@aws-sdk/client-securityhub 3.370.0 → 3.378.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -37,31 +37,31 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
37
37
  * ProductArn: [ // StringFilterList
38
38
  * { // StringFilter
39
39
  * Value: "STRING_VALUE",
40
- * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
40
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
41
41
  * },
42
42
  * ],
43
43
  * AwsAccountId: [
44
44
  * {
45
45
  * Value: "STRING_VALUE",
46
- * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
46
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
47
47
  * },
48
48
  * ],
49
49
  * Id: [
50
50
  * {
51
51
  * Value: "STRING_VALUE",
52
- * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
52
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
53
53
  * },
54
54
  * ],
55
55
  * GeneratorId: [
56
56
  * {
57
57
  * Value: "STRING_VALUE",
58
- * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
58
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
59
59
  * },
60
60
  * ],
61
61
  * Region: [
62
62
  * {
63
63
  * Value: "STRING_VALUE",
64
- * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS",
64
+ * Comparison: "EQUALS" || "PREFIX" || "NOT_EQUALS" || "PREFIX_NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
65
65
  * },
66
66
  * ],
67
67
  * Type: "<StringFilterList>",
@@ -142,7 +142,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
142
142
  * { // MapFilter
143
143
  * Key: "STRING_VALUE",
144
144
  * Value: "STRING_VALUE",
145
- * Comparison: "EQUALS" || "NOT_EQUALS",
145
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
146
146
  * },
147
147
  * ],
148
148
  * ProductName: "<StringFilterList>",
@@ -151,7 +151,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
151
151
  * {
152
152
  * Key: "STRING_VALUE",
153
153
  * Value: "STRING_VALUE",
154
- * Comparison: "EQUALS" || "NOT_EQUALS",
154
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
155
155
  * },
156
156
  * ],
157
157
  * MalwareName: "<StringFilterList>",
@@ -220,7 +220,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
220
220
  * {
221
221
  * Key: "STRING_VALUE",
222
222
  * Value: "STRING_VALUE",
223
- * Comparison: "EQUALS" || "NOT_EQUALS",
223
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
224
224
  * },
225
225
  * ],
226
226
  * ResourceAwsEc2InstanceType: "<StringFilterList>",
@@ -251,7 +251,7 @@ export interface UpdateInsightCommandOutput extends UpdateInsightResponse, __Met
251
251
  * {
252
252
  * Key: "STRING_VALUE",
253
253
  * Value: "STRING_VALUE",
254
- * Comparison: "EQUALS" || "NOT_EQUALS",
254
+ * Comparison: "EQUALS" || "NOT_EQUALS" || "CONTAINS" || "NOT_CONTAINS",
255
255
  * },
256
256
  * ],
257
257
  * ComplianceStatus: "<StringFilterList>",
@@ -917,7 +917,9 @@ export type AutoEnableStandards = (typeof AutoEnableStandards)[keyof typeof Auto
917
917
  * @enum
918
918
  */
919
919
  export declare const StringFilterComparison: {
920
+ readonly CONTAINS: "CONTAINS";
920
921
  readonly EQUALS: "EQUALS";
922
+ readonly NOT_CONTAINS: "NOT_CONTAINS";
921
923
  readonly NOT_EQUALS: "NOT_EQUALS";
922
924
  readonly PREFIX: "PREFIX";
923
925
  readonly PREFIX_NOT_EQUALS: "PREFIX_NOT_EQUALS";
@@ -928,73 +930,74 @@ export declare const StringFilterComparison: {
928
930
  export type StringFilterComparison = (typeof StringFilterComparison)[keyof typeof StringFilterComparison];
929
931
  /**
930
932
  * @public
931
- * <p>A string filter for querying findings.</p>
933
+ * <p>A string filter for filtering Security Hub findings.</p>
932
934
  */
933
935
  export interface StringFilter {
934
936
  /**
935
937
  * <p>The string filter value. Filter values are case sensitive. For example, the product name
936
938
  * for control-based findings is <code>Security Hub</code>. If you provide <code>security hub</code>
937
- * as the filter text, then there is no match.</p>
939
+ * as the filter value, there's no match.</p>
938
940
  */
939
941
  Value?: string;
940
942
