@cdklabs/cdk-ecs-codedeploy 0.0.6 → 0.0.8

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/.jsii +3 -3
  2. package/lib/ecs-appspec/index.js +1 -1
  3. package/lib/ecs-deployment/index.js +1 -1
  4. package/node_modules/aws-sdk/CHANGELOG.md +19 -1
  5. package/node_modules/aws-sdk/README.md +1 -1
  6. package/node_modules/aws-sdk/apis/backup-gateway-2021-01-01.min.json +211 -9
  7. package/node_modules/aws-sdk/apis/ce-2017-10-25.min.json +21 -3
  8. package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +5 -2
  9. package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +3 -0
  10. package/node_modules/aws-sdk/apis/kinesis-2013-12-02.min.json +304 -51
  11. package/node_modules/aws-sdk/apis/kinesis-2013-12-02.paginators.json +6 -3
  12. package/node_modules/aws-sdk/apis/m2-2021-04-28.min.json +4 -0
  13. package/node_modules/aws-sdk/apis/monitoring-2010-08-01.min.json +33 -27
  14. package/node_modules/aws-sdk/apis/networkmanager-2019-07-05.min.json +3 -0
  15. package/node_modules/aws-sdk/apis/redshift-data-2019-12-20.min.json +13 -7
  16. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +541 -524
  17. package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +796 -160
  18. package/node_modules/aws-sdk/clients/backupgateway.d.ts +258 -0
  19. package/node_modules/aws-sdk/clients/cloudwatch.d.ts +12 -3
  20. package/node_modules/aws-sdk/clients/connect.d.ts +7 -7
  21. package/node_modules/aws-sdk/clients/costexplorer.d.ts +33 -13
  22. package/node_modules/aws-sdk/clients/ecs.d.ts +15 -3
  23. package/node_modules/aws-sdk/clients/eks.d.ts +21 -21
  24. package/node_modules/aws-sdk/clients/glue.d.ts +4 -0
  25. package/node_modules/aws-sdk/clients/kinesis.d.ts +180 -60
  26. package/node_modules/aws-sdk/clients/location.d.ts +2 -2
  27. package/node_modules/aws-sdk/clients/m2.d.ts +81 -65
  28. package/node_modules/aws-sdk/clients/networkmanager.d.ts +6 -2
  29. package/node_modules/aws-sdk/clients/redshiftdata.d.ts +31 -22
  30. package/node_modules/aws-sdk/clients/sagemaker.d.ts +60 -42
  31. package/node_modules/aws-sdk/clients/sagemakermetrics.d.ts +7 -7
  32. package/node_modules/aws-sdk/clients/securityhub.d.ts +971 -0
  33. package/node_modules/aws-sdk/clients/translate.d.ts +10 -9
  34. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  35. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +13 -13
  36. package/node_modules/aws-sdk/dist/aws-sdk.js +372 -89
  37. package/node_modules/aws-sdk/dist/aws-sdk.min.js +95 -95
  38. package/node_modules/aws-sdk/lib/core.js +1 -1
  39. package/node_modules/aws-sdk/package.json +1 -1
  40. package/package.json +6 -6
@@ -173,11 +173,11 @@ declare class ECS extends Service {
173
173
  */
174
174
  discoverPollEndpoint(callback?: (err: AWSError, data: ECS.Types.DiscoverPollEndpointResponse) => void): Request<ECS.Types.DiscoverPollEndpointResponse, AWSError>;
175
175
  /**
176
- * Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value.
176
+ * Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value. For information about required permissions and considerations, see Using Amazon ECS Exec for debugging in the Amazon ECS Developer Guide.
177
177
  */
178
178
  executeCommand(params: ECS.Types.ExecuteCommandRequest, callback?: (err: AWSError, data: ECS.Types.ExecuteCommandResponse) => void): Request<ECS.Types.ExecuteCommandResponse, AWSError>;
179
179
  /**
180
- * Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value.
