc_id: false,
562
578
  # docs_to_investigate: 1,
563
579
  # kms_key_id: "String",
580
+ # secrets_manager_access_role_arn: "String",
581
+ # secrets_manager_secret_id: "String",
564
582
  # },
565
583
  # }
566
584
  #
@@ -3105,6 +3123,8 @@ module Aws::DatabaseMigrationService
3105
3123
  # extract_doc_id: false,
3106
3124
  # docs_to_investigate: 1,
3107
3125
  # kms_key_id: "String",
3126
+ # secrets_manager_access_role_arn: "String",
3127
+ # secrets_manager_secret_id: "String",
3108
3128
  # }
3109
3129
  #
3110
3130
  # @!attribute [rw] username
@@ -3159,6 +3179,36 @@ module Aws::DatabaseMigrationService
3159
3179
  # Region.
3160
3180
  # @return [String]
3161
3181
  #
3182
+ # @!attribute [rw] secrets_manager_access_role_arn
3183
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
3184
+ # AWS DMS as the trusted entity and grants the required permissions to
3185
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
3186
+ # has the value of the AWS Secrets Manager secret that allows access
3187
+ # to the DocumentDB endpoint.
3188
+ #
3189
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
3190
+ # can specify the values for this setting and
3191
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
3192
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
3193
+ # both. For more information on creating this `SecretsManagerSecret`
3194
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
3195
+ # required to access it, see [Using secrets to access AWS Database
3196
+ # Migration Service resources][1] in the *AWS Database Migration
3197
+ # Service User Guide*.
3198
+ #
3199
+ # </note>
3200
+ #
3201
+ #
3202
+ #
3203
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
3204
+ # @return [String]
3205
+ #
3206
+ # @!attribute [rw] secrets_manager_secret_id
3207
+ # The full ARN, partial ARN, or friendly name of the
3208
+ # `SecretsManagerSecret` that contains the DocumentDB endpoint
3209
+ # connection details.
3210
+ # @return [String]
3211
+ #
3162
3212
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/DocDbSettings AWS API Documentation
3163
3213
  #
3164
3214
  class DocDbSettings < Struct.new(
@@ -3170,7 +3220,9 @@ module Aws::DatabaseMigrationService
3170
3220
  :nesting_level,
3171
3221
  :extract_doc_id,
3172
3222
  :docs_to_investigate,
3173
- :kms_key_id)
3223
+ :kms_key_id,
3224
+ :secrets_manager_access_role_arn,
3225
+ :secrets_manager_secret_id)
3174
3226
  SENSITIVE = [:password]
3175
3227
  include Aws::Structure
3176
3228
  end
@@ -3624,7 +3676,7 @@ module Aws::DatabaseMigrationService
3624
3676
  # Identifies the name and value of a filter object. This filter is used
3625
3677
  # to limit the number and type of AWS DMS objects that are returned for
3626
3678
  # a particular `Describe*` call or similar operation. Filters are used
3627
- # as an optional parameter to the following APIs.
3679
+ # as an optional parameter for certain API operations.
3628
3680
  #
3629
3681
  # @note When making an API call, you may pass Filter
3630
3682
  # data as a hash:
@@ -3667,6 +3719,8 @@ module Aws::DatabaseMigrationService
3667
3719
  # current_lsn: "String",
3668
3720
  # max_k_bytes_per_read: 1,
3669
3721
  # username: "String",
3722
+ # secrets_manager_access_role_arn: "String",
3723
+ # secrets_manager_secret_id: "String",
3670
3724
  # }
3671
3725
  #
3672
3726
  # @!attribute [rw] database_name
@@ -3704,6 +3758,36 @@ module Aws::DatabaseMigrationService
3704
3758
  # Endpoint connection user name.
3705
3759
  # @return [String]
3706
3760
  #
3761
+ # @!attribute [rw] secrets_manager_access_role_arn
3762
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
3763
+ # AWS DMS as the trusted entity and grants the required permissions to
3764
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
3765
+ # has the value of the AWS Secrets Manager secret that allows access
3766
+ # to the Db2 LUW endpoint.
3767
+ #
3768
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
3769
+ # can specify the values for this setting and
3770
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
3771
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
3772
+ # both. For more information on creating this `SecretsManagerSecret`
3773
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
3774
+ # required to access it, see [Using secrets to access AWS Database
3775
+ # Migration Service resources][1] in the *AWS Database Migration
3776
+ # Service User Guide*.