  /**
941
- * <p>The condition to apply to a string value when querying for findings. To search for
942
- * values that contain the filter criteria value, use one of the following comparison
943
- * operators:</p>
943
+ * <p>The condition to apply to a string value when filtering Security Hub findings.</p>
944
+ * <p>To search for values that have the filter value, use one of the following comparison operators:</p>
944
945
  * <ul>
945
946
  * <li>
946
- * <p>To search for values that exactly match the filter value, use
947
- * <code>EQUALS</code>.</p>
948
- * <p>For example, the filter <code>ResourceType EQUALS AwsEc2SecurityGroup</code> only
949
- * matches findings that have a resource type of
950
- * <code>AwsEc2SecurityGroup</code>.</p>
947
+ * <p>To search for values that include the filter value, use <code>CONTAINS</code>. For example, the
948
+ * filter <code>Title CONTAINS CloudFront</code> matches findings that have a <code>Title</code> that
949
+ * includes the string CloudFront.</p>
951
950
  * </li>
952
951
  * <li>
953
- * <p>To search for values that start with the filter value, use
954
- * <code>PREFIX</code>.</p>
955
- * <p>For example, the filter <code>ResourceType PREFIX AwsIam</code> matches findings
956
- * that have a resource type that starts with <code>AwsIam</code>. Findings with a
957
- * resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>, or
958
- * <code>AwsIamUser</code> would all match.</p>
952
+ * <p>To search for values that exactly match the filter value, use <code>EQUALS</code>. For example,
953
+ * the filter <code>AwsAccountId EQUALS 123456789012</code> only matches findings that have an account ID of
954
+ * <code>123456789012</code>.</p>
955
+ * </li>
956
+ * <li>
957
+ * <p>To search for values that start with the filter value, use <code>PREFIX</code>. For example, the
958
+ * filter <code>ResourceRegion PREFIX us</code> matches findings that have a <code>ResourceRegion</code> that starts
959
+ * with <code>us</code>. A <code>ResourceRegion</code> that starts with a different value, such as <code>af</code>,
960
+ * <code>ap</code>, or <code>ca</code>, doesn't match.</p>
959
961
  * </li>
960
962
  * </ul>
961
963
  * <p>
962
- * <code>EQUALS</code> and <code>PREFIX</code> filters on the same field are joined by
963
- * <code>OR</code>. A finding matches if it matches any one of those filters.</p>
964
- * <p>To search for values that do not contain the filter criteria value, use one of the
965
- * following comparison operators:</p>
964
+ * <code>CONTAINS</code>, <code>EQUALS</code>, and <code>PREFIX</code> filters on the same field are joined by
965
+ * <code>OR</code>. A finding matches if it matches any one of those filters. For example, the filters <code>Title CONTAINS CloudFront OR
966
+ * Title CONTAINS CloudWatch</code> match a finding that includes either <code>CloudFront</code>,
967
+ * <code>CloudWatch</code>, or both strings in the title.</p>
968
+ * <p>To search for values that don’t have the filter value, use one of the following comparison operators:</p>
966
969
  * <ul>
967
970
  * <li>
968
- * <p>To search for values that do not exactly match the filter value, use
969
- * <code>NOT_EQUALS</code>.</p>
970
- * <p>For example, the filter <code>ResourceType NOT_EQUALS AwsIamPolicy</code> matches
971
- * findings that have a resource type other than <code>AwsIamPolicy</code>.</p>
971
+ * <p>To search for values that exclude the filter value, use <code>NOT_CONTAINS</code>. For example, the
972
+ * filter <code>Title NOT_CONTAINS CloudFront</code> matches findings that have a <code>Title</code> that
973
+ * excludes the string CloudFront.</p>
972
974
  * </li>
973
975
  * <li>
974
- * <p>To search for values that do not start with the filter value, use
975
- * <code>PREFIX_NOT_EQUALS</code>.</p>
976
- * <p>For example, the filter <code>ResourceType PREFIX_NOT_EQUALS AwsIam</code> matches
977
- * findings that have a resource type that does not start with <code>AwsIam</code>.
