aws-sdk-ec2 1.369.0 → 1.371.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -384,11 +384,11 @@ module Aws::EC2
384
384
  # The Elastic IP address you are accepting for transfer.
385
385
  #
386
386
  # @option params [Array<Types::TagSpecification>] :tag_specifications
387
- # `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
388
- # the resource. Use the tag key in the filter name and the tag value as
389
- # the filter value. For example, to find all resources that have a tag
390
- # with the key `Owner` and the value `TeamA`, specify `tag:Owner` for
391
- # the filter name and `TeamA` for the filter value.
387
+ # `tag`:&lt;key&gt; - The key/value combination of a tag assigned to the
388
+ # resource. Use the tag key in the filter name and the tag value as the
389
+ # filter value. For example, to find all resources that have a tag with
390
+ # the key `Owner` and the value `TeamA`, specify `tag:Owner` for the
391
+ # filter name and `TeamA` for the filter value.
392
392
  #
393
393
  # @option params [Boolean] :dry_run
394
394
  # Checks whether you have the required permissions for the action,
@@ -1114,6 +1114,12 @@ module Aws::EC2
1114
1114
  # For more information, see [Allocate CIDRs][1] in the *Amazon VPC IPAM
1115
1115
  # User Guide*.
1116
1116
  #
1117
+ # <note markdown="1"> This action creates an allocation with strong consistency. The
1118
+ # returned CIDR will not overlap with any other allocations from the
1119
+ # same pool.
1120
+ #
1121
+ # </note>
1122
+ #
1117
1123
  #
1118
1124
  #
1119
1125
  # [1]: https://docs.aws.amazon.com/vpc/latest/ipam/allocate-cidrs-ipam.html
@@ -5931,7 +5937,7 @@ module Aws::EC2
5931
5937
  # another Region, specify `region.compute.internal` (for example,
5932
5938
  # `ap-northeast-1.compute.internal`). Otherwise, specify a domain name
5933
5939
  # (for example, `ExampleCompany.com`). This value is used to complete
5934
- # unqualified DNS hostnames. **Important**\: Some Linux operating
5940
+ # unqualified DNS hostnames. **Important**: Some Linux operating
5935
5941
  # systems accept multiple domain names separated by spaces. However,
5936
5942
  # Windows and other Linux operating systems treat the value as a
5937
5943
  # single domain, which results in unexpected behavior. If your DHCP
@@ -6207,12 +6213,12 @@ module Aws::EC2
6207
6213
  #
6208
6214
  # @option params [Time,DateTime,Date,Integer,String] :valid_from
6209
6215
  # The start date and time of the request, in UTC format (for example,
6210
- # *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z). The default is to start
6211
- # fulfilling the request immediately.
6216
+ # *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z). The default is to start fulfilling
6217
+ # the request immediately.
6212
6218
  #
6213
6219
  # @option params [Time,DateTime,Date,Integer,String] :valid_until
6214
6220
  # The end date and time of the request, in UTC format (for example,
6215
- # *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z). At this point, no new EC2 Fleet
6221
+ # *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z). At this point, no new EC2 Fleet
6216
6222
  # requests are placed or able to fulfill the request. If no value is
6217
6223
  # specified, the request remains until you cancel it.
6218
6224
  #
@@ -6598,7 +6604,7 @@ module Aws::EC2
6598
6604
  # * If the destination type is `cloud-watch-logs`, specify the ARN of a
6599
6605
  # CloudWatch Logs log group. For example:
6600
6606
  #
6601
- # arn:aws:logs:*region*\:*account\_id*\:log-group:*my\_group*
6607
+ # arn:aws:logs:*region*:*account\_id*:log-group:*my\_group*
6602
6608
  #
6603
6609
  # Alternatively, use the `LogGroupName` parameter.
6604
6610
  #
@@ -6613,7 +6619,7 @@ module Aws::EC2
6613
6619
  # * If the destination type is `kinesis-data-firehose`, specify the ARN
6614
6620
  # of a Kinesis Data Firehose delivery stream. For example:
6615
6621
  #
6616
- # arn:aws:firehose:*region*\:*account\_id*\:deliverystream:*my\_stream*
6622
+ # arn:aws:firehose:*region*:*account\_id*:deliverystream:*my\_stream*
6617
6623
  #
6618
6624
  # @option params [String] :log_format
6619
6625
  # The fields to include in the flow log record. List the fields in the
@@ -9799,25 +9805,25 @@ module Aws::EC2
9799
9805
  #
9800
9806
  # Reachability Analyzer enables you to analyze and debug network
9801
9807
  # reachability between two resources in your virtual private cloud
9802
- # (VPC). For more information, see [What is Reachability Analyzer][1].
9808
+ # (VPC). For more information, see the [Reachability Analyzer Guide][1].
9803
9809
  #
9804
9810
  #
9805
9811
  #
9806
9812
  # [1]: https://docs.aws.amazon.com/vpc/latest/reachability/
9807
9813
  #
9808
9814
  # @option params [String] :source_ip
9809
- # The IP address of the Amazon Web Services resource that is the source
9810
- # of the path.
9815
+ # The IP address of the source.
9811
9816
  #
9812
9817
  # @option params [String] :destination_ip
9813
- # The IP address of the Amazon Web Services resource that is the
9814
- # destination of the path.
9818
+ # The IP address of the destination.
9815
9819
  #
9816
9820
  # @option params [required, String] :source
9817
- # The Amazon Web Services resource that is the source of the path.
9821
+ # The ID or ARN of the source. If the resource is in another account,
9822
+ # you must specify an ARN.
9818
9823
  #
9819
- # @option params [required, String] :destination
9820
- # The Amazon Web Services resource that is the destination of the path.
9824
+ # @option params [String] :destination
9825
+ # The ID or ARN of the destination. If the resource is in another
9826
+ # account, you must specify an ARN.
9821
9827
  #
9822
9828
  # @option params [required, String] :protocol
9823
9829
  # The protocol.
@@ -9846,6 +9852,16 @@ module Aws::EC2
9846
9852
  #
9847
9853
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/Run_Instance_Idempotency.html
9848
9854
  #
9855
+ # @option params [Types::PathRequestFilter] :filter_at_source
9856
+ # Scopes the analysis to network paths that match specific filters at
9857
+ # the source. If you specify this parameter, you can't specify the
9858
+ # parameters for the source IP address or the destination port.
9859
+ #
9860
+ # @option params [Types::PathRequestFilter] :filter_at_destination
9861
+ # Scopes the analysis to network paths that match specific filters at
9862
+ # the destination. If you specify this parameter, you can't specify the
9863
+ # parameter for the destination IP address.
9864
+ #
9849
9865
  # @return [Types::CreateNetworkInsightsPathResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
9850
9866
  #
9851
9867
  # * {Types::CreateNetworkInsightsPathResult#network_insights_path #network_insights_path} => Types::NetworkInsightsPath
@@ -9856,7 +9872,7 @@ module Aws::EC2
9856
9872
  # source_ip: "IpAddress",
9857
9873
  # destination_ip: "IpAddress",
9858
9874
  # source: "NetworkInsightsResourceId", # required
9859
- # destination: "NetworkInsightsResourceId", # required
9875
+ # destination: "NetworkInsightsResourceId",
9860
9876
  # protocol: "tcp", # required, accepts tcp, udp
9861
9877
  # destination_port: 1,
9862
9878
  # tag_specifications: [
@@ -9872,6 +9888,30 @@ module Aws::EC2
9872
9888
  # ],
9873
9889
  # dry_run: false,
9874
9890
  # client_token: "String", # required
9891
+ # filter_at_source: {
9892
+ # source_address: "IpAddress",
9893
+ # source_port_range: {
9894
+ # from_port: 1,
9895
+ # to_port: 1,
9896
+ # },
9897
+ # destination_address: "IpAddress",
9898
+ # destination_port_range: {
9899
+ # from_port: 1,
9900
+ # to_port: 1,
9901
+ # },
9902
+ # },
9903
+ # filter_at_destination: {
9904
+ # source_address: "IpAddress",
9905
+ # source_port_range: {
9906
+ # from_port: 1,
9907
+ # to_port: 1,
9908
+ # },
9909
+ # destination_address: "IpAddress",
9910
+ # destination_port_range: {
9911
+ # from_port: 1,
9912
+ # to_port: 1,
9913
+ # },
9914
+ # },
9875
9915
  # })
9876
9916
  #
9877
9917
  # @example Response structure
@@ -9890,6 +9930,18 @@ module Aws::EC2
9890
9930
  # resp.network_insights_path.tags #=> Array
9891
9931
  # resp.network_insights_path.tags[0].key #=> String
9892
9932
  # resp.network_insights_path.tags[0].value #=> String
9933
+ # resp.network_insights_path.filter_at_source.source_address #=> String
9934
+ # resp.network_insights_path.filter_at_source.source_port_range.from_port #=> Integer
9935
+ # resp.network_insights_path.filter_at_source.source_port_range.to_port #=> Integer
9936
+ # resp.network_insights_path.filter_at_source.destination_address #=> String
9937
+ # resp.network_insights_path.filter_at_source.destination_port_range.from_port #=> Integer
9938
+ # resp.network_insights_path.filter_at_source.destination_port_range.to_port #=> Integer
9939
+ # resp.network_insights_path.filter_at_destination.source_address #=> String
9940
+ # resp.network_insights_path.filter_at_destination.source_port_range.from_port #=> Integer
9941
+ # resp.network_insights_path.filter_at_destination.source_port_range.to_port #=> Integer
9942
+ # resp.network_insights_path.filter_at_destination.destination_address #=> String
9943
+ # resp.network_insights_path.filter_at_destination.destination_port_range.from_port #=> Integer
9944
+ # resp.network_insights_path.filter_at_destination.destination_port_range.to_port #=> Integer
9893
9945
  #
9894
9946
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/CreateNetworkInsightsPath AWS API Documentation
9895
9947
  #
@@ -11013,7 +11065,7 @@ module Aws::EC2
11013
11065
  # [4]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/vpc-migrate.html
11014
11066
  #
11015
11067
  # @option params [required, String] :description
11016
- # A description for the security group. This is informational only.
11068
+ # A description for the security group.
11017
11069
  #
11018
11070
  # Constraints: Up to 255 characters in length
11019
11071
  #
@@ -11128,8 +11180,9 @@ module Aws::EC2
11128
11180
  # may remount and use your volume while the snapshot status is
11129
11181
  # `pending`.
11130
11182
  #
11131
- # To create a snapshot for Amazon EBS volumes that serve as root
11132
- # devices, you should stop the instance before taking the snapshot.
11183
+ # When you create a snapshot for an EBS volume that serves as a root
11184
+ # device, we recommend that you stop the instance before taking the
11185
+ # snapshot.
