@cdklabs/cdk-ecs-codedeploy 0.0.6 → 0.0.8
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/ecs-appspec/index.js +1 -1
- package/lib/ecs-deployment/index.js +1 -1
- package/node_modules/aws-sdk/CHANGELOG.md +19 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/backup-gateway-2021-01-01.min.json +211 -9
- package/node_modules/aws-sdk/apis/ce-2017-10-25.min.json +21 -3
- package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +5 -2
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +3 -0
- package/node_modules/aws-sdk/apis/kinesis-2013-12-02.min.json +304 -51
- package/node_modules/aws-sdk/apis/kinesis-2013-12-02.paginators.json +6 -3
- package/node_modules/aws-sdk/apis/m2-2021-04-28.min.json +4 -0
- package/node_modules/aws-sdk/apis/monitoring-2010-08-01.min.json +33 -27
- package/node_modules/aws-sdk/apis/networkmanager-2019-07-05.min.json +3 -0
- package/node_modules/aws-sdk/apis/redshift-data-2019-12-20.min.json +13 -7
- package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +541 -524
- package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +796 -160
- package/node_modules/aws-sdk/clients/backupgateway.d.ts +258 -0
- package/node_modules/aws-sdk/clients/cloudwatch.d.ts +12 -3
- package/node_modules/aws-sdk/clients/connect.d.ts +7 -7
- package/node_modules/aws-sdk/clients/costexplorer.d.ts +33 -13
- package/node_modules/aws-sdk/clients/ecs.d.ts +15 -3
- package/node_modules/aws-sdk/clients/eks.d.ts +21 -21
- package/node_modules/aws-sdk/clients/glue.d.ts +4 -0
- package/node_modules/aws-sdk/clients/kinesis.d.ts +180 -60
- package/node_modules/aws-sdk/clients/location.d.ts +2 -2
- package/node_modules/aws-sdk/clients/m2.d.ts +81 -65
- package/node_modules/aws-sdk/clients/networkmanager.d.ts +6 -2
- package/node_modules/aws-sdk/clients/redshiftdata.d.ts +31 -22
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +60 -42
- package/node_modules/aws-sdk/clients/sagemakermetrics.d.ts +7 -7
- package/node_modules/aws-sdk/clients/securityhub.d.ts +971 -0
- package/node_modules/aws-sdk/clients/translate.d.ts +10 -9
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +13 -13
- package/node_modules/aws-sdk/dist/aws-sdk.js +372 -89
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +95 -95
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +6 -6
|
@@ -173,11 +173,11 @@ declare class ECS extends Service {
|
|
|
173
173
|
*/
|
|
174
174
|
discoverPollEndpoint(callback?: (err: AWSError, data: ECS.Types.DiscoverPollEndpointResponse) => void): Request<ECS.Types.DiscoverPollEndpointResponse, AWSError>;
|
|
175
175
|
/**
|
|
176
|
-
* Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value.
|
|
176
|
+
* Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value. For information about required permissions and considerations, see Using Amazon ECS Exec for debugging in the Amazon ECS Developer Guide.
|
|
177
177
|
*/
|
|
178
178
|
executeCommand(params: ECS.Types.ExecuteCommandRequest, callback?: (err: AWSError, data: ECS.Types.ExecuteCommandResponse) => void): Request<ECS.Types.ExecuteCommandResponse, AWSError>;
|
|
179
179
|
/**
|
|
180
|
-
* Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value.
|
|
180
|
+
* Runs a command remotely on a container within a task. If you use a condition key in your IAM policy to refine the conditions for the policy statement, for example limit the actions to a specific cluster, you receive an AccessDeniedException when there is a mismatch between the condition key value and the corresponding parameter value. For information about required permissions and considerations, see Using Amazon ECS Exec for debugging in the Amazon ECS Developer Guide.
|
|
181
181
|
*/
|
|
182
182
|
executeCommand(callback?: (err: AWSError, data: ECS.Types.ExecuteCommandResponse) => void): Request<ECS.Types.ExecuteCommandResponse, AWSError>;
|
|
183
183
|
/**
|
|
@@ -2604,6 +2604,14 @@ declare namespace ECS {
|
|
|
2604
2604
|
* The protocol used for the network binding.
