aws-sdk-ec2 1.441.0 → 1.442.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -1244,11 +1244,11 @@ module Aws::EC2
1244
1244
  # The snapshot must be created on the same Outpost as the volume.
1245
1245
  #
1246
1246
  # For more information, see [Create local snapshots from volumes on an
1247
- # Outpost][1] in the *Amazon Elastic Compute Cloud User Guide*.
1247
+ # Outpost][1] in the *Amazon EBS User Guide*.
1248
1248
  #
1249
1249
  #
1250
1250
  #
1251
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#create-snapshot
1251
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#create-snapshot
1252
1252
  # @option options [required, String] :volume_id
1253
1253
  # The ID of the Amazon EBS volume.
1254
1254
  # @option options [Array<Types::TagSpecification>] :tag_specifications
@@ -1476,8 +1476,7 @@ module Aws::EC2
1476
1476
  # setting the encryption state to `true` depends on the volume origin
1477
1477
  # (new or from a snapshot), starting encryption state, ownership, and
1478
1478
  # whether encryption by default is enabled. For more information, see
1479
- # [Encryption by default][1] in the *Amazon Elastic Compute Cloud User
1480
- # Guide*.
1479
+ # [Encryption by default][1] in the *Amazon EBS User Guide*.
1481
1480
  #
1482
1481
  # Encrypted Amazon EBS volumes must be attached to instances that
1483
1482
  # support Amazon EBS encryption. For more information, see [Supported
@@ -1485,8 +1484,8 @@ module Aws::EC2
1485
1484
  #
1486
1485
  #
1487
1486
  #
1488
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#encryption-by-default
1489
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html#EBSEncryption_supported_instances
1487
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/work-with-ebs-encr.html#encryption-by-default
1488
+ # [2]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption-requirements.html#ebs-encryption_supported_instances
1490
1489
  # @option options [Integer] :iops
1491
1490
  # The number of I/O operations per second (IOPS). For `gp3`, `io1`, and
1492
1491
  # `io2` volumes, this represents the number of IOPS that are provisioned
@@ -1573,13 +1572,13 @@ module Aws::EC2
1573
1572
  # be used as boot volumes.
1574
1573
  #
1575
1574
  # For more information, see [Amazon EBS volume types][1] in the *Amazon
1576
- # Elastic Compute Cloud User Guide*.
1575
+ # EBS User Guide*.
1577
1576
  #
1578
1577
  # Default: `gp2`
1579
1578
  #
1580
1579
  #
1581
1580
  #
1582
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSVolumeTypes.html
1581
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volume-types.html
1583
1582
  # @option options [Boolean] :dry_run
1584
1583
  # Checks whether you have the required permissions for the action,
1585
1584
  # without actually making the request, and provides an error response.
@@ -1592,13 +1591,12 @@ module Aws::EC2
1592
1591
  # Multi-Attach, you can attach the volume to up to 16 [Instances built
1593
1592
  # on the Nitro System][1] in the same Availability Zone. This parameter
1594
1593
  # is supported with `io1` and `io2` volumes only. For more information,
1595
- # see [ Amazon EBS Multi-Attach][2] in the *Amazon Elastic Compute Cloud
1596
- # User Guide*.
1594
+ # see [ Amazon EBS Multi-Attach][2] in the *Amazon EBS User Guide*.
1597
1595
  #
1598
1596
  #
1599
1597
  #
1600
1598
  # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html#ec2-nitro-instances
1601
- # [2]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-volumes-multi.html
1599
+ # [2]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volumes-multi.html
1602
1600
  # @option options [Integer] :throughput
1603
1601
  # The throughput to provision for a volume, with a maximum of 1,000
1604
1602
  # MiB/s.
@@ -1939,11 +1937,11 @@ module Aws::EC2
1939
1937
  # on the same Outpost or in the Region of that Outpost. AMIs on an
1940
1938
  # Outpost that include local snapshots can be used to launch instances
1941
1939
  # on the same Outpost only. For more information, [Amazon EBS local
1942
- # snapshots on Outposts][1] in the *Amazon EC2 User Guide*.