180
+ * Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value. For information about required permissions and considerations, see Using Amazon ECS Exec for debugging in the Amazon ECS Developer Guide.
181
181
  */
182
182
  executeCommand(callback?: (err: AWSError, data: ECS.Types.ExecuteCommandResponse) => void): Request<ECS.Types.ExecuteCommandResponse, AWSError>;
183
183
  /**
@@ -2604,6 +2604,14 @@ declare namespace ECS {
2604
2604
  * The protocol used for the network binding.
2605
2605
  */
2606
2606
  protocol?: TransportProtocol;
2607
+ /**
2608
+ * The port number range on the container that's bound to the dynamically mapped host port range. The following rules apply when you specify a containerPortRange: You must use either the bridge network mode or the awsvpc network mode. This parameter is available for both the EC2 and Fargate launch types. This parameter is available for both the Linux and Windows operating systems. The container instance must have at least version 1.67.0 of the container agent and at least version 1.67.0-1 of the ecs-init package You can specify a maximum of 100 port ranges per container. You do not specify a hostPortRange. The value of the hostPortRange is set as follows: For containers in a task with the awsvpc network mode, the hostPort is set to the same value as the containerPort. This is a static mapping strategy. For containers in a task with the bridge network mode, the Amazon ECS agent finds open host ports from the default ephemeral range and passes it to docker to bind them to the container ports. The containerPortRange valid values are between 1 and 65535. A port can only be included in one port mapping per container. You cannot specify overlapping port ranges. The first port in the range must be less than last port in the range. Docker recommends that you turn off the docker-proxy in the Docker daemon config file when you have a large number of ports. For more information, see Issue #11185 on the Github website. For information about how to turn off the docker-proxy in the Docker daemon config file, see Docker daemon in the Amazon ECS Developer Guide. You can call DescribeTasks to view the hostPortRange which are the host ports that are bound to the container ports.
2609
+ */
2610
+ containerPortRange?: String;
2611
+ /**
2612
+ * The port number range on the host that's used with the network binding. This is assigned is assigned by Docker and delivered by the Amazon ECS agent.
2613
+ */
2614
+ hostPortRange?: String;
2607
2615
  }
2608
2616
  export type NetworkBindings = NetworkBinding[];
2609
2617
  export interface NetworkConfiguration {
@@ -2672,7 +2680,7 @@ declare namespace ECS {
2672
2680
  */
2673
2681
  containerPort?: BoxedInteger;
2674
2682
  /**
2675
- * The port number on the container instance to reserve for your container. If you use containers in a task with the awsvpc or host network mode, the hostPort can either be left blank or set to the same value as the containerPort. If you use containers in a task with the bridge network mode, you can specify a non-reserved host port for your container port mapping, or you can omit the hostPort (or set it to 0) while specifying a containerPort and your container automatically receives a port in the ephemeral port range for your container instance operating system and Docker version. The default ephemeral port range for Docker version 1.6.0 and later is listed on the instance under /proc/sys/net/ipv4/ip_local_port_range. If this kernel parameter is unavailable, the default ephemeral port range from 49153 through 65535 is used. Do not attempt to specify a host port in the ephemeral port range as these are reserved for automatic assignment. In general, ports below 32768 are outside of the ephemeral port range. The default reserved ports are 22 for SSH, the Docker ports 2375 and 2376, and the Amazon ECS container agent ports 51678-51680. Any host port that was previously specified in a running task is also reserved while the task is running. That is, after a task stops, the host port is released. The current reserved ports are displayed in the remainingResources of DescribeContainerInstances output. A container instance can have up to 100 reserved ports at a time. This number includes the default reserved ports. Automatically assigned ports aren't included in the 100 reserved ports quota.
