aws-sdk-ec2 1.441.0 → 1.442.0

Sign up to get free protection for your applications and to get access to all the features.
@@ -1244,11 +1244,11 @@ module Aws::EC2
1244
1244
  # The snapshot must be created on the same Outpost as the volume.
1245
1245
  #
1246
1246
  # For more information, see [Create local snapshots from volumes on an
1247
- # Outpost][1] in the *Amazon Elastic Compute Cloud User Guide*.
1247
+ # Outpost][1] in the *Amazon EBS User Guide*.
1248
1248
  #
1249
1249
  #
1250
1250
  #
1251
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#create-snapshot
1251
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#create-snapshot
1252
1252
  # @option options [required, String] :volume_id
1253
1253
  # The ID of the Amazon EBS volume.
1254
1254
  # @option options [Array<Types::TagSpecification>] :tag_specifications
@@ -1476,8 +1476,7 @@ module Aws::EC2
1476
1476
  # setting the encryption state to `true` depends on the volume origin
1477
1477
  # (new or from a snapshot), starting encryption state, ownership, and
1478
1478
  # whether encryption by default is enabled. For more information, see
1479
- # [Encryption by default][1] in the *Amazon Elastic Compute Cloud User
1480
- # Guide*.
1479
+ # [Encryption by default][1] in the *Amazon EBS User Guide*.
1481
1480
  #
1482
1481
  # Encrypted Amazon EBS volumes must be attached to instances that
1483
1482
  # support Amazon EBS encryption. For more information, see [Supported
@@ -1485,8 +1484,8 @@ module Aws::EC2
1485
1484
  #
1486
1485
  #
1487
1486
  #
1488
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
1489
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
1487
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/work-with-ebs-encr.html#encryption-by-default
1488
+ # [2]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption-requirements.html#ebs-encryption_supported_instances
1490
1489
  # @option options [Integer] :iops
1491
1490
  # The number of I/O operations per second (IOPS). For `gp3`, `io1`, and
1492
1491
  # `io2` volumes, this represents the number of IOPS that are provisioned
@@ -1573,13 +1572,13 @@ module Aws::EC2
1573
1572
  # be used as boot volumes.
1574
1573
  #
1575
1574
  # For more information, see [Amazon EBS volume types][1] in the *Amazon
1576
- # Elastic Compute Cloud User Guide*.
1575
+ # EBS User Guide*.
1577
1576
  #
1578
1577
  # Default: `gp2`
1579
1578
  #
1580
1579
  #
1581
1580
  #
1582
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumeTypes.html
1581
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volume-types.html
1583
1582
  # @option options [Boolean] :dry_run
1584
1583
  # Checks whether you have the required permissions for the action,
1585
1584
  # without actually making the request, and provides an error response.
@@ -1592,13 +1591,12 @@ module Aws::EC2
1592
1591
  # Multi-Attach, you can attach the volume to up to 16 [Instances built
1593
1592
  # on the Nitro System][1] in the same Availability Zone. This parameter
1594
1593
  # is supported with `io1` and `io2` volumes only. For more information,
1595
- # see [ Amazon EBS Multi-Attach][2] in the *Amazon Elastic Compute Cloud
1596
- # User Guide*.
1594
+ # see [ Amazon EBS Multi-Attach][2] in the *Amazon EBS User Guide*.
1597
1595
  #
1598
1596
  #
1599
1597
  #
1600
1598
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html#ec2-nitro-instances
1601
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volumes-multi.html
1599
+ # [2]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volumes-multi.html
1602
1600
  # @option options [Integer] :throughput
1603
1601
  # The throughput to provision for a volume, with a maximum of 1,000
1604
1602
  # MiB/s.
@@ -1939,11 +1937,11 @@ module Aws::EC2
1939
1937
  # on the same Outpost or in the Region of that Outpost. AMIs on an
1940
1938
  # Outpost that include local snapshots can be used to launch instances
1941
1939
  # on the same Outpost only. For more information, [Amazon EBS local
1942
- # snapshots on Outposts][1] in the *Amazon EC2 User Guide*.