3777
+ #
3778
+ # </note>
3779
+ #
3780
+ #
3781
+ #
3782
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
3783
+ # @return [String]
3784
+ #
3785
+ # @!attribute [rw] secrets_manager_secret_id
3786
+ # The full ARN, partial ARN, or friendly name of the
3787
+ # `SecretsManagerSecret` that contains the Db2 LUW endpoint connection
3788
+ # details.
3789
+ # @return [String]
3790
+ #
3707
3791
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/IBMDb2Settings AWS API Documentation
3708
3792
  #
3709
3793
  class IBMDb2Settings < Struct.new(
@@ -3714,7 +3798,9 @@ module Aws::DatabaseMigrationService
3714
3798
  :set_data_capture_changes,
3715
3799
  :current_lsn,
3716
3800
  :max_k_bytes_per_read,
3717
- :username)
3801
+ :username,
3802
+ :secrets_manager_access_role_arn,
3803
+ :secrets_manager_secret_id)
3718
3804
  SENSITIVE = [:password]
3719
3805
  include Aws::Structure
3720
3806
  end
@@ -4169,6 +4255,8 @@ module Aws::DatabaseMigrationService
4169
4255
  # server_name: "String",
4170
4256
  # username: "String",
4171
4257
  # use_bcp_full_load: false,
4258
+ # secrets_manager_access_role_arn: "String",
4259
+ # secrets_manager_secret_id: "String",
4172
4260
  # }
4173
4261
  #
4174
4262
  # @!attribute [rw] port
@@ -4185,10 +4273,10 @@ module Aws::DatabaseMigrationService
4185
4273
  # @return [String]
4186
4274
  #
4187
4275
  # @!attribute [rw] control_tables_file_group
4188
- # Specify a filegroup for the AWS DMS internal tables. When the
4276
+ # Specifies a file group for the AWS DMS internal tables. When the
4189
4277
  # replication task starts, all the internal AWS DMS control tables
4190
4278
  # (awsdms\_ apply\_exception, awsdms\_apply, awsdms\_changes) are
4191
- # created on the specified filegroup.
4279
+ # created for the specified file group.
4192
4280
  # @return [String]
4193
4281
  #
4194
4282
  # @!attribute [rw] password
@@ -4241,6 +4329,36 @@ module Aws::DatabaseMigrationService
4241
4329
  # loading table option.
4242
4330
  # @return [Boolean]
4243
4331
  #
4332
+ # @!attribute [rw] secrets_manager_access_role_arn
4333
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
4334
+ # AWS DMS as the trusted entity and grants the required permissions to
4335
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
4336
+ # has the value of the AWS Secrets Manager secret that allows access
4337
+ # to the SQL Server endpoint.
4338
+ #
4339
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
4340
+ # can specify the values for this setting and
4341
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
4342
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
4343
+ # both. For more information on creating this `SecretsManagerSecret`
4344
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
4345
+ # required to access it, see [Using secrets to access AWS Database
4346
+ # Migration Service resources][1] in the *AWS Database Migration
4347
+ # Service User Guide*.
4348
+ #
4349
+ # </note>
4350
+ #
4351
+ #
4352
+ #
4353
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
4354
+ # @return [String]
4355
+ #
4356
+ # @!attribute [rw] secrets_manager_secret_id
4357
+ # The full ARN, partial ARN, or friendly name of the
4358
+ # `SecretsManagerSecret` that contains the SQL Server endpoint
4359
+ # connection details.
