@pulumi/aws-native 1.29.0-alpha.1747978507 → 1.29.0-alpha.1748545062

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (79) hide show
  1. package/aps/getWorkspace.d.ts +1 -0
  2. package/aps/getWorkspace.js.map +1 -1
  3. package/aps/workspace.d.ts +2 -0
  4. package/aps/workspace.js +2 -0
  5. package/aps/workspace.js.map +1 -1
  6. package/bedrock/flowAlias.d.ts +2 -0
  7. package/bedrock/flowAlias.js +2 -0
  8. package/bedrock/flowAlias.js.map +1 -1
  9. package/bedrock/getFlowAlias.d.ts +1 -0
  10. package/bedrock/getFlowAlias.js.map +1 -1
  11. package/datasync/getLocationAzureBlob.d.ts +6 -3
  12. package/datasync/getLocationAzureBlob.js +2 -2
  13. package/datasync/getLocationAzureBlob.js.map +1 -1
  14. package/datasync/getLocationObjectStorage.d.ts +6 -3
  15. package/datasync/getLocationObjectStorage.js +2 -2
  16. package/datasync/getLocationObjectStorage.js.map +1 -1
  17. package/datasync/locationAzureBlob.d.ts +10 -5
  18. package/datasync/locationAzureBlob.js +7 -4
  19. package/datasync/locationAzureBlob.js.map +1 -1
  20. package/datasync/locationObjectStorage.d.ts +11 -6
  21. package/datasync/locationObjectStorage.js +7 -4
  22. package/datasync/locationObjectStorage.js.map +1 -1
  23. package/ec2/getInstance.d.ts +4 -0
  24. package/ec2/getInstance.js.map +1 -1
  25. package/ec2/instance.d.ts +8 -0
  26. package/ec2/instance.js +2 -0
  27. package/ec2/instance.js.map +1 -1
  28. package/elasticloadbalancingv2/getListener.d.ts +2 -3
  29. package/elasticloadbalancingv2/getListener.js.map +1 -1
  30. package/elasticloadbalancingv2/getLoadBalancer.d.ts +1 -0
  31. package/elasticloadbalancingv2/getLoadBalancer.js.map +1 -1
  32. package/elasticloadbalancingv2/listener.d.ts +4 -6
  33. package/elasticloadbalancingv2/listener.js.map +1 -1
  34. package/elasticloadbalancingv2/loadBalancer.d.ts +2 -0
  35. package/elasticloadbalancingv2/loadBalancer.js.map +1 -1
  36. package/lakeformation/getPrincipalPermissions.d.ts +2 -2
  37. package/lakeformation/getPrincipalPermissions.js +2 -2
  38. package/lakeformation/principalPermissions.d.ts +1 -1
  39. package/lakeformation/principalPermissions.js +1 -1
  40. package/package.json +3 -3
  41. package/package.json.dev +2 -2
  42. package/ses/getMailManagerAddressList.d.ts +21 -0
  43. package/ses/getMailManagerAddressList.js +28 -0
  44. package/ses/getMailManagerAddressList.js.map +1 -0
  45. package/ses/index.d.ts +6 -0
  46. package/ses/index.js +8 -1
  47. package/ses/index.js.map +1 -1
  48. package/ses/mailManagerAddressList.d.ts +41 -0
  49. package/ses/mailManagerAddressList.js +64 -0
  50. package/ses/mailManagerAddressList.js.map +1 -0
  51. package/timestream/scheduledQuery.js +1 -1
  52. package/timestream/scheduledQuery.js.map +1 -1
  53. package/types/enums/bedrock/index.d.ts +21 -0
  54. package/types/enums/bedrock/index.js +14 -2
  55. package/types/enums/bedrock/index.js.map +1 -1
  56. package/types/enums/datasync/index.d.ts +1 -0
  57. package/types/enums/datasync/index.js +1 -0
  58. package/types/enums/datasync/index.js.map +1 -1
  59. package/types/enums/deadline/index.d.ts +5 -0
  60. package/types/enums/deadline/index.js +5 -1
  61. package/types/enums/deadline/index.js.map +1 -1
  62. package/types/enums/ec2/index.d.ts +32 -0
  63. package/types/enums/ec2/index.js +18 -2
  64. package/types/enums/ec2/index.js.map +1 -1
  65. package/types/enums/ses/index.d.ts +10 -0
  66. package/types/enums/ses/index.js +9 -1
  67. package/types/enums/ses/index.js.map +1 -1
  68. package/types/enums/wisdom/index.d.ts +1 -0
  69. package/types/enums/wisdom/index.js +1 -0
  70. package/types/enums/wisdom/index.js.map +1 -1
  71. package/types/input.d.ts +151 -8
  72. package/types/output.d.ts +186 -9
  73. package/types/output.js.map +1 -1
  74. package/vpclattice/resourceConfiguration.d.ts +4 -4
  75. package/vpclattice/resourceConfiguration.js +3 -0
  76. package/vpclattice/resourceConfiguration.js.map +1 -1
  77. package/vpclattice/resourceGateway.d.ts +6 -6
  78. package/vpclattice/resourceGateway.js +6 -0
  79. package/vpclattice/resourceGateway.js.map +1 -1
package/types/input.d.ts CHANGED
@@ -6147,6 +6147,15 @@ export declare namespace aps {
6147
6147
  */
6148
6148
  subnetIds: pulumi.Input<pulumi.Input<string>[]>;
6149
6149
  }
6150
+ /**
6151
+ * Represents a cloudwatch logs destination for query logging
6152
+ */
6153
+ interface WorkspaceCloudWatchLogDestinationArgs {
6154
+ /**
6155
+ * The ARN of the CloudWatch Logs log group
6156
+ */
6157
+ logGroupArn: pulumi.Input<string>;
6158
+ }
6150
6159
  /**
6151
6160
  * Workspace configuration
6152
6161
  */
@@ -6204,6 +6213,31 @@ export declare namespace aps {
6204
6213
  */
6205
6214
  logGroupArn?: pulumi.Input<string>;
6206
6215
  }
6216
+ /**
6217
+ * Destinations for query logging
6218
+ */
6219
+ interface WorkspaceLoggingDestinationArgs {
6220
+ cloudWatchLogs: pulumi.Input<inputs.aps.WorkspaceCloudWatchLogDestinationArgs>;
6221
+ filters: pulumi.Input<inputs.aps.WorkspaceLoggingFilterArgs>;
6222
+ }
6223
+ /**
6224
+ * Filters for logging
6225
+ */
6226
+ interface WorkspaceLoggingFilterArgs {
6227
+ /**
6228
+ * Query logs with QSP above this limit are vended
6229
+ */
6230
+ qspThreshold: pulumi.Input<number>;
6231
+ }
6232
+ /**
6233
+ * Query logging configuration
6234
+ */
6235
+ interface WorkspaceQueryLoggingConfigurationArgs {
6236
+ /**
6237
+ * The destinations configuration for query logging
6238
+ */
6239
+ destinations: pulumi.Input<pulumi.Input<inputs.aps.WorkspaceLoggingDestinationArgs>[]>;
6240
+ }
6207
6241
  }
6208
6242
  export declare namespace arczonalshift {
6209
6243
  interface ZonalAutoshiftConfigurationControlConditionArgs {
@@ -10923,6 +10957,13 @@ export declare namespace bedrock {
10923
10957
  */
10924
10958
  agentAliasArn: pulumi.Input<string>;
10925
10959
  }
10960
+ interface FlowAliasConcurrencyConfigurationArgs {
10961
+ /**
10962
+ * Number of nodes executed concurrently at a time
10963
+ */
10964
+ maxConcurrency?: pulumi.Input<number>;
10965
+ type: pulumi.Input<enums.bedrock.FlowAliasConcurrencyType>;
10966
+ }
10926
10967
  /**
10927
10968
  * Details about the routing configuration for a Flow alias.