1940
+ # snapshots on Outposts][1] in the *Amazon EBS User Guide*.
1943
1941
  #
1944
1942
  #
1945
1943
  #
1946
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#ami
1944
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#ami
1947
1945
  # @option options [String] :description
1948
1946
  # A description for your AMI.
1949
1947
  # @option options [Boolean] :dry_run
@@ -280,25 +280,21 @@ module Aws::EC2
280
280
  # If you have the required permissions, the error response is
281
281
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
282
282
  # @option options [Array<Types::IpPermission>] :ip_permissions
283
- # The sets of IP permissions. You can't specify a destination security
284
- # group and a CIDR IP address range in the same set of permissions.
283
+ # The permissions for the security group rules.
285
284
  # @option options [Array<Types::TagSpecification>] :tag_specifications
286
285
  # The tags applied to the security group rule.
287
286
  # @option options [String] :cidr_ip
288
- # Not supported. Use a set of IP permissions to specify the CIDR.
287
+ # Not supported. Use IP permissions instead.
289
288
  # @option options [Integer] :from_port
290
- # Not supported. Use a set of IP permissions to specify the port.
289
+ # Not supported. Use IP permissions instead.
291
290
  # @option options [String] :ip_protocol
292
- # Not supported. Use a set of IP permissions to specify the protocol
293
- # name or number.
291
+ # Not supported. Use IP permissions instead.
294
292
  # @option options [Integer] :to_port
295
- # Not supported. Use a set of IP permissions to specify the port.
293
+ # Not supported. Use IP permissions instead.
296
294
  # @option options [String] :source_security_group_name
297
- # Not supported. Use a set of IP permissions to specify a destination
298
- # security group.
295
+ # Not supported. Use IP permissions instead.
299
296
  # @option options [String] :source_security_group_owner_id
300
- # Not supported. Use a set of IP permissions to specify a destination
301
- # security group.
297
+ # Not supported. Use IP permissions instead.
302
298
  # @return [Types::AuthorizeSecurityGroupEgressResult]
303
299
  def authorize_egress(options = {})
304
300
  options = options.merge(group_id: @id)
@@ -369,73 +365,68 @@ module Aws::EC2
369
365
  # })
370
366
  # @param [Hash] options ({})
371
367
  # @option options [String] :cidr_ip
372
- # The IPv4 address range, in CIDR format. You can't specify this
373
- # parameter when specifying a source security group. To specify an IPv6
374
- # address range, use a set of IP permissions.
368
+ # The IPv4 address range, in CIDR format.
369
+ #
370
+ # To specify an IPv6 address range, use IP permissions instead.
375
371
  #
376
- # Alternatively, use a set of IP permissions to specify multiple rules
377
- # and a description for the rule.
372
+ # To specify multiple rules and descriptions for the rules, use IP
373
+ # permissions instead.
378
374
  # @option options [Integer] :from_port
379
375
  # If the protocol is TCP or UDP, this is the start of the port range. If
380
- # the protocol is ICMP, this is the type number. A value of -1 indicates
381
- # all ICMP types. If you specify all ICMP types, you must specify all
382
- # ICMP codes.
376
+ # the protocol is ICMP, this is the ICMP type or -1 (all ICMP types).
383
377
  #
384
- # Alternatively, use a set of IP permissions to specify multiple rules
385
- # and a description for the rule.
378
+ # To specify multiple rules and descriptions for the rules, use IP
379
+ # permissions instead.
386
380
  # @option options [String] :group_name
387
- # \[Default VPC\] The name of the security group. You must specify
388
- # either the security group ID or the security group name in the
389
- # request. For security groups in a nondefault VPC, you must specify the
390
- # security group ID.
381
+ # \[Default VPC\] The name of the security group. For security groups
382
+ # for a default VPC you can specify either the ID or the name of the
383
+ # security group. For security groups for a nondefault VPC, you must
384
+ # specify the ID of the security group.