4360
+ # @return [String]
4361
+ #
4244
4362
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/MicrosoftSQLServerSettings AWS API Documentation
4245
4363
  #
4246
4364
  class MicrosoftSQLServerSettings < Struct.new(
@@ -4253,7 +4371,9 @@ module Aws::DatabaseMigrationService
4253
4371
  :safeguard_policy,
4254
4372
  :server_name,
4255
4373
  :username,
4256
- :use_bcp_full_load)
4374
+ :use_bcp_full_load,
4375
+ :secrets_manager_access_role_arn,
4376
+ :secrets_manager_secret_id)
4257
4377
  SENSITIVE = [:password]
4258
4378
  include Aws::Structure
4259
4379
  end
@@ -4326,6 +4446,8 @@ module Aws::DatabaseMigrationService
4326
4446
  # docs_to_investigate: "String",
4327
4447
  # auth_source: "String",
4328
4448
  # kms_key_id: "String",
4449
+ # secrets_manager_access_role_arn: "String",
4450
+ # secrets_manager_secret_id: "String",
4329
4451
  # },
4330
4452
  # kinesis_settings: {
4331
4453
  # stream_arn: "String",
@@ -4394,6 +4516,8 @@ module Aws::DatabaseMigrationService
4394
4516
  # truncate_columns: false,
4395
4517
  # username: "String",
4396
4518
  # write_buffer_size: 1,
4519
+ # secrets_manager_access_role_arn: "String",
4520
+ # secrets_manager_secret_id: "String",
4397
4521
  # },
4398
4522
  # postgre_sql_settings: {
4399
4523
  # after_connect_script: "String",
@@ -4408,6 +4532,8 @@ module Aws::DatabaseMigrationService
4408
4532
  # server_name: "String",
4409
4533
  # username: "String",
4410
4534
  # slot_name: "String",
4535
+ # secrets_manager_access_role_arn: "String",
4536
+ # secrets_manager_secret_id: "String",
4411
4537
  # },
4412
4538
  # my_sql_settings: {
4413
4539
  # after_connect_script: "String",
@@ -4421,6 +4547,8 @@ module Aws::DatabaseMigrationService
4421
4547
  # server_name: "String",
4422
4548
  # server_timezone: "String",
4423
4549
  # username: "String",
4550
+ # secrets_manager_access_role_arn: "String",
4551
+ # secrets_manager_secret_id: "String",
4424
4552
  # },
4425
4553
  # oracle_settings: {
4426
4554
  # add_supplemental_logging: false,
@@ -4453,6 +4581,8 @@ module Aws::DatabaseMigrationService
4453
4581
  # security_db_encryption_name: "String",
4454
4582
  # server_name: "String",
4455
4583
  # username: "String",
4584
+ # secrets_manager_access_role_arn: "String",
4585
+ # secrets_manager_secret_id: "String",
4456
4586
  # },
4457
4587
  # sybase_settings: {
4458
4588
  # database_name: "String",
@@ -4460,6 +4590,8 @@ module Aws::DatabaseMigrationService
4460
4590
  # port: 1,
4461
4591
  # server_name: "String",
4462
4592
  # username: "String",
4593
+ # secrets_manager_access_role_arn: "String",
4594
+ # secrets_manager_secret_id: "String",
4463
4595
  # },
4464
4596
  # microsoft_sql_server_settings: {
4465
4597
  # port: 1,
@@ -4472,6 +4604,8 @@ module Aws::DatabaseMigrationService
4472
4604
  # server_name: "String",
4473
4605
  # username: "String",
4474
4606
  # use_bcp_full_load: false,
4607
+ # secrets_manager_access_role_arn: "String",
4608
+ # secrets_manager_secret_id: "String",
4475
4609
  # },
4476
4610
  # ibm_db_2_settings: {
4477
4611
  # database_name: "String",
@@ -4482,6 +4616,8 @@ module Aws::DatabaseMigrationService
4482
4616
  # current_lsn: "String",
4483
4617
  # max_k_bytes_per_read: 1,
4484
4618
  # username: "String",
4619
+ # secrets_manager_access_role_arn: "String",
4620
+ # secrets_manager_secret_id: "String",
4485
4621
  # },
4486
4622
  # doc_db_settings: {
4487
4623
  # username: "String",
@@ -4493,6 +4629,8 @@ module Aws::DatabaseMigrationService
4493
4629
  # extract_doc_id: false,
4494
4630
  # docs_to_investigate: 1,
4495
4631
  # kms_key_id: "String",
4632
+ # secrets_manager_access_role_arn: "String",
4633
+ # secrets_manager_secret_id: "String",
4496
4634
  # },
4497
4635
  # }
4498
4636
  #
@@ -4971,7 +5109,7 @@ module Aws::DatabaseMigrationService
4971
5109
  # A value that indicates that minor version upgrades are applied
4972
5110
  # automatically to the replication instance during the maintenance
4973
5111
  # window. Changing this parameter doesn't result in an outage, except
4974
- # in the case dsecribed following. The change is asynchronously
5112
+ # in the case described following. The change is asynchronously
4975
5113
  # applied as soon as possible.
4976
5114
  #
4977
5115
  # An outage does result if these factors apply:
@@ -5216,6 +5354,8 @@ module Aws::DatabaseMigrationService
5216
5354
  # docs_to_investigate: "String",
5217
5355
  # auth_source: "String",
5218