978
- * Findings with a resource type of <code>AwsIamPolicy</code>, <code>AwsIamRole</code>,
979
- * or <code>AwsIamUser</code> would all be excluded from the results.</p>
976
+ * <p>To search for values other than the filter value, use <code>NOT_EQUALS</code>. For
977
+ * example, the filter <code>AwsAccountId NOT_EQUALS 123456789012</code> only matches findings that have an account
978
+ * ID other than <code>123456789012</code>.</p>
979
+ * </li>
980
+ * <li>
981
+ * <p>To search for values that don't start with the filter value, use <code>PREFIX_NOT_EQUALS</code>. For
982
+ * example, the filter <code>ResourceRegion PREFIX_NOT_EQUALS us</code> matches findings with a
983
+ * <code>ResourceRegion</code> that starts with a value other than <code>us</code>.</p>
980
984
  * </li>
981
985
  * </ul>
982
986
  * <p>
983
- * <code>NOT_EQUALS</code> and <code>PREFIX_NOT_EQUALS</code> filters on the same field are
984
- * joined by <code>AND</code>. A finding matches only if it matches all of those
985
- * filters.</p>
986
- * <p>For filters on the same field, you cannot provide both an <code>EQUALS</code> filter and
987
- * a <code>NOT_EQUALS</code> or <code>PREFIX_NOT_EQUALS</code> filter. Combining filters in
988
- * this way always returns an error, even if the provided filter values would return valid
989
- * results.</p>
990
- * <p>You can combine <code>PREFIX</code> filters with <code>NOT_EQUALS</code> or
991
- * <code>PREFIX_NOT_EQUALS</code> filters for the same field. Security Hub first processes the
992
- * <code>PREFIX</code> filters, then the <code>NOT_EQUALS</code> or
993
- * <code>PREFIX_NOT_EQUALS</code> filters.</p>
994
- * <p> For example, for the following filter, Security Hub first identifies findings that have
995
- * resource types that start with either <code>AwsIAM</code> or <code>AwsEc2</code>. It then
996
- * excludes findings that have a resource type of <code>AwsIamPolicy</code> and findings that
997
- * have a resource type of <code>AwsEc2NetworkInterface</code>.</p>
987
+ * <code>NOT_CONTAINS</code>, <code>NOT_EQUALS</code>, and <code>PREFIX_NOT_EQUALS</code> filters on the same field
988
+ * are joined by <code>AND</code>. A finding matches only if it matches all of those filters. For example, the filters <code>Title NOT_CONTAINS CloudFront AND
989
+ * Title NOT_CONTAINS CloudWatch</code> match a finding that excludes both <code>CloudFront</code> and
990
+ * <code>CloudWatch</code> in the title.</p>
991
+ * <p>You can’t have both a <code>CONTAINS</code> filter and a <code>NOT_CONTAINS</code> filter on the same field. Similarly,
992
+ * you can't provide both an <code>EQUALS</code> filter and a <code>NOT_EQUALS</code> or
993
+ * <code>PREFIX_NOT_EQUALS</code> filter on the same field. Combining filters in this way returns an error. <code>CONTAINS</code> filters
994
+ * can only be used with other <code>CONTAINS</code> filters. <code>NOT_CONTAINS</code> filters can only be used with
995
+ * other <code>NOT_CONTAINS</code> filters. </p>
996
+ * <p>You can combine <code>PREFIX</code> filters with <code>NOT_EQUALS</code> or <code>PREFIX_NOT_EQUALS</code> filters for the same field.