391
385
  # @option options [Array<Types::IpPermission>] :ip_permissions
392
- # The sets of IP permissions.
386
+ # The permissions for the security group rules.
393
387
  # @option options [String] :ip_protocol
394
388
  # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
395
- # Numbers][1]). To specify `icmpv6`, use a set of IP permissions.
389
+ # Numbers][1]). To specify all protocols, use `-1`.
396
390
  #
397
- # Use `-1` to specify all protocols. If you specify `-1` or a protocol
398
- # other than `tcp`, `udp`, or `icmp`, traffic on all ports is allowed,
399
- # regardless of any ports you specify.
391
+ # To specify `icmpv6`, use IP permissions instead.
400
392
  #
401
- # Alternatively, use a set of IP permissions to specify multiple rules
402
- # and a description for the rule.
393
+ # If you specify a protocol other than one of the supported values,
394
+ # traffic is allowed on all ports, regardless of any ports that you
395
+ # specify.
396
+ #
397
+ # To specify multiple rules and descriptions for the rules, use IP
398
+ # permissions instead.
403
399
  #
404
400
  #
405
401
  #
406
402
  # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
407
403
  # @option options [String] :source_security_group_name
408
- # \[Default VPC\] The name of the source security group. You can't
409
- # specify this parameter in combination with the following parameters:
410
- # the CIDR IP address range, the start of the port range, the IP
411
- # protocol, and the end of the port range. Creates rules that grant full
412
- # ICMP, UDP, and TCP access. To create a rule with a specific IP
413
- # protocol and port range, use a set of IP permissions instead. The
414
- # source security group must be in the same VPC.
415
- # @option options [String] :source_security_group_owner_id
416
- # \[Nondefault VPC\] The Amazon Web Services account ID for the source
417
- # security group, if the source security group is in a different
418
- # account. You can't specify this parameter in combination with the
419
- # following parameters: the CIDR IP address range, the IP protocol, the
420
- # start of the port range, and the end of the port range. Creates rules
421
- # that grant full ICMP, UDP, and TCP access. To create a rule with a
422
- # specific IP protocol and port range, use a set of IP permissions
404
+ # \[Default VPC\] The name of the source security group.
405
+ #
406
+ # The rule grants full ICMP, UDP, and TCP access. To create a rule with
407
+ # a specific protocol and port range, specify a set of IP permissions
423
408
  # instead.
409
+ # @option options [String] :source_security_group_owner_id
410
+ # The Amazon Web Services account ID for the source security group, if
411
+ # the source security group is in a different account.
412
+ #
413
+ # The rule grants full ICMP, UDP, and TCP access. To create a rule with
414
+ # a specific protocol and port range, use IP permissions instead.
424
415
  # @option options [Integer] :to_port
425
416
  # If the protocol is TCP or UDP, this is the end of the port range. If
426
- # the protocol is ICMP, this is the code. A value of -1 indicates all
427
- # ICMP codes. If you specify all ICMP types, you must specify all ICMP
428
- # codes.
417
+ # the protocol is ICMP, this is the ICMP code or -1 (all ICMP codes). If
418
+ # the start port is -1 (all ICMP types), then the end port must be -1
419
+ # (all ICMP codes).
429
420
  #
430
- # Alternatively, use a set of IP permissions to specify multiple rules
431
- # and a description for the rule.
421
+ # To specify multiple rules and descriptions for the rules, use IP
422
+ # permissions instead.
432
423
  # @option options [Boolean] :dry_run
433
424
  # Checks whether you have the required permissions for the action,
434
425
  # without actually making the request, and provides an error response.
435
426
  # If you have the required permissions, the error response is
436
427
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
437
428
  # @option options [Array<Types::TagSpecification>] :tag_specifications
438
- # \[VPC Only\] The tags applied to the security group rule.
429
+ # The tags applied to the security group rule.