5356
  # kms_key_id: "String",
5357
+ # secrets_manager_access_role_arn: "String",
5358
+ # secrets_manager_secret_id: "String",
5219
5359
  # }
5220
5360
  #
5221
5361
  # @!attribute [rw] username
@@ -5295,6 +5435,36 @@ module Aws::DatabaseMigrationService
5295
5435
  # Region.
5296
5436
  # @return [String]
5297
5437
  #
5438
+ # @!attribute [rw] secrets_manager_access_role_arn
5439
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
5440
+ # AWS DMS as the trusted entity and grants the required permissions to
5441
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
5442
+ # has the value of the AWS Secrets Manager secret that allows access
5443
+ # to the MongoDB endpoint.
5444
+ #
5445
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
5446
+ # can specify the values for this setting and
5447
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
5448
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
5449
+ # both. For more information on creating this `SecretsManagerSecret`
5450
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
5451
+ # required to access it, see [Using secrets to access AWS Database
5452
+ # Migration Service resources][1] in the *AWS Database Migration
5453
+ # Service User Guide*.
5454
+ #
5455
+ # </note>
5456
+ #
5457
+ #
5458
+ #
5459
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
5460
+ # @return [String]
5461
+ #
5462
+ # @!attribute [rw] secrets_manager_secret_id
5463
+ # The full ARN, partial ARN, or friendly name of the
5464
+ # `SecretsManagerSecret` that contains the MongoDB endpoint connection
5465
+ # details.
5466
+ # @return [String]
5467
+ #
5298
5468
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/MongoDbSettings AWS API Documentation
5299
5469
  #
5300
5470
  class MongoDbSettings < Struct.new(
@@ -5309,7 +5479,9 @@ module Aws::DatabaseMigrationService
5309
5479
  :extract_doc_id,
5310
5480
  :docs_to_investigate,
5311
5481
  :auth_source,
5312
- :kms_key_id)
5482
+ :kms_key_id,
5483
+ :secrets_manager_access_role_arn,
5484
+ :secrets_manager_secret_id)
5313
5485
  SENSITIVE = [:password]
5314
5486
  include Aws::Structure
5315
5487
  end
@@ -5369,6 +5541,8 @@ module Aws::DatabaseMigrationService
5369
5541
  # server_name: "String",
5370
5542
  # server_timezone: "String",
5371
5543
  # username: "String",
5544
+ # secrets_manager_access_role_arn: "String",
5545
+ # secrets_manager_secret_id: "String",
5372
5546
  # }
5373
5547
  #
5374
5548
  # @!attribute [rw] after_connect_script
@@ -5406,7 +5580,7 @@ module Aws::DatabaseMigrationService
5406
5580
  # @return [Integer]
5407
5581
  #
5408
5582
  # @!attribute [rw] parallel_load_threads
5409
- # Improves performance when loading data into the MySQLcompatible
5583
+ # Improves performance when loading data into the MySQL-compatible
5410
5584
  # target database. Specifies how many threads to use to load the data
5411
5585
  # into the MySQL-compatible target database. Setting a large number of
5412
5586
  # threads can have an adverse effect on database performance, because
@@ -5439,6 +5613,36 @@ module Aws::DatabaseMigrationService
5439
5613
  # Endpoint connection user name.
5440
5614
  # @return [String]
5441
5615
  #
5616
+ # @!attribute [rw] secrets_manager_access_role_arn
5617
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
5618
+ # AWS DMS as the trusted entity and grants the required permissions to
5619
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
5620
+ # has the value of the AWS Secrets Manager secret that allows access
5621
+ # to the MySQL endpoint.
5622
+ #
5623
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
5624
+ # can specify the values for this setting and
5625
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
5626
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
5627
+ # both. For more information on creating this `SecretsManagerSecret`
5628
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
5629
+ # required to access it, see [Using secrets to access AWS Database
5630
+ # Migration Service resources][1] in the *AWS Database Migration
5631
+ # Service User Guide*.
5632
+ #
5633
+ # </note>
5634
+ #
5635
+ #
5636
+ #
5637
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
5638
+ # @return [String]
5639
+ #
5640
+ # @!attribute [rw] secrets_manager_secret_id
5641
+ # The full ARN, partial ARN, or friendly name of the
5642
+ # `SecretsManagerSecret` that contains the MySQL endpoint connection
5643
+ # details.