10928
10969
  */
@@ -11044,6 +11085,16 @@ export declare namespace bedrock {
11044
11085
  */
11045
11086
  guardrailVersion?: pulumi.Input<string>;
11046
11087
  }
11088
+ /**
11089
+ * Inline code config strucuture, contains code configs
11090
+ */
11091
+ interface FlowInlineCodeFlowNodeConfigurationArgs {
11092
+ /**
11093
+ * The inline code entered by customers. max size is 5MB.
11094
+ */
11095
+ code: pulumi.Input<string>;
11096
+ language: pulumi.Input<enums.bedrock.FlowSupportedLanguages>;
11097
+ }
11047
11098
  /**
11048
11099
  * Input flow node configuration
11049
11100
  */
@@ -11097,7 +11148,7 @@ export declare namespace bedrock {
11097
11148
  /**
11098
11149
  * Contains configurations for the node.
11099
11150
  */
11100
- configuration?: pulumi.Input<inputs.bedrock.FlowNodeConfiguration0PropertiesArgs | inputs.bedrock.FlowNodeConfiguration1PropertiesArgs | inputs.bedrock.FlowNodeConfiguration2PropertiesArgs | inputs.bedrock.FlowNodeConfiguration3PropertiesArgs | inputs.bedrock.FlowNodeConfiguration4PropertiesArgs | inputs.bedrock.FlowNodeConfiguration5PropertiesArgs | inputs.bedrock.FlowNodeConfiguration6PropertiesArgs | inputs.bedrock.FlowNodeConfiguration7PropertiesArgs | inputs.bedrock.FlowNodeConfiguration8PropertiesArgs | inputs.bedrock.FlowNodeConfiguration9PropertiesArgs | inputs.bedrock.FlowNodeConfiguration10PropertiesArgs | inputs.bedrock.FlowNodeConfiguration11PropertiesArgs>;
11151
+ configuration?: pulumi.Input<inputs.bedrock.FlowNodeConfiguration0PropertiesArgs | inputs.bedrock.FlowNodeConfiguration1PropertiesArgs | inputs.bedrock.FlowNodeConfiguration2PropertiesArgs | inputs.bedrock.FlowNodeConfiguration3PropertiesArgs | inputs.bedrock.FlowNodeConfiguration4PropertiesArgs | inputs.bedrock.FlowNodeConfiguration5PropertiesArgs | inputs.bedrock.FlowNodeConfiguration6PropertiesArgs | inputs.bedrock.FlowNodeConfiguration7PropertiesArgs | inputs.bedrock.FlowNodeConfiguration8PropertiesArgs | inputs.bedrock.FlowNodeConfiguration9PropertiesArgs | inputs.bedrock.FlowNodeConfiguration10PropertiesArgs | inputs.bedrock.FlowNodeConfiguration11PropertiesArgs | inputs.bedrock.FlowNodeConfiguration12PropertiesArgs>;
11101
11152
  /**
11102
11153
  * List of node inputs in a flow
11103
11154
  */
@@ -11133,6 +11184,12 @@ export declare namespace bedrock {
11133
11184
  interface FlowNodeConfiguration11PropertiesArgs {
11134
11185
  retrieval: pulumi.Input<inputs.bedrock.FlowRetrievalFlowNodeConfigurationArgs>;
11135
11186
  }
11187
+ /**
11188
+ * Node configuration in a flow
11189
+ */
11190
+ interface FlowNodeConfiguration12PropertiesArgs {
11191
+ inlineCode: pulumi.Input<inputs.bedrock.FlowInlineCodeFlowNodeConfigurationArgs>;
11192
+ }
11136
11193
  /**
11137
11194
  * Node configuration in a flow
11138
11195
  */
@@ -15499,9 +15556,8 @@ export declare namespace cloudfront {
15499
15556
  */
15500
15557
  originProtocolPolicy?: pulumi.Input<string>;
15501
15558
  /**
15502
- * Specifies the minimum SSL/TLS protocol that CloudFront uses when connecting to your origin over HTTPS. Valid values include `SSLv3` , `TLSv1` , `TLSv1.1` , and `TLSv1.2` .
15503
- *
15504
- * For more information, see [Minimum Origin SSL Protocol](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValuesOriginSSLProtocols) in the *Amazon CloudFront Developer Guide* .
15559
+ * Specifies the minimum SSL/TLS protocol that CloudFront uses when connecting to your origin over HTTPS. Valid values include ``SSLv3``, ``TLSv1``, ``TLSv1.1``, and ``TLSv1.2``.
15560
+ * For more information, see [Minimum Origin SSL Protocol](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValuesOriginSSLProtocols) in the *Amazon CloudFront Developer Guide*.
15505
15561
  */
15506
15562
  originSslProtocols?: pulumi.Input<pulumi.Input<string>[]>;
15507
15563
  }
@@ -20664,6 +20720,32 @@ export declare namespace datasync {
20664
20720
  */
20665
20721
  azureBlobSasToken: pulumi.Input<string>;
20666
20722
  }
20723
+ /**
20724
+ * Specifies configuration information for a DataSync-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and a customer-managed AWS KMS key.