2683
+ * The port number on the container instance to reserve for your container. If you specify a containerPortRange, leave this field empty and the value of the hostPort is set as follows: For containers in a task with the awsvpc network mode, the hostPort is set to the same value as the containerPort. This is a static mapping strategy. For containers in a task with the bridge network mode, the Amazon ECS agent finds open ports on the host and automaticaly binds them to the container ports. This is a dynamic mapping strategy. If you use containers in a task with the awsvpc or host network mode, the hostPort can either be left blank or set to the same value as the containerPort. If you use containers in a task with the bridge network mode, you can specify a non-reserved host port for your container port mapping, or you can omit the hostPort (or set it to 0) while specifying a containerPort and your container automatically receives a port in the ephemeral port range for your container instance operating system and Docker version. The default ephemeral port range for Docker version 1.6.0 and later is listed on the instance under /proc/sys/net/ipv4/ip_local_port_range. If this kernel parameter is unavailable, the default ephemeral port range from 49153 through 65535 is used. Do not attempt to specify a host port in the ephemeral port range as these are reserved for automatic assignment. In general, ports below 32768 are outside of the ephemeral port range. The default reserved ports are 22 for SSH, the Docker ports 2375 and 2376, and the Amazon ECS container agent ports 51678-51680. Any host port that was previously specified in a running task is also reserved while the task is running. That is, after a task stops, the host port is released. The current reserved ports are displayed in the remainingResources of DescribeContainerInstances output. A container instance can have up to 100 reserved ports at a time. This number includes the default reserved ports. Automatically assigned ports aren't included in the 100 reserved ports quota.
2676
2684
  */
2677
2685
  hostPort?: BoxedInteger;
2678
2686
  /**
@@ -2687,6 +2695,10 @@ declare namespace ECS {
2687
2695
  * The application protocol that's used for the port mapping. This parameter only applies to Service Connect. We recommend that you set this parameter to be consistent with the protocol that your application uses. If you set this parameter, Amazon ECS adds protocol-specific connection handling to the Service Connect proxy. If you set this parameter, Amazon ECS adds protocol-specific telemetry in the Amazon ECS console and CloudWatch. If you don't set a value for this parameter, then TCP is used. However, Amazon ECS doesn't add protocol-specific telemetry for TCP. Tasks that run in a namespace can use short names to connect to services in the namespace. Tasks can connect to services across all of the clusters in the namespace. Tasks connect through a managed proxy container that collects logs and metrics for increased visibility. Only the tasks that Amazon ECS services create are supported with Service Connect. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide.
2688
2696
  */
2689
2697
  appProtocol?: ApplicationProtocol;
2698
+ /**
2699
+ * The port number range on the container that's bound to the dynamically mapped host port range. The following rules apply when you specify a containerPortRange: You must use either the bridge network mode or the awsvpc network mode. This parameter is available for both the EC2 and Fargate launch types. This parameter is available for both the Linux and Windows operating systems. The container instance must have at least version 1.67.0 of the container agent and at least version 1.67.0-1 of the ecs-init package You can specify a maximum of 100 port ranges per container. You do not specify a hostPortRange. The value of the hostPortRange is set as follows: For containers in a task with the awsvpc network mode, the hostPort is set to the same value as the containerPort. This is a static mapping strategy. For containers in a task with the bridge network mode, the Amazon ECS agent finds open host ports from the default ephemeral range and passes it to docker to bind them to the container ports. The containerPortRange valid values are between 1 and 65535. A port can only be included in one port mapping per container. You cannot specify overlapping port ranges. The first port in the range must be less than last port in the range. Docker recommends that you turn off the docker-proxy in the Docker daemon config file when you have a large number of ports. For more information, see Issue #11185 on the Github website. For information about how to turn off the docker-proxy in the Docker daemon config file, see Docker daemon in the Amazon ECS Developer Guide. You can call DescribeTasks to view the hostPortRange which are the host ports that are bound to the container ports.