997
+ * Security Hub first processes the <code>PREFIX</code> filters, and then the <code>NOT_EQUALS</code> or <code>PREFIX_NOT_EQUALS</code> filters.</p>
998
+ * <p>For example, for the following filters, Security Hub first identifies findings that have resource types
999
+ * that start with either <code>AwsIam</code> or <code>AwsEc2</code>. It then excludes findings that have a resource
1000
+ * type of <code>AwsIamPolicy</code> and findings that have a resource type of <code>AwsEc2NetworkInterface</code>.</p>
998
1001
  * <ul>
999
1002
  * <li>
1000
1003
  * <p>
@@ -1017,6 +1020,9 @@ export interface StringFilter {
1017
1020
  * </p>
1018
1021
  * </li>
1019
1022
  * </ul>
1023
+ * <p>
1024
+ * <code>CONTAINS</code> and <code>NOT_CONTAINS</code> operators can be used only with automation rules. For more information,
1025
+ * see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html">Automation rules</a> in the <i>Security Hub User Guide</i>.</p>
1020
1026
  */
1021
1027
  Comparison?: StringFilterComparison | string;
1022
1028
  }
@@ -1093,7 +1099,9 @@ export interface DateFilter {
1093
1099
  * @enum
1094
1100
  */
1095
1101
  export declare const MapFilterComparison: {
1102
+ readonly CONTAINS: "CONTAINS";
1096
1103
  readonly EQUALS: "EQUALS";
1104
+ readonly NOT_CONTAINS: "NOT_CONTAINS";
1097
1105
  readonly NOT_EQUALS: "NOT_EQUALS";
1098
1106
  };
1099
1107
  /**
@@ -1102,8 +1110,8 @@ export declare const MapFilterComparison: {
1102
1110
  export type MapFilterComparison = (typeof MapFilterComparison)[keyof typeof MapFilterComparison];
1103
1111
  /**
1104
1112
  * @public
1105
- * <p>A map filter for querying findings. Each map filter provides the field to check, the
1106
- * value to look for, and the comparison operator.</p>
1113
+ * <p>A map filter for filtering Security Hub findings. Each map filter provides the field to check for, the
1114
+ * value to check for, and the comparison operator.</p>
1107
1115
  */
1108
1116
  export interface MapFilter {
1109
1117
  /**
@@ -1115,28 +1123,59 @@ export interface MapFilter {
1115
1123
  /**
1116
1124
  * <p>The value for the key in the map filter. Filter values are case sensitive. For example,
1117
1125
  * one of the values for a tag called <code>Department</code> might be <code>Security</code>.
1118
- * If you provide <code>security</code> as the filter value, then there is no match.</p>
1126
+ * If you provide <code>security</code> as the filter value, then there's no match.</p>
1119
1127
  */
1120
1128
  Value?: string;
1121
1129
  /**
1122
- * <p>The condition to apply to the key value when querying for findings with a map
1130
+ * <p>The condition to apply to the key value when filtering Security Hub findings with a map
1123
1131
  * filter.</p>
1124
- * <p>To search for values that exactly match the filter value, use <code>EQUALS</code>. For
1125
- * example, for the <code>ResourceTags</code> field, the filter <code>Department EQUALS
1126
- * Security</code> matches findings that have the value <code>Security</code> for the tag
1127
- * <code>Department</code>.</p>
1128
- * <p>To search for values other than the filter value, use <code>NOT_EQUALS</code>. For
1129
- * example, for the <code>ResourceTags</code> field, the filter <code>Department NOT_EQUALS
1130
- * Finance</code> matches findings that do not have the value <code>Finance</code> for the
1131
- * tag <code>Department</code>.</p>
1132
+ * <p>To search for values that have the filter value, use one of the following comparison operators:</p>
1133
+ * <ul>
1134
+ * <li>
1135
+ * <p>To search for values that include the filter value, use <code>CONTAINS</code>. For example, for the
1136
+ * <code>ResourceTags</code> field, the filter <code>Department CONTAINS Security</code> matches findings that
1137
+ * include the value <code>Security</code> for the <code>Department</code> tag. In the same example, a finding with a value of
1138
+ * <code>Security team</code> for the <code>Department</code> tag is a match.</p>
1139
+ * </li>
1140
+ * <li>
1141
+ * <p>To search for values that exactly match the filter value, use <code>EQUALS</code>. For example, for
1142
+ * the <code>ResourceTags</code> field, the filter <code>Department EQUALS Security</code> matches findings that
1143
+ * have the value <code>Security</code> for the <code>Department</code> tag.</p>
1144
+ * </li>
1145
+ * </ul>
1146
+ * <p>
1147
+ * <code>CONTAINS</code> and <code>EQUALS</code> filters on the same field are joined by <code>OR</code>. A
1148
+ * finding matches if it matches any one of those filters. For example, the filters <code>Department CONTAINS Security OR
1149
+ * Department CONTAINS Finance</code> match a finding that includes either <code>Security</code>,
1150
+ * <code>Finance</code>, or both values.</p>
1151
+ * <p>To search for values that don't have the filter value, use one of the following comparison operators:</p>
1152
+ * <ul>
1153
+ * <li>
1154
+ * <p>To search for values that exclude the filter value, use <code>NOT_CONTAINS</code>. For example, for
1155
+ * the <code>ResourceTags</code> field, the filter <code>Department NOT_CONTAINS Finance</code> matches findings
1156
+ * that exclude the value <code>Finance</code> for the <code>Department</code> tag.</p>
1157
+ * </li>
1158
+ * <li>
1159
+ * <p>To search for values other than the filter value, use <code>NOT_EQUALS</code>. For example, for the
1160
+ * <code>ResourceTags</code> field, the filter <code>Department NOT_EQUALS Finance</code> matches findings that
1161
+ * don’t have the value <code>Finance</code> for the <code>Department</code> tag.</p>
1162
+ * </li>
1163
+ * </ul>
1164
+ * <p>
1165
+ * <code>NOT_CONTAINS</code> and <code>NOT_EQUALS</code> filters on the same field are joined by <code>AND</code>.