20725
+ */
20726
+ interface LocationAzureBlobCmkSecretConfigArgs {
20727
+ /**
20728
+ * Specifies the ARN for the customer-managed AWS KMS key used to encrypt the secret specified for SecretArn. DataSync provides this key to AWS Secrets Manager.
20729
+ */
20730
+ kmsKeyArn?: pulumi.Input<string>;
20731
+ /**
20732
+ * Specifies the ARN for an AWS Secrets Manager secret, managed by DataSync.
20733
+ */
20734
+ secretArn?: pulumi.Input<string>;
20735
+ }
20736
+ /**
20737
+ * Specifies configuration information for a customer-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and an IAM role that DataSync can assume and access the customer-managed secret.
20738
+ */
20739
+ interface LocationAzureBlobCustomSecretConfigArgs {
20740
+ /**
20741
+ * Specifies the ARN for the AWS Identity and Access Management role that DataSync uses to access the secret specified for SecretArn.
20742
+ */
20743
+ secretAccessRoleArn: pulumi.Input<string>;
20744
+ /**
20745
+ * Specifies the ARN for a customer created AWS Secrets Manager secret.
20746
+ */
20747
+ secretArn: pulumi.Input<string>;
20748
+ }
20667
20749
  /**
20668
20750
  * The subnet and security group that DataSync uses to access target EFS file system.
20669
20751
  */
@@ -20809,6 +20891,32 @@ export declare namespace datasync {
20809
20891
  */
20810
20892
  agentArns: pulumi.Input<pulumi.Input<string>[]>;
20811
20893
  }
20894
+ /**
20895
+ * Specifies configuration information for a DataSync-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and a customer-managed AWS KMS key.
20896
+ */
20897
+ interface LocationObjectStorageCmkSecretConfigArgs {
20898
+ /**
20899
+ * Specifies the ARN for the customer-managed AWS KMS key used to encrypt the secret specified for SecretArn. DataSync provides this key to AWS Secrets Manager.
20900
+ */
20901
+ kmsKeyArn?: pulumi.Input<string>;
20902
+ /**
20903
+ * Specifies the ARN for an AWS Secrets Manager secret, managed by DataSync.
20904
+ */
20905
+ secretArn?: pulumi.Input<string>;
20906
+ }
20907
+ /**
20908
+ * Specifies configuration information for a customer-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and an IAM role that DataSync can assume and access the customer-managed secret.
20909
+ */
20910
+ interface LocationObjectStorageCustomSecretConfigArgs {
20911
+ /**
20912
+ * Specifies the ARN for the AWS Identity and Access Management role that DataSync uses to access the secret specified for SecretArn.
20913
+ */
20914
+ secretAccessRoleArn: pulumi.Input<string>;
20915
+ /**
20916
+ * Specifies the ARN for a customer created AWS Secrets Manager secret.
20917
+ */
20918
+ secretArn: pulumi.Input<string>;
20919
+ }
20812
20920
  /**
20813
20921
  * The Amazon Resource Name (ARN) of the AWS IAM role that is used to access an Amazon S3 bucket.
20814
20922
  */
@@ -21651,6 +21759,7 @@ export declare namespace deadline {
21651
21759
  interface FleetCustomerManagedFleetConfigurationArgs {
21652
21760
  mode: pulumi.Input<enums.deadline.FleetAutoScalingMode>;
21653
21761
  storageProfileId?: pulumi.Input<string>;
21762
+ tagPropagationMode?: pulumi.Input<enums.deadline.FleetTagPropagationMode>;
21654
21763
  workerCapabilities: pulumi.Input<inputs.deadline.FleetCustomerManagedWorkerCapabilitiesArgs>;
21655
21764
  }
21656
21765
  interface FleetCustomerManagedWorkerCapabilitiesArgs {
@@ -23798,6 +23907,28 @@ export declare namespace ec2 {
23798
23907
  */
23799
23908
  licenseConfigurationArn: pulumi.Input<string>;
23800
23909
  }
23910
+ interface InstanceMetadataOptionsArgs {
23911
+ /**
23912
+ * Enables or disables the HTTP metadata endpoint on your instances. If you specify a value of disabled, you cannot access your instance metadata.
23913
+ */
23914
+ httpEndpoint?: pulumi.Input<enums.ec2.InstanceMetadataOptionsHttpEndpoint>;
23915
+ /**
23916
+ * Enables or disables the IPv6 endpoint for the instance metadata service. To use this option, the instance must be a Nitro-based instance launched in a subnet that supports IPv6.
23917
+ */
23918
+ httpProtocolIpv6?: pulumi.Input<enums.ec2.InstanceMetadataOptionsHttpProtocolIpv6>;
23919
+ /**
23920
+ * The number of network hops that the metadata token can travel. Maximum is 64.
23921
+ */
23922
+ httpPutResponseHopLimit?: pulumi.Input<number>;
23923
+ /**
23924
+ * Indicates whether IMDSv2 is required.
23925
+ */
23926
+ httpTokens?: pulumi.Input<enums.ec2.InstanceMetadataOptionsHttpTokens>;
23927
+ /**
23928
+ * Indicates whether tags from the instance are propagated to the EBS volumes.
23929
+ */
23930
+ instanceMetadataTags?: pulumi.Input<enums.ec2.InstanceMetadataOptionsInstanceMetadataTags>;
23931
+ }
23801
23932
  interface InstanceNetworkInterfaceArgs {
23802
23933
  /**
23803
23934
  * Not currently supported by AWS CloudFormation.
@@ -27202,12 +27333,14 @@ export declare namespace ecs {
27202
27333
  */
27203
27334
  interface ClusterManagedStorageConfigurationArgs {
27204
27335
  /**
27205
- * Specify the KMSlong key ID for the Fargate ephemeral storage.
27336
+ * Specify the KMSlong key ID for Fargate ephemeral storage.
27337
+ * When you specify a ``fargateEphemeralStorageKmsKeyId``, AWS Fargate uses the key to encrypt data at rest in ephemeral storage. For more information about Fargate ephemeral storage encryption, see [Customer managed keys for Fargate ephemeral storage for Amazon ECS](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/fargate-storage-encryption.html) in the *Amazon Elastic Container Service Developer Guide*.