11133
11186
  #
11134
11187
  # Snapshots that are taken from encrypted volumes are automatically
11135
11188
  # encrypted. Volumes that are created from encrypted snapshots are also
@@ -11737,13 +11790,13 @@ module Aws::EC2
11737
11790
  #
11738
11791
  # The following are valid values:
11739
11792
  #
11740
- # * `prefix`\: The Amazon EC2 Prefix Delegation feature assigns the IP
11793
+ # * `prefix`: The Amazon EC2 Prefix Delegation feature assigns the IP
11741
11794
  # addresses to network interfaces that are associated with an
11742
11795
  # instance. For information about Prefix Delegation, see [Prefix
11743
11796
  # Delegation for Amazon EC2 network interfaces][1] in the *Amazon
11744
11797
  # Elastic Compute Cloud User Guide*.
11745
11798
  #
11746
- # * `explicit`\: You manually assign the IP addresses to resources that
11799
+ # * `explicit`: You manually assign the IP addresses to resources that
11747
11800
  # reside in your subnet.
11748
11801
  #
11749
11802
  #
@@ -13658,11 +13711,11 @@ module Aws::EC2
13658
13711
  #
13659
13712
  # The following are the supported values for each volume type:
13660
13713
  #
13661
- # * `gp3`\: 3,000-16,000 IOPS
13714
+ # * `gp3`: 3,000-16,000 IOPS
13662
13715
  #
13663
- # * `io1`\: 100-64,000 IOPS
13716
+ # * `io1`: 100-64,000 IOPS
13664
13717
  #
13665
- # * `io2`\: 100-64,000 IOPS
13718
+ # * `io2`: 100-64,000 IOPS
13666
13719
  #
13667
13720
  # `io1` and `io2` volumes support up to 64,000 IOPS only on [Instances
13668
13721
  # built on the Nitro System][1]. Other instance families support
@@ -13709,13 +13762,13 @@ module Aws::EC2
13709
13762
  #
13710
13763
  # The following are the supported volumes sizes for each volume type:
13711
13764
  #
13712
- # * `gp2` and `gp3`\: 1-16,384
13765
+ # * `gp2` and `gp3`: 1-16,384
13713
13766
  #
13714
- # * `io1` and `io2`\: 4-16,384
13767
+ # * `io1` and `io2`: 4-16,384
13715
13768
  #
13716
- # * `st1` and `sc1`\: 125-16,384
13769
+ # * `st1` and `sc1`: 125-16,384
13717
13770
  #
13718
- # * `standard`\: 1-1,024
13771
+ # * `standard`: 1-1,024
13719
13772
  #
13720
13773
  # @option params [String] :snapshot_id
13721
13774
  # The snapshot from which to create the volume. You must specify either
@@ -14199,8 +14252,8 @@ module Aws::EC2
14199
14252
  # generated by the VPC endpoint service.
14200
14253
  #
14201
14254
  # To use a private hosted zone, you must set the following VPC
14202
- # attributes to `true`\: `enableDnsHostnames` and `enableDnsSupport`.
14203
- # Use ModifyVpcAttribute to set the VPC attributes.
14255
+ # attributes to `true`: `enableDnsHostnames` and `enableDnsSupport`. Use
14256
+ # ModifyVpcAttribute to set the VPC attributes.
14204
14257
  #
14205
14258
  # Default: `true`
14206
14259
  #
@@ -14226,6 +14279,7 @@ module Aws::EC2
14226
14279
  # ip_address_type: "ipv4", # accepts ipv4, dualstack, ipv6
14227
14280
  # dns_options: {
14228
14281
  # dns_record_ip_type: "ipv4", # accepts ipv4, dualstack, ipv6, service-defined
14282
+ # private_dns_only_for_inbound_resolver_endpoint: false,
14229
14283
  # },
14230
14284
  # client_token: "String",
14231
14285
  # private_dns_enabled: false,
@@ -14259,6 +14313,7 @@ module Aws::EC2
14259
14313
  # resp.vpc_endpoint.groups[0].group_name #=> String
14260
14314
  # resp.vpc_endpoint.ip_address_type #=> String, one of "ipv4", "dualstack", "ipv6"
14261
14315
  # resp.vpc_endpoint.dns_options.dns_record_ip_type #=> String, one of "ipv4", "dualstack", "ipv6", "service-defined"
14316
+ # resp.vpc_endpoint.dns_options.private_dns_only_for_inbound_resolver_endpoint #=> Boolean
14262
14317
  # resp.vpc_endpoint.private_dns_enabled #=> Boolean
14263
14318
  # resp.vpc_endpoint.requester_managed #=> Boolean
14264
14319
  # resp.vpc_endpoint.network_interface_ids #=> Array
@@ -18766,24 +18821,24 @@ module Aws::EC2
18766
18821
  # Describes attributes of your Amazon Web Services account. The
18767
18822
  # following are the supported account attributes:
18768
18823
  #
18769
- # * `supported-platforms`\: Indicates whether your account can launch
18824
+ # * `supported-platforms`: Indicates whether your account can launch
18770
18825
  # instances into EC2-Classic and EC2-VPC, or only into EC2-VPC.
18771
18826
  #
18772
- # * `default-vpc`\: The ID of the default VPC for your account, or
18827
+ # * `default-vpc`: The ID of the default VPC for your account, or
18773
18828
  # `none`.
18774
18829
  #
18775
- # * `max-instances`\: This attribute is no longer supported. The
18776
- # returned value does not reflect your actual vCPU limit for running
18777
- # On-Demand Instances. For more information, see [On-Demand Instance
18778
- # Limits][1] in the *Amazon Elastic Compute Cloud User Guide*.
18830
+ # * `max-instances`: This attribute is no longer supported. The returned
18831
+ # value does not reflect your actual vCPU limit for running On-Demand
18832
+ # Instances. For more information, see [On-Demand Instance Limits][1]
18833
+ # in the *Amazon Elastic Compute Cloud User Guide*.
18779
18834
  #
18780
- # * `vpc-max-security-groups-per-interface`\: The maximum number of
18835
+ # * `vpc-max-security-groups-per-interface`: The maximum number of
18781
18836
  # security groups that you can assign to a network interface.
18782
18837
  #
18783
- # * `max-elastic-ips`\: The maximum number of Elastic IP addresses that
18838
+ # * `max-elastic-ips`: The maximum number of Elastic IP addresses that
18784
18839
  # you can allocate for use with EC2-Classic.
18785
18840
  #
18786
- # * `vpc-max-elastic-ips`\: The maximum number of Elastic IP addresses
18841
+ # * `vpc-max-elastic-ips`: The maximum number of Elastic IP addresses
18787
18842
  # that you can allocate for use with EC2-VPC.
18788
18843
  #
18789
18844
  # <note markdown="1"> We are retiring EC2-Classic on August 15, 2022. We recommend that you
@@ -19033,7 +19088,7 @@ module Aws::EC2
19033
19088
  #
19034
19089
  # * `public-ip` - The Elastic IP address, or the carrier IP address.
19035
19090
  #
19036
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
19091
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
19037
19092
  # the resource. Use the tag key in the filter name and the tag value
19038
19093
  # as the filter value. For example, to find all resources that have a
19039
19094
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -19959,7 +20014,7 @@ module Aws::EC2
19959
20014
  # * `owner-id` - The Amazon Web Services account ID of the owner of the
19960
20015
  # carrier gateway.
19961
20016
  #
19962
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
20017
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
19963
20018
  # the resource. Use the tag key in the filter name and the tag value
19964
20019
  # as the filter value. For example, to find all resources that have a
19965
20020
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -20052,7 +20107,7 @@ module Aws::EC2
20052
20107
  #
20053
20108
  # * `instance-id` - The ID of the instance.
20054
20109
  #
20055
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
20110
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
20056
20111
  # the resource. Use the tag key in the filter name and the tag value
20057
20112
  # as the filter value. For example, to find all resources that have a
20058
20113
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -20730,7 +20785,7 @@ module Aws::EC2
20730
20785
  # * `type` - The type of customer gateway. Currently, the only supported
20731
20786
  # type is `ipsec.1`.
20732
20787
  #
20733
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
20788
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
20734
20789
  # the resource. Use the tag key in the filter name and the tag value
20735
20790
  # as the filter value. For example, to find all resources that have a
20736
20791
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -20841,7 +20896,7 @@ module Aws::EC2
20841
20896
  # * `owner-id` - The ID of the Amazon Web Services account that owns the
20842
20897
  # DHCP options set.
20843
20898
  #
20844
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
20899
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
20845
20900
  # the resource. Use the tag key in the filter name and the tag value
20846
20901
  # as the filter value. For example, to find all resources that have a
20847
20902
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -20975,7 +21030,7 @@ module Aws::EC2
20975
21030
  # @option params [Array<Types::Filter>] :filters
20976
21031
  # One or more filters.
20977
21032
  #
20978
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
21033
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
20979
21034
  # the resource. Use the tag key in the filter name and the tag value
20980
21035
  # as the filter value. For example, to find all resources that have a
20981
21036
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -21331,14 +21386,14 @@ module Aws::EC2
21331
21386
  # @option params [Array<Types::Filter>] :filters
21332
21387
  # The filters. The possible values are:
21333
21388
  #
21334
- # * `availability-zone`\: The Availability Zone of the snapshot.
21389
+ # * `availability-zone`: The Availability Zone of the snapshot.
21335
21390
  #
21336
- # * `owner-id`\: The ID of the Amazon Web Services account that enabled
21391
+ # * `owner-id`: The ID of the Amazon Web Services account that enabled
21337
21392
  # fast snapshot restore on the snapshot.
21338
21393
  #
21339
- # * `snapshot-id`\: The ID of the snapshot.
21394
+ # * `snapshot-id`: The ID of the snapshot.
21340
21395
  #
21341
- # * `state`\: The state of fast snapshot restores for the snapshot
21396
+ # * `state`: The state of fast snapshot restores for the snapshot
21342
21397
  # (`enabling` \| `optimizing` \| `enabled` \| `disabling` \|
21343
21398
  # `disabled`).
21344
21399
  #
@@ -21449,7 +21504,7 @@ module Aws::EC2
21449
21504
  #
21450
21505
  # @option params [required, Time,DateTime,Date,Integer,String] :start_time
21451
21506
  # The start date and time for the events, in UTC format (for example,
21452
- # *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z).
21507
+ # *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z).
21453
21508
  #
21454
21509
  # @return [Types::DescribeFleetHistoryResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
21455
21510
  #
@@ -21893,7 +21948,7 @@ module Aws::EC2
21893
21948
  # * `traffic-type` - The type of traffic (`ACCEPT` \| `REJECT` \|
21894
21949
  # `ALL`).
21895
21950
  #
21896
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
21951
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
21897
21952
  # the resource. Use the tag key in the filter name and the tag value
21898
21953
  # as the filter value. For example, to find all resources that have a
21899
21954
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -22065,7 +22120,7 @@ module Aws::EC2
22065
22120
  # * `state` - The state of the AFI (`pending` \| `failed` \| `available`
22066
22121
  # \| `unavailable`).
22067
22122
  #
22068
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
22123
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
22069
22124
  # the resource. Use the tag key in the filter name and the tag value
22070
22125
  # as the filter value. For example, to find all resources that have a
22071
22126
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -22679,10 +22734,10 @@ module Aws::EC2
22679
22734
  # @option params [required, String] :attribute
22680
22735
  # The AMI attribute.
22681
22736
  #
22682
- # **Note**\: The `blockDeviceMapping` attribute is deprecated. Using
22683
- # this attribute returns the `Client.AuthFailure` error. To get
22684
- # information about the block device mappings for an AMI, use the
22685
- # DescribeImages action.
22737
+ # **Note**: The `blockDeviceMapping` attribute is deprecated. Using this
22738
+ # attribute returns the `Client.AuthFailure` error. To get information
22739
+ # about the block device mappings for an AMI, use the DescribeImages
22740
+ # action.
22686
22741
  #
22687
22742
  # @option params [required, String] :image_id
22688
22743
  # The ID of the AMI.
@@ -22895,7 +22950,7 @@ module Aws::EC2
22895
22950
  # * `sriov-net-support` - A value of `simple` indicates that enhanced
22896
22951
  # networking with the Intel 82599 VF interface is enabled.
22897
22952
  #
22898
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
22953
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
22899
22954
  # the resource. Use the tag key in the filter name and the tag value
22900
22955
  # as the filter value. For example, to find all resources that have a
22901
22956
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -24869,7 +24924,7 @@ module Aws::EC2
24869
24924
  # * `owner-id` - The ID of the Amazon Web Services account that owns the
24870
24925
  # internet gateway.
24871
24926
  #
24872
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
24927
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
24873
24928
  # the resource. Use the tag key in the filter name and the tag value
24874
24929
  # as the filter value. For example, to find all resources that have a
24875
24930
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -25399,7 +25454,7 @@ module Aws::EC2
25399
25454
  # @option params [Array<Types::Filter>] :filters
25400
25455
  # One or more filters.
25401
25456
  #
25402
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
25457
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
25403
25458
  # the resource. Use the tag key in the filter name and the tag value
25404
25459
  # as the filter value. For example, to find all resources that have a
25405
25460
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -25474,7 +25529,7 @@ module Aws::EC2
25474
25529
  # filter to find all resources assigned a tag with a specific key,
25475
25530
  # regardless of the tag value.
25476
25531
  #
25477
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
25532
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
25478
25533
  # the resource. Use the tag key in the filter name and the tag value
25479
25534
  # as the filter value. For example, to find all resources that have a
25480
25535
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -25949,7 +26004,7 @@ module Aws::EC2
25949
26004
  #
25950
26005
  # * `launch-template-name` - The name of the launch template.
25951
26006
  #
25952
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
26007
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
25953
26008
  # the resource. Use the tag key in the filter name and the tag value
25954
26009
  # as the filter value. For example, to find all resources that have a
25955
26010
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -26728,7 +26783,7 @@ module Aws::EC2
26728
26783
  #
26729
26784
  # * `subnet-id` - The ID of the subnet in which the NAT gateway resides.
26730
26785
  #
26731
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
26786
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
26732
26787
  # the resource. Use the tag key in the filter name and the tag value
26733
26788
  # as the filter value. For example, to find all resources that have a
26734
26789
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -26916,7 +26971,7 @@ module Aws::EC2
26916
26971
  # * `owner-id` - The ID of the Amazon Web Services account that owns the
26917
26972
  # network ACL.
26918
26973
  #
26919
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
26974
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
26920
26975
  # the resource. Use the tag key in the filter name and the tag value
26921
26976
  # as the filter value. For example, to find all resources that have a
26922
26977
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -27336,6 +27391,9 @@ module Aws::EC2
27336
27391
  # resp.network_insights_analyses[0].forward_path_components[0].route_table_route.transit_gateway_id #=> String
27337
27392
  # resp.network_insights_analyses[0].forward_path_components[0].route_table_route.vpc_peering_connection_id #=> String
27338
27393
  # resp.network_insights_analyses[0].forward_path_components[0].route_table_route.state #=> String
27394
+ # resp.network_insights_analyses[0].forward_path_components[0].route_table_route.carrier_gateway_id #=> String
27395
+ # resp.network_insights_analyses[0].forward_path_components[0].route_table_route.core_network_arn #=> String
27396
+ # resp.network_insights_analyses[0].forward_path_components[0].route_table_route.local_gateway_id #=> String
27339
27397
  # resp.network_insights_analyses[0].forward_path_components[0].security_group_rule.cidr #=> String
27340
27398
  # resp.network_insights_analyses[0].forward_path_components[0].security_group_rule.direction #=> String
27341
27399
  # resp.network_insights_analyses[0].forward_path_components[0].security_group_rule.security_group_id #=> String
@@ -27357,6 +27415,27 @@ module Aws::EC2
27357
27415
  # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].component.id #=> String
27358
27416
  # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].component.arn #=> String
27359
27417
  # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].component.name #=> String
27418
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].vpc_endpoint_service.id #=> String
27419
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].vpc_endpoint_service.arn #=> String
27420
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].vpc_endpoint_service.name #=> String
27421
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_options #=> Array
27422
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_options[0].keyword #=> String
27423
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_options[0].settings #=> Array
27424
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_options[0].settings[0] #=> String
27425
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_type_pairs #=> Array
27426
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_arn #=> String
27427
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_type #=> String
27428
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_rule_options_pairs #=> Array
27429
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_group_arn #=> String
27430
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options #=> Array
27431
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].keyword #=> String
27432
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings #=> Array
27433
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings[0] #=> String
27434
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].service_name #=> String
27435
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].load_balancers #=> Array
27436
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].load_balancers[0].id #=> String
27437
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].load_balancers[0].arn #=> String
27438
+ # resp.network_insights_analyses[0].forward_path_components[0].additional_details[0].load_balancers[0].name #=> String
27360
27439
  # resp.network_insights_analyses[0].forward_path_components[0].transit_gateway.id #=> String
27361
27440
  # resp.network_insights_analyses[0].forward_path_components[0].transit_gateway.arn #=> String
27362
27441
  # resp.network_insights_analyses[0].forward_path_components[0].transit_gateway.name #=> String
@@ -27460,6 +27539,9 @@ module Aws::EC2
27460
27539
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table_route.transit_gateway_id #=> String
27461
27540
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table_route.vpc_peering_connection_id #=> String
27462
27541
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table_route.state #=> String
27542
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table_route.carrier_gateway_id #=> String
27543
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table_route.core_network_arn #=> String
27544
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table_route.local_gateway_id #=> String
27463
27545
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table.id #=> String
27464
27546
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table.arn #=> String
27465
27547
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].route_table.name #=> String
@@ -27517,9 +27599,68 @@ module Aws::EC2
27517
27599
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].transit_gateway_attachment.name #=> String
27518
27600
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].component_account #=> String
27519
27601
  # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].component_region #=> String
27602
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.rule_group_arn #=> String
27603
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.sources #=> Array
27604
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.sources[0] #=> String
27605
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.destinations #=> Array
27606
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.destinations[0] #=> String
27607
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.source_ports #=> Array
27608
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
27609
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
27610
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.destination_ports #=> Array
27611
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
27612
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
27613
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.protocols #=> Array
27614
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
27615
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.rule_action #=> String
27616
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateless_rule.priority #=> Integer
27617
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.rule_group_arn #=> String
27618
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.sources #=> Array
27619
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.sources[0] #=> String
27620
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.destinations #=> Array
27621
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.destinations[0] #=> String
27622
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.source_ports #=> Array
27623
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
27624
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
27625
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.destination_ports #=> Array
27626
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
27627
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
27628
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.protocol #=> String
27629
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.rule_action #=> String
27630
+ # resp.network_insights_analyses[0].forward_path_components[0].explanations[0].firewall_stateful_rule.direction #=> String
27520
27631
  # resp.network_insights_analyses[0].forward_path_components[0].elastic_load_balancer_listener.id #=> String
27521
27632
  # resp.network_insights_analyses[0].forward_path_components[0].elastic_load_balancer_listener.arn #=> String
27522
27633
  # resp.network_insights_analyses[0].forward_path_components[0].elastic_load_balancer_listener.name #=> String
27634
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.rule_group_arn #=> String
27635
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.sources #=> Array
27636
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.sources[0] #=> String
27637
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.destinations #=> Array
27638
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.destinations[0] #=> String
27639
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.source_ports #=> Array
27640
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.source_ports[0].from #=> Integer
27641
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.source_ports[0].to #=> Integer
27642
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.destination_ports #=> Array
27643
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
27644
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
27645
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.protocols #=> Array
27646
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.protocols[0] #=> Integer
27647
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.rule_action #=> String
27648
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateless_rule.priority #=> Integer
27649
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.rule_group_arn #=> String
27650
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.sources #=> Array
27651
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.sources[0] #=> String
27652
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.destinations #=> Array
27653
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.destinations[0] #=> String
27654
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.source_ports #=> Array
27655
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.source_ports[0].from #=> Integer
27656
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.source_ports[0].to #=> Integer
27657
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.destination_ports #=> Array
27658
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
27659
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
27660
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.protocol #=> String
27661
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.rule_action #=> String
27662
+ # resp.network_insights_analyses[0].forward_path_components[0].firewall_stateful_rule.direction #=> String
27663
+ # resp.network_insights_analyses[0].forward_path_components[0].service_name #=> String
27523
27664
  # resp.network_insights_analyses[0].return_path_components #=> Array
27524
27665
  # resp.network_insights_analyses[0].return_path_components[0].sequence_number #=> Integer
27525
27666
  # resp.network_insights_analyses[0].return_path_components[0].acl_rule.cidr #=> String
@@ -27571,6 +27712,9 @@ module Aws::EC2
27571
27712
  # resp.network_insights_analyses[0].return_path_components[0].route_table_route.transit_gateway_id #=> String
27572
27713
  # resp.network_insights_analyses[0].return_path_components[0].route_table_route.vpc_peering_connection_id #=> String
27573
27714
  # resp.network_insights_analyses[0].return_path_components[0].route_table_route.state #=> String
27715
+ # resp.network_insights_analyses[0].return_path_components[0].route_table_route.carrier_gateway_id #=> String
27716
+ # resp.network_insights_analyses[0].return_path_components[0].route_table_route.core_network_arn #=> String
27717
+ # resp.network_insights_analyses[0].return_path_components[0].route_table_route.local_gateway_id #=> String
27574
27718
  # resp.network_insights_analyses[0].return_path_components[0].security_group_rule.cidr #=> String
27575
27719
  # resp.network_insights_analyses[0].return_path_components[0].security_group_rule.direction #=> String
27576
27720
  # resp.network_insights_analyses[0].return_path_components[0].security_group_rule.security_group_id #=> String
@@ -27592,6 +27736,27 @@ module Aws::EC2
27592
27736
  # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].component.id #=> String
27593
27737
  # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].component.arn #=> String
27594
27738
  # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].component.name #=> String
27739
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].vpc_endpoint_service.id #=> String
27740
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].vpc_endpoint_service.arn #=> String
27741
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].vpc_endpoint_service.name #=> String
27742
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_options #=> Array
27743
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_options[0].keyword #=> String
27744
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_options[0].settings #=> Array
27745
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_options[0].settings[0] #=> String
27746
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_type_pairs #=> Array
27747
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_arn #=> String
27748
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_type #=> String
27749
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_rule_options_pairs #=> Array
27750
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_group_arn #=> String
27751
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options #=> Array
27752
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].keyword #=> String
27753
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings #=> Array
27754
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings[0] #=> String
27755
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].service_name #=> String
27756
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].load_balancers #=> Array
27757
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].load_balancers[0].id #=> String
27758
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].load_balancers[0].arn #=> String
27759
+ # resp.network_insights_analyses[0].return_path_components[0].additional_details[0].load_balancers[0].name #=> String
27595
27760
  # resp.network_insights_analyses[0].return_path_components[0].transit_gateway.id #=> String
27596
27761
  # resp.network_insights_analyses[0].return_path_components[0].transit_gateway.arn #=> String
27597
27762
  # resp.network_insights_analyses[0].return_path_components[0].transit_gateway.name #=> String
@@ -27695,6 +27860,9 @@ module Aws::EC2
27695
27860
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table_route.transit_gateway_id #=> String
27696
27861
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table_route.vpc_peering_connection_id #=> String
27697
27862
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table_route.state #=> String
27863
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table_route.carrier_gateway_id #=> String
27864
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table_route.core_network_arn #=> String
27865
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table_route.local_gateway_id #=> String
27698
27866
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table.id #=> String
27699
27867
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table.arn #=> String
27700
27868
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].route_table.name #=> String
@@ -27752,9 +27920,68 @@ module Aws::EC2
27752
27920
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].transit_gateway_attachment.name #=> String
27753
27921
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].component_account #=> String
27754
27922
  # resp.network_insights_analyses[0].return_path_components[0].explanations[0].component_region #=> String
27923
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.rule_group_arn #=> String
27924
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.sources #=> Array
27925
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.sources[0] #=> String
27926
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.destinations #=> Array
27927
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.destinations[0] #=> String
27928
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.source_ports #=> Array
27929
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
27930
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
27931
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.destination_ports #=> Array
27932
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
27933
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
27934
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.protocols #=> Array
27935
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
27936
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.rule_action #=> String
27937
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateless_rule.priority #=> Integer
27938
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.rule_group_arn #=> String
27939
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.sources #=> Array
27940
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.sources[0] #=> String
27941
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.destinations #=> Array
27942
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.destinations[0] #=> String
27943
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.source_ports #=> Array
27944
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
27945
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
27946
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.destination_ports #=> Array
27947
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
27948
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
27949
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.protocol #=> String
27950
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.rule_action #=> String
27951
+ # resp.network_insights_analyses[0].return_path_components[0].explanations[0].firewall_stateful_rule.direction #=> String
27755
27952
  # resp.network_insights_analyses[0].return_path_components[0].elastic_load_balancer_listener.id #=> String
27756
27953
  # resp.network_insights_analyses[0].return_path_components[0].elastic_load_balancer_listener.arn #=> String
27757
27954
  # resp.network_insights_analyses[0].return_path_components[0].elastic_load_balancer_listener.name #=> String
27955
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.rule_group_arn #=> String
27956
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.sources #=> Array
27957
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.sources[0] #=> String
27958
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.destinations #=> Array
27959
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.destinations[0] #=> String
27960
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.source_ports #=> Array
27961
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.source_ports[0].from #=> Integer
27962
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.source_ports[0].to #=> Integer
27963
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.destination_ports #=> Array
27964
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
27965
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
27966
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.protocols #=> Array
27967
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.protocols[0] #=> Integer
27968
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.rule_action #=> String
27969
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateless_rule.priority #=> Integer
27970
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.rule_group_arn #=> String
27971
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.sources #=> Array
27972
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.sources[0] #=> String
27973
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.destinations #=> Array
27974
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.destinations[0] #=> String
27975
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.source_ports #=> Array
27976
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.source_ports[0].from #=> Integer
27977
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.source_ports[0].to #=> Integer
27978
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.destination_ports #=> Array
27979
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
27980
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
27981
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.protocol #=> String
27982
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.rule_action #=> String
27983
+ # resp.network_insights_analyses[0].return_path_components[0].firewall_stateful_rule.direction #=> String
27984
+ # resp.network_insights_analyses[0].return_path_components[0].service_name #=> String
27758
27985
  # resp.network_insights_analyses[0].explanations #=> Array
27759
27986
  # resp.network_insights_analyses[0].explanations[0].acl.id #=> String
27760
27987
  # resp.network_insights_analyses[0].explanations[0].acl.arn #=> String
@@ -27848,6 +28075,9 @@ module Aws::EC2
27848
28075
  # resp.network_insights_analyses[0].explanations[0].route_table_route.transit_gateway_id #=> String
27849
28076
  # resp.network_insights_analyses[0].explanations[0].route_table_route.vpc_peering_connection_id #=> String
27850
28077
  # resp.network_insights_analyses[0].explanations[0].route_table_route.state #=> String
28078
+ # resp.network_insights_analyses[0].explanations[0].route_table_route.carrier_gateway_id #=> String
28079
+ # resp.network_insights_analyses[0].explanations[0].route_table_route.core_network_arn #=> String
28080
+ # resp.network_insights_analyses[0].explanations[0].route_table_route.local_gateway_id #=> String
27851
28081
  # resp.network_insights_analyses[0].explanations[0].route_table.id #=> String
27852
28082
  # resp.network_insights_analyses[0].explanations[0].route_table.arn #=> String
27853
28083
  # resp.network_insights_analyses[0].explanations[0].route_table.name #=> String
@@ -27905,6 +28135,35 @@ module Aws::EC2
27905
28135
  # resp.network_insights_analyses[0].explanations[0].transit_gateway_attachment.name #=> String
27906
28136
  # resp.network_insights_analyses[0].explanations[0].component_account #=> String
27907
28137
  # resp.network_insights_analyses[0].explanations[0].component_region #=> String
28138
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.rule_group_arn #=> String
28139
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.sources #=> Array
28140
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.sources[0] #=> String
28141
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.destinations #=> Array
28142
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.destinations[0] #=> String
28143
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.source_ports #=> Array
28144
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
28145
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
28146
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.destination_ports #=> Array
28147
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
28148
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
28149
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.protocols #=> Array
28150
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
28151
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.rule_action #=> String
28152
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateless_rule.priority #=> Integer
28153
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.rule_group_arn #=> String
28154
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.sources #=> Array
28155
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.sources[0] #=> String
28156
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.destinations #=> Array
28157
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.destinations[0] #=> String
28158
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.source_ports #=> Array
28159
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
28160
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
28161
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.destination_ports #=> Array
28162
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
28163
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
28164
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.protocol #=> String
28165
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.rule_action #=> String
28166
+ # resp.network_insights_analyses[0].explanations[0].firewall_stateful_rule.direction #=> String
27908
28167
  # resp.network_insights_analyses[0].alternate_path_hints #=> Array
27909
28168
  # resp.network_insights_analyses[0].alternate_path_hints[0].component_id #=> String
27910
28169
  # resp.network_insights_analyses[0].alternate_path_hints[0].component_arn #=> String
@@ -27934,7 +28193,29 @@ module Aws::EC2
27934
28193
  #
27935
28194
  # * destination - The ID of the resource.
27936
28195
  #
27937
- # * destination-port - The destination port.
28196
+ # * filter-at-source.source-address - The source IPv4 address at the
28197
+ # source.
28198
+ #
28199
+ # * filter-at-source.source-port-range - The source port range at the
28200
+ # source.
28201
+ #
28202
+ # * filter-at-source.destination-address - The destination IPv4 address
28203
+ # at the source.
28204
+ #
28205
+ # * filter-at-source.destination-port-range - The destination port range
28206
+ # at the source.
28207
+ #
28208
+ # * filter-at-destination.source-address - The source IPv4 address at
28209
+ # the destination.
28210
+ #
28211
+ # * filter-at-destination.source-port-range - The source port range at
28212
+ # the destination.
28213
+ #
28214
+ # * filter-at-destination.destination-address - The destination IPv4
28215
+ # address at the destination.
28216
+ #
28217
+ # * filter-at-destination.destination-port-range - The destination port
28218
+ # range at the destination.
27938
28219
  #
27939
28220
  # * protocol - The protocol.
27940
28221
  #
@@ -27993,6 +28274,18 @@ module Aws::EC2
27993
28274
  # resp.network_insights_paths[0].tags #=> Array
27994
28275
  # resp.network_insights_paths[0].tags[0].key #=> String
27995
28276
  # resp.network_insights_paths[0].tags[0].value #=> String
28277
+ # resp.network_insights_paths[0].filter_at_source.source_address #=> String
28278
+ # resp.network_insights_paths[0].filter_at_source.source_port_range.from_port #=> Integer
28279
+ # resp.network_insights_paths[0].filter_at_source.source_port_range.to_port #=> Integer
28280
+ # resp.network_insights_paths[0].filter_at_source.destination_address #=> String
28281
+ # resp.network_insights_paths[0].filter_at_source.destination_port_range.from_port #=> Integer
28282
+ # resp.network_insights_paths[0].filter_at_source.destination_port_range.to_port #=> Integer
28283
+ # resp.network_insights_paths[0].filter_at_destination.source_address #=> String
28284
+ # resp.network_insights_paths[0].filter_at_destination.source_port_range.from_port #=> Integer
28285
+ # resp.network_insights_paths[0].filter_at_destination.source_port_range.to_port #=> Integer
28286
+ # resp.network_insights_paths[0].filter_at_destination.destination_address #=> String
28287
+ # resp.network_insights_paths[0].filter_at_destination.destination_port_range.from_port #=> Integer
28288
+ # resp.network_insights_paths[0].filter_at_destination.destination_port_range.to_port #=> Integer
27996
28289
  # resp.next_token #=> String
27997
28290
  #
27998
28291
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/DescribeNetworkInsightsPaths AWS API Documentation
@@ -28327,7 +28620,7 @@ module Aws::EC2
28327
28620
  #
28328
28621
  # * `subnet-id` - The ID of the subnet for the network interface.
28329
28622
  #
28330
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
28623
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
28331
28624
  # the resource. Use the tag key in the filter name and the tag value
28332
28625
  # as the filter value. For example, to find all resources that have a
28333
28626
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -28634,9 +28927,9 @@ module Aws::EC2
28634
28927
  # @option params [Array<Types::Filter>] :filters
28635
28928
  # One or more filters.
28636
28929
  #
28637
- # * `prefix-list-id`\: The ID of a prefix list.
28930
+ # * `prefix-list-id`: The ID of a prefix list.
28638
28931
  #
28639
- # * `prefix-list-name`\: The name of a prefix list.
28932
+ # * `prefix-list-name`: The name of a prefix list.
28640
28933
  #
28641
28934
  # @option params [Integer] :max_results
28642
28935
  # The maximum number of results to return with a single call. To
@@ -28787,7 +29080,7 @@ module Aws::EC2
28787
29080
  # @option params [Array<Types::Filter>] :filters
28788
29081
  # One or more filters.
28789
29082
  #
28790
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
29083
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
28791
29084
  # the resource. Use the tag key in the filter name and the tag value
28792
29085
  # as the filter value. For example, to find all resources that have a
28793
29086
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -29676,7 +29969,7 @@ module Aws::EC2
29676
29969
  # * `route.vpc-peering-connection-id` - The ID of a VPC peering
29677
29970
  # connection specified in a route in the table.
29678
29971
  #
29679
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
29972
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
29680
29973
  # the resource. Use the tag key in the filter name and the tag value
29681
29974
  # as the filter value. For example, to find all resources that have a
29682
29975
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -30199,7 +30492,7 @@ module Aws::EC2
30199
30492
  #
30200
30493
  # * `security-group-rule-id` - The ID of the security group rule.
30201
30494
  #
30202
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
30495
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
30203
30496
  # the resource. Use the tag key in the filter name and the tag value
30204
30497
  # as the filter value. For example, to find all resources that have a
30205
30498
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -30376,7 +30669,7 @@ module Aws::EC2
30376
30669
  # * `owner-id` - The Amazon Web Services account ID of the owner of the
30377
30670
  # security group.
30378
30671
  #
30379
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
30672
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
30380
30673
  # the resource. Use the tag key in the filter name and the tag value
30381
30674
  # as the filter value. For example, to find all resources that have a
30382
30675
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -30717,15 +31010,15 @@ module Aws::EC2
30717
31010
  #
30718
31011
  # The create volume permissions fall into the following categories:
30719
31012
  #
30720
- # * *public*\: The owner of the snapshot granted create volume
31013
+ # * *public*: The owner of the snapshot granted create volume
30721
31014
  # permissions for the snapshot to the `all` group. All Amazon Web
30722
31015
  # Services accounts have create volume permissions for these
30723
31016
  # snapshots.
30724
31017
  #
30725
- # * *explicit*\: The owner of the snapshot granted create volume
31018
+ # * *explicit*: The owner of the snapshot granted create volume
30726
31019
  # permissions to a specific Amazon Web Services account.
30727
31020
  #
30728
- # * *implicit*\: An Amazon Web Services account has implicit create
31021
+ # * *implicit*: An Amazon Web Services account has implicit create
30729
31022
  # volume permissions for all snapshots it owns.
30730
31023
  #
30731
31024
  # The list of snapshots returned can be filtered by specifying snapshot
@@ -30794,7 +31087,7 @@ module Aws::EC2
30794
31087
  # * `storage-tier` - The storage tier of the snapshot (`archive` \|
30795
31088
  # `standard`).
30796
31089
  #
30797
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
31090
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
30798
31091
  # the resource. Use the tag key in the filter name and the tag value
30799
31092
  # as the filter value. For example, to find all resources that have a
30800
31093
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -31151,7 +31444,7 @@ module Aws::EC2
31151
31444
  #
31152
31445
  # @option params [required, Time,DateTime,Date,Integer,String] :start_time
31153
31446
  # The starting date and time for the events, in UTC format (for example,
31154
- # *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z).
31447
+ # *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z).
31155
31448
  #
31156
31449
  # @return [Types::DescribeSpotFleetRequestHistoryResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
31157
31450
  #
@@ -31925,9 +32218,9 @@ module Aws::EC2
31925
32218
  # wildcards; greater than or less than comparison is not supported).
31926
32219
  #
31927
32220
  # * `timestamp` - The time stamp of the Spot price history, in UTC
31928
- # format (for example, *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z). You can
31929
- # use wildcards (* and ?). Greater than or less than comparison is
31930
- # not supported.
32221
+ # format (for example, *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z). You can use
32222
+ # wildcards (* and ?). Greater than or less than comparison is not
32223
+ # supported.
31931
32224
  #
31932
32225
  # @option params [String] :availability_zone
31933
32226
  # Filters the results by the specified Availability Zone.
@@ -31941,7 +32234,7 @@ module Aws::EC2
31941
32234
  # @option params [Time,DateTime,Date,Integer,String] :end_time
31942
32235
  # The date and time, up to the current date, from which to stop
31943
32236
  # retrieving the price history data, in UTC format (for example,
31944
- # *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z).
32237
+ # *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z).
31945
32238
  #
31946
32239
  # @option params [Array<String>] :instance_types
31947
32240
  # Filters the results by the specified instance types.
@@ -31965,7 +32258,7 @@ module Aws::EC2
31965
32258
  # @option params [Time,DateTime,Date,Integer,String] :start_time
31966
32259
  # The date and time, up to the past 90 days, from which to start
31967
32260
  # retrieving the price history data, in UTC format (for example,
31968
- # *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z).
32261
+ # *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z).
31969
32262
  #
31970
32263
  # @return [Types::DescribeSpotPriceHistoryResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
31971
32264
  #
@@ -32331,7 +32624,7 @@ module Aws::EC2
32331
32624
  #
32332
32625
  # * `subnet-id` - The ID of the subnet.
32333
32626
  #
32334
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
32627
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
32335
32628
  # the resource. Use the tag key in the filter name and the tag value
32336
32629
  # as the filter value. For example, to find all resources that have a
32337
32630
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -32502,7 +32795,7 @@ module Aws::EC2
32502
32795
  # `vpc-endpoint-service` \| `vpc-peering-connection` \|
32503
32796
  # `vpn-connection` \| `vpn-gateway`).
32504
32797
  #
32505
- # * `tag`\:&lt;key&gt; - The key/value combination of the tag. For
32798
+ # * `tag`:&lt;key&gt; - The key/value combination of the tag. For
32506
32799
  # example, specify "tag:Owner" for the filter name and "TeamA" for
32507
32800
  # the filter value to find resources with the tag "Owner=TeamA".
32508
32801
  #
@@ -32609,9 +32902,9 @@ module Aws::EC2
32609
32902
  # @option params [Array<Types::Filter>] :filters
32610
32903
  # One or more filters. The possible values are:
32611
32904
  #
32612
- # * `description`\: The Traffic Mirror filter description.
32905
+ # * `description`: The Traffic Mirror filter description.
32613
32906
  #
32614
- # * `traffic-mirror-filter-id`\: The ID of the Traffic Mirror filter.
32907
+ # * `traffic-mirror-filter-id`: The ID of the Traffic Mirror filter.
32615
32908
  #
32616
32909
  # @option params [Integer] :max_results
32617
32910
  # The maximum number of results to return with a single call. To
@@ -32708,25 +33001,25 @@ module Aws::EC2
32708
33001
  # @option params [Array<Types::Filter>] :filters
32709
33002
  # One or more filters. The possible values are:
32710
33003
  #
32711
- # * `description`\: The Traffic Mirror session description.
33004
+ # * `description`: The Traffic Mirror session description.
32712
33005
  #
32713
- # * `network-interface-id`\: The ID of the Traffic Mirror session
32714
- # network interface.
33006
+ # * `network-interface-id`: The ID of the Traffic Mirror session network
33007
+ # interface.
32715
33008
  #
32716
- # * `owner-id`\: The ID of the account that owns the Traffic Mirror
33009
+ # * `owner-id`: The ID of the account that owns the Traffic Mirror
32717
33010
  # session.
32718
33011
  #
32719
- # * `packet-length`\: The assigned number of packets to mirror.
33012
+ # * `packet-length`: The assigned number of packets to mirror.
32720
33013
  #
32721
- # * `session-number`\: The assigned session number.
33014
+ # * `session-number`: The assigned session number.
32722
33015
  #
32723
- # * `traffic-mirror-filter-id`\: The ID of the Traffic Mirror filter.
33016
+ # * `traffic-mirror-filter-id`: The ID of the Traffic Mirror filter.
32724
33017
  #
32725
- # * `traffic-mirror-session-id`\: The ID of the Traffic Mirror session.
33018
+ # * `traffic-mirror-session-id`: The ID of the Traffic Mirror session.
32726
33019
  #
32727
- # * `traffic-mirror-target-id`\: The ID of the Traffic Mirror target.
33020
+ # * `traffic-mirror-target-id`: The ID of the Traffic Mirror target.
32728
33021
  #
32729
- # * `virtual-network-id`\: The virtual network ID of the Traffic Mirror
33022
+ # * `virtual-network-id`: The virtual network ID of the Traffic Mirror
32730
33023
  # session.
32731
33024
  #
32732
33025
  # @option params [Integer] :max_results
@@ -32799,18 +33092,18 @@ module Aws::EC2
32799
33092
  # @option params [Array<Types::Filter>] :filters
32800
33093
  # One or more filters. The possible values are:
32801
33094
  #
32802
- # * `description`\: The Traffic Mirror target description.
33095
+ # * `description`: The Traffic Mirror target description.
32803
33096
  #
32804
- # * `network-interface-id`\: The ID of the Traffic Mirror session
32805
- # network interface.
33097
+ # * `network-interface-id`: The ID of the Traffic Mirror session network
33098
+ # interface.
32806
33099
  #
32807
- # * `network-load-balancer-arn`\: The Amazon Resource Name (ARN) of the
33100
+ # * `network-load-balancer-arn`: The Amazon Resource Name (ARN) of the
32808
33101
  # Network Load Balancer that is associated with the session.
32809
33102
  #
32810
- # * `owner-id`\: The ID of the account that owns the Traffic Mirror
33103
+ # * `owner-id`: The ID of the account that owns the Traffic Mirror
32811
33104
  # session.
32812
33105
  #
32813
- # * `traffic-mirror-target-id`\: The ID of the Traffic Mirror target.
33106
+ # * `traffic-mirror-target-id`: The ID of the Traffic Mirror target.
32814
33107
  #
32815
33108
  # @option params [Integer] :max_results
32816
33109
  # The maximum number of results to return with a single call. To
@@ -33229,7 +33522,7 @@ module Aws::EC2
33229
33522
  # `initiatingRequest` \| `modifying` \| `pendingAcceptance` \|
33230
33523
  # `pending` \| `rollingBack` \| `rejected` \| `rejecting`).
33231
33524
  #
33232
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
33525
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
33233
33526
  # the resource. Use the tag key in the filter name and the tag value
33234
33527
  # as the filter value. For example, to find all resources that have a
33235
33528
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -34278,7 +34571,7 @@ module Aws::EC2
34278
34571
  # The `DescribeVolumeStatus` operation provides the following
34279
34572
  # information about the specified volumes:
34280
34573
  #
34281
- # *Status*\: Reflects the current status of the volume. The possible
34574
+ # *Status*: Reflects the current status of the volume. The possible
34282
34575
  # values are `ok`, `impaired` , `warning`, or `insufficient-data`. If
34283
34576
  # all checks pass, the overall status of the volume is `ok`. If the
34284
34577
  # check fails, the overall status is `impaired`. If the status is
@@ -34287,14 +34580,14 @@ module Aws::EC2
34287
34580
  # more information about volume status, see [Monitor the status of your
34288
34581
  # volumes][1] in the *Amazon Elastic Compute Cloud User Guide*.
34289
34582
  #
34290
- # *Events*\: Reflect the cause of a volume status and might require you
34583
+ # *Events*: Reflect the cause of a volume status and might require you
34291
34584
  # to take action. For example, if your volume returns an `impaired`
34292
34585
  # status, then the volume event might be `potential-data-inconsistency`.
34293
34586
  # This means that your volume has been affected by an issue with the
34294
34587
  # underlying host, has all I/O operations disabled, and might have
34295
34588
  # inconsistent data.
34296
34589
  #
34297
- # *Actions*\: Reflect the actions you might have to take in response to
34590
+ # *Actions*: Reflect the actions you might have to take in response to
34298
34591
  # an event. For example, if the status of the volume is `impaired` and
34299
34592
  # the volume event shows `potential-data-inconsistency`, then the action
34300
34593
  # shows `enable-volume-io`. This means that you may want to enable the
@@ -34326,8 +34619,8 @@ module Aws::EC2
34326
34619
  #
34327
34620
  # * `event.event-id` - The event ID.
34328
34621
  #
34329
- # * `event.event-type` - The event type (for `io-enabled`\: `passed` \|
34330
- # `failed`; for `io-performance`\: `io-performance:degraded` \|
34622
+ # * `event.event-type` - The event type (for `io-enabled`: `passed` \|
34623
+ # `failed`; for `io-performance`: `io-performance:degraded` \|
34331
34624
  # `io-performance:severely-degraded` \| `io-performance:stalled`).
34332
34625
  #
34333
34626
  # * `event.not-after` - The latest end time for the event.
@@ -34338,8 +34631,8 @@ module Aws::EC2
34338
34631
  # (`io-enabled` \| `io-performance`).
34339
34632
  #
34340
34633
  # * `volume-status.details-status` - The status of
34341
- # `volume-status.details-name` (for `io-enabled`\: `passed` \|
34342
- # `failed`; for `io-performance`\: `normal` \| `degraded` \|
34634
+ # `volume-status.details-name` (for `io-enabled`: `passed` \|
34635
+ # `failed`; for `io-performance`: `normal` \| `degraded` \|
34343
34636
  # `severely-degraded` \| `stalled`).
34344
34637
  #
34345
34638
  # * `volume-status.status` - The status of the volume (`ok` \|
@@ -34545,7 +34838,7 @@ module Aws::EC2
34545
34838
  # * `status` - The state of the volume (`creating` \| `available` \|
34546
34839
  # `in-use` \| `deleting` \| `deleted` \| `error`).
34547
34840
  #
34548
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
34841
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
34549
34842
  # the resource. Use the tag key in the filter name and the tag value
34550
34843
  # as the filter value. For example, to find all resources that have a
34551
34844
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -34958,7 +35251,7 @@ module Aws::EC2
34958
35251
  # * `is-classic-link-enabled` - Whether the VPC is enabled for
34959
35252
  # ClassicLink (`true` \| `false`).
34960
35253
  #
34961
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
35254
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
34962
35255
  # the resource. Use the tag key in the filter name and the tag value
34963
35256
  # as the filter value. For example, to find all resources that have a
34964
35257
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -35273,7 +35566,7 @@ module Aws::EC2
35273
35566
  # * `supported-ip-address-types` - The IP address type (`ipv4` \|
35274
35567
  # `ipv6`).
35275
35568
  #
35276
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
35569
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
35277
35570
  # the resource. Use the tag key in the filter name and the tag value
35278
35571
  # as the filter value. For example, to find all resources that have a
35279
35572
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -35461,7 +35754,7 @@ module Aws::EC2
35461
35754
  # * `supported-ip-address-types` - The IP address type (`ipv4` \|
35462
35755
  # `ipv6`).
35463
35756
  #
35464
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
35757
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
35465
35758
  # the resource. Use the tag key in the filter name and the tag value
35466
35759
  # as the filter value. For example, to find all resources that have a
35467
35760
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -35560,7 +35853,7 @@ module Aws::EC2
35560
35853
  #
35561
35854
  # * `service-name` - The name of the service.
35562
35855
  #
35563
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
35856
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
35564
35857
  # the resource. Use the tag key in the filter name and the tag value
35565
35858
  # as the filter value. For example, to find all resources that have a
35566
35859
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -35633,6 +35926,7 @@ module Aws::EC2
35633
35926
  # resp.vpc_endpoints[0].groups[0].group_name #=> String
35634
35927
  # resp.vpc_endpoints[0].ip_address_type #=> String, one of "ipv4", "dualstack", "ipv6"
35635
35928
  # resp.vpc_endpoints[0].dns_options.dns_record_ip_type #=> String, one of "ipv4", "dualstack", "ipv6", "service-defined"
35929
+ # resp.vpc_endpoints[0].dns_options.private_dns_only_for_inbound_resolver_endpoint #=> Boolean
35636
35930
  # resp.vpc_endpoints[0].private_dns_enabled #=> Boolean
35637
35931
  # resp.vpc_endpoints[0].requester_managed #=> Boolean
35638
35932
  # resp.vpc_endpoints[0].network_interface_ids #=> Array
@@ -35689,7 +35983,7 @@ module Aws::EC2
35689
35983
  # * `status-message` - A message that provides more information about
35690
35984
  # the status of the VPC peering connection, if applicable.
35691
35985
  #
35692
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
35986
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
35693
35987
  # the resource. Use the tag key in the filter name and the tag value
35694
35988
  # as the filter value. For example, to find all resources that have a
35695
35989
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -35836,7 +36130,7 @@ module Aws::EC2
35836
36130
  #
35837
36131
  # * `state` - The state of the VPC (`pending` \| `available`).
35838
36132
  #
35839
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
36133
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
35840
36134
  # the resource. Use the tag key in the filter name and the tag value
35841
36135
  # as the filter value. For example, to find all resources that have a
35842
36136
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -35998,7 +36292,7 @@ module Aws::EC2
35998
36292
  # * `bgp-asn` - The BGP Autonomous System Number (ASN) associated with a
35999
36293
  # BGP device.
36000
36294
  #
36001
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
36295
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
36002
36296
  # the resource. Use the tag key in the filter name and the tag value
36003
36297
  # as the filter value. For example, to find all resources that have a
36004
36298
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -36157,7 +36451,7 @@ module Aws::EC2
36157
36451
  # * `state` - The state of the virtual private gateway (`pending` \|
36158
36452
  # `available` \| `deleting` \| `deleted`).
36159
36453
  #
36160
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
36454
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
36161
36455
  # the resource. Use the tag key in the filter name and the tag value
36162
36456
  # as the filter value. For example, to find all resources that have a
36163
36457
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -38268,7 +38562,7 @@ module Aws::EC2
38268
38562
  #
38269
38563
  # @option params [required, Time,DateTime,Date,Integer,String] :deprecate_at
38270
38564
  # The date and time to deprecate the AMI, in UTC, in the following
38271
- # format: *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z. If you specify a value for
38565
+ # format: *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z. If you specify a value for
38272
38566
  # seconds, Amazon EC2 rounds the seconds to the nearest minute.
38273
38567
  #
38274
38568
  # You can’t specify a date in the past. The upper limit for
@@ -40105,6 +40399,18 @@ module Aws::EC2
40105
40399
 
40106
40400
  # Get a list of all the CIDR allocations in an IPAM pool.
40107
40401
  #
40402
+ # <note markdown="1"> If you use this action after [AllocateIpamPoolCidr][1] or
40403
+ # [ReleaseIpamPoolAllocation][2], note that all EC2 API actions follow
40404
+ # an [eventual consistency][3] model.
40405
+ #
40406
+ # </note>
40407
+ #
40408
+ #
40409
+ #
40410
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_AllocateIpamPoolCidr.html
40411
+ # [2]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ReleaseIpamPoolAllocation.html
40412
+ # [3]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/query-api-troubleshooting.html#eventual-consistency
40413
+ #
40108
40414
  # @option params [Boolean] :dry_run
40109
40415
  # A check for whether you have the required permissions for the action
40110
40416
  # without actually making the request and provides an error response. If
@@ -40795,6 +41101,9 @@ module Aws::EC2
40795
41101
  # resp.analysis_findings[0].finding_components[0].route_table_route.transit_gateway_id #=> String
40796
41102
  # resp.analysis_findings[0].finding_components[0].route_table_route.vpc_peering_connection_id #=> String
40797
41103
  # resp.analysis_findings[0].finding_components[0].route_table_route.state #=> String
41104
+ # resp.analysis_findings[0].finding_components[0].route_table_route.carrier_gateway_id #=> String
41105
+ # resp.analysis_findings[0].finding_components[0].route_table_route.core_network_arn #=> String
41106
+ # resp.analysis_findings[0].finding_components[0].route_table_route.local_gateway_id #=> String
40798
41107
  # resp.analysis_findings[0].finding_components[0].security_group_rule.cidr #=> String
40799
41108
  # resp.analysis_findings[0].finding_components[0].security_group_rule.direction #=> String
40800
41109
  # resp.analysis_findings[0].finding_components[0].security_group_rule.security_group_id #=> String
@@ -40816,6 +41125,27 @@ module Aws::EC2
40816
41125
  # resp.analysis_findings[0].finding_components[0].additional_details[0].component.id #=> String
40817
41126
  # resp.analysis_findings[0].finding_components[0].additional_details[0].component.arn #=> String
40818
41127
  # resp.analysis_findings[0].finding_components[0].additional_details[0].component.name #=> String
41128
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].vpc_endpoint_service.id #=> String
41129
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].vpc_endpoint_service.arn #=> String
41130
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].vpc_endpoint_service.name #=> String
41131
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_options #=> Array
41132
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_options[0].keyword #=> String
41133
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_options[0].settings #=> Array
41134
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_options[0].settings[0] #=> String
41135
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_type_pairs #=> Array
41136
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_arn #=> String
41137
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_type #=> String
41138
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_rule_options_pairs #=> Array
41139
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_group_arn #=> String
41140
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options #=> Array
41141
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].keyword #=> String
41142
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings #=> Array
41143
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings[0] #=> String
41144
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].service_name #=> String
41145
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].load_balancers #=> Array
41146
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].load_balancers[0].id #=> String
41147
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].load_balancers[0].arn #=> String
41148
+ # resp.analysis_findings[0].finding_components[0].additional_details[0].load_balancers[0].name #=> String
40819
41149
  # resp.analysis_findings[0].finding_components[0].transit_gateway.id #=> String
40820
41150
  # resp.analysis_findings[0].finding_components[0].transit_gateway.arn #=> String
40821
41151
  # resp.analysis_findings[0].finding_components[0].transit_gateway.name #=> String
@@ -40919,6 +41249,9 @@ module Aws::EC2
40919
41249
  # resp.analysis_findings[0].finding_components[0].explanations[0].route_table_route.transit_gateway_id #=> String
40920
41250
  # resp.analysis_findings[0].finding_components[0].explanations[0].route_table_route.vpc_peering_connection_id #=> String
40921
41251
  # resp.analysis_findings[0].finding_components[0].explanations[0].route_table_route.state #=> String
41252
+ # resp.analysis_findings[0].finding_components[0].explanations[0].route_table_route.carrier_gateway_id #=> String
41253
+ # resp.analysis_findings[0].finding_components[0].explanations[0].route_table_route.core_network_arn #=> String
41254
+ # resp.analysis_findings[0].finding_components[0].explanations[0].route_table_route.local_gateway_id #=> String
40922
41255
  # resp.analysis_findings[0].finding_components[0].explanations[0].route_table.id #=> String
40923
41256
  # resp.analysis_findings[0].finding_components[0].explanations[0].route_table.arn #=> String
40924
41257
  # resp.analysis_findings[0].finding_components[0].explanations[0].route_table.name #=> String
@@ -40976,9 +41309,68 @@ module Aws::EC2
40976
41309
  # resp.analysis_findings[0].finding_components[0].explanations[0].transit_gateway_attachment.name #=> String
40977
41310
  # resp.analysis_findings[0].finding_components[0].explanations[0].component_account #=> String
40978
41311
  # resp.analysis_findings[0].finding_components[0].explanations[0].component_region #=> String
41312
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.rule_group_arn #=> String
41313
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.sources #=> Array
41314
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.sources[0] #=> String
41315
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.destinations #=> Array
41316
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.destinations[0] #=> String
41317
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.source_ports #=> Array
41318
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
41319
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
41320
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.destination_ports #=> Array
41321
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
41322
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
41323
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.protocols #=> Array
41324
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
41325
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.rule_action #=> String
41326
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateless_rule.priority #=> Integer
41327
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.rule_group_arn #=> String
41328
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.sources #=> Array
41329
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.sources[0] #=> String
41330
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.destinations #=> Array
41331
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.destinations[0] #=> String
41332
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.source_ports #=> Array
41333
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
41334
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
41335
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.destination_ports #=> Array
41336
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
41337
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
41338
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.protocol #=> String
41339
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.rule_action #=> String
41340
+ # resp.analysis_findings[0].finding_components[0].explanations[0].firewall_stateful_rule.direction #=> String
40979
41341
  # resp.analysis_findings[0].finding_components[0].elastic_load_balancer_listener.id #=> String
40980
41342
  # resp.analysis_findings[0].finding_components[0].elastic_load_balancer_listener.arn #=> String
40981
41343
  # resp.analysis_findings[0].finding_components[0].elastic_load_balancer_listener.name #=> String
41344
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.rule_group_arn #=> String
41345
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.sources #=> Array
41346
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.sources[0] #=> String
41347
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.destinations #=> Array
41348
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.destinations[0] #=> String
41349
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.source_ports #=> Array
41350
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.source_ports[0].from #=> Integer
41351
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.source_ports[0].to #=> Integer
41352
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.destination_ports #=> Array
41353
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
41354
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
41355
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.protocols #=> Array
41356
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.protocols[0] #=> Integer
41357
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.rule_action #=> String
41358
+ # resp.analysis_findings[0].finding_components[0].firewall_stateless_rule.priority #=> Integer
41359
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.rule_group_arn #=> String
41360
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.sources #=> Array
41361
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.sources[0] #=> String
41362
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.destinations #=> Array
41363
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.destinations[0] #=> String
41364
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.source_ports #=> Array
41365
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.source_ports[0].from #=> Integer
41366
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.source_ports[0].to #=> Integer
41367
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.destination_ports #=> Array
41368
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
41369
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
41370
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.protocol #=> String
41371
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.rule_action #=> String
41372
+ # resp.analysis_findings[0].finding_components[0].firewall_stateful_rule.direction #=> String
41373
+ # resp.analysis_findings[0].finding_components[0].service_name #=> String
40982
41374
  # resp.next_token #=> String
40983
41375
  #
40984
41376
  # @see http://docs.aws.amazon.com/goto/WebAPI/ec2-2016-11-15/GetNetworkInsightsAccessScopeAnalysisFindings AWS API Documentation
@@ -41469,7 +41861,7 @@ module Aws::EC2
41469
41861
  #
41470
41862
  # * `subnet-id` - The ID of the subnet.
41471
41863
  #
41472
- # * `tag`\:&lt;key&gt; - The key/value combination of a tag assigned to
41864
+ # * `tag`:&lt;key&gt; - The key/value combination of a tag assigned to
41473
41865
  # the resource. Use the tag key in the filter name and the tag value
41474
41866
  # as the filter value. For example, to find all resources that have a
41475
41867
  # tag with the key `Owner` and the value `TeamA`, specify `tag:Owner`
@@ -42368,19 +42760,19 @@ module Aws::EC2
42368
42760
  # followed by the Region of the key, the Amazon Web Services account
42369
42761
  # ID of the key owner, the `alias` namespace, and then the key alias.
42370
42762
  # For example,
42371
- # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
42763
+ # arn:aws:kms:*us-east-1*:*012345678910*:alias/*ExampleAlias*.
42372
42764
  #
42373
42765
  # * ARN using key ID. The ID ARN contains the `arn:aws:kms` namespace,
42374
42766
  # followed by the Region of the key, the Amazon Web Services account
42375
42767
  # ID of the key owner, the `key` namespace, and then the key ID. For
42376
42768
  # example,
42377
- # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
42769
+ # arn:aws:kms:*us-east-1*:*012345678910*:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
42378
42770
  #
42379
42771
  # * ARN using key alias. The alias ARN contains the `arn:aws:kms`
42380
42772
  # namespace, followed by the Region of the key, the Amazon Web
42381
42773
  # Services account ID of the key owner, the `alias` namespace, and
42382
42774
  # then the key alias. For example,
42383
- # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
42775
+ # arn:aws:kms:*us-east-1*:*012345678910*:alias/*ExampleAlias*.
42384
42776
  #
42385
42777
  # Amazon Web Services parses `KmsKeyId` asynchronously, meaning that the
42386
42778
  # action you call may appear to complete even though you provided an
@@ -42601,7 +42993,7 @@ module Aws::EC2
42601
42993
  # image: {
42602
42994
  # bytes: 1, # required
42603
42995
  # format: "VMDK", # required, accepts VMDK, RAW, VHD
42604
- # import_manifest_url: "String", # required
42996
+ # import_manifest_url: "ImportManifestUrl", # required
42605
42997
  # },
42606
42998
  # volume: {
42607
42999
  # size: 1, # required
@@ -42809,19 +43201,19 @@ module Aws::EC2
42809
43201
  # followed by the Region of the key, the Amazon Web Services account
42810
43202
  # ID of the key owner, the `alias` namespace, and then the key alias.
42811
43203
  # For example,
42812
- # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
43204
+ # arn:aws:kms:*us-east-1*:*012345678910*:alias/*ExampleAlias*.
42813
43205
  #
42814
43206
  # * ARN using key ID. The ID ARN contains the `arn:aws:kms` namespace,
42815
43207
  # followed by the Region of the key, the Amazon Web Services account
42816
43208
  # ID of the key owner, the `key` namespace, and then the key ID. For
42817
43209
  # example,
42818
- # arn:aws:kms:*us-east-1*\:*012345678910*\:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
43210
+ # arn:aws:kms:*us-east-1*:*012345678910*:key/*abcd1234-a123-456a-a12b-a123b4cd56ef*.
42819
43211
  #
42820
43212
  # * ARN using key alias. The alias ARN contains the `arn:aws:kms`
42821
43213
  # namespace, followed by the Region of the key, the Amazon Web
42822
43214
  # Services account ID of the key owner, the `alias` namespace, and
42823
43215
  # then the key alias. For example,
42824
- # arn:aws:kms:*us-east-1*\:*012345678910*\:alias/*ExampleAlias*.
43216
+ # arn:aws:kms:*us-east-1*:*012345678910*:alias/*ExampleAlias*.
42825
43217
  #
42826
43218
  # Amazon Web Services parses `KmsKeyId` asynchronously, meaning that the
42827
43219
  # action you call may appear to complete even though you provided an
@@ -42963,7 +43355,7 @@ module Aws::EC2
42963
43355
  # image: { # required
42964
43356
  # bytes: 1, # required
42965
43357
  # format: "VMDK", # required, accepts VMDK, RAW, VHD
42966
- # import_manifest_url: "String", # required
43358
+ # import_manifest_url: "ImportManifestUrl", # required
42967
43359
  # },
42968
43360
  # volume: { # required
42969
43361
  # size: 1, # required
@@ -47606,13 +47998,13 @@ module Aws::EC2
47606
47998
  #
47607
47999
  # The following are the supported volumes sizes for each volume type:
47608
48000
  #
47609
- # * `gp2` and `gp3`\: 1-16,384
48001
+ # * `gp2` and `gp3`: 1-16,384
47610
48002
  #
47611
- # * `io1` and `io2`\: 4-16,384
48003
+ # * `io1` and `io2`: 4-16,384
47612
48004
  #
47613
- # * `st1` and `sc1`\: 125-16,384
48005
+ # * `st1` and `sc1`: 125-16,384
47614
48006
  #
47615
- # * `standard`\: 1-1,024
48007
+ # * `standard`: 1-1,024
47616
48008
  #
47617
48009
  # Default: The existing size is retained.
47618
48010
  #
@@ -47633,11 +48025,11 @@ module Aws::EC2
47633
48025
  #
47634
48026
  # The following are the supported values for each volume type:
47635
48027
  #
47636
- # * `gp3`\: 3,000-16,000 IOPS
48028
+ # * `gp3`: 3,000-16,000 IOPS
47637
48029
  #
47638
- # * `io1`\: 100-64,000 IOPS
48030
+ # * `io1`: 100-64,000 IOPS
47639
48031
  #
47640
- # * `io2`\: 100-64,000 IOPS
48032
+ # * `io2`: 100-64,000 IOPS
47641
48033
  #
47642
48034
  # Default: The existing value is retained if you keep the same volume
47643
48035
  # type. If you change the volume type to `io1`, `io2`, or `gp3`, the
@@ -47936,6 +48328,7 @@ module Aws::EC2
47936
48328
  # ip_address_type: "ipv4", # accepts ipv4, dualstack, ipv6
47937
48329
  # dns_options: {
47938
48330
  # dns_record_ip_type: "ipv4", # accepts ipv4, dualstack, ipv6, service-defined
48331
+ # private_dns_only_for_inbound_resolver_endpoint: false,
47939
48332
  # },
47940
48333
  # private_dns_enabled: false,
47941
48334
  # })
@@ -49444,7 +49837,7 @@ module Aws::EC2
49444
49837
  #
49445
49838
  # @option params [Time,DateTime,Date,Integer,String] :purchase_time
49446
49839
  # The time at which to purchase the Reserved Instance, in UTC format
49447
- # (for example, *YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z).
49840
+ # (for example, *YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z).
49448
49841
  #
49449
49842
  # @return [Types::PurchaseReservedInstancesOfferingResult] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
49450
49843
  #
@@ -50490,10 +50883,15 @@ module Aws::EC2
50490
50883
  # false using [ModifyIpamResourceCidr][1]. For more information, see
50491
50884
  # [Release an allocation][2] in the *Amazon VPC IPAM User Guide*.
50492
50885
  #
50886
+ # <note markdown="1"> All EC2 API actions follow an [eventual consistency][3] model.
50887
+ #
50888
+ # </note>
50889
+ #
50493
50890
  #
50494
50891
  #
50495
50892
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_ModifyIpamResourceCidr.html
50496
50893
  # [2]: https://docs.aws.amazon.com/vpc/latest/ipam/release-pool-alloc-ipam.html
50894
+ # [3]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/query-api-troubleshooting.html#eventual-consistency
50497
50895
  #
50498
50896
  # @option params [Boolean] :dry_run
50499
50897
  # A check for whether you have the required permissions for the action
@@ -51023,30 +51421,30 @@ module Aws::EC2
51023
51421
  # @option params [required, Array<String>] :reason_codes
51024
51422
  # The reason codes that describe the health state of your instance.
51025
51423
  #
51026
- # * `instance-stuck-in-state`\: My instance is stuck in a state.
51424
+ # * `instance-stuck-in-state`: My instance is stuck in a state.
51027
51425
  #
51028
- # * `unresponsive`\: My instance is unresponsive.
51426
+ # * `unresponsive`: My instance is unresponsive.
51029
51427
  #
51030
- # * `not-accepting-credentials`\: My instance is not accepting my
51428
+ # * `not-accepting-credentials`: My instance is not accepting my
51031
51429
  # credentials.
51032
51430
  #
51033
- # * `password-not-available`\: A password is not available for my
51431
+ # * `password-not-available`: A password is not available for my
51034
51432
  # instance.
51035
51433
  #
51036
- # * `performance-network`\: My instance is experiencing performance
51434
+ # * `performance-network`: My instance is experiencing performance
51037
51435
  # problems that I believe are network related.
51038
51436
  #
51039
- # * `performance-instance-store`\: My instance is experiencing
51437
+ # * `performance-instance-store`: My instance is experiencing
51040
51438
  # performance problems that I believe are related to the instance
51041
51439
  # stores.
51042
51440
  #
51043
- # * `performance-ebs-volume`\: My instance is experiencing performance
51441
+ # * `performance-ebs-volume`: My instance is experiencing performance
51044
51442
  # problems that I believe are related to an EBS volume.
51045
51443
  #
51046
- # * `performance-other`\: My instance is experiencing performance
51444
+ # * `performance-other`: My instance is experiencing performance
51047
51445
  # problems.
51048
51446
  #
51049
- # * `other`\: \[explain using the description parameter\]
51447
+ # * `other`: \[explain using the description parameter\]
51050
51448
  #
51051
51449
  # @option params [Time,DateTime,Date,Integer,String] :start_time
51052
51450
  # The time at which the reported instance health state began.
@@ -51686,7 +52084,7 @@ module Aws::EC2
51686
52084
  #
51687
52085
  # @option params [Time,DateTime,Date,Integer,String] :valid_until
51688
52086
  # The end date of the request, in UTC format
51689
- # (*YYYY*-*MM*-*DD*T*HH*\:*MM*\:*SS*Z).
52087
+ # (*YYYY*-*MM*-*DD*T*HH*:*MM*:*SS*Z).
51690
52088
  #
51691
52089
  # * For a persistent request, the request remains active until the
51692
52090
  # `ValidUntil` date and time is reached. Otherwise, the request
@@ -54635,6 +55033,9 @@ module Aws::EC2
54635
55033
  # resp.network_insights_analysis.forward_path_components[0].route_table_route.transit_gateway_id #=> String
54636
55034
  # resp.network_insights_analysis.forward_path_components[0].route_table_route.vpc_peering_connection_id #=> String
54637
55035
  # resp.network_insights_analysis.forward_path_components[0].route_table_route.state #=> String
55036
+ # resp.network_insights_analysis.forward_path_components[0].route_table_route.carrier_gateway_id #=> String
55037
+ # resp.network_insights_analysis.forward_path_components[0].route_table_route.core_network_arn #=> String
55038
+ # resp.network_insights_analysis.forward_path_components[0].route_table_route.local_gateway_id #=> String
54638
55039
  # resp.network_insights_analysis.forward_path_components[0].security_group_rule.cidr #=> String
54639
55040
  # resp.network_insights_analysis.forward_path_components[0].security_group_rule.direction #=> String
54640
55041
  # resp.network_insights_analysis.forward_path_components[0].security_group_rule.security_group_id #=> String
@@ -54656,6 +55057,27 @@ module Aws::EC2
54656
55057
  # resp.network_insights_analysis.forward_path_components[0].additional_details[0].component.id #=> String
54657
55058
  # resp.network_insights_analysis.forward_path_components[0].additional_details[0].component.arn #=> String
54658
55059
  # resp.network_insights_analysis.forward_path_components[0].additional_details[0].component.name #=> String
55060
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].vpc_endpoint_service.id #=> String
55061
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].vpc_endpoint_service.arn #=> String
55062
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].vpc_endpoint_service.name #=> String
55063
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_options #=> Array
55064
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_options[0].keyword #=> String
55065
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_options[0].settings #=> Array
55066
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_options[0].settings[0] #=> String
55067
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_type_pairs #=> Array
55068
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_arn #=> String
55069
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_type #=> String
55070
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_rule_options_pairs #=> Array
55071
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_group_arn #=> String
55072
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options #=> Array
55073
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].keyword #=> String
55074
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings #=> Array
55075
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings[0] #=> String
55076
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].service_name #=> String
55077
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].load_balancers #=> Array
55078
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].load_balancers[0].id #=> String
55079
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].load_balancers[0].arn #=> String
55080
+ # resp.network_insights_analysis.forward_path_components[0].additional_details[0].load_balancers[0].name #=> String
54659
55081
  # resp.network_insights_analysis.forward_path_components[0].transit_gateway.id #=> String
54660
55082
  # resp.network_insights_analysis.forward_path_components[0].transit_gateway.arn #=> String
54661
55083
  # resp.network_insights_analysis.forward_path_components[0].transit_gateway.name #=> String
@@ -54759,6 +55181,9 @@ module Aws::EC2
54759
55181
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table_route.transit_gateway_id #=> String
54760
55182
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table_route.vpc_peering_connection_id #=> String
54761
55183
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table_route.state #=> String
55184
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table_route.carrier_gateway_id #=> String
55185
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table_route.core_network_arn #=> String
55186
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table_route.local_gateway_id #=> String
54762
55187
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table.id #=> String
54763
55188
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table.arn #=> String
54764
55189
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].route_table.name #=> String
@@ -54816,9 +55241,68 @@ module Aws::EC2
54816
55241
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].transit_gateway_attachment.name #=> String
54817
55242
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].component_account #=> String
54818
55243
  # resp.network_insights_analysis.forward_path_components[0].explanations[0].component_region #=> String
55244
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.rule_group_arn #=> String
55245
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.sources #=> Array
55246
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.sources[0] #=> String
55247
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.destinations #=> Array
55248
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.destinations[0] #=> String
55249
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.source_ports #=> Array
55250
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
55251
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
55252
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.destination_ports #=> Array
55253
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
55254
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
55255
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.protocols #=> Array
55256
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
55257
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.rule_action #=> String
55258
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateless_rule.priority #=> Integer
55259
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.rule_group_arn #=> String
55260
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.sources #=> Array
55261
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.sources[0] #=> String
55262
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.destinations #=> Array
55263
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.destinations[0] #=> String
55264
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.source_ports #=> Array
55265
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
55266
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
55267
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.destination_ports #=> Array
55268
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
55269
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
55270
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.protocol #=> String
55271
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.rule_action #=> String
55272
+ # resp.network_insights_analysis.forward_path_components[0].explanations[0].firewall_stateful_rule.direction #=> String
54819
55273
  # resp.network_insights_analysis.forward_path_components[0].elastic_load_balancer_listener.id #=> String
54820
55274
  # resp.network_insights_analysis.forward_path_components[0].elastic_load_balancer_listener.arn #=> String
54821
55275
  # resp.network_insights_analysis.forward_path_components[0].elastic_load_balancer_listener.name #=> String
55276
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.rule_group_arn #=> String
55277
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.sources #=> Array
55278
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.sources[0] #=> String
55279
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.destinations #=> Array
55280
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.destinations[0] #=> String
55281
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.source_ports #=> Array
55282
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.source_ports[0].from #=> Integer
55283
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.source_ports[0].to #=> Integer
55284
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.destination_ports #=> Array
55285
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
55286
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
55287
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.protocols #=> Array
55288
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.protocols[0] #=> Integer
55289
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.rule_action #=> String
55290
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateless_rule.priority #=> Integer
55291
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.rule_group_arn #=> String
55292
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.sources #=> Array
55293
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.sources[0] #=> String
55294