2700
+ */
2701
+ containerPortRange?: String;
2690
2702
  }
2691
2703
  export type PortMappingList = PortMapping[];
2692
2704
  export type PortNumber = number;
@@ -53,11 +53,11 @@ declare class EKS extends Service {
53
53
  */
54
54
  createFargateProfile(callback?: (err: AWSError, data: EKS.Types.CreateFargateProfileResponse) => void): Request<EKS.Types.CreateFargateProfileResponse, AWSError>;
55
55
  /**
56
- * Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster. Each node group uses a version of the Amazon EKS optimized Amazon Linux 2 AMI. For more information, see Managed Node Groups in the Amazon EKS User Guide.
56
+ * Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster. For more information, see Managed node groups in the Amazon EKS User Guide. Windows AMI types are only supported for commercial Regions that support Windows Amazon EKS.
57
57
  */
58
58
  createNodegroup(params: EKS.Types.CreateNodegroupRequest, callback?: (err: AWSError, data: EKS.Types.CreateNodegroupResponse) => void): Request<EKS.Types.CreateNodegroupResponse, AWSError>;
59
59
  /**
60
- * Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster. Each node group uses a version of the Amazon EKS optimized Amazon Linux 2 AMI. For more information, see Managed Node Groups in the Amazon EKS User Guide.
60
+ * Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster. For more information, see Managed node groups in the Amazon EKS User Guide. Windows AMI types are only supported for commercial Regions that support Windows Amazon EKS.
61
61
  */
62
62
  createNodegroup(callback?: (err: AWSError, data: EKS.Types.CreateNodegroupResponse) => void): Request<EKS.Types.CreateNodegroupResponse, AWSError>;
63
63
  /**
@@ -285,11 +285,11 @@ declare class EKS extends Service {
285
285
  */
286
286
  updateNodegroupConfig(callback?: (err: AWSError, data: EKS.Types.UpdateNodegroupConfigResponse) => void): Request<EKS.Types.UpdateNodegroupConfigResponse, AWSError>;
287
287
  /**
288
- * Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For more information, see Amazon EKS optimized Amazon Linux 2 AMI versions in the Amazon EKS User Guide. You cannot roll back a node group to an earlier Kubernetes version or AMI version. When a node in a managed node group is terminated due to a scaling action or update, the pods in that node are drained first. Amazon EKS attempts to drain the nodes gracefully and will fail if it is unable to do so. You can force the update if Amazon EKS is unable to drain the nodes as a result of a pod disruption budget issue.
288
+ * Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. You cannot roll back a node group to an earlier Kubernetes version or AMI version. When a node in a managed node group is terminated due to a scaling action or update, the pods in that node are drained first. Amazon EKS attempts to drain the nodes gracefully and will fail if it is unable to do so. You can force the update if Amazon EKS is unable to drain the nodes as a result of a pod disruption budget issue.
289
289
  */
290
290
  updateNodegroupVersion(params: EKS.Types.UpdateNodegroupVersionRequest, callback?: (err: AWSError, data: EKS.Types.UpdateNodegroupVersionResponse) => void): Request<EKS.Types.UpdateNodegroupVersionResponse, AWSError>;
291
291
  /**
292
- * Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For more information, see Amazon EKS optimized Amazon Linux 2 AMI versions in the Amazon EKS User Guide. You cannot roll back a node group to an earlier Kubernetes version or AMI version. When a node in a managed node group is terminated due to a scaling action or update, the pods in that node are drained first. Amazon EKS attempts to drain the nodes gracefully and will fail if it is unable to do so. You can force the update if Amazon EKS is unable to drain the nodes as a result of a pod disruption budget issue.
292
+ * Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. You cannot roll back a node group to an earlier Kubernetes version or AMI version. When a node in a managed node group is terminated due to a scaling action or update, the pods in that node are drained first. Amazon EKS attempts to drain the nodes gracefully and will fail if it is unable to do so. You can force the update if Amazon EKS is unable to drain the nodes as a result of a pod disruption budget issue.
293
293
  */
294
294
  updateNodegroupVersion(callback?: (err: AWSError, data: EKS.Types.UpdateNodegroupVersionResponse) => void): Request<EKS.Types.UpdateNodegroupVersionResponse, AWSError>;
295
295
  /**
@@ -358,7 +358,7 @@ declare class EKS extends Service {
358
358
  waitFor(state: "fargateProfileDeleted", callback?: (err: AWSError, data: EKS.Types.DescribeFargateProfileResponse) => void): Request<EKS.Types.DescribeFargateProfileResponse, AWSError>;
359
359
  }
360
360
  declare namespace EKS {
361
- export type AMITypes = "AL2_x86_64"|"AL2_x86_64_GPU"|"AL2_ARM_64"|"CUSTOM"|"BOTTLEROCKET_ARM_64"|"BOTTLEROCKET_x86_64"|"BOTTLEROCKET_ARM_64_NVIDIA"|"BOTTLEROCKET_x86_64_NVIDIA"|string;
361
+ export type AMITypes = "AL2_x86_64"|"AL2_x86_64_GPU"|"AL2_ARM_64"|"CUSTOM"|"BOTTLEROCKET_ARM_64"|"BOTTLEROCKET_x86_64"|"BOTTLEROCKET_ARM_64_NVIDIA"|"BOTTLEROCKET_x86_64_NVIDIA"|"WINDOWS_CORE_2019_x86_64"|"WINDOWS_FULL_2019_x86_64"|"WINDOWS_CORE_2022_x86_64"|"WINDOWS_FULL_2022_x86_64"|string;
362
362
  export interface Addon {
363
363
  /**
364
364
  * The name of the add-on.
@@ -377,7 +377,7 @@ declare namespace EKS {
377
377
  */
378
378
  addonVersion?: String;
379
379
  /**
380
- * An object representing the health of the add-on.
380
+ * An object that represents the health of the add-on.
381
381
  */
382
382
  health?: AddonHealth;
383
383
  /**
@@ -393,7 +393,7 @@ declare namespace EKS {
393
393
  */
394
394
  modifiedAt?: Timestamp;
395
395
  /**
396
- * The Amazon Resource Name (ARN) of the IAM role that is bound to the Kubernetes service account used by the add-on.
396
+ * The Amazon Resource Name (ARN) of the IAM role that's bound to the Kubernetes service account that the add-on uses.
397
397
  */
398
398
  serviceAccountRoleArn?: String;
399
399
  /**
@@ -413,7 +413,7 @@ declare namespace EKS {
413
413
  */
414
414
  marketplaceInformation?: MarketplaceInformation;
415
415
  /**
416
- * The provided configuration values.
416
+ * The configuration values that you provided.
417
417
  */
418
418
  configurationValues?: String;
419
419
  }
@@ -718,7 +718,7 @@ declare namespace EKS {
718
718
  */
719
719
  clusterName: ClusterName;
720
720
  /**
721
- * The name of the add-on. The name must match one of the names returned by DescribeAddonVersions .
721
+ * The name of the add-on. The name must match one of the names that DescribeAddonVersions returns.
722
722
  */
723
723
  addonName: String;
724
724
  /**
@@ -742,7 +742,7 @@ declare namespace EKS {
742
742
  */
743
743
  tags?: TagMap;
744
744
  /**
745
- * The set of configuration values for the add-on being created. Whatever values provided here are validated against the schema from DescribeAddonConfiguration .
745
+ * The set of configuration values for the add-on that's created. The values that you provide are validated against the schema in DescribeAddonConfiguration .