27206
27338
  * The key must be a single Region key.
27207
27339
  */
27208
27340
  fargateEphemeralStorageKmsKeyId?: pulumi.Input<string>;
27209
27341
  /**
27210
- * Specify a KMSlong key ID to encrypt the managed storage.
27342
+ * Specify a KMSlong key ID to encrypt Amazon ECS managed storage.
27343
+ * When you specify a ``kmsKeyId``, Amazon ECS uses the key to encrypt data volumes managed by Amazon ECS that are attached to tasks in the cluster. The following data volumes are managed by Amazon ECS: Amazon EBS. For more information about encryption of Amazon EBS volumes attached to Amazon ECS tasks, see [Encrypt data stored in Amazon EBS volumes for Amazon ECS](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ebs-kms-encryption.html) in the *Amazon Elastic Container Service Developer Guide*.
27211
27344
  * The key must be a single Region key.
27212
27345
  */
27213
27346
  kmsKeyId?: pulumi.Input<string>;
@@ -28426,7 +28559,7 @@ export declare namespace ecs {
28426
28559
  * The options you can specify depend on the log driver. Some of the options you can specify when you use the ``awslogs`` log driver to route logs to Amazon CloudWatch include the following:
28427
28560
  * + awslogs-create-group Required: No Specify whether you want the log group to be created automatically. If this option isn't specified, it defaults to false. Your IAM policy must include the logs:CreateLogGroup permission before you attempt to use awslogs-create-group. + awslogs-region Required: Yes Specify the Region that the awslogs log driver is to send your Docker logs to. You can choose to send all of your logs from clusters in different Regions to a single region in CloudWatch Logs. This is so that they're all visible in one location. Otherwise, you can separate them by Region for more granularity. Make sure that the specified log group exists in the Region that you specify with this option. + awslogs-group Required: Yes Make sure to specify a log group that the awslogs log driver sends its log streams to. + awslogs-stream-prefix Required: Yes, when using Fargate.Optional when using EC2. Use the awslogs-stream-prefix option to associate a log stream with the specified prefix, the container name, and the ID of the Amazon ECS task that the container belongs to. If you specify a prefix with this option, then the log stream takes the format prefix-name/container-name/ecs-task-id. If you don't specify a prefix with this option, then the log stream is named after the container ID that's assigned by the Docker daemon on the container instance. Because it's difficult to trace logs back to the container that sent them with just the Docker container ID (which is only available on the container instance), we recommend that you specify a prefix with this option. For Amazon ECS services, you can use the service name as the prefix. Doing so, you can trace log streams to the service that the container belongs to, the name of the container that sent them, and the ID of the task that the container belongs to. You must specify a stream-prefix for your logs to have your logs appear in the Log pane when using the Amazon ECS console. + awslogs-datetime-format Required: No This option defines a multiline start pattern in Python strftime format. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. One example of a use case for using this format is for parsing output such as a stack dump, which might otherwise be logged in multiple entries. The correct pattern allows it to be captured in a single entry. For more information, see awslogs-datetime-format. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance. + awslogs-multiline-pattern Required: No This option defines a multiline start pattern that uses a regular expression. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. For more information, see awslogs-multiline-pattern. This option is ignored if awslogs-datetime-format is also configured. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance.
28428
28561
  * The following options apply to all supported log drivers.
28429
- * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
28562
+ * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. On June 25, 2025, Amazon ECS is changing the default log driver mode from blocking to non-blocking to prioritize task availability over logging. To continue using the blocking mode after this change, do one of the following: Set the mode option in your container definition's logConfiguration as blocking. Set the defaultLogDriverMode account setting to blocking. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
28430
28563
  * To route logs using the ``splunk`` log router, you need to specify a ``splunk-token`` and a ``splunk-url``.
28431
28564
  * When you use the ``awsfirelens`` log router to route logs to an AWS Service or AWS Partner Network destination for log storage and analytics, you can set the ``log-driver-buffer-limit`` option to limit the number of events that are buffered in memory, before being sent to the log router container. It can help to resolve potential log loss issue because high throughput might result in memory running out for the buffer inside of Docker.
28432
28565
  * Other options you can specify when using ``awsfirelens`` to route logs depend on the destination. When you export logs to Amazon Data Firehose, you can specify the AWS Region with ``region`` and a name for the log stream with ``delivery_stream``.
@@ -92544,7 +92677,7 @@ export declare namespace ses {
92544
92677
  /**
92545
92678
  * The list of actions to execute when the conditions match the incoming email, and none of the "unless conditions" match.