5644
+ # @return [String]
5645
+ #
5442
5646
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/MySQLSettings AWS API Documentation
5443
5647
  #
5444
5648
  class MySQLSettings < Struct.new(
@@ -5452,7 +5656,9 @@ module Aws::DatabaseMigrationService
5452
5656
  :port,
5453
5657
  :server_name,
5454
5658
  :server_timezone,
5455
- :username)
5659
+ :username,
5660
+ :secrets_manager_access_role_arn,
5661
+ :secrets_manager_secret_id)
5456
5662
  SENSITIVE = [:password]
5457
5663
  include Aws::Structure
5458
5664
  end
@@ -5572,6 +5778,8 @@ module Aws::DatabaseMigrationService
5572
5778
  # security_db_encryption_name: "String",
5573
5779
  # server_name: "String",
5574
5780
  # username: "String",
5781
+ # secrets_manager_access_role_arn: "String",
5782
+ # secrets_manager_secret_id: "String",
5575
5783
  # }
5576
5784
  #
5577
5785
  # @!attribute [rw] add_supplemental_logging
@@ -5809,6 +6017,36 @@ module Aws::DatabaseMigrationService
5809
6017
  # Endpoint connection user name.
5810
6018
  # @return [String]
5811
6019
  #
6020
+ # @!attribute [rw] secrets_manager_access_role_arn
6021
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
6022
+ # AWS DMS as the trusted entity and grants the required permissions to
6023
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
6024
+ # has the value of the AWS Secrets Manager secret that allows access
6025
+ # to the Oracle endpoint.
6026
+ #
6027
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
6028
+ # can specify the values for this setting and
6029
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
6030
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
6031
+ # both. For more information on creating this `SecretsManagerSecret`
6032
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
6033
+ # required to access it, see [Using secrets to access AWS Database
6034
+ # Migration Service resources][1] in the *AWS Database Migration
6035
+ # Service User Guide*.
6036
+ #
6037
+ # </note>
6038
+ #
6039
+ #
6040
+ #
6041
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
6042
+ # @return [String]
6043
+ #
6044
+ # @!attribute [rw] secrets_manager_secret_id
6045
+ # The full ARN, partial ARN, or friendly name of the
6046
+ # `SecretsManagerSecret` that contains the Oracle endpoint connection
6047
+ # details.
6048
+ # @return [String]
6049
+ #
5812
6050
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/OracleSettings AWS API Documentation
5813
6051
  #
5814
6052
  class OracleSettings < Struct.new(
@@ -5841,7 +6079,9 @@ module Aws::DatabaseMigrationService
5841
6079
  :security_db_encryption,
5842
6080
  :security_db_encryption_name,
5843
6081
  :server_name,
5844
- :username)
6082
+ :username,
6083
+ :secrets_manager_access_role_arn,
6084
+ :secrets_manager_secret_id)
5845
6085
  SENSITIVE = [:asm_password, :password, :security_db_encryption]
5846
6086
  include Aws::Structure
5847
6087
  end
@@ -5997,6 +6237,8 @@ module Aws::DatabaseMigrationService
5997
6237
  # server_name: "String",
5998
6238
  # username: "String",
5999
6239
  # slot_name: "String",
6240
+ # secrets_manager_access_role_arn: "String",
6241
+ # secrets_manager_secret_id: "String",
6000
6242
  # }
6001
6243
  #
6002
6244
  # @!attribute [rw] after_connect_script
@@ -6073,6 +6315,36 @@ module Aws::DatabaseMigrationService
6073
6315
  # this attribute also enables using native CDC start points.
6074
6316
  # @return [String]
6075
6317
  #
6318
+ # @!attribute [rw] secrets_manager_access_role_arn
6319
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
6320
+ # AWS DMS as the trusted entity and grants the required permissions to
6321
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
6322
+ # has the value of the AWS Secrets Manager secret that allows access
6323
+ # to the PostgreSQL endpoint.
6324
+ #
6325
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
6326
+ # can specify the values for this setting and
6327
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
6328
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
6329
+ # both. For more information on creating this `SecretsManagerSecret`
6330
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
6331
+ # required to access it, see [Using secrets to access AWS Database
6332
+ # Migration Service resources][1] in the *AWS Database Migration
6333
+ # Service User Guide*.