|
|
2605
2605
|
*/
|
|
2606
2606
|
protocol?: TransportProtocol;
|
|
2607
|
+
/**
|
|
2608
|
+
* The port number range on the container that's bound to the dynamically mapped host port range. The following rules apply when you specify a containerPortRange: You must use either the bridge network mode or the awsvpc network mode. This parameter is available for both the EC2 and Fargate launch types. This parameter is available for both the Linux and Windows operating systems. The container instance must have at least version 1.67.0 of the container agent and at least version 1.67.0-1 of the ecs-init package You can specify a maximum of 100 port ranges per container. You do not specify a hostPortRange. The value of the hostPortRange is set as follows: For containers in a task with the awsvpc network mode, the hostPort is set to the same value as the containerPort. This is a static mapping strategy. For containers in a task with the bridge network mode, the Amazon ECS agent finds open host ports from the default ephemeral range and passes it to docker to bind them to the container ports. The containerPortRange valid values are between 1 and 65535. A port can only be included in one port mapping per container. You cannot specify overlapping port ranges. The first port in the range must be less than last port in the range. Docker recommends that you turn off the docker-proxy in the Docker daemon config file when you have a large number of ports. For more information, see Issue #11185 on the Github website. For information about how to turn off the docker-proxy in the Docker daemon config file, see Docker daemon in the Amazon ECS Developer Guide. You can call DescribeTasks to view the hostPortRange which are the host ports that are bound to the container ports.
|
|
2609
|
+
*/
|
|
2610
|
+
containerPortRange?: String;
|
|
2611
|
+
/**
|
|
2612
|
+
* The port number range on the host that's used with the network binding. This is assigned is assigned by Docker and delivered by the Amazon ECS agent.
|
|
2613
|
+
*/
|
|
2614
|
+
hostPortRange?: String;
|
|
2607
2615
|
}
|
|
2608
2616
|
export type NetworkBindings = NetworkBinding[];
|
|
2609
2617
|
export interface NetworkConfiguration {
|
|
@@ -2672,7 +2680,7 @@ declare namespace ECS {
|
|
|
2672
2680
|
*/
|
|
2673
2681
|
containerPort?: BoxedInteger;
|
|
2674
2682
|
/**
|
|
2675
|
-
* The port number on the container instance to reserve for your container. If you use containers in a task with the awsvpc or host network mode, the hostPort can either be left blank or set to the same value as the containerPort. If you use containers in a task with the bridge network mode, you can specify a non-reserved host port for your container port mapping, or you can omit the hostPort (or set it to 0) while specifying a containerPort and your container automatically receives a port in the ephemeral port range for your container instance operating system and Docker version. The default ephemeral port range for Docker version 1.6.0 and later is listed on the instance under /proc/sys/net/ipv4/ip_local_port_range. If this kernel parameter is unavailable, the default ephemeral port range from 49153 through 65535 is used. Do not attempt to specify a host port in the ephemeral port range as these are reserved for automatic assignment. In general, ports below 32768 are outside of the ephemeral port range. The default reserved ports are 22 for SSH, the Docker ports 2375 and 2376, and the Amazon ECS container agent ports 51678-51680. Any host port that was previously specified in a running task is also reserved while the task is running. That is, after a task stops, the host port is released. The current reserved ports are displayed in the remainingResources of DescribeContainerInstances output. A container instance can have up to 100 reserved ports at a time. This number includes the default reserved ports. Automatically assigned ports aren't included in the 100 reserved ports quota.