746
746
  */
747
747
  configurationValues?: String;
748
748
  }
@@ -847,7 +847,7 @@ declare namespace EKS {
847
847
  */
848
848
  scalingConfig?: NodegroupScalingConfig;
849
849
  /**
850
- * The root device disk size (in GiB) for your node group instances. The default disk size is 20 GiB. If you specify launchTemplate, then don't specify diskSize, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
850
+ * The root device disk size (in GiB) for your node group instances. The default disk size is 20 GiB for Linux and Bottlerocket. The default disk size is 50 GiB for Windows. If you specify launchTemplate, then don't specify diskSize, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
851
851
  */
852
852
  diskSize?: BoxedInteger;
853
853
  /**
@@ -855,15 +855,15 @@ declare namespace EKS {
855
855
  */
856
856
  subnets: StringList;
857
857
  /**
858
- * Specify the instance types for a node group. If you specify a GPU instance type, be sure to specify AL2_x86_64_GPU with the amiType parameter. If you specify launchTemplate, then you can specify zero or one instance type in your launch template or you can specify 0-20 instance types for instanceTypes. If however, you specify an instance type in your launch template and specify any instanceTypes, the node group deployment will fail. If you don't specify an instance type in a launch template or for instanceTypes, then t3.medium is used, by default. If you specify Spot for capacityType, then we recommend specifying multiple values for instanceTypes. For more information, see Managed node group capacity types and Launch template support in the Amazon EKS User Guide.
858
+ * Specify the instance types for a node group. If you specify a GPU instance type, make sure to also specify an applicable GPU AMI type with the amiType parameter. If you specify launchTemplate, then you can specify zero or one instance type in your launch template or you can specify 0-20 instance types for instanceTypes. If however, you specify an instance type in your launch template and specify any instanceTypes, the node group deployment will fail. If you don't specify an instance type in a launch template or for instanceTypes, then t3.medium is used, by default. If you specify Spot for capacityType, then we recommend specifying multiple values for instanceTypes. For more information, see Managed node group capacity types and Launch template support in the Amazon EKS User Guide.
859
859
  */
860
860
  instanceTypes?: StringList;
861
861
  /**
862
- * The AMI type for your node group. GPU instance types should use the AL2_x86_64_GPU AMI type. Non-GPU instances should use the AL2_x86_64 AMI type. Arm instances should use the AL2_ARM_64 AMI type. All types use the Amazon EKS optimized Amazon Linux 2 AMI. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify amiType, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
862
+ * The AMI type for your node group. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify amiType, or the node group deployment will fail. If your launch template uses a Windows custom AMI, then add eks:kube-proxy-windows to your Windows nodes rolearn in the aws-auth ConfigMap. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
863
863
  */
864
864
  amiType?: AMITypes;
865
865
  /**
866
- * The remote access (SSH) configuration to use with your node group. If you specify launchTemplate, then don't specify remoteAccess, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
866
+ * The remote access configuration to use with your node group. For Linux, the protocol is SSH. For Windows, the protocol is RDP. If you specify launchTemplate, then don't specify remoteAccess, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
867
867
  */
868
868
  remoteAccess?: RemoteAccessConfig;
869
869
  /**
@@ -903,7 +903,7 @@ declare namespace EKS {
903
903
  */
904
904
  version?: String;
905
905
  /**
906
- * The AMI version of the Amazon EKS optimized AMI to use with your node group. By default, the latest available AMI version for the node group's current Kubernetes version is used. For more information, see Amazon EKS optimized Amazon Linux 2 AMI versions in the Amazon EKS User Guide. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify releaseVersion, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
906
+ * The AMI version of the Amazon EKS optimized AMI to use with your node group. By default, the latest available AMI version for the node group's current Kubernetes version is used. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. Amazon EKS managed node groups support the November 2022 and later releases of the Windows AMIs. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify releaseVersion, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
907
907
  */
908
908
  releaseVersion?: String;
909
909
  }
@@ -985,7 +985,7 @@ declare namespace EKS {
985
985
  }
986
986
  export interface DescribeAddonConfigurationRequest {
987
987
  /**
988
- * The name of the add-on. The name must match one of the names returned by DescribeAddonVersions .
988
+ * The name of the add-on. The name must match one of the names that DescribeAddonVersions returns.