6334
+ #
6335
+ # </note>
6336
+ #
6337
+ #
6338
+ #
6339
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
6340
+ # @return [String]
6341
+ #
6342
+ # @!attribute [rw] secrets_manager_secret_id
6343
+ # The full ARN, partial ARN, or friendly name of the
6344
+ # `SecretsManagerSecret` that contains the PostgreSQL endpoint
6345
+ # connection details.
6346
+ # @return [String]
6347
+ #
6076
6348
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/PostgreSQLSettings AWS API Documentation
6077
6349
  #
6078
6350
  class PostgreSQLSettings < Struct.new(
@@ -6087,7 +6359,9 @@ module Aws::DatabaseMigrationService
6087
6359
  :port,
6088
6360
  :server_name,
6089
6361
  :username,
6090
- :slot_name)
6362
+ :slot_name,
6363
+ :secrets_manager_access_role_arn,
6364
+ :secrets_manager_secret_id)
6091
6365
  SENSITIVE = [:password]
6092
6366
  include Aws::Structure
6093
6367
  end
@@ -6165,6 +6439,8 @@ module Aws::DatabaseMigrationService
6165
6439
  # truncate_columns: false,
6166
6440
  # username: "String",
6167
6441
  # write_buffer_size: 1,
6442
+ # secrets_manager_access_role_arn: "String",
6443
+ # secrets_manager_secret_id: "String",
6168
6444
  # }
6169
6445
  #
6170
6446
  # @!attribute [rw] accept_any_date
@@ -6191,8 +6467,8 @@ module Aws::DatabaseMigrationService
6191
6467
  # and loads them to the *BucketFolder/TableID* path. AWS DMS uses the
6192
6468
  # Redshift `COPY` command to upload the .csv files to the target
6193
6469
  # table. The files are deleted once the `COPY` operation has finished.
6194
- # For more information, see [Amazon Redshift Database Developer
6195
- # Guide][1]
6470
+ # For more information, see [COPY][1] in the *Amazon Redshift Database
6471
+ # Developer Guide*.
6196
6472
  #
6197
6473
  # For change-data-capture (CDC) mode, AWS DMS creates a *NetChanges*
6198
6474
  # table, and loads the .csv files to this
@@ -6380,6 +6656,36 @@ module Aws::DatabaseMigrationService
6380
6656
  # instance. The default value is 1000 (buffer size is 1000KB).
6381
6657
  # @return [Integer]
6382
6658
  #
6659
+ # @!attribute [rw] secrets_manager_access_role_arn
6660
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
6661
+ # AWS DMS as the trusted entity and grants the required permissions to
6662
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
6663
+ # has the value of the AWS Secrets Manager secret that allows access
6664
+ # to the Amazon Redshift endpoint.
6665
+ #
6666
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
6667
+ # can specify the values for this setting and
6668
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
6669
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
6670
+ # both. For more information on creating this `SecretsManagerSecret`
6671
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
6672
+ # required to access it, see [Using secrets to access AWS Database
6673
+ # Migration Service resources][1] in the *AWS Database Migration
6674
+ # Service User Guide*.
6675
+ #
6676
+ # </note>
6677
+ #
6678
+ #
6679
+ #
6680
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
6681
+ # @return [String]
6682
+ #
6683
+ # @!attribute [rw] secrets_manager_secret_id
6684
+ # The full ARN, partial ARN, or friendly name of the
6685
+ # `SecretsManagerSecret` that contains the Amazon Redshift endpoint
6686
+ # connection details.
6687
+ # @return [String]
6688
+ #
6383
6689
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/RedshiftSettings AWS API Documentation
6384
6690
  #
6385
6691
  class RedshiftSettings < Struct.new(
@@ -6410,7 +6716,9 @@ module Aws::DatabaseMigrationService
6410
6716
  :trim_blanks,
6411
6717
  :truncate_columns,
6412
6718
  :username,
6413
- :write_buffer_size)
6719
+ :write_buffer_size,
6720
+ :secrets_manager_access_role_arn,
6721
+ :secrets_manager_secret_id)
6414
6722
  SENSITIVE = [:password]
6415
6723
  include Aws::Structure
6416
6724
  end
@@ -7905,40 +8213,50 @@ module Aws::DatabaseMigrationService
7905
8213
  # This setting applies if the S3 output files during a change data
7906
8214
  # capture (CDC) load are written in .csv format. If set to `true` for
7907
8215
  # columns not included in the supplemental log, AWS DMS uses the value
7908
- # specified by [ `CsvNoSupValue`
7909
- # ](dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-CsvNoSupValue).