92546
92679
  */
92547
- actions: pulumi.Input<pulumi.Input<inputs.ses.MailManagerRuleSetRuleAction0PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction1PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction2PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction3PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction4PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction5PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction6PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction7PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction8PropertiesArgs>[]>;
92680
+ actions: pulumi.Input<pulumi.Input<inputs.ses.MailManagerRuleSetRuleAction0PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction1PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction2PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction3PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction4PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction5PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction6PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction7PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction8PropertiesArgs | inputs.ses.MailManagerRuleSetRuleAction9PropertiesArgs>[]>;
92548
92681
  /**
92549
92682
  * The conditions of this rule. All conditions must match the email for the actions to be executed. An empty list of conditions means that all emails match, but are still subject to any "unless conditions"
92550
92683
  */
@@ -92585,6 +92718,9 @@ export declare namespace ses {
92585
92718
  interface MailManagerRuleSetRuleAction8PropertiesArgs {
92586
92719
  deliverToQBusiness: pulumi.Input<inputs.ses.MailManagerRuleSetDeliverToQBusinessActionArgs>;
92587
92720
  }
92721
+ interface MailManagerRuleSetRuleAction9PropertiesArgs {
92722
+ publishToSns: pulumi.Input<inputs.ses.MailManagerRuleSetSnsActionArgs>;
92723
+ }
92588
92724
  interface MailManagerRuleSetRuleBooleanExpressionArgs {
92589
92725
  evaluate: pulumi.Input<inputs.ses.MailManagerRuleSetRuleBooleanToEvaluate0PropertiesArgs | inputs.ses.MailManagerRuleSetRuleBooleanToEvaluate1PropertiesArgs>;
92590
92726
  operator: pulumi.Input<enums.ses.MailManagerRuleSetRuleBooleanOperator>;
@@ -92669,6 +92805,13 @@ export declare namespace ses {
92669
92805
  actionFailurePolicy?: pulumi.Input<enums.ses.MailManagerRuleSetActionFailurePolicy>;
92670
92806
  roleArn: pulumi.Input<string>;
92671
92807
  }
92808
+ interface MailManagerRuleSetSnsActionArgs {
92809
+ actionFailurePolicy?: pulumi.Input<enums.ses.MailManagerRuleSetActionFailurePolicy>;
92810
+ encoding?: pulumi.Input<enums.ses.MailManagerRuleSetSnsNotificationEncoding>;
92811
+ payloadType?: pulumi.Input<enums.ses.MailManagerRuleSetSnsNotificationPayloadType>;
92812
+ roleArn: pulumi.Input<string>;
92813
+ topicArn: pulumi.Input<string>;
92814
+ }
92672
92815
  interface MailManagerTrafficPolicyIngressAnalysisArgs {
92673
92816
  analyzer: pulumi.Input<string>;
92674
92817
  resultField: pulumi.Input<string>;
package/types/output.d.ts CHANGED
@@ -6057,6 +6057,15 @@ export declare namespace aps {
6057
6057
  */
6058
6058
  subnetIds: string[];
6059
6059
  }
6060
+ /**
6061
+ * Represents a cloudwatch logs destination for query logging
6062
+ */
6063
+ interface WorkspaceCloudWatchLogDestination {
6064
+ /**
6065
+ * The ARN of the CloudWatch Logs log group
6066
+ */
6067
+ logGroupArn: string;
6068
+ }
6060
6069
  /**
6061
6070
  * Workspace configuration
6062
6071
  */
@@ -6114,6 +6123,31 @@ export declare namespace aps {
6114
6123
  */
6115
6124
  logGroupArn?: string;
6116
6125
  }
6126
+ /**
6127
+ * Destinations for query logging
6128
+ */
6129
+ interface WorkspaceLoggingDestination {
6130
+ cloudWatchLogs: outputs.aps.WorkspaceCloudWatchLogDestination;
6131
+ filters: outputs.aps.WorkspaceLoggingFilter;
6132
+ }
6133
+ /**
6134
+ * Filters for logging
6135
+ */
6136
+ interface WorkspaceLoggingFilter {
6137
+ /**
6138
+ * Query logs with QSP above this limit are vended
6139
+ */
6140
+ qspThreshold: number;
6141
+ }
6142
+ /**
6143
+ * Query logging configuration
6144
+ */
6145
+ interface WorkspaceQueryLoggingConfiguration {
6146
+ /**
6147
+ * The destinations configuration for query logging
6148
+ */
6149
+ destinations: outputs.aps.WorkspaceLoggingDestination[];
6150
+ }
6117
6151
  }
6118
6152
  export declare namespace arczonalshift {
6119
6153
  interface ZonalAutoshiftConfigurationControlCondition {
@@ -10859,6 +10893,13 @@ export declare namespace bedrock {
10859
10893
  */
10860
10894
  agentAliasArn: string;
10861
10895
  }
10896
+ interface FlowAliasConcurrencyConfiguration {
10897
+ /**
10898
+ * Number of nodes executed concurrently at a time
10899
+ */
10900
+ maxConcurrency?: number;
10901
+ type: enums.bedrock.FlowAliasConcurrencyType;
10902
+ }
10862
10903
  /**
10863
10904
  * Details about the routing configuration for a Flow alias.
10864
10905
  */
@@ -10980,6 +11021,16 @@ export declare namespace bedrock {
10980
11021
  */
10981
11022
  guardrailVersion?: string;
10982
11023
  }
11024
+ /**
11025
+ * Inline code config strucuture, contains code configs
11026
+ */
11027
+ interface FlowInlineCodeFlowNodeConfiguration {
11028
+ /**
11029
+ * The inline code entered by customers. max size is 5MB.
11030
+ */
11031
+ code: string;
11032
+ language: enums.bedrock.FlowSupportedLanguages;
11033
+ }
10983
11034
  /**
10984
11035
  * Input flow node configuration
10985
11036
  */
@@ -11033,7 +11084,7 @@ export declare namespace bedrock {
11033
11084
  /**
11034
11085
  * Contains configurations for the node.
11035
11086
  */
11036
- configuration?: outputs.bedrock.FlowNodeConfiguration0Properties | outputs.bedrock.FlowNodeConfiguration1Properties | outputs.bedrock.FlowNodeConfiguration2Properties | outputs.bedrock.FlowNodeConfiguration3Properties | outputs.bedrock.FlowNodeConfiguration4Properties | outputs.bedrock.FlowNodeConfiguration5Properties | outputs.bedrock.FlowNodeConfiguration6Properties | outputs.bedrock.FlowNodeConfiguration7Properties | outputs.bedrock.FlowNodeConfiguration8Properties | outputs.bedrock.FlowNodeConfiguration9Properties | outputs.bedrock.FlowNodeConfiguration10Properties | outputs.bedrock.FlowNodeConfiguration11Properties;
11087
+ configuration?: outputs.bedrock.FlowNodeConfiguration0Properties | outputs.bedrock.FlowNodeConfiguration1Properties | outputs.bedrock.FlowNodeConfiguration2Properties | outputs.bedrock.FlowNodeConfiguration3Properties | outputs.bedrock.FlowNodeConfiguration4Properties | outputs.bedrock.FlowNodeConfiguration5Properties | outputs.bedrock.FlowNodeConfiguration6Properties | outputs.bedrock.FlowNodeConfiguration7Properties | outputs.bedrock.FlowNodeConfiguration8Properties | outputs.bedrock.FlowNodeConfiguration9Properties | outputs.bedrock.FlowNodeConfiguration10Properties | outputs.bedrock.FlowNodeConfiguration11Properties | outputs.bedrock.FlowNodeConfiguration12Properties;
11037
11088
  /**
11038
11089
  * List of node inputs in a flow
11039
11090
  */
@@ -11069,6 +11120,12 @@ export declare namespace bedrock {
11069
11120
  interface FlowNodeConfiguration11Properties {
11070
11121
  retrieval: outputs.bedrock.FlowRetrievalFlowNodeConfiguration;
11071
11122
  }
11123
+ /**
11124
+ * Node configuration in a flow
11125
+ */
11126
+ interface FlowNodeConfiguration12Properties {
11127
+ inlineCode: outputs.bedrock.FlowInlineCodeFlowNodeConfiguration;
11128
+ }
11072
11129
  /**
11073
11130
  * Node configuration in a flow
11074
11131
  */
@@ -11436,7 +11493,7 @@ export declare namespace bedrock {
11436
11493
  /**
11437
11494
  * Contains configurations for the node.