|
|
2683
|
+
* The port number on the container instance to reserve for your container. If you specify a containerPortRange, leave this field empty and the value of the hostPort is set as follows: For containers in a task with the awsvpc network mode, the hostPort is set to the same value as the containerPort. This is a static mapping strategy. For containers in a task with the bridge network mode, the Amazon ECS agent finds open ports on the host and automaticaly binds them to the container ports. This is a dynamic mapping strategy. If you use containers in a task with the awsvpc or host network mode, the hostPort can either be left blank or set to the same value as the containerPort. If you use containers in a task with the bridge network mode, you can specify a non-reserved host port for your container port mapping, or you can omit the hostPort (or set it to 0) while specifying a containerPort and your container automatically receives a port in the ephemeral port range for your container instance operating system and Docker version. The default ephemeral port range for Docker version 1.6.0 and later is listed on the instance under /proc/sys/net/ipv4/ip_local_port_range. If this kernel parameter is unavailable, the default ephemeral port range from 49153 through 65535 is used. Do not attempt to specify a host port in the ephemeral port range as these are reserved for automatic assignment. In general, ports below 32768 are outside of the ephemeral port range. The default reserved ports are 22 for SSH, the Docker ports 2375 and 2376, and the Amazon ECS container agent ports 51678-51680. Any host port that was previously specified in a running task is also reserved while the task is running. That is, after a task stops, the host port is released. The current reserved ports are displayed in the remainingResources of DescribeContainerInstances output. A container instance can have up to 100 reserved ports at a time. This number includes the default reserved ports. Automatically assigned ports aren't included in the 100 reserved ports quota.
|
|
2676
2684
|
*/
|
|
2677
2685
|
hostPort?: BoxedInteger;
|
|
2678
2686
|
/**
|
|
@@ -2687,6 +2695,10 @@ declare namespace ECS {
|
|
|
2687
2695
|
* The application protocol that's used for the port mapping. This parameter only applies to Service Connect. We recommend that you set this parameter to be consistent with the protocol that your application uses. If you set this parameter, Amazon ECS adds protocol-specific connection handling to the Service Connect proxy. If you set this parameter, Amazon ECS adds protocol-specific telemetry in the Amazon ECS console and CloudWatch. If you don't set a value for this parameter, then TCP is used. However, Amazon ECS doesn't add protocol-specific telemetry for TCP. Tasks that run in a namespace can use short names to connect to services in the namespace. Tasks can connect to services across all of the clusters in the namespace. Tasks connect through a managed proxy container that collects logs and metrics for increased visibility. Only the tasks that Amazon ECS services create are supported with Service Connect. For more information, see Service Connect in the Amazon Elastic Container Service Developer Guide.
|
|
2688
2696
|
*/
|
|
2689
2697
|
appProtocol?: ApplicationProtocol;
|
|
2698
|
+
/**
|
|
2699
|
+
* The port number range on the container that's bound to the dynamically mapped host port range. The following rules apply when you specify a containerPortRange: You must use either the bridge network mode or the awsvpc network mode. This parameter is available for both the EC2 and Fargate launch types. This parameter is available for both the Linux and Windows operating systems. The container instance must have at least version 1.67.0 of the container agent and at least version 1.67.0-1 of the ecs-init package You can specify a maximum of 100 port ranges per container. You do not specify a hostPortRange. The value of the hostPortRange is set as follows: For containers in a task with the awsvpc network mode, the hostPort is set to the same value as the containerPort. This is a static mapping strategy. For containers in a task with the bridge network mode, the Amazon ECS agent finds open host ports from the default ephemeral range and passes it to docker to bind them to the container ports. The containerPortRange valid values are between 1 and 65535. A port can only be included in one port mapping per container. You cannot specify overlapping port ranges. The first port in the range must be less than last port in the range. Docker recommends that you turn off the docker-proxy in the Docker daemon config file when you have a large number of ports. For more information, see Issue #11185 on the Github website. For information about how to turn off the docker-proxy in the Docker daemon config file, see Docker daemon in the Amazon ECS Developer Guide. You can call DescribeTasks to view the hostPortRange which are the host ports that are bound to the container ports.
|
|
2700
|
+
*/
|
|
2701
|
+
containerPortRange?: String;
|
|
2690
2702
|
}
|
|
2691
2703
|
export type PortMappingList = PortMapping[];
|
|
2692
2704
|
export type PortNumber = number;
|
|
@@ -53,11 +53,11 @@ declare class EKS extends Service {
|
|
|
53
53
|
*/
|
|
54
54
|
createFargateProfile(callback?: (err: AWSError, data: EKS.Types.CreateFargateProfileResponse) => void): Request<EKS.Types.CreateFargateProfileResponse, AWSError>;
|
|
55
55
|
/**
|
|
56
|
-
* Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster.