1940
+ # snapshots on Outposts][1] in the *Amazon EBS User Guide*.
1943
1941
  #
1944
1942
  #
1945
1943
  #
1946
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#ami
1944
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#ami
1947
1945
  # @option options [String] :description
1948
1946
  # A description for your AMI.
1949
1947
  # @option options [Boolean] :dry_run
@@ -280,25 +280,21 @@ module Aws::EC2
280
280
  # If you have the required permissions, the error response is
281
281
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
282
282
  # @option options [Array<Types::IpPermission>] :ip_permissions
283
- # The sets of IP permissions. You can't specify a destination security
284
- # group and a CIDR IP address range in the same set of permissions.
283
+ # The permissions for the security group rules.
285
284
  # @option options [Array<Types::TagSpecification>] :tag_specifications
286
285
  # The tags applied to the security group rule.
287
286
  # @option options [String] :cidr_ip
288
- # Not supported. Use a set of IP permissions to specify the CIDR.
287
+ # Not supported. Use IP permissions instead.
289
288
  # @option options [Integer] :from_port
290
- # Not supported. Use a set of IP permissions to specify the port.
289
+ # Not supported. Use IP permissions instead.
291
290
  # @option options [String] :ip_protocol
292
- # Not supported. Use a set of IP permissions to specify the protocol
293
- # name or number.
291
+ # Not supported. Use IP permissions instead.
294
292
  # @option options [Integer] :to_port
295
- # Not supported. Use a set of IP permissions to specify the port.
293
+ # Not supported. Use IP permissions instead.
296
294
  # @option options [String] :source_security_group_name
297
- # Not supported. Use a set of IP permissions to specify a destination
298
- # security group.
295
+ # Not supported. Use IP permissions instead.
299
296
  # @option options [String] :source_security_group_owner_id
300
- # Not supported. Use a set of IP permissions to specify a destination
301
- # security group.
297
+ # Not supported. Use IP permissions instead.
302
298
  # @return [Types::AuthorizeSecurityGroupEgressResult]
303
299
  def authorize_egress(options = {})
304
300
  options = options.merge(group_id: @id)
@@ -369,73 +365,68 @@ module Aws::EC2
369
365
  # })
370
366
  # @param [Hash] options ({})
371
367
  # @option options [String] :cidr_ip
372
- # The IPv4 address range, in CIDR format. You can't specify this
373
- # parameter when specifying a source security group. To specify an IPv6
374
- # address range, use a set of IP permissions.
368
+ # The IPv4 address range, in CIDR format.
369
+ #
370
+ # To specify an IPv6 address range, use IP permissions instead.
375
371
  #
376
- # Alternatively, use a set of IP permissions to specify multiple rules
377
- # and a description for the rule.
372
+ # To specify multiple rules and descriptions for the rules, use IP
373
+ # permissions instead.
378
374
  # @option options [Integer] :from_port
379
375
  # If the protocol is TCP or UDP, this is the start of the port range. If
380
- # the protocol is ICMP, this is the type number. A value of -1 indicates
381
- # all ICMP types. If you specify all ICMP types, you must specify all
382
- # ICMP codes.
376
+ # the protocol is ICMP, this is the ICMP type or -1 (all ICMP types).
383
377
  #
384
- # Alternatively, use a set of IP permissions to specify multiple rules
385
- # and a description for the rule.
378
+ # To specify multiple rules and descriptions for the rules, use IP
379
+ # permissions instead.
386
380
  # @option options [String] :group_name
387
- # \[Default VPC\] The name of the security group. You must specify
388
- # either the security group ID or the security group name in the
389
- # request. For security groups in a nondefault VPC, you must specify the
390
- # security group ID.
381
+ # \[Default VPC\] The name of the security group. For security groups
382
+ # for a default VPC you can specify either the ID or the name of the
383
+ # security group. For security groups for a nondefault VPC, you must
384
+ # specify the ID of the security group.
391
385
  # @option options [Array<Types::IpPermission>] :ip_permissions
392
- # The sets of IP permissions.