1166
+ * A finding matches only if it matches all of those filters. For example, the filters <code>Department NOT_CONTAINS Security AND
1167
+ * Department NOT_CONTAINS Finance</code> match a finding that excludes both the <code>Security</code> and
1168
+ * <code>Finance</code> values.</p>
1132
1169
  * <p>
1133
- * <code>EQUALS</code> filters on the same field are joined by <code>OR</code>. A finding
1134
- * matches if it matches any one of those filters.</p>
1170
+ * <code>CONTAINS</code> filters can only be used with other <code>CONTAINS</code> filters. <code>NOT_CONTAINS</code>
1171
+ * filters can only be used with other <code>NOT_CONTAINS</code> filters.</p>
1172
+ * <p>You can’t have both a <code>CONTAINS</code> filter and a <code>NOT_CONTAINS</code> filter on the same field.
1173
+ * Similarly, you can’t have both an <code>EQUALS</code> filter and a <code>NOT_EQUALS</code> filter on the same field.
1174
+ * Combining filters in this way returns an error.
1175
+ * </p>
1135
1176
  * <p>
1136
- * <code>NOT_EQUALS</code> filters on the same field are joined by <code>AND</code>. A
1137
- * finding matches only if it matches all of those filters.</p>
1138
- * <p>You cannot have both an <code>EQUALS</code> filter and a <code>NOT_EQUALS</code> filter
1139
- * on the same field.</p>
1177
+ * <code>CONTAINS</code> and <code>NOT_CONTAINS</code> operators can be used only with automation rules. For more information,
1178
+ * see <a href="https://docs.aws.amazon.com/securityhub/latest/userguide/automation-rules.html">Automation rules</a> in the <i>Security Hub User Guide</i>.</p>
1140
1179
  */
1141
1180
  Comparison?: MapFilterComparison | string;
1142
1181
  }
@@ -1437,11 +1476,9 @@ export interface AutomationRulesConfig {
1437
1476
  */
1438
1477
  Description?: string;
1439
1478
  /**
1440
- * <p>Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful
1441
- * when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this
1442
- * field is set to <code>true</code> for a rule, Security Hub applies the rule action to a finding that matches
1443
- * the rule criteria and doesn't evaluate other rules for the finding.
1444
- The default value of this field is <code>false</code>.
1479
+ * <p>Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding
1480
+ * matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches
1481
+ * the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
1445
1482
  * </p>
1446
1483
  */
1447
1484
  IsTerminal?: boolean;
@@ -1530,12 +1567,9 @@ export interface AutomationRulesMetadata {
1530
1567
  */
1531
1568
  Description?: string;
1532
1569
  /**
1533
- * <p>
1534
- * Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful
1535
- * when a finding matches the criteria for multiple rules, and each rule has different actions. If the value of this
1536
- * field is set to <code>true</code> for a rule, Security Hub applies the rule action to a finding that matches
1537
- * the rule criteria and doesn't evaluate other rules for the finding.
1538
- The default value of this field is <code>false</code>.
1570
+ * <p>Specifies whether a rule is the last to be applied with respect to a finding that matches the rule criteria. This is useful when a finding
1571
+ * matches the criteria for multiple rules, and each rule has different actions. If a rule is terminal, Security Hub applies the rule action to a finding that matches
1572
+ * the rule criteria and doesn't evaluate other rules for the finding. By default, a rule isn't terminal.