|
|
56
|
+
* Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster. For more information, see Managed node groups in the Amazon EKS User Guide. Windows AMI types are only supported for commercial Regions that support Windows Amazon EKS.
|
|
57
57
|
*/
|
|
58
58
|
createNodegroup(params: EKS.Types.CreateNodegroupRequest, callback?: (err: AWSError, data: EKS.Types.CreateNodegroupResponse) => void): Request<EKS.Types.CreateNodegroupResponse, AWSError>;
|
|
59
59
|
/**
|
|
60
|
-
* Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster.
|
|
60
|
+
* Creates a managed node group for an Amazon EKS cluster. You can only create a node group for your cluster that is equal to the current Kubernetes version for the cluster. All node groups are created with the latest AMI release version for the respective minor Kubernetes version of the cluster, unless you deploy a custom AMI using a launch template. For more information about using launch templates, see Launch template support. An Amazon EKS managed node group is an Amazon EC2 Auto Scaling group and associated Amazon EC2 instances that are managed by Amazon Web Services for an Amazon EKS cluster. For more information, see Managed node groups in the Amazon EKS User Guide. Windows AMI types are only supported for commercial Regions that support Windows Amazon EKS.
|
|
61
61
|
*/
|
|
62
62
|
createNodegroup(callback?: (err: AWSError, data: EKS.Types.CreateNodegroupResponse) => void): Request<EKS.Types.CreateNodegroupResponse, AWSError>;
|
|
63
63
|
/**
|
|
@@ -285,11 +285,11 @@ declare class EKS extends Service {
|
|
|
285
285
|
*/
|
|
286
286
|
updateNodegroupConfig(callback?: (err: AWSError, data: EKS.Types.UpdateNodegroupConfigResponse) => void): Request<EKS.Types.UpdateNodegroupConfigResponse, AWSError>;
|
|
287
287
|
/**
|
|
288
|
-
* Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For
|
|
288
|
+
* Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. You cannot roll back a node group to an earlier Kubernetes version or AMI version. When a node in a managed node group is terminated due to a scaling action or update, the pods in that node are drained first. Amazon EKS attempts to drain the nodes gracefully and will fail if it is unable to do so. You can force the update if Amazon EKS is unable to drain the nodes as a result of a pod disruption budget issue.
|
|
289
289
|
*/
|
|
290
290
|
updateNodegroupVersion(params: EKS.Types.UpdateNodegroupVersionRequest, callback?: (err: AWSError, data: EKS.Types.UpdateNodegroupVersionResponse) => void): Request<EKS.Types.UpdateNodegroupVersionResponse, AWSError>;
|
|
291
291
|
/**
|
|
292
|
-
* Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For
|
|
292
|
+
* Updates the Kubernetes version or AMI version of an Amazon EKS managed node group. You can update a node group using a launch template only if the node group was originally deployed with a launch template. If you need to update a custom AMI in a node group that was deployed with a launch template, then update your custom AMI, specify the new ID in a new version of the launch template, and then update the node group to the new version of the launch template. If you update without a launch template, then you can update to the latest available AMI version of a node group's current Kubernetes version by not specifying a Kubernetes version in the request. You can update to the latest AMI version of your cluster's current Kubernetes version by specifying your cluster's Kubernetes version in the request. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. You cannot roll back a node group to an earlier Kubernetes version or AMI version. When a node in a managed node group is terminated due to a scaling action or update, the pods in that node are drained first. Amazon EKS attempts to drain the nodes gracefully and will fail if it is unable to do so. You can force the update if Amazon EKS is unable to drain the nodes as a result of a pod disruption budget issue.
