@pulumi/aws-native 1.30.0-alpha.1749274537 → 1.30.0-alpha.1749561139

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (53) hide show
  1. package/efs/mountTarget.d.ts +5 -0
  2. package/efs/mountTarget.js +5 -1
  3. package/efs/mountTarget.js.map +1 -1
  4. package/eks/getPodIdentityAssociation.d.ts +12 -0
  5. package/eks/getPodIdentityAssociation.js.map +1 -1
  6. package/eks/podIdentityAssociation.d.ts +20 -0
  7. package/eks/podIdentityAssociation.js +6 -0
  8. package/eks/podIdentityAssociation.js.map +1 -1
  9. package/fis/experimentTemplate.d.ts +2 -2
  10. package/fis/experimentTemplate.js +1 -4
  11. package/fis/experimentTemplate.js.map +1 -1
  12. package/fis/getExperimentTemplate.d.ts +6 -0
  13. package/fis/getExperimentTemplate.js.map +1 -1
  14. package/mediapackage/asset.d.ts +2 -2
  15. package/mediapackage/asset.js +2 -0
  16. package/mediapackage/asset.js.map +1 -1
  17. package/mediapackage/getAsset.d.ts +0 -8
  18. package/mediapackage/getAsset.js.map +1 -1
  19. package/networkfirewall/getLoggingConfiguration.d.ts +1 -0
  20. package/networkfirewall/getLoggingConfiguration.js.map +1 -1
  21. package/networkfirewall/getVpcEndpointAssociation.d.ts +37 -0
  22. package/networkfirewall/getVpcEndpointAssociation.js +28 -0
  23. package/networkfirewall/getVpcEndpointAssociation.js.map +1 -0
  24. package/networkfirewall/index.d.ts +6 -0
  25. package/networkfirewall/index.js +8 -1
  26. package/networkfirewall/index.js.map +1 -1
  27. package/networkfirewall/loggingConfiguration.d.ts +2 -0
  28. package/networkfirewall/loggingConfiguration.js +2 -0
  29. package/networkfirewall/loggingConfiguration.js.map +1 -1
  30. package/networkfirewall/vpcEndpointAssociation.d.ts +84 -0
  31. package/networkfirewall/vpcEndpointAssociation.js +81 -0
  32. package/networkfirewall/vpcEndpointAssