aws-sdk-ec2 1.438.0 → 1.442.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -1484,6 +1484,7 @@ module Aws::EC2
1484
1484
  GetManagedPrefixListAssociationsResult = Shapes::StructureShape.new(name: 'GetManagedPrefixListAssociationsResult')
1485
1485
  GetManagedPrefixListEntriesRequest = Shapes::StructureShape.new(name: 'GetManagedPrefixListEntriesRequest')
1486
1486
  GetManagedPrefixListEntriesResult = Shapes::StructureShape.new(name: 'GetManagedPrefixListEntriesResult')
1487
+ GetNetworkInsightsAccessScopeAnalysisFindingsMaxResults = Shapes::IntegerShape.new(name: 'GetNetworkInsightsAccessScopeAnalysisFindingsMaxResults')
1487
1488
  GetNetworkInsightsAccessScopeAnalysisFindingsRequest = Shapes::StructureShape.new(name: 'GetNetworkInsightsAccessScopeAnalysisFindingsRequest')
1488
1489
  GetNetworkInsightsAccessScopeAnalysisFindingsResult = Shapes::StructureShape.new(name: 'GetNetworkInsightsAccessScopeAnalysisFindingsResult')
1489
1490
  GetNetworkInsightsAccessScopeContentRequest = Shapes::StructureShape.new(name: 'GetNetworkInsightsAccessScopeContentRequest')
@@ -4422,6 +4423,7 @@ module Aws::EC2
4422
4423
  CopyImageRequest.add_member(:destination_outpost_arn, Shapes::ShapeRef.new(shape: String, location_name: "DestinationOutpostArn"))
4423
4424
  CopyImageRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: Boolean, location_name: "dryRun"))
4424
4425
  CopyImageRequest.add_member(:copy_image_tags, Shapes::ShapeRef.new(shape: Boolean, location_name: "CopyImageTags"))
4426
+ CopyImageRequest.add_member(:tag_specifications, Shapes::ShapeRef.new(shape: TagSpecificationList, location_name: "TagSpecification"))
4425
4427
  CopyImageRequest.struct_class = Types::CopyImageRequest
4426
4428
 
4427
4429
  CopyImageResult.add_member(:image_id, Shapes::ShapeRef.new(shape: String, location_name: "imageId"))
@@ -9161,7 +9163,7 @@ module Aws::EC2
9161
9163
  GetManagedPrefixListEntriesResult.struct_class = Types::GetManagedPrefixListEntriesResult
9162
9164
 
9163
9165
  GetNetworkInsightsAccessScopeAnalysisFindingsRequest.add_member(:network_insights_access_scope_analysis_id, Shapes::ShapeRef.new(shape: NetworkInsightsAccessScopeAnalysisId, required: true, location_name: "NetworkInsightsAccessScopeAnalysisId"))
9164
- GetNetworkInsightsAccessScopeAnalysisFindingsRequest.add_member(:max_results, Shapes::ShapeRef.new(shape: NetworkInsightsMaxResults, location_name: "MaxResults"))
9166
+ GetNetworkInsightsAccessScopeAnalysisFindingsRequest.add_member(:max_results, Shapes::ShapeRef.new(shape: GetNetworkInsightsAccessScopeAnalysisFindingsMaxResults, location_name: "MaxResults"))
9165
9167
  GetNetworkInsightsAccessScopeAnalysisFindingsRequest.add_member(:next_token, Shapes::ShapeRef.new(shape: NextToken, location_name: "NextToken"))
9166
9168
  GetNetworkInsightsAccessScopeAnalysisFindingsRequest.add_member(:dry_run, Shapes::ShapeRef.new(shape: Boolean, location_name: "DryRun"))
9167
9169
  GetNetworkInsightsAccessScopeAnalysisFindingsRequest.struct_class = Types::GetNetworkInsightsAccessScopeAnalysisFindingsRequest
@@ -12815,6 +12817,7 @@ module Aws::EC2
12815
12817
  RegisterImageRequest.add_member(:tpm_support, Shapes::ShapeRef.new(shape: TpmSupportValues, location_name: "TpmSupport"))
12816
12818
  RegisterImageRequest.add_member(:uefi_data, Shapes::ShapeRef.new(shape: StringType, location_name: "UefiData"))
12817
12819
  RegisterImageRequest.add_member(:imds_support, Shapes::ShapeRef.new(shape: ImdsSupportValues, location_name: "ImdsSupport"))
12820
+ RegisterImageRequest.add_member(:tag_specifications, Shapes::ShapeRef.new(shape: TagSpecificationList, location_name: "TagSpecification"))
12818
12821
  RegisterImageRequest.struct_class = Types::RegisterImageRequest
12819
12822
 
12820
12823
  RegisterImageResult.add_member(:image_id, Shapes::ShapeRef.new(shape: String, location_name: "imageId"))
@@ -1244,11 +1244,11 @@ module Aws::EC2
1244
1244
  # The snapshot must be created on the same Outpost as the volume.
1245
1245
  #
1246
1246
  # For more information, see [Create local snapshots from volumes on an
1247
- # Outpost][1] in the *Amazon Elastic Compute Cloud User Guide*.
1247
+ # Outpost][1] in the *Amazon EBS User Guide*.
1248
1248
  #
1249
1249
  #
1250
1250
  #
1251
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#create-snapshot
1251
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#create-snapshot
1252
1252
  # @option options [required, String] :volume_id
1253
1253
  # The ID of the Amazon EBS volume.
1254
1254
  # @option options [Array<Types::TagSpecification>] :tag_specifications
@@ -1476,8 +1476,7 @@ module Aws::EC2
1476
1476
  # setting the encryption state to `true` depends on the volume origin
1477
1477
  # (new or from a snapshot), starting encryption state, ownership, and
1478
1478
  # whether encryption by default is enabled. For more information, see
1479
- # [Encryption by default][1] in the *Amazon Elastic Compute Cloud User
1480
- # Guide*.
1479
+ # [Encryption by default][1] in the *Amazon EBS User Guide*.
1481
1480
  #
1482
1481
  # Encrypted Amazon EBS volumes must be attached to instances that
1483
1482
  # support Amazon EBS encryption. For more information, see [Supported
@@ -1485,8 +1484,8 @@ module Aws::EC2
1485
1484
  #
1486
1485
  #
1487
1486
  #
1488
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
1489
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
1487
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/work-with-ebs-encr.html#encryption-by-default
1488
+ # [2]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption-requirements.html#ebs-encryption_supported_instances
1490
1489
  # @option options [Integer] :iops
1491
1490
  # The number of I/O operations per second (IOPS). For `gp3`, `io1`, and
1492
1491
  # `io2` volumes, this represents the number of IOPS that are provisioned
@@ -1573,13 +1572,13 @@ module Aws::EC2
1573
1572
  # be used as boot volumes.
1574
1573
  #
1575
1574
  # For more information, see [Amazon EBS volume types][1] in the *Amazon
1576
- # Elastic Compute Cloud User Guide*.
1575
+ # EBS User Guide*.
1577
1576
  #
1578
1577
  # Default: `gp2`
1579
1578
  #
1580
1579
  #
1581
1580
  #
1582
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumeTypes.html
1581
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volume-types.html
1583
1582
  # @option options [Boolean] :dry_run
1584
1583
  # Checks whether you have the required permissions for the action,
1585
1584
  # without actually making the request, and provides an error response.
@@ -1592,13 +1591,12 @@ module Aws::EC2
1592
1591
  # Multi-Attach, you can attach the volume to up to 16 [Instances built
1593
1592
  # on the Nitro System][1] in the same Availability Zone. This parameter
1594
1593
  # is supported with `io1` and `io2` volumes only. For more information,
1595
- # see [ Amazon EBS Multi-Attach][2] in the *Amazon Elastic Compute Cloud
1596
- # User Guide*.
1594
+ # see [ Amazon EBS Multi-Attach][2] in the *Amazon EBS User Guide*.
1597
1595
  #
1598
1596
  #
1599
1597
  #
1600
1598
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html#ec2-nitro-instances
1601
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volumes-multi.html
1599
+ # [2]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volumes-multi.html
1602
1600
  # @option options [Integer] :throughput
1603
1601
  # The throughput to provision for a volume, with a maximum of 1,000
1604
1602
  # MiB/s.
@@ -1902,6 +1900,17 @@ module Aws::EC2
1902
1900
  # tpm_support: "v2.0", # accepts v2.0
1903
1901
  # uefi_data: "StringType",
1904
1902
  # imds_support: "v2.0", # accepts v2.0
1903
+ # tag_specifications: [
1904
+ # {
1905
+ # resource_type: "capacity-reservation", # accepts capacity-reservation, client-vpn-endpoint, customer-gateway, carrier-gateway, coip-pool, dedicated-host, dhcp-options, egress-only-internet-gateway, elastic-ip, elastic-gpu, export-image-task, export-instance-task, fleet, fpga-image, host-reservation, image, import-image-task, import-snapshot-task, instance, instance-event-window, internet-gateway, ipam, ipam-pool, ipam-scope, ipv4pool-ec2, ipv6pool-ec2, key-pair, launch-template, local-gateway, local-gateway-route-table, local-gateway-virtual-interface, local-gateway-virtual-interface-group, local-gateway-route-table-vpc-association, local-gateway-route-table-virtual-interface-group-association, natgateway, network-acl, network-interface, network-insights-analysis, network-insights-path, network-insights-access-scope, network-insights-access-scope-analysis, placement-group, prefix-list, replace-root-volume-task, reserved-instances, route-table, security-group, security-group-rule, snapshot, spot-fleet-request, spot-instances-request, subnet, subnet-cidr-reservation, traffic-mirror-filter, traffic-mirror-session, traffic-mirror-target, transit-gateway, transit-gateway-attachment, transit-gateway-connect-peer, transit-gateway-multicast-domain, transit-gateway-policy-table, transit-gateway-route-table, transit-gateway-route-table-announcement, volume, vpc, vpc-endpoint, vpc-endpoint-connection, vpc-endpoint-service, vpc-endpoint-service-permission, vpc-peering-connection, vpn-connection, vpn-gateway, vpc-flow-log, capacity-reservation-fleet, traffic-mirror-filter-rule, vpc-endpoint-connection-device-type, verified-access-instance, verified-access-group, verified-access-endpoint, verified-access-policy, verified-access-trust-provider, vpn-connection-device-type, vpc-block-public-access-exclusion, ipam-resource-discovery, ipam-resource-discovery-association, instance-connect-endpoint
1906
+ # tags: [
1907
+ # {
1908
+ # key: "String",
1909
+ # value: "String",
1910
+ # },
1911
+ # ],
1912
+ # },
1913
+ # ],
1905
1914
  # })
1906
1915
  # @param [Hash] options ({})
1907
1916
  # @option options [String] :image_location
@@ -1928,11 +1937,11 @@ module Aws::EC2
1928
1937
  # on the same Outpost or in the Region of that Outpost. AMIs on an
1929
1938
  # Outpost that include local snapshots can be used to launch instances
1930
1939
  # on the same Outpost only. For more information, [Amazon EBS local
1931
- # snapshots on Outposts][1] in the *Amazon EC2 User Guide*.
1940
+ # snapshots on Outposts][1] in the *Amazon EBS User Guide*.
1932
1941
  #
1933
1942
  #
1934
1943
  #
1935
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#ami
1944
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#ami
1936
1945
  # @option options [String] :description
1937
1946
  # A description for your AMI.
1938
1947
  # @option options [Boolean] :dry_run
@@ -2036,6 +2045,17 @@ module Aws::EC2
2036
2045
  #
2037
2046
  #
2038
2047
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/configuring-IMDS-new-instances.html#configure-IMDS-new-instances-ami-configuration
2048
+ # @option options [Array<Types::TagSpecification>] :tag_specifications
2049
+ # The tags to apply to the AMI.
2050
+ #
2051
+ # To tag the AMI, the value for `ResourceType` must be `image`. If you
2052
+ # specify another value for `ResourceType`, the request fails.
2053
+ #
2054
+ # To tag an AMI after it has been registered, see [CreateTags][1].
2055
+ #
2056
+ #
2057
+ #
2058
+ # [1]: https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_CreateTags.html
2039
2059
  # @return [Image]
2040
2060
  def register_image(options = {})
2041
2061
  resp = Aws::Plugins::UserAgent.feature('resource') do
@@ -280,25 +280,21 @@ module Aws::EC2
280
280
  # If you have the required permissions, the error response is
281
281
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
282
282
  # @option options [Array<Types::IpPermission>] :ip_permissions
283
- # The sets of IP permissions. You can't specify a destination security
284
- # group and a CIDR IP address range in the same set of permissions.
283
+ # The permissions for the security group rules.
285
284
  # @option options [Array<Types::TagSpecification>] :tag_specifications
286
285
  # The tags applied to the security group rule.
287
286
  # @option options [String] :cidr_ip
288
- # Not supported. Use a set of IP permissions to specify the CIDR.
287
+ # Not supported. Use IP permissions instead.
289
288
  # @option options [Integer] :from_port
290
- # Not supported. Use a set of IP permissions to specify the port.
289
+ # Not supported. Use IP permissions instead.
291
290
  # @option options [String] :ip_protocol
292
- # Not supported. Use a set of IP permissions to specify the protocol
293
- # name or number.
291
+ # Not supported. Use IP permissions instead.
294
292
  # @option options [Integer] :to_port
295
- # Not supported. Use a set of IP permissions to specify the port.
293
+ # Not supported. Use IP permissions instead.
296
294
  # @option options [String] :source_security_group_name
297
- # Not supported. Use a set of IP permissions to specify a destination
298
- # security group.
295
+ # Not supported. Use IP permissions instead.
299
296
  # @option options [String] :source_security_group_owner_id
300
- # Not supported. Use a set of IP permissions to specify a destination
301
- # security group.
297
+ # Not supported. Use IP permissions instead.
302
298
  # @return [Types::AuthorizeSecurityGroupEgressResult]
303
299
  def authorize_egress(options = {})
304
300
  options = options.merge(group_id: @id)
@@ -369,73 +365,68 @@ module Aws::EC2
369
365
  # })
370
366
  # @param [Hash] options ({})
371
367
  # @option options [String] :cidr_ip
372
- # The IPv4 address range, in CIDR format. You can't specify this
373
- # parameter when specifying a source security group. To specify an IPv6
374
- # address range, use a set of IP permissions.
368
+ # The IPv4 address range, in CIDR format.
369
+ #
370
+ # To specify an IPv6 address range, use IP permissions instead.
375
371
  #
376
- # Alternatively, use a set of IP permissions to specify multiple rules
377
- # and a description for the rule.
372
+ # To specify multiple rules and descriptions for the rules, use IP
373
+ # permissions instead.
378
374
  # @option options [Integer] :from_port
379
375
  # If the protocol is TCP or UDP, this is the start of the port range. If
380
- # the protocol is ICMP, this is the type number. A value of -1 indicates
381
- # all ICMP types. If you specify all ICMP types, you must specify all
382
- # ICMP codes.
376
+ # the protocol is ICMP, this is the ICMP type or -1 (all ICMP types).
383
377
  #
384
- # Alternatively, use a set of IP permissions to specify multiple rules
385
- # and a description for the rule.
378
+ # To specify multiple rules and descriptions for the rules, use IP
379
+ # permissions instead.
386
380
  # @option options [String] :group_name
387
- # \[Default VPC\] The name of the security group. You must specify
388
- # either the security group ID or the security group name in the
389
- # request. For security groups in a nondefault VPC, you must specify the
390
- # security group ID.
381
+ # \[Default VPC\] The name of the security group. For security groups
382
+ # for a default VPC you can specify either the ID or the name of the
383
+ # security group. For security groups for a nondefault VPC, you must
384
+ # specify the ID of the security group.
391
385
  # @option options [Array<Types::IpPermission>] :ip_permissions
392
- # The sets of IP permissions.
386
+ # The permissions for the security group rules.
393
387
  # @option options [String] :ip_protocol
394
388
  # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
395
- # Numbers][1]). To specify `icmpv6`, use a set of IP permissions.
389
+ # Numbers][1]). To specify all protocols, use `-1`.
396
390
  #
397
- # Use `-1` to specify all protocols. If you specify `-1` or a protocol
398
- # other than `tcp`, `udp`, or `icmp`, traffic on all ports is allowed,
399
- # regardless of any ports you specify.
391
+ # To specify `icmpv6`, use IP permissions instead.
400
392
  #
401
- # Alternatively, use a set of IP permissions to specify multiple rules
402
- # and a description for the rule.
393
+ # If you specify a protocol other than one of the supported values,
394
+ # traffic is allowed on all ports, regardless of any ports that you
395
+ # specify.
396
+ #
397
+ # To specify multiple rules and descriptions for the rules, use IP
398
+ # permissions instead.
403
399
  #
404
400
  #
405
401
  #
406
402
  # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
407
403
  # @option options [String] :source_security_group_name
408
- # \[Default VPC\] The name of the source security group. You can't
409
- # specify this parameter in combination with the following parameters:
410
- # the CIDR IP address range, the start of the port range, the IP
411
- # protocol, and the end of the port range. Creates rules that grant full
412
- # ICMP, UDP, and TCP access. To create a rule with a specific IP
413
- # protocol and port range, use a set of IP permissions instead. The
414
- # source security group must be in the same VPC.
415
- # @option options [String] :source_security_group_owner_id
416
- # \[Nondefault VPC\] The Amazon Web Services account ID for the source
417
- # security group, if the source security group is in a different
418
- # account. You can't specify this parameter in combination with the
419
- # following parameters: the CIDR IP address range, the IP protocol, the
420
- # start of the port range, and the end of the port range. Creates rules
421
- # that grant full ICMP, UDP, and TCP access. To create a rule with a
422
- # specific IP protocol and port range, use a set of IP permissions
404
+ # \[Default VPC\] The name of the source security group.
405
+ #
406
+ # The rule grants full ICMP, UDP, and TCP access. To create a rule with
407
+ # a specific protocol and port range, specify a set of IP permissions
423
408
  # instead.
409
+ # @option options [String] :source_security_group_owner_id
410
+ # The Amazon Web Services account ID for the source security group, if
411
+ # the source security group is in a different account.
412
+ #
413
+ # The rule grants full ICMP, UDP, and TCP access. To create a rule with
414
+ # a specific protocol and port range, use IP permissions instead.
424
415
  # @option options [Integer] :to_port
425
416
  # If the protocol is TCP or UDP, this is the end of the port range. If
426
- # the protocol is ICMP, this is the code. A value of -1 indicates all
427
- # ICMP codes. If you specify all ICMP types, you must specify all ICMP
428
- # codes.
417
+ # the protocol is ICMP, this is the ICMP code or -1 (all ICMP codes). If
418
+ # the start port is -1 (all ICMP types), then the end port must be -1
419
+ # (all ICMP codes).
429
420
  #
430
- # Alternatively, use a set of IP permissions to specify multiple rules
431
- # and a description for the rule.
421
+ # To specify multiple rules and descriptions for the rules, use IP
422
+ # permissions instead.
432
423
  # @option options [Boolean] :dry_run
433
424
  # Checks whether you have the required permissions for the action,
434
425
  # without actually making the request, and provides an error response.
435
426
  # If you have the required permissions, the error response is
436
427
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
437
428
  # @option options [Array<Types::TagSpecification>] :tag_specifications
438
- # \[VPC Only\] The tags applied to the security group rule.
429
+ # The tags applied to the security group rule.
439
430
  # @return [Types::AuthorizeSecurityGroupIngressResult]
440
431
  def authorize_ingress(options = {})
441
432
  options = options.merge(group_id: @id)
@@ -694,8 +685,7 @@ module Aws::EC2
694
685
  # specifying a source security group.
695
686
  # @option options [Integer] :from_port
696
687
  # If the protocol is TCP or UDP, this is the start of the port range. If
697
- # the protocol is ICMP, this is the type number. A value of -1 indicates
698
- # all ICMP types.
688
+ # the protocol is ICMP, this is the ICMP type or -1 (all ICMP types).
699
689
  # @option options [String] :group_name
700
690
  # \[Default VPC\] The name of the security group. You must specify
701
691
  # either the security group ID or the security group name in the
@@ -722,8 +712,7 @@ module Aws::EC2
722
712
  # Not supported.
723
713
  # @option options [Integer] :to_port
724
714
  # If the protocol is TCP or UDP, this is the end of the port range. If
725
- # the protocol is ICMP, this is the code. A value of -1 indicates all
726
- # ICMP codes.
715
+ # the protocol is ICMP, this is the ICMP code or -1 (all ICMP codes).
727
716
  # @option options [Boolean] :dry_run
728
717
  # Checks whether you have the required permissions for the action,
729
718
  # without actually making the request, and provides an error response.
@@ -125,11 +125,11 @@ module Aws::EC2
125
125
 
126
126
  # The ARN of the Outpost on which the snapshot is stored. For more
127
127
  # information, see [Amazon EBS local snapshots on Outposts][1] in the
128
- # *Amazon Elastic Compute Cloud User Guide*.
128
+ # *Amazon EBS User Guide*.
129
129
  #
130
130
  #
131
131
  #
132
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html
132
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html
133
133
  # @return [String]
134
134
  def outpost_arn
135
135
  data[:outpost_arn]
@@ -357,12 +357,11 @@ module Aws::EC2
357
357
  # Outpost.
358
358
  #
359
359
  # For more information, see [ Copy snapshots from an Amazon Web Services
360
- # Region to an Outpost][1] in the *Amazon Elastic Compute Cloud User
361
- # Guide*.
360
+ # Region to an Outpost][1] in the *Amazon EBS User Guide*.
362
361
  #
363
362
  #
364
363
  #
365
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#copy-snapshots
364
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#copy-snapshots
366
365
  # @option options [String] :destination_region
367
366
  # The destination Region to use in the `PresignedUrl` parameter of a
368
367
  # snapshot copy operation. This parameter is only valid for specifying
@@ -379,11 +378,11 @@ module Aws::EC2
379
378
  # omit this parameter. Encrypted snapshots are encrypted, even if you
380
379
  # omit this parameter and encryption by default is not enabled. You
381
380
  # cannot set this parameter to false. For more information, see [Amazon
382
- # EBS encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
381
+ # EBS encryption][1] in the *Amazon EBS User Guide*.
383
382
  #
384
383
  #
385
384
  #
386
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
385
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption.html
387
386
  # @option options [String] :kms_key_id
388
387
  # The identifier of the Key Management Service (KMS) KMS key to use for
389
388
  # Amazon EBS encryption. If this parameter is not specified, your KMS
@@ -78,10 +78,10 @@ module Aws::EC2
78
78
  # Indicates whether instances launched in this subnet receive a public
79
79
  # IPv4 address.
80
80
  #
81
- # Starting on February 1, 2024, Amazon Web Services will charge for all
82
- # public IPv4 addresses, including public IPv4 addresses associated with
83
- # running instances and Elastic IP addresses. For more information, see
84
- # the *Public IPv4 Address* tab on the [Amazon VPC pricing page][1].
81
+ # Amazon Web Services charges for all public IPv4 addresses, including
82
+ # public IPv4 addresses associated with running instances and Elastic IP
83
+ # addresses. For more information, see the *Public IPv4 Address* tab on
84
+ # the [Amazon VPC pricing page][1].
85
85
  #
86
86
  #
87
87
  #