386
+ # The permissions for the security group rules.
393
387
  # @option options [String] :ip_protocol
394
388
  # The IP protocol name (`tcp`, `udp`, `icmp`) or number (see [Protocol
395
- # Numbers][1]). To specify `icmpv6`, use a set of IP permissions.
389
+ # Numbers][1]). To specify all protocols, use `-1`.
396
390
  #
397
- # Use `-1` to specify all protocols. If you specify `-1` or a protocol
398
- # other than `tcp`, `udp`, or `icmp`, traffic on all ports is allowed,
399
- # regardless of any ports you specify.
391
+ # To specify `icmpv6`, use IP permissions instead.
400
392
  #
401
- # Alternatively, use a set of IP permissions to specify multiple rules
402
- # and a description for the rule.
393
+ # If you specify a protocol other than one of the supported values,
394
+ # traffic is allowed on all ports, regardless of any ports that you
395
+ # specify.
396
+ #
397
+ # To specify multiple rules and descriptions for the rules, use IP
398
+ # permissions instead.
403
399
  #
404
400
  #
405
401
  #
406
402
  # [1]: http://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
407
403
  # @option options [String] :source_security_group_name
408
- # \[Default VPC\] The name of the source security group. You can't
409
- # specify this parameter in combination with the following parameters:
410
- # the CIDR IP address range, the start of the port range, the IP
411
- # protocol, and the end of the port range. Creates rules that grant full
412
- # ICMP, UDP, and TCP access. To create a rule with a specific IP
413
- # protocol and port range, use a set of IP permissions instead. The
414
- # source security group must be in the same VPC.
415
- # @option options [String] :source_security_group_owner_id
416
- # \[Nondefault VPC\] The Amazon Web Services account ID for the source
417
- # security group, if the source security group is in a different
418
- # account. You can't specify this parameter in combination with the
419
- # following parameters: the CIDR IP address range, the IP protocol, the
420
- # start of the port range, and the end of the port range. Creates rules
421
- # that grant full ICMP, UDP, and TCP access. To create a rule with a
422
- # specific IP protocol and port range, use a set of IP permissions
404
+ # \[Default VPC\] The name of the source security group.
405
+ #
406
+ # The rule grants full ICMP, UDP, and TCP access. To create a rule with
407
+ # a specific protocol and port range, specify a set of IP permissions
423
408
  # instead.
409
+ # @option options [String] :source_security_group_owner_id
410
+ # The Amazon Web Services account ID for the source security group, if
411
+ # the source security group is in a different account.
412
+ #
413
+ # The rule grants full ICMP, UDP, and TCP access. To create a rule with
414
+ # a specific protocol and port range, use IP permissions instead.
424
415
  # @option options [Integer] :to_port
425
416
  # If the protocol is TCP or UDP, this is the end of the port range. If
426
- # the protocol is ICMP, this is the code. A value of -1 indicates all
427
- # ICMP codes. If you specify all ICMP types, you must specify all ICMP
428
- # codes.
417
+ # the protocol is ICMP, this is the ICMP code or -1 (all ICMP codes). If
418
+ # the start port is -1 (all ICMP types), then the end port must be -1
419
+ # (all ICMP codes).
429
420
  #
430
- # Alternatively, use a set of IP permissions to specify multiple rules
431
- # and a description for the rule.
421
+ # To specify multiple rules and descriptions for the rules, use IP
422
+ # permissions instead.
432
423
  # @option options [Boolean] :dry_run
433
424
  # Checks whether you have the required permissions for the action,
434
425
  # without actually making the request, and provides an error response.
435
426
  # If you have the required permissions, the error response is
436
427
  # `DryRunOperation`. Otherwise, it is `UnauthorizedOperation`.
437
428
  # @option options [Array<Types::TagSpecification>] :tag_specifications
438
- # \[VPC Only\] The tags applied to the security group rule.
429
+ # The tags applied to the security group rule.