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.destinations #=> Array
55295
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.destinations[0] #=> String
55296
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.source_ports #=> Array
55297
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.source_ports[0].from #=> Integer
55298
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.source_ports[0].to #=> Integer
55299
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.destination_ports #=> Array
55300
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
55301
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
55302
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.protocol #=> String
55303
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.rule_action #=> String
55304
+ # resp.network_insights_analysis.forward_path_components[0].firewall_stateful_rule.direction #=> String
55305
+ # resp.network_insights_analysis.forward_path_components[0].service_name #=> String
54822
55306
  # resp.network_insights_analysis.return_path_components #=> Array
54823
55307
  # resp.network_insights_analysis.return_path_components[0].sequence_number #=> Integer
54824
55308
  # resp.network_insights_analysis.return_path_components[0].acl_rule.cidr #=> String
@@ -54870,6 +55354,9 @@ module Aws::EC2
54870
55354
  # resp.network_insights_analysis.return_path_components[0].route_table_route.transit_gateway_id #=> String
54871
55355
  # resp.network_insights_analysis.return_path_components[0].route_table_route.vpc_peering_connection_id #=> String
54872
55356
  # resp.network_insights_analysis.return_path_components[0].route_table_route.state #=> String
55357
+ # resp.network_insights_analysis.return_path_components[0].route_table_route.carrier_gateway_id #=> String
55358
+ # resp.network_insights_analysis.return_path_components[0].route_table_route.core_network_arn #=> String
55359
+ # resp.network_insights_analysis.return_path_components[0].route_table_route.local_gateway_id #=> String
54873
55360
  # resp.network_insights_analysis.return_path_components[0].security_group_rule.cidr #=> String
54874
55361
  # resp.network_insights_analysis.return_path_components[0].security_group_rule.direction #=> String
54875
55362
  # resp.network_insights_analysis.return_path_components[0].security_group_rule.security_group_id #=> String
@@ -54891,6 +55378,27 @@ module Aws::EC2
54891
55378
  # resp.network_insights_analysis.return_path_components[0].additional_details[0].component.id #=> String
54892
55379
  # resp.network_insights_analysis.return_path_components[0].additional_details[0].component.arn #=> String
54893
55380
  # resp.network_insights_analysis.return_path_components[0].additional_details[0].component.name #=> String
55381
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].vpc_endpoint_service.id #=> String
55382
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].vpc_endpoint_service.arn #=> String
55383
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].vpc_endpoint_service.name #=> String
55384
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_options #=> Array
55385
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_options[0].keyword #=> String
55386
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_options[0].settings #=> Array
55387
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_options[0].settings[0] #=> String
55388
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_type_pairs #=> Array
55389
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_arn #=> String
55390
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_type_pairs[0].rule_group_type #=> String
55391
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_rule_options_pairs #=> Array
55392
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_group_arn #=> String
55393
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options #=> Array
55394
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].keyword #=> String
55395
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings #=> Array
55396
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].rule_group_rule_options_pairs[0].rule_options[0].settings[0] #=> String
55397
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].service_name #=> String
55398
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].load_balancers #=> Array
55399
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].load_balancers[0].id #=> String
55400
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].load_balancers[0].arn #=> String
55401
+ # resp.network_insights_analysis.return_path_components[0].additional_details[0].load_balancers[0].name #=> String
54894
55402
  # resp.network_insights_analysis.return_path_components[0].transit_gateway.id #=> String
54895
55403
  # resp.network_insights_analysis.return_path_components[0].transit_gateway.arn #=> String
54896
55404
  # resp.network_insights_analysis.return_path_components[0].transit_gateway.name #=> String
@@ -54994,6 +55502,9 @@ module Aws::EC2
54994
55502
  # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table_route.transit_gateway_id #=> String
54995
55503
  # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table_route.vpc_peering_connection_id #=> String
54996
55504
  # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table_route.state #=> String
55505
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table_route.carrier_gateway_id #=> String
55506
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table_route.core_network_arn #=> String
55507
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table_route.local_gateway_id #=> String
54997
55508
  # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table.id #=> String
54998
55509
  # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table.arn #=> String
54999
55510
  # resp.network_insights_analysis.return_path_components[0].explanations[0].route_table.name #=> String
@@ -55051,9 +55562,68 @@ module Aws::EC2
55051
55562
  # resp.network_insights_analysis.return_path_components[0].explanations[0].transit_gateway_attachment.name #=> String
55052
55563
  # resp.network_insights_analysis.return_path_components[0].explanations[0].component_account #=> String
55053
55564
  # resp.network_insights_analysis.return_path_components[0].explanations[0].component_region #=> String
55565
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.rule_group_arn #=> String
55566
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.sources #=> Array
55567
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.sources[0] #=> String
55568
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.destinations #=> Array
55569
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.destinations[0] #=> String
55570
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.source_ports #=> Array
55571
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
55572
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
55573
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.destination_ports #=> Array
55574
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
55575
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
55576
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.protocols #=> Array
55577
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
55578
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.rule_action #=> String
55579
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateless_rule.priority #=> Integer
55580
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.rule_group_arn #=> String
55581
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.sources #=> Array
55582
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.sources[0] #=> String
55583
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.destinations #=> Array
55584
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.destinations[0] #=> String
55585
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.source_ports #=> Array
55586
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
55587
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
55588
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.destination_ports #=> Array
55589
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
55590
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
55591
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.protocol #=> String
55592
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.rule_action #=> String
55593
+ # resp.network_insights_analysis.return_path_components[0].explanations[0].firewall_stateful_rule.direction #=> String
55054
55594
  # resp.network_insights_analysis.return_path_components[0].elastic_load_balancer_listener.id #=> String
55055
55595
  # resp.network_insights_analysis.return_path_components[0].elastic_load_balancer_listener.arn #=> String
55056
55596
  # resp.network_insights_analysis.return_path_components[0].elastic_load_balancer_listener.name #=> String
55597
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.rule_group_arn #=> String
55598
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.sources #=> Array
55599
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.sources[0] #=> String
55600
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.destinations #=> Array
55601
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.destinations[0] #=> String
55602
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.source_ports #=> Array
55603
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.source_ports[0].from #=> Integer
55604
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.source_ports[0].to #=> Integer
55605
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.destination_ports #=> Array
55606
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
55607
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
55608
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.protocols #=> Array
55609
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.protocols[0] #=> Integer
55610
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.rule_action #=> String
55611
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateless_rule.priority #=> Integer
55612
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.rule_group_arn #=> String
55613
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.sources #=> Array
55614
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.sources[0] #=> String
55615
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.destinations #=> Array
55616
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.destinations[0] #=> String
55617
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.source_ports #=> Array
55618
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.source_ports[0].from #=> Integer
55619
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.source_ports[0].to #=> Integer
55620
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.destination_ports #=> Array
55621
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
55622
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
55623
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.protocol #=> String
55624
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.rule_action #=> String
55625
+ # resp.network_insights_analysis.return_path_components[0].firewall_stateful_rule.direction #=> String
55626
+ # resp.network_insights_analysis.return_path_components[0].service_name #=> String
55057
55627
  # resp.network_insights_analysis.explanations #=> Array
55058
55628
  # resp.network_insights_analysis.explanations[0].acl.id #=> String
55059
55629
  # resp.network_insights_analysis.explanations[0].acl.arn #=> String
@@ -55147,6 +55717,9 @@ module Aws::EC2
55147
55717
  # resp.network_insights_analysis.explanations[0].route_table_route.transit_gateway_id #=> String
55148
55718
  # resp.network_insights_analysis.explanations[0].route_table_route.vpc_peering_connection_id #=> String
55149
55719
  # resp.network_insights_analysis.explanations[0].route_table_route.state #=> String
55720
+ # resp.network_insights_analysis.explanations[0].route_table_route.carrier_gateway_id #=> String
55721
+ # resp.network_insights_analysis.explanations[0].route_table_route.core_network_arn #=> String
55722
+ # resp.network_insights_analysis.explanations[0].route_table_route.local_gateway_id #=> String
55150
55723
  # resp.network_insights_analysis.explanations[0].route_table.id #=> String
55151
55724
  # resp.network_insights_analysis.explanations[0].route_table.arn #=> String
55152
55725
  # resp.network_insights_analysis.explanations[0].route_table.name #=> String
@@ -55204,6 +55777,35 @@ module Aws::EC2
55204
55777
  # resp.network_insights_analysis.explanations[0].transit_gateway_attachment.name #=> String
55205
55778
  # resp.network_insights_analysis.explanations[0].component_account #=> String
55206
55779
  # resp.network_insights_analysis.explanations[0].component_region #=> String
55780
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.rule_group_arn #=> String
55781
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.sources #=> Array
55782
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.sources[0] #=> String
55783
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.destinations #=> Array
55784
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.destinations[0] #=> String
55785
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.source_ports #=> Array
55786
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.source_ports[0].from #=> Integer
55787
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.source_ports[0].to #=> Integer
55788
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.destination_ports #=> Array
55789
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.destination_ports[0].from #=> Integer
55790
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.destination_ports[0].to #=> Integer
55791
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.protocols #=> Array
55792
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.protocols[0] #=> Integer
55793
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.rule_action #=> String
55794
+ # resp.network_insights_analysis.explanations[0].firewall_stateless_rule.priority #=> Integer
55795
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.rule_group_arn #=> String
55796
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.sources #=> Array
55797
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.sources[0] #=> String
55798
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.destinations #=> Array
55799
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.destinations[0] #=> String
55800
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.source_ports #=> Array
55801
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.source_ports[0].from #=> Integer
55802
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.source_ports[0].to #=> Integer
55803
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.destination_ports #=> Array
55804
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.destination_ports[0].from #=> Integer
55805
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.destination_ports[0].to #=> Integer
55806
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.protocol #=> String
55807
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.rule_action #=> String
55808
+ # resp.network_insights_analysis.explanations[0].firewall_stateful_rule.direction #=> String
55207
55809
  # resp.network_insights_analysis.alternate_path_hints #=> Array
55208
55810
  # resp.network_insights_analysis.alternate_path_hints[0].component_id #=> String
55209
55811
  # resp.network_insights_analysis.alternate_path_hints[0].component_arn #=> String
@@ -56108,7 +56710,7 @@ module Aws::EC2
56108
56710
  params: params,
56109
56711
  config: config)
56110
56712
  context[:gem_name] = 'aws-sdk-ec2'
56111
- context[:gem_version] = '1.369.0'
56713
+ context[:gem_version] = '1.371.0'
56112
56714
  Seahorse::Client::Request.new(handlers, context)
56113
56715
  end
56114
56716