|
|
293
293
|
*/
|
|
294
294
|
updateNodegroupVersion(callback?: (err: AWSError, data: EKS.Types.UpdateNodegroupVersionResponse) => void): Request<EKS.Types.UpdateNodegroupVersionResponse, AWSError>;
|
|
295
295
|
/**
|
|
@@ -358,7 +358,7 @@ declare class EKS extends Service {
|
|
|
358
358
|
waitFor(state: "fargateProfileDeleted", callback?: (err: AWSError, data: EKS.Types.DescribeFargateProfileResponse) => void): Request<EKS.Types.DescribeFargateProfileResponse, AWSError>;
|
|
359
359
|
}
|
|
360
360
|
declare namespace EKS {
|
|
361
|
-
export type AMITypes = "AL2_x86_64"|"AL2_x86_64_GPU"|"AL2_ARM_64"|"CUSTOM"|"BOTTLEROCKET_ARM_64"|"BOTTLEROCKET_x86_64"|"BOTTLEROCKET_ARM_64_NVIDIA"|"BOTTLEROCKET_x86_64_NVIDIA"|string;
|
|
361
|
+
export type AMITypes = "AL2_x86_64"|"AL2_x86_64_GPU"|"AL2_ARM_64"|"CUSTOM"|"BOTTLEROCKET_ARM_64"|"BOTTLEROCKET_x86_64"|"BOTTLEROCKET_ARM_64_NVIDIA"|"BOTTLEROCKET_x86_64_NVIDIA"|"WINDOWS_CORE_2019_x86_64"|"WINDOWS_FULL_2019_x86_64"|"WINDOWS_CORE_2022_x86_64"|"WINDOWS_FULL_2022_x86_64"|string;
|
|
362
362
|
export interface Addon {
|
|
363
363
|
/**
|
|
364
364
|
* The name of the add-on.
|
|
@@ -377,7 +377,7 @@ declare namespace EKS {
|
|
|
377
377
|
*/
|
|
378
378
|
addonVersion?: String;
|
|
379
379
|
/**
|
|
380
|
-
* An object
|
|
380
|
+
* An object that represents the health of the add-on.
|
|
381
381
|
*/
|
|
382
382
|
health?: AddonHealth;
|
|
383
383
|
/**
|
|
@@ -393,7 +393,7 @@ declare namespace EKS {
|
|
|
393
393
|
*/
|
|
394
394
|
modifiedAt?: Timestamp;
|
|
395
395
|
/**
|
|
396
|
-
* The Amazon Resource Name (ARN) of the IAM role that
|
|
396
|
+
* The Amazon Resource Name (ARN) of the IAM role that's bound to the Kubernetes service account that the add-on uses.
|
|
397
397
|
*/
|
|
398
398
|
serviceAccountRoleArn?: String;
|
|
399
399
|
/**
|
|
@@ -413,7 +413,7 @@ declare namespace EKS {
|
|
|
413
413
|
*/
|
|
414
414
|
marketplaceInformation?: MarketplaceInformation;
|
|
415
415
|
/**
|
|
416
|
-
* The
|
|
416
|
+
* The configuration values that you provided.
|
|
417
417
|
*/
|
|
418
418
|
configurationValues?: String;
|
|
419
419
|
}
|
|
@@ -718,7 +718,7 @@ declare namespace EKS {
|
|
|
718
718
|
*/
|
|
719
719
|
clusterName: ClusterName;
|
|
720
720
|
/**
|
|
721
|
-
* The name of the add-on. The name must match one of the names
|
|
721
|
+
* The name of the add-on. The name must match one of the names that DescribeAddonVersions returns.
|
|
722
722
|
*/
|
|
723
723
|
addonName: String;
|
|
724
724
|
/**
|
|
@@ -742,7 +742,7 @@ declare namespace EKS {
|
|
|
742
742
|
*/
|
|
743
743
|
tags?: TagMap;
|
|
744
744
|
/**
|
|
745
|
-
*
|
|
745
|
+
* The set of configuration values for the add-on that's created. The values that you provide are validated against the schema in DescribeAddonConfiguration .