1539
1573
  * </p>
1540
1574
  */
1541
1575
  IsTerminal?: boolean;
@@ -2602,6 +2636,97 @@ export interface AwsAppSyncGraphQlApiDetails {
2602
2636
  */
2603
2637
  WafWebAclArn?: string;
2604
2638
  }
2639
+ /**
2640
+ * @public
2641
+ * <p>
2642
+ * Specifies the method used to encrypt the user’s data stores in the Athena workgroup.
2643
+ * </p>
2644
+ */
2645
+ export interface AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails {
2646
+ /**
2647
+ * <p>
2648
+ * Indicates whether Amazon Simple Storage Service (Amazon S3) server-side encryption with Amazon S3 managed
2649
+ * keys (SSE_S3), server-side encryption with KMS keys (SSE_KMS), or client-side encryption with
2650
+ * KMS customer managed keys (CSE_KMS) is used.
2651
+ * </p>
2652
+ */
2653
+ EncryptionOption?: string;
2654
+ /**
2655
+ * <p>
2656
+ * For <code>SSE_KMS</code> and <code>CSE_KMS</code>, this is the KMS key Amazon Resource Name (ARN) or ID.
2657
+ * </p>
2658
+ */
2659
+ KmsKey?: string;
2660
+ }
2661
+ /**
2662
+ * @public
2663
+ * <p>
2664
+ * The location in Amazon Simple Storage Service (Amazon S3) where query and calculation results are stored and the encryption option, if any,
2665
+ * used for query and calculation results. These are known as client-side settings. If workgroup settings override
2666
+ * client-side settings, then the query uses the workgroup settings.
2667
+ * </p>
2668
+ */
2669
+ export interface AwsAthenaWorkGroupConfigurationResultConfigurationDetails {
2670
+ /**
2671
+ * <p>
2672
+ * Specifies the method used to encrypt the user’s data stores in the Athena workgroup.
2673
+ * </p>
2674
+ */
2675
+ EncryptionConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationEncryptionConfigurationDetails;
2676
+ }
2677
+ /**
2678
+ * @public
2679
+ * <p>
2680
+ * The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3) where
2681
+ * query results are stored, the encryption option, if any, used for query results, whether Amazon CloudWatch
2682
+ * metrics are enabled for the workgroup, and the limit for the amount of bytes scanned (cutoff) per query, if it is
2683
+ * specified.
2684
+ * </p>
2685
+ */
2686
+ export interface AwsAthenaWorkGroupConfigurationDetails {
2687
+ /**
2688
+ * <p>
2689
+ * The location in Amazon S3 where query and calculation results are stored and the
2690
+ * encryption option, if any, used for query and calculation results. These are known as client-side settings. If
2691
+ * workgroup settings override client-side settings, then the query uses the workgroup settings.</p>
2692
+ */
2693
+ ResultConfiguration?: AwsAthenaWorkGroupConfigurationResultConfigurationDetails;
2694
+ }
2695
+ /**
2696
+ * @public
2697
+ * <p>
2698
+ * Provides information about an Amazon Athena workgroup.
2699
+ * </p>
2700
+ */
2701
+ export interface AwsAthenaWorkGroupDetails {
2702
+ /**
2703
+ * <p>
2704
+ * The workgroup name.
2705
+ * </p>
2706
+ */
2707
+ Name?: string;
2708
+ /**
2709
+ * <p>
2710
+ * The workgroup description.
2711
+ * </p>
2712
+ */
2713
+ Description?: string;
2714
+ /**
2715
+ * <p>
2716
+ * Whether the workgroup is enabled or disabled.
2717
+ * </p>
2718
+ */
2719
+ State?: string;
2720
+ /**
2721
+ * <p>
2722
+ * The configuration of the workgroup, which includes the location in Amazon Simple Storage Service (Amazon S3)
2723
+ * where query results are stored, the encryption option, if any, used for query results, whether
2724
+ * Amazon CloudWatch metrics are enabled for the workgroup, and the limit for the amount of bytes scanned
2725
+ * (cutoff) per query, if it is specified.