11438
11495
  */
11439
- configuration?: outputs.bedrock.FlowVersionFlowNodeConfiguration0Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration1Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration2Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration3Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration4Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration5Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration6Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration7Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration8Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration9Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration10Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration11Properties;
11496
+ configuration?: outputs.bedrock.FlowVersionFlowNodeConfiguration0Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration1Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration2Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration3Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration4Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration5Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration6Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration7Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration8Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration9Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration10Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration11Properties | outputs.bedrock.FlowVersionFlowNodeConfiguration12Properties;
11440
11497
  /**
11441
11498
  * List of node inputs in a flow
11442
11499
  */
@@ -11472,6 +11529,12 @@ export declare namespace bedrock {
11472
11529
  interface FlowVersionFlowNodeConfiguration11Properties {
11473
11530
  collector: outputs.bedrock.FlowVersionCollectorFlowNodeConfiguration;
11474
11531
  }
11532
+ /**
11533
+ * Node configuration in a flow
11534
+ */
11535
+ interface FlowVersionFlowNodeConfiguration12Properties {
11536
+ inlineCode: outputs.bedrock.FlowVersionInlineCodeFlowNodeConfiguration;
11537
+ }
11475
11538
  /**
11476
11539
  * Node configuration in a flow
11477
11540
  */
@@ -11569,6 +11632,16 @@ export declare namespace bedrock {
11569
11632
  */
11570
11633
  guardrailVersion?: string;
11571
11634
  }
11635
+ /**
11636
+ * Inline code config strucuture, contains code configs
11637
+ */
11638
+ interface FlowVersionInlineCodeFlowNodeConfiguration {
11639
+ /**
11640
+ * The inline code entered by customers. max size is 5MB.
11641
+ */
11642
+ code: string;
11643
+ language: enums.bedrock.FlowVersionSupportedLanguages;
11644
+ }
11572
11645
  /**
11573
11646
  * Input flow node configuration
11574
11647
  */
@@ -16205,9 +16278,8 @@ export declare namespace cloudfront {
16205
16278
  */
16206
16279
  originProtocolPolicy?: string;
16207
16280
  /**
16208
- * Specifies the minimum SSL/TLS protocol that CloudFront uses when connecting to your origin over HTTPS. Valid values include `SSLv3` , `TLSv1` , `TLSv1.1` , and `TLSv1.2` .
16209
- *
16210
- * For more information, see [Minimum Origin SSL Protocol](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValuesOriginSSLProtocols) in the *Amazon CloudFront Developer Guide* .
16281
+ * Specifies the minimum SSL/TLS protocol that CloudFront uses when connecting to your origin over HTTPS. Valid values include ``SSLv3``, ``TLSv1``, ``TLSv1.1``, and ``TLSv1.2``.
16282
+ * For more information, see [Minimum Origin SSL Protocol](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/distribution-web-values-specify.html#DownloadDistValuesOriginSSLProtocols) in the *Amazon CloudFront Developer Guide*.
16211
16283
  */
16212
16284
  originSslProtocols?: string[];
16213
16285
  }
@@ -21509,6 +21581,41 @@ export declare namespace datasync {
21509
21581
  */
21510
21582
  azureBlobSasToken: string;
21511
21583
  }
21584
+ /**
21585
+ * Specifies configuration information for a DataSync-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and a customer-managed AWS KMS key.
21586
+ */
21587
+ interface LocationAzureBlobCmkSecretConfig {
21588
+ /**
21589
+ * Specifies the ARN for the customer-managed AWS KMS key used to encrypt the secret specified for SecretArn. DataSync provides this key to AWS Secrets Manager.
21590
+ */
21591
+ kmsKeyArn?: string;
21592
+ /**
21593
+ * Specifies the ARN for an AWS Secrets Manager secret, managed by DataSync.
21594
+ */
21595
+ secretArn?: string;
21596
+ }
21597
+ /**
21598
+ * Specifies configuration information for a customer-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and an IAM role that DataSync can assume and access the customer-managed secret.
21599
+ */
21600
+ interface LocationAzureBlobCustomSecretConfig {
21601
+ /**
21602
+ * Specifies the ARN for the AWS Identity and Access Management role that DataSync uses to access the secret specified for SecretArn.
21603
+ */
21604
+ secretAccessRoleArn: string;
21605
+ /**
21606
+ * Specifies the ARN for a customer created AWS Secrets Manager secret.
21607
+ */
21608
+ secretArn: string;
21609
+ }
21610
+ /**
21611
+ * Specifies configuration information for a DataSync-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location. DataSync uses the default AWS-managed KMS key to encrypt this secret in AWS Secrets Manager.
21612
+ */
21613
+ interface LocationAzureBlobManagedSecretConfig {
21614
+ /**
21615
+ * Specifies the ARN for an AWS Secrets Manager secret.
21616
+ */
21617
+ secretArn: string;
21618
+ }
21512
21619
  /**
21513
21620
  * The subnet and security group that DataSync uses to access target EFS file system.
21514
21621
  */
@@ -21654,6 +21761,41 @@ export declare namespace datasync {
21654
21761
  */
21655
21762
  agentArns: string[];
21656
21763
  }
21764
+ /**
21765
+ * Specifies configuration information for a DataSync-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and a customer-managed AWS KMS key.
21766
+ */
21767
+ interface LocationObjectStorageCmkSecretConfig {
21768
+ /**
21769
+ * Specifies the ARN for the customer-managed AWS KMS key used to encrypt the secret specified for SecretArn. DataSync provides this key to AWS Secrets Manager.
21770
+ */
21771
+ kmsKeyArn?: string;
21772
+ /**
21773
+ * Specifies the ARN for an AWS Secrets Manager secret, managed by DataSync.
21774
+ */
21775
+ secretArn?: string;
21776
+ }
21777
+ /**
21778
+ * Specifies configuration information for a customer-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location, and an IAM role that DataSync can assume and access the customer-managed secret.
21779
+ */
21780
+ interface LocationObjectStorageCustomSecretConfig {
21781
+ /**
21782
+ * Specifies the ARN for the AWS Identity and Access Management role that DataSync uses to access the secret specified for SecretArn.