7910
- # If not set or set to `false`, AWS DMS uses the null value for these
7911
- # columns.
8216
+ # specified by [ `CsvNoSupValue` ][1]. If not set or set to `false`,
8217
+ # AWS DMS uses the null value for these columns.
7912
8218
  #
7913
8219
  # <note markdown="1"> This setting is supported in AWS DMS versions 3.4.1 and later.
7914
8220
  #
7915
8221
  # </note>
8222
+ #
8223
+ #
8224
+ #
8225
+ # [1]: https://docs.aws.amazon.com/dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-CsvNoSupValue
7916
8226
  # @return [Boolean]
7917
8227
  #
7918
8228
  # @!attribute [rw] csv_no_sup_value
7919
8229
  # This setting only applies if your Amazon S3 output files during a
7920
8230
  # change data capture (CDC) load are written in .csv format. If [
7921
- # `UseCsvNoSupValue`
7922
- # ](dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-UseCsvNoSupValue)
7923
- # is set to true, specify a string value that you want AWS DMS to use
7924
- # for all columns not included in the supplemental log. If you do not
7925
- # specify a string value, AWS DMS uses the null value for these
7926
- # columns regardless of the `UseCsvNoSupValue` setting.
8231
+ # `UseCsvNoSupValue` ][1] is set to true, specify a string value that
8232
+ # you want AWS DMS to use for all columns not included in the
8233
+ # supplemental log. If you do not specify a string value, AWS DMS uses
8234
+ # the null value for these columns regardless of the
8235
+ # `UseCsvNoSupValue` setting.
7927
8236
  #
7928
8237
  # <note markdown="1"> This setting is supported in AWS DMS versions 3.4.1 and later.
7929
8238
  #
7930
8239
  # </note>
8240
+ #
8241
+ #
8242
+ #
8243
+ # [1]: https://docs.aws.amazon.com/dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-UseCsvNoSupValue
7931
8244
  # @return [String]
7932
8245
  #
7933
8246
  # @!attribute [rw] preserve_transactions
7934
8247
  # If set to `true`, AWS DMS saves the transaction order for a change
7935
8248
  # data capture (CDC) load on the Amazon S3 target specified by [
7936
- # `CdcPath`
7937
- # ](dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-CdcPath).
8249
+ # `CdcPath` ][1]. For more information, see [Capturing data changes
8250
+ # (CDC) including transaction order on the S3 target][2].
7938
8251
  #
7939
8252
  # <note markdown="1"> This setting is supported in AWS DMS versions 3.4.2 and later.
7940
8253
  #
7941
8254
  # </note>
8255
+ #
8256
+ #
8257
+ #
8258
+ # [1]: https://docs.aws.amazon.com/dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-CdcPath
8259
+ # [2]: https://docs.aws.amazon.com/dms/latest/userguide/CHAP_Target.S3.html#CHAP_Target.S3.EndpointSettings.CdcPath
7942
8260
  # @return [Boolean]
7943
8261
  #
7944
8262
  # @!attribute [rw] cdc_path
@@ -7946,17 +8264,12 @@ module Aws::DatabaseMigrationService
7946
8264
  # setting is required if a task captures change data; otherwise, it's
7947
8265
  # optional. If `CdcPath` is set, AWS DMS reads CDC files from this
7948
8266
  # path and replicates the data changes to the target endpoint. For an
7949
- # S3 target, if `CdcPath`is set, it is the folder path where data
7950
- # changes are replicated. If you set [ `PreserveTransactions`
7951
- # ](dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-PreserveTransactions)
7952
- # to `true`, AWS DMS verifies that you have set this parameter to a
7953
- # folder path on your S3 target where AWS DMS can save the transaction
7954
- # order for the CDC load. AWS DMS creates this CDC folder path in
7955
- # either your S3 target working directory or the S3 target location
7956
- # specified by [ `BucketFolder`
7957
- # ](dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-BucketFolder)
7958
- # and [ `BucketName`
7959
- # ](dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-BucketName).
8267
+ # S3 target if you set [ `PreserveTransactions` ][1] to `true`, AWS
8268
+ # DMS verifies that you have set this parameter to a folder path on
8269
+ # your S3 target where AWS DMS can save the transaction order for the
8270
+ # CDC load. AWS DMS creates this CDC folder path in either your S3
8271
+ # target working directory or the S3 target location specified by [
8272
+ # `BucketFolder` ][2] and [ `BucketName` ][3].