|
|
746
746
|
*/
|
|
747
747
|
configurationValues?: String;
|
|
748
748
|
}
|
|
@@ -847,7 +847,7 @@ declare namespace EKS {
|
|
|
847
847
|
*/
|
|
848
848
|
scalingConfig?: NodegroupScalingConfig;
|
|
849
849
|
/**
|
|
850
|
-
* The root device disk size (in GiB) for your node group instances. The default disk size is 20 GiB. If you specify launchTemplate, then don't specify diskSize, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
|
|
850
|
+
* The root device disk size (in GiB) for your node group instances. The default disk size is 20 GiB for Linux and Bottlerocket. The default disk size is 50 GiB for Windows. If you specify launchTemplate, then don't specify diskSize, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
|
|
851
851
|
*/
|
|
852
852
|
diskSize?: BoxedInteger;
|
|
853
853
|
/**
|
|
@@ -855,15 +855,15 @@ declare namespace EKS {
|
|
|
855
855
|
*/
|
|
856
856
|
subnets: StringList;
|
|
857
857
|
/**
|
|
858
|
-
* Specify the instance types for a node group. If you specify a GPU instance type,
|
|
858
|
+
* Specify the instance types for a node group. If you specify a GPU instance type, make sure to also specify an applicable GPU AMI type with the amiType parameter. If you specify launchTemplate, then you can specify zero or one instance type in your launch template or you can specify 0-20 instance types for instanceTypes. If however, you specify an instance type in your launch template and specify any instanceTypes, the node group deployment will fail. If you don't specify an instance type in a launch template or for instanceTypes, then t3.medium is used, by default. If you specify Spot for capacityType, then we recommend specifying multiple values for instanceTypes. For more information, see Managed node group capacity types and Launch template support in the Amazon EKS User Guide.
|
|
859
859
|
*/
|
|
860
860
|
instanceTypes?: StringList;
|
|
861
861
|
/**
|
|
862
|
-
* The AMI type for your node group.
|
|
862
|
+
* The AMI type for your node group. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify amiType, or the node group deployment will fail. If your launch template uses a Windows custom AMI, then add eks:kube-proxy-windows to your Windows nodes rolearn in the aws-auth ConfigMap. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
|
|
863
863
|
*/
|
|
864
864
|
amiType?: AMITypes;
|
|
865
865
|
/**
|
|
866
|
-
* The remote access
|
|
866
|
+
* The remote access configuration to use with your node group. For Linux, the protocol is SSH. For Windows, the protocol is RDP. If you specify launchTemplate, then don't specify remoteAccess, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
|
|
867
867
|
*/
|
|
868
868
|
remoteAccess?: RemoteAccessConfig;
|
|
869
869
|
/**
|
|
@@ -903,7 +903,7 @@ declare namespace EKS {
|
|
|
903
903
|
*/
|
|
904
904
|
version?: String;
|
|
905
905
|
/**
|
|
906
|
-
* The AMI version of the Amazon EKS optimized AMI to use with your node group. By default, the latest available AMI version for the node group's current Kubernetes version is used. For
|
|
906
|
+
* The AMI version of the Amazon EKS optimized AMI to use with your node group. By default, the latest available AMI version for the node group's current Kubernetes version is used. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. Amazon EKS managed node groups support the November 2022 and later releases of the Windows AMIs. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify releaseVersion, or the node group deployment will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
|
|
907
907
|
*/
|
|
908
908
|
releaseVersion?: String;
|
|
909
909
|
}
|
|
@@ -985,7 +985,7 @@ declare namespace EKS {
|
|
|
985
985
|
}
|
|
986
986
|
export interface DescribeAddonConfigurationRequest {
|
|
987
987
|
/**
|
|
988
|
-
* The name of the add-on. The name must match one of the names
|
|
988
|
+
* The name of the add-on. The name must match one of the names that DescribeAddonVersions returns.
|
|
989
989
|
*/
|
|
990
990
|
addonName: String;
|
|
991
991
|
/**
|
|
@@ -1003,7 +1003,7 @@ declare namespace EKS {
|
|
|
1003
1003
|
*/
|
|
1004
1004
|
addonVersion?: String;
|
|
1005
1005
|
/**
|
|
1006
|
-
* A JSON schema used to validate
|
|
1006
|
+
* A JSON schema that's used to validate the configuration values that you provide when an addon is created or updated.