21783
+ */
21784
+ secretAccessRoleArn: string;
21785
+ /**
21786
+ * Specifies the ARN for a customer created AWS Secrets Manager secret.
21787
+ */
21788
+ secretArn: string;
21789
+ }
21790
+ /**
21791
+ * Specifies configuration information for a DataSync-managed secret, such as an authentication token or set of credentials that DataSync uses to access a specific transfer location. DataSync uses the default AWS-managed KMS key to encrypt this secret in AWS Secrets Manager.
21792
+ */
21793
+ interface LocationObjectStorageManagedSecretConfig {
21794
+ /**
21795
+ * Specifies the ARN for an AWS Secrets Manager secret.
21796
+ */
21797
+ secretArn: string;
21798
+ }
21657
21799
  /**
21658
21800
  * The Amazon Resource Name (ARN) of the AWS IAM role that is used to access an Amazon S3 bucket.
21659
21801
  */
@@ -22538,6 +22680,7 @@ export declare namespace deadline {
22538
22680
  interface FleetCustomerManagedFleetConfiguration {
22539
22681
  mode: enums.deadline.FleetAutoScalingMode;
22540
22682
  storageProfileId?: string;
22683
+ tagPropagationMode?: enums.deadline.FleetTagPropagationMode;
22541
22684
  workerCapabilities: outputs.deadline.FleetCustomerManagedWorkerCapabilities;
22542
22685
  }
22543
22686
  interface FleetCustomerManagedWorkerCapabilities {
@@ -24705,6 +24848,28 @@ export declare namespace ec2 {
24705
24848
  */
24706
24849
  licenseConfigurationArn: string;
24707
24850
  }
24851
+ interface InstanceMetadataOptions {
24852
+ /**
24853
+ * Enables or disables the HTTP metadata endpoint on your instances. If you specify a value of disabled, you cannot access your instance metadata.
24854
+ */
24855
+ httpEndpoint?: enums.ec2.InstanceMetadataOptionsHttpEndpoint;
24856
+ /**
24857
+ * Enables or disables the IPv6 endpoint for the instance metadata service. To use this option, the instance must be a Nitro-based instance launched in a subnet that supports IPv6.
24858
+ */
24859
+ httpProtocolIpv6?: enums.ec2.InstanceMetadataOptionsHttpProtocolIpv6;
24860
+ /**
24861
+ * The number of network hops that the metadata token can travel. Maximum is 64.
24862
+ */
24863
+ httpPutResponseHopLimit?: number;
24864
+ /**
24865
+ * Indicates whether IMDSv2 is required.
24866
+ */
24867
+ httpTokens?: enums.ec2.InstanceMetadataOptionsHttpTokens;
24868
+ /**
24869
+ * Indicates whether tags from the instance are propagated to the EBS volumes.
24870
+ */
24871
+ instanceMetadataTags?: enums.ec2.InstanceMetadataOptionsInstanceMetadataTags;
24872
+ }
24708
24873
  interface InstanceNetworkInterface {
24709
24874
  /**
24710
24875
  * Not currently supported by AWS CloudFormation.
@@ -28650,12 +28815,14 @@ export declare namespace ecs {
28650
28815
  */
28651
28816
  interface ClusterManagedStorageConfiguration {
28652
28817
  /**
28653
- * Specify the KMSlong key ID for the Fargate ephemeral storage.
28818
+ * Specify the KMSlong key ID for Fargate ephemeral storage.
28819
+ * When you specify a ``fargateEphemeralStorageKmsKeyId``, AWS Fargate uses the key to encrypt data at rest in ephemeral storage. For more information about Fargate ephemeral storage encryption, see [Customer managed keys for Fargate ephemeral storage for Amazon ECS](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/fargate-storage-encryption.html) in the *Amazon Elastic Container Service Developer Guide*.
28654
28820
  * The key must be a single Region key.
28655
28821
  */
28656
28822
  fargateEphemeralStorageKmsKeyId?: string;
28657
28823
  /**
28658
- * Specify a KMSlong key ID to encrypt the managed storage.
28824
+ * Specify a KMSlong key ID to encrypt Amazon ECS managed storage.
28825
+ * When you specify a ``kmsKeyId``, Amazon ECS uses the key to encrypt data volumes managed by Amazon ECS that are attached to tasks in the cluster. The following data volumes are managed by Amazon ECS: Amazon EBS. For more information about encryption of Amazon EBS volumes attached to Amazon ECS tasks, see [Encrypt data stored in Amazon EBS volumes for Amazon ECS](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ebs-kms-encryption.html) in the *Amazon Elastic Container Service Developer Guide*.
28659
28826
  * The key must be a single Region key.
28660
28827
  */
28661
28828
  kmsKeyId?: string;
@@ -29874,7 +30041,7 @@ export declare namespace ecs {
29874
30041
  * The options you can specify depend on the log driver. Some of the options you can specify when you use the ``awslogs`` log driver to route logs to Amazon CloudWatch include the following:
29875
30042
  * + awslogs-create-group Required: No Specify whether you want the log group to be created automatically. If this option isn't specified, it defaults to false. Your IAM policy must include the logs:CreateLogGroup permission before you attempt to use awslogs-create-group. + awslogs-region Required: Yes Specify the Region that the awslogs log driver is to send your Docker logs to. You can choose to send all of your logs from clusters in different Regions to a single region in CloudWatch Logs. This is so that they're all visible in one location. Otherwise, you can separate them by Region for more granularity. Make sure that the specified log group exists in the Region that you specify with this option. + awslogs-group Required: Yes Make sure to specify a log group that the awslogs log driver sends its log streams to. + awslogs-stream-prefix Required: Yes, when using Fargate.Optional when using EC2. Use the awslogs-stream-prefix option to associate a log stream with the specified prefix, the container name, and the ID of the Amazon ECS task that the container belongs to. If you specify a prefix with this option, then the log stream takes the format prefix-name/container-name/ecs-task-id. If you don't specify a prefix with this option, then the log stream is named after the container ID that's assigned by the Docker daemon on the container instance. Because it's difficult to trace logs back to the container that sent them with just the Docker container ID (which is only available on the container instance), we recommend that you specify a prefix with this option. For Amazon ECS services, you can use the service name as the prefix. Doing so, you can trace log streams to the service that the container belongs to, the name of the container that sent them, and the ID of the task that the container belongs to. You must specify a stream-prefix for your logs to have your logs appear in the Log pane when using the Amazon ECS console. + awslogs-datetime-format Required: No This option defines a multiline start pattern in Python strftime format. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. One example of a use case for using this format is for parsing output such as a stack dump, which might otherwise be logged in multiple entries. The correct pattern allows it to be captured in a single entry. For more information, see awslogs-datetime-format. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance. + awslogs-multiline-pattern Required: No This option defines a multiline start pattern that uses a regular expression. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. For more information, see awslogs-multiline-pattern. This option is ignored if awslogs-datetime-format is also configured. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance.