439
430
  # @return [Types::AuthorizeSecurityGroupIngressResult]
440
431
  def authorize_ingress(options = {})
441
432
  options = options.merge(group_id: @id)
@@ -694,8 +685,7 @@ module Aws::EC2
694
685
  # specifying a source security group.
695
686
  # @option options [Integer] :from_port
696
687
  # If the protocol is TCP or UDP, this is the start of the port range. If
697
- # the protocol is ICMP, this is the type number. A value of -1 indicates
698
- # all ICMP types.
688
+ # the protocol is ICMP, this is the ICMP type or -1 (all ICMP types).
699
689
  # @option options [String] :group_name
700
690
  # \[Default VPC\] The name of the security group. You must specify
701
691
  # either the security group ID or the security group name in the
@@ -722,8 +712,7 @@ module Aws::EC2
722
712
  # Not supported.
723
713
  # @option options [Integer] :to_port
724
714
  # If the protocol is TCP or UDP, this is the end of the port range. If
725
- # the protocol is ICMP, this is the code. A value of -1 indicates all
726
- # ICMP codes.
715
+ # the protocol is ICMP, this is the ICMP code or -1 (all ICMP codes).
727
716
  # @option options [Boolean] :dry_run
728
717
  # Checks whether you have the required permissions for the action,
729
718
  # without actually making the request, and provides an error response.
@@ -125,11 +125,11 @@ module Aws::EC2
125
125
 
126
126
  # The ARN of the Outpost on which the snapshot is stored. For more
127
127
  # information, see [Amazon EBS local snapshots on Outposts][1] in the
128
- # *Amazon Elastic Compute Cloud User Guide*.
128
+ # *Amazon EBS User Guide*.
129
129
  #
130
130
  #
131
131
  #
132
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html
132
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html
133
133
  # @return [String]
134
134
  def outpost_arn
135
135
  data[:outpost_arn]
@@ -357,12 +357,11 @@ module Aws::EC2
357
357
  # Outpost.
358
358
  #
359
359
  # For more information, see [ Copy snapshots from an Amazon Web Services
360
- # Region to an Outpost][1] in the *Amazon Elastic Compute Cloud User
361
- # Guide*.
360
+ # Region to an Outpost][1] in the *Amazon EBS User Guide*.
362
361
  #
363
362
  #
364
363
  #
365
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#copy-snapshots
364
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#copy-snapshots
366
365
  # @option options [String] :destination_region
367
366
  # The destination Region to use in the `PresignedUrl` parameter of a
368
367
  # snapshot copy operation. This parameter is only valid for specifying
@@ -379,11 +378,11 @@ module Aws::EC2
379
378
  # omit this parameter. Encrypted snapshots are encrypted, even if you
380
379
  # omit this parameter and encryption by default is not enabled. You
381
380
  # cannot set this parameter to false. For more information, see [Amazon
382
- # EBS encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
381
+ # EBS encryption][1] in the *Amazon EBS User Guide*.
383
382
  #
384
383
  #
385
384
  #
386
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
385
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption.html
387
386
  # @option options [String] :kms_key_id
388
387
  # The identifier of the Key Management Service (KMS) KMS key to use for
389
388
  # Amazon EBS encryption. If this parameter is not specified, your KMS
@@ -78,10 +78,10 @@ module Aws::EC2
78
78
  # Indicates whether instances launched in this subnet receive a public
79
79
  # IPv4 address.
80
80
  #
81
- # Starting on February 1, 2024, Amazon Web Services will charge for all
82
- # public IPv4 addresses, including public IPv4 addresses associated with
83
- # running instances and Elastic IP addresses. For more information, see
84
- # the *Public IPv4 Address* tab on the [Amazon VPC pricing page][1].
81
+ # Amazon Web Services charges for all public IPv4 addresses, including
82
+ # public IPv4 addresses associated with running instances and Elastic IP
83
+ # addresses. For more information, see the *Public IPv4 Address* tab on
84
+ # the [Amazon VPC pricing page][1].
85
85
  #
86
86
  #
87
87
  #