2726
+ * </p>
2727
+ */
2728
+ Configuration?: AwsAthenaWorkGroupConfigurationDetails;
2729
+ }
2605
2730
  /**
2606
2731
  * @public
2607
2732
  * <p>An Availability Zone for the automatic scaling group.</p>
@@ -9755,112 +9880,3 @@ export interface AwsEfsAccessPointRootDirectoryCreationInfoDetails {
9755
9880
  */
9756
9881
  Permissions?: string;
9757
9882
  }
9758
- /**
9759
- * @public
9760
- * <p>Provides information about the directory on the Amazon EFS file system that the access point exposes
9761
- * as the root directory to NFS clients using the access point.
9762
- * </p>
9763
- */
9764
- export interface AwsEfsAccessPointRootDirectoryDetails {
9765
- /**
9766
- * <p>Specifies the POSIX IDs and permissions to apply to the access point's root directory.
9767
- * </p>
9768
- */
9769
- CreationInfo?: AwsEfsAccessPointRootDirectoryCreationInfoDetails;
9770
- /**
9771
- * <p>Specifies the path on the Amazon EFS file system to expose as the root directory to NFS clients
9772
- * using the access point to access the EFS file system. A path can have up to four subdirectories. If the specified
9773
- * path does not exist, you are required to provide <code>CreationInfo</code>.
9774
- * </p>
9775
- */
9776
- Path?: string;
9777
- }
9778
- /**
9779
- * @public
9780
- * <p>Provides information about an Amazon EFS access point.
9781
- * </p>
9782
- */
9783
- export interface AwsEfsAccessPointDetails {
9784
- /**
9785
- * <p>The ID of the Amazon EFS access point.
9786
- * </p>
9787
- */
9788
- AccessPointId?: string;
9789
- /**
9790
- * <p>The Amazon Resource Name (ARN) of the Amazon EFS access point. </p>
9791
- */
9792
- Arn?: string;
9793
- /**
9794
- * <p>The opaque string specified in the request to ensure idempotent creation.
9795
- * </p>
9796
- */
9797
- ClientToken?: string;
9798
- /**
9799
- * <p>The ID of the Amazon EFS file system that the access point applies to.
9800
- * </p>
9801
- */
9802
- FileSystemId?: string;
9803
- /**
9804
- * <p>The full POSIX identity, including the user ID, group ID, and secondary group IDs on the access point,
9805
- * that is used for all file operations by NFS clients using the access point.
9806
- * </p>
9807
- */
9808
- PosixUser?: AwsEfsAccessPointPosixUserDetails;
9809
- /**
9810
- * <p>The directory on the Amazon EFS file system that the access point exposes as the root
9811
- * directory to NFS clients using the access point.
9812
- * </p>
9813
- */
9814
- RootDirectory?: AwsEfsAccessPointRootDirectoryDetails;
9815
- }
9816
- /**
9817
- * @public
9818
- * <p>Details for a cluster logging configuration.</p>
9819
- */
9820
- export interface AwsEksClusterLoggingClusterLoggingDetails {
9821
- /**
9822
- * <p>Whether the logging types that are listed in <code>Types</code> are enabled.</p>
9823
- */
9824
- Enabled?: boolean;
9825
- /**
9826
- * <p>A list of logging types. Valid values are as follows:</p>
9827
- * <ul>
9828
- * <li>
9829
- * <p>
9830
- * <code>api</code>
9831
- * </p>
9832
- * </li>
9833
- * <li>
9834
- * <p>
9835
- * <code>audit</code>
9836
- * </p>
9837
- * </li>
9838
- * <li>
9839
- * <p>
9840
- * <code>authenticator</code>
9841
- * </p>
9842
- * </li>
9843
- * <li>
9844
- * <p>
9845
- * <code>controllerManager</code>
9846
- * </p>
9847
- * </li>
9848
- * <li>
9849
- * <p>
9850
- * <code>scheduler</code>
9851
- * </p>
9852
- * </li>
9853
- * </ul>
9854
- */
9855
- Types?: string[];
9856
- }
9857
- /**
9858
- * @public
9859
- * <p>The logging configuration for an Amazon EKS cluster.</p>
9860
- */
9861
- export interface AwsEksClusterLoggingDetails {
9862
- /**
9863
- * <p>Cluster logging configurations.</p>
9864
- */
9865
- ClusterLogging?: AwsEksClusterLoggingClusterLoggingDetails[];
9866
- }