989
989
  */
990
990
  addonName: String;
991
991
  /**
@@ -1003,7 +1003,7 @@ declare namespace EKS {
1003
1003
  */
1004
1004
  addonVersion?: String;
1005
1005
  /**
1006
- * A JSON schema used to validate provided configuration values when creating or updating an addon.
1006
+ * A JSON schema that's used to validate the configuration values that you provide when an addon is created or updated.
1007
1007
  */
1008
1008
  configurationSchema?: String;
1009
1009
  }
@@ -1802,11 +1802,11 @@ declare namespace EKS {
1802
1802
  }
1803
1803
  export interface RemoteAccessConfig {
1804
1804
  /**
1805
- * The Amazon EC2 SSH key name that provides access for SSH communication with the nodes in the managed node group. For more information, see Amazon EC2 key pairs and Linux instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
1805
+ * The Amazon EC2 SSH key name that provides access for SSH communication with the nodes in the managed node group. For more information, see Amazon EC2 key pairs and Linux instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances. For Windows, an Amazon EC2 SSH key is used to obtain the RDP password. For more information, see Amazon EC2 key pairs and Windows instances in the Amazon Elastic Compute Cloud User Guide for Windows Instances.
1806
1806
  */
1807
1807
  ec2SshKey?: String;
1808
1808
  /**
1809
- * The security group ids that are allowed SSH access (port 22) to the nodes. If you specify an Amazon EC2 SSH key but do not specify a source security group when you create a managed node group, then port 22 on the nodes is opened to the internet (0.0.0.0/0). For more information, see Security Groups for Your VPC in the Amazon Virtual Private Cloud User Guide.
1809
+ * The security group IDs that are allowed SSH access (port 22) to the nodes. For Windows, the port is 3389. If you specify an Amazon EC2 SSH key but don't specify a source security group when you create a managed node group, then the port on the nodes is opened to the internet (0.0.0.0/0). For more information, see Security Groups for Your VPC in the Amazon Virtual Private Cloud User Guide.
1810
1810
  */
1811
1811
  sourceSecurityGroups?: StringList;
1812
1812
  }
@@ -1910,7 +1910,7 @@ declare namespace EKS {
1910
1910
  */
1911
1911
  clientRequestToken?: String;
1912
1912
  /**
1913
- * The set of configuration values for the add-on being created. Whatever values provided here are validated against the schema from DescribeAddonConfiguration
1913
+ * The set of configuration values for the add-on that's created. The values that you provide are validated against the schema in DescribeAddonConfiguration.
1914
1914
  */
1915
1915
  configurationValues?: String;
1916
1916
  }
@@ -2012,7 +2012,7 @@ declare namespace EKS {
2012
2012
  */
2013
2013
  version?: String;
2014
2014
  /**
2015
- * The AMI version of the Amazon EKS optimized AMI to use for the update. By default, the latest available AMI version for the node group's Kubernetes version is used. For more information, see Amazon EKS optimized Amazon Linux 2 AMI versions in the Amazon EKS User Guide. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify releaseVersion, or the node group update will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
2015
+ * The AMI version of the Amazon EKS optimized AMI to use for the update. By default, the latest available AMI version for the node group's Kubernetes version is used. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. Amazon EKS managed node groups support the November 2022 and later releases of the Windows AMIs. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify releaseVersion, or the node group update will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
2016
2016
  */
2017
2017
  releaseVersion?: String;
2018
2018
  /**
@@ -5166,6 +5166,10 @@ declare namespace Glue {
5166
5166
  * Specifies whether to write the manifest files to the Delta table path.
5167
5167
  */
5168
5168
  WriteManifest?: NullableBoolean;
5169
+ /**
5170
+ * Specifies whether the crawler will create native tables, to allow integration with query engines that support querying of the Delta transaction log directly.
5171
+ */
5172
+ CreateNativeDeltaTable?: NullableBoolean;
5169
5173
  }
5170
5174
  export type DeltaTargetList = DeltaTarget[];
5171
5175
  export type DescriptionString = string;