29876
30043
  * The following options apply to all supported log drivers.
29877
- * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
30044
+ * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. On June 25, 2025, Amazon ECS is changing the default log driver mode from blocking to non-blocking to prioritize task availability over logging. To continue using the blocking mode after this change, do one of the following: Set the mode option in your container definition's logConfiguration as blocking. Set the defaultLogDriverMode account setting to blocking. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
29878
30045
  * To route logs using the ``splunk`` log router, you need to specify a ``splunk-token`` and a ``splunk-url``.
29879
30046
  * When you use the ``awsfirelens`` log router to route logs to an AWS Service or AWS Partner Network destination for log storage and analytics, you can set the ``log-driver-buffer-limit`` option to limit the number of events that are buffered in memory, before being sent to the log router container. It can help to resolve potential log loss issue because high throughput might result in memory running out for the buffer inside of Docker.
29880
30047
  * Other options you can specify when using ``awsfirelens`` to route logs depend on the destination. When you export logs to Amazon Data Firehose, you can specify the AWS Region with ``region`` and a name for the log stream with ``delivery_stream``.
@@ -94951,7 +95118,7 @@ export declare namespace ses {
94951
95118
  /**
94952
95119
  * The list of actions to execute when the conditions match the incoming email, and none of the "unless conditions" match.
94953
95120
  */
94954
- actions: (outputs.ses.MailManagerRuleSetRuleAction0Properties | outputs.ses.MailManagerRuleSetRuleAction1Properties | outputs.ses.MailManagerRuleSetRuleAction2Properties | outputs.ses.MailManagerRuleSetRuleAction3Properties | outputs.ses.MailManagerRuleSetRuleAction4Properties | outputs.ses.MailManagerRuleSetRuleAction5Properties | outputs.ses.MailManagerRuleSetRuleAction6Properties | outputs.ses.MailManagerRuleSetRuleAction7Properties | outputs.ses.MailManagerRuleSetRuleAction8Properties)[];
95121
+ actions: (outputs.ses.MailManagerRuleSetRuleAction0Properties | outputs.ses.MailManagerRuleSetRuleAction1Properties | outputs.ses.MailManagerRuleSetRuleAction2Properties | outputs.ses.MailManagerRuleSetRuleAction3Properties | outputs.ses.MailManagerRuleSetRuleAction4Properties | outputs.ses.MailManagerRuleSetRuleAction5Properties | outputs.ses.MailManagerRuleSetRuleAction6Properties | outputs.ses.MailManagerRuleSetRuleAction7Properties | outputs.ses.MailManagerRuleSetRuleAction8Properties | outputs.ses.MailManagerRuleSetRuleAction9Properties)[];
94955
95122
  /**
94956
95123
  * The conditions of this rule. All conditions must match the email for the actions to be executed. An empty list of conditions means that all emails match, but are still subject to any "unless conditions"
94957
95124
  */
@@ -94992,6 +95159,9 @@ export declare namespace ses {
94992
95159
  interface MailManagerRuleSetRuleAction8Properties {
94993
95160
  deliverToQBusiness: outputs.ses.MailManagerRuleSetDeliverToQBusinessAction;
94994
95161
  }
95162
+ interface MailManagerRuleSetRuleAction9Properties {
95163
+ publishToSns: outputs.ses.MailManagerRuleSetSnsAction;
95164
+ }
94995
95165
  interface MailManagerRuleSetRuleBooleanExpression {
94996
95166
  evaluate: outputs.ses.MailManagerRuleSetRuleBooleanToEvaluate0Properties | outputs.ses.MailManagerRuleSetRuleBooleanToEvaluate1Properties;
94997
95167
  operator: enums.ses.MailManagerRuleSetRuleBooleanOperator;
@@ -95076,6 +95246,13 @@ export declare namespace ses {
95076
95246
  actionFailurePolicy?: enums.ses.MailManagerRuleSetActionFailurePolicy;
95077
95247
  roleArn: string;
95078
95248
  }
95249
+ interface MailManagerRuleSetSnsAction {
95250
+ actionFailurePolicy?: enums.ses.MailManagerRuleSetActionFailurePolicy;
95251
+ encoding?: enums.ses.MailManagerRuleSetSnsNotificationEncoding;
95252
+ payloadType?: enums.ses.MailManagerRuleSetSnsNotificationPayloadType;
95253
+ roleArn: string;
95254
+ topicArn: string;
95255
+ }
95079
95256
  interface MailManagerTrafficPolicyIngressAnalysis {
95080
95257
  analyzer: string;
95081
95258
  resultField: string;
@@ -1 +1 @@
1
- {"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAm3lBjF,IAAiB,MAAM,CAgHtB;AAhHD,WAAiB,MAAM;IAoDnB;;OAEG;IACH,SAAgB,yBAAyB,CAAC,GAAe;;QACrD,uCACO,GAAG,KACN,qBAAqB,EAAE,MAAA,CAAC,GAAG,CAAC,qBAAqB,CAAC,mCAAI,CAAC,IACzD;IACN,CAAC;IALe,gCAAyB,4BAKxC,CAAA;AAoDL,CAAC,EAhHgB,MAAM,GAAN,cAAM,KAAN,cAAM,QAgHtB"}
1
+ {"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAo8lBjF,IAAiB,MAAM,CAgHtB;AAhHD,WAAiB,MAAM;IAoDnB;;OAEG;IACH,SAAgB,yBAAyB,CAAC,GAAe;;QACrD,uCACO,GAAG,KACN,qBAAqB,EAAE,MAAA,CAAC,GAAG,CAAC,qBAAqB,CAAC,mCAAI,CAAC,IACzD;IACN,CAAC;IALe,gCAAyB,4BAKxC,CAAA;AAoDL,CAAC,EAhHgB,MAAM,GAAN,cAAM,KAAN,cAAM,QAgHtB"}