|
|
1007
1007
|
*/
|
|
1008
1008
|
configurationSchema?: String;
|
|
1009
1009
|
}
|
|
@@ -1802,11 +1802,11 @@ declare namespace EKS {
|
|
|
1802
1802
|
}
|
|
1803
1803
|
export interface RemoteAccessConfig {
|
|
1804
1804
|
/**
|
|
1805
|
-
* The Amazon EC2 SSH key name that provides access for SSH communication with the nodes in the managed node group. For more information, see Amazon EC2 key pairs and Linux instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
|
|
1805
|
+
* The Amazon EC2 SSH key name that provides access for SSH communication with the nodes in the managed node group. For more information, see Amazon EC2 key pairs and Linux instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances. For Windows, an Amazon EC2 SSH key is used to obtain the RDP password. For more information, see Amazon EC2 key pairs and Windows instances in the Amazon Elastic Compute Cloud User Guide for Windows Instances.
|
|
1806
1806
|
*/
|
|
1807
1807
|
ec2SshKey?: String;
|
|
1808
1808
|
/**
|
|
1809
|
-
* The security group
|
|
1809
|
+
* The security group IDs that are allowed SSH access (port 22) to the nodes. For Windows, the port is 3389. If you specify an Amazon EC2 SSH key but don't specify a source security group when you create a managed node group, then the port on the nodes is opened to the internet (0.0.0.0/0). For more information, see Security Groups for Your VPC in the Amazon Virtual Private Cloud User Guide.
|
|
1810
1810
|
*/
|
|
1811
1811
|
sourceSecurityGroups?: StringList;
|
|
1812
1812
|
}
|
|
@@ -1910,7 +1910,7 @@ declare namespace EKS {
|
|
|
1910
1910
|
*/
|
|
1911
1911
|
clientRequestToken?: String;
|
|
1912
1912
|
/**
|
|
1913
|
-
* The set of configuration values for the add-on
|
|
1913
|
+
* The set of configuration values for the add-on that's created. The values that you provide are validated against the schema in DescribeAddonConfiguration.
|
|
1914
1914
|
*/
|
|
1915
1915
|
configurationValues?: String;
|
|
1916
1916
|
}
|
|
@@ -2012,7 +2012,7 @@ declare namespace EKS {
|
|
|
2012
2012
|
*/
|
|
2013
2013
|
version?: String;
|
|
2014
2014
|
/**
|
|
2015
|
-
* The AMI version of the Amazon EKS optimized AMI to use for the update. By default, the latest available AMI version for the node group's Kubernetes version is used. For
|
|
2015
|
+
* The AMI version of the Amazon EKS optimized AMI to use for the update. By default, the latest available AMI version for the node group's Kubernetes version is used. For information about Linux versions, see Amazon EKS optimized Amazon Linux AMI versions in the Amazon EKS User Guide. Amazon EKS managed node groups support the November 2022 and later releases of the Windows AMIs. For information about Windows versions, see Amazon EKS optimized Windows AMI versions in the Amazon EKS User Guide. If you specify launchTemplate, and your launch template uses a custom AMI, then don't specify releaseVersion, or the node group update will fail. For more information about using launch templates with Amazon EKS, see Launch template support in the Amazon EKS User Guide.
|
|
2016
2016
|
*/
|
|
2017
2017
|
releaseVersion?: String;
|
|
2018
2018
|
/**
|
|
@@ -5166,6 +5166,10 @@ declare namespace Glue {
|
|
|
5166
5166
|
* Specifies whether to write the manifest files to the Delta table path.
|
|
5167
5167
|
*/
|
|
5168
5168
|
WriteManifest?: NullableBoolean;
|
|
5169
|
+
/**
|
|
5170
|
+
* Specifies whether the crawler will create native tables, to allow integration with query engines that support querying of the Delta transaction log directly.
|
|
5171
|
+
*/
|
|
5172
|
+
CreateNativeDeltaTable?: NullableBoolean;
|
|
5169
5173
|
}
|
|
5170
5174
|
export type DeltaTargetList = DeltaTarget[];
|
|
5171
5175
|
export type DescriptionString = string;
|