7960
8273
  #
7961
8274
  # For example, if you specify `CdcPath` as `MyChangedData`, and you
7962
8275
  # specify `BucketName` as `MyTargetBucket` but do not specify
@@ -7968,9 +8281,20 @@ module Aws::DatabaseMigrationService
7968
8281
  # creates the CDC folder path following:
7969
8282
  # `MyTargetBucket/MyTargetData/MyChangedData`.
7970
8283
  #
8284
+ # For more information on CDC including transaction order on an S3
8285
+ # target, see [Capturing data changes (CDC) including transaction
8286
+ # order on the S3 target][4].
8287
+ #
7971
8288
  # <note markdown="1"> This setting is supported in AWS DMS versions 3.4.2 and later.
7972
8289
  #
7973
8290
  # </note>
8291
+ #
8292
+ #
8293
+ #
8294
+ # [1]: https://docs.aws.amazon.com/dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-PreserveTransactions
8295
+ # [2]: https://docs.aws.amazon.com/dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-BucketFolder
8296
+ # [3]: https://docs.aws.amazon.com/dms/latest/APIReference/API_S3Settings.html#DMS-Type-S3Settings-BucketName
8297
+ # [4]: https://docs.aws.amazon.com/dms/latest/userguide/CHAP_Target.S3.html#CHAP_Target.S3.EndpointSettings.CdcPath
7974
8298
  # @return [String]
7975
8299
  #
7976
8300
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/S3Settings AWS API Documentation
@@ -8417,6 +8741,8 @@ module Aws::DatabaseMigrationService
8417
8741
  # port: 1,
8418
8742
  # server_name: "String",
8419
8743
  # username: "String",
8744
+ # secrets_manager_access_role_arn: "String",
8745
+ # secrets_manager_secret_id: "String",
8420
8746
  # }
8421
8747
  #
8422
8748
  # @!attribute [rw] database_name
@@ -8439,6 +8765,36 @@ module Aws::DatabaseMigrationService
8439
8765
  # Endpoint connection user name.
8440
8766
  # @return [String]
8441
8767
  #
8768
+ # @!attribute [rw] secrets_manager_access_role_arn
8769
+ # The full Amazon Resource Name (ARN) of the IAM role that specifies
8770
+ # AWS DMS as the trusted entity and grants the required permissions to
8771
+ # access the value in `SecretsManagerSecret`. `SecretsManagerSecret`
8772
+ # has the value of the AWS Secrets Manager secret that allows access
8773
+ # to the SAP ASE endpoint.
8774
+ #
8775
+ # <note markdown="1"> You can specify one of two sets of values for these permissions. You
8776
+ # can specify the values for this setting and
8777
+ # `SecretsManagerSecretId`. Or you can specify clear-text values for
8778
+ # `UserName`, `Password`, `ServerName`, and `Port`. You can't specify
8779
+ # both. For more information on creating this `SecretsManagerSecret`
8780
+ # and the `SecretsManagerAccessRoleArn` and `SecretsManagerSecretId`
8781
+ # required to access it, see [Using secrets to access AWS Database
8782
+ # Migration Service resources][1] in the *AWS Database Migration
8783
+ # Service User Guide*.
8784
+ #
8785
+ # </note>
8786
+ #
8787
+ #
8788
+ #
8789
+ # [1]: https://docs.aws.amazon.com/https:/docs.aws.amazon.com/dms/latest/userguide/CHAP_Security.html#security-iam-secretsmanager
8790
+ # @return [String]
8791
+ #
8792
+ # @!attribute [rw] secrets_manager_secret_id
8793
+ # The full ARN, partial ARN, or friendly name of the
8794
+ # `SecretsManagerSecret` that contains the SAP SAE endpoint connection
8795
+ # details.
8796
+ # @return [String]
8797
+ #
8442
8798
  # @see http://docs.aws.amazon.com/goto/WebAPI/dms-2016-01-01/SybaseSettings AWS API Documentation
8443
8799
  #
8444
8800
  class SybaseSettings < Struct.new(
@@ -8446,7 +8802,9 @@ module Aws::DatabaseMigrationService
8446
8802
  :password,
8447
8803
  :port,
8448
8804
  :server_name,
8449
- :username)
8805
+ :username,
8806
+ :secrets_manager_access_role_arn,
8807
+ :secrets_manager_secret_id)
8450
8808
  SENSITIVE = [:password]
8451
8809
  include Aws::Structure
8452
8810
  end