439
430
  # @return [Types::AuthorizeSecurityGroupIngressResult]
440
431
  def authorize_ingress(options = {})
441
432
  options = options.merge(group_id: @id)
@@ -694,8 +685,7 @@ module Aws::EC2
694
685
  # specifying a source security group.
695
686
  # @option options [Integer] :from_port
696
687
  # If the protocol is TCP or UDP, this is the start of the port range. If
697
- # the protocol is ICMP, this is the type number. A value of -1 indicates
698
- # all ICMP types.
688
+ # the protocol is ICMP, this is the ICMP type or -1 (all ICMP types).
699
689
  # @option options [String] :group_name
700
690
  # \[Default VPC\] The name of the security group. You must specify
701
691
  # either the security group ID or the security group name in the
@@ -722,8 +712,7 @@ module Aws::EC2
722
712
  # Not supported.
723
713
  # @option options [Integer] :to_port
724
714
  # If the protocol is TCP or UDP, this is the end of the port range. If
725
- # the protocol is ICMP, this is the code. A value of -1 indicates all
726
- # ICMP codes.
715
+ # the protocol is ICMP, this is the ICMP code or -1 (all ICMP codes).
727
716
  # @option options [Boolean] :dry_run
728
717
  # Checks whether you have the required permissions for the action,
729
718
  # without actually making the request, and provides an error response.
@@ -125,11 +125,11 @@ module Aws::EC2
125
125
 
126
126
  # The ARN of the Outpost on which the snapshot is stored. For more
127
127
  # information, see [Amazon EBS local snapshots on Outposts][1] in the
128
- # *Amazon Elastic Compute Cloud User Guide*.
128
+ # *Amazon EBS User Guide*.
129
129
  #
130
130
  #
131
131
  #
132
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html
132
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html
133
133
  # @return [String]
134
134
  def outpost_arn
135
135
  data[:outpost_arn]
@@ -357,12 +357,11 @@ module Aws::EC2
357
357
  # Outpost.
358
358
  #
359
359
  # For more information, see [ Copy snapshots from an Amazon Web Services
360
- # Region to an Outpost][1] in the *Amazon Elastic Compute Cloud User
361
- # Guide*.
360
+ # Region to an Outpost][1] in the *Amazon EBS User Guide*.
362
361
  #
363
362
  #
364
363
  #
365
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/snapshots-outposts.html#copy-snapshots
364
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/snapshots-outposts.html#copy-snapshots
366
365
  # @option options [String] :destination_region
367
366
  # The destination Region to use in the `PresignedUrl` parameter of a
368
367
  # snapshot copy operation. This parameter is only valid for specifying
@@ -379,11 +378,11 @@ module Aws::EC2
379
378
  # omit this parameter. Encrypted snapshots are encrypted, even if you
380
379
  # omit this parameter and encryption by default is not enabled. You
381
380
  # cannot set this parameter to false. For more information, see [Amazon
382
- # EBS encryption][1] in the *Amazon Elastic Compute Cloud User Guide*.
381
+ # EBS encryption][1] in the *Amazon EBS User Guide*.
383
382
  #
384
383
  #
385
384
  #
386
- # [1]: https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSEncryption.html
385
+ # [1]: https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption.html
387
386
  # @option options [String] :kms_key_id
388
387
  # The identifier of the Key Management Service (KMS) KMS key to use for
389
388
  # Amazon EBS encryption. If this parameter is not specified, your KMS
@@ -78,10 +78,10 @@ module Aws::EC2
78
78
  # Indicates whether instances launched in this subnet receive a public
79
79
  # IPv4 address.
80
80
  #
81
- # Starting on February 1, 2024, Amazon Web Services will charge for all
82
- # public IPv4 addresses, including public IPv4 addresses associated with
83
- # running instances and Elastic IP addresses. For more information, see
84
- # the *Public IPv4 Address* tab on the [Amazon VPC pricing page][1].
81
+ # Amazon Web Services charges for all public IPv4 addresses, including
82
+ # public IPv4 addresses associated with running instances and Elastic IP
83
+ # addresses. For more information, see the *Public IPv4 Address* tab on
84
+ # the [Amazon VPC pricing page][1].
85
85
  #
86
86
  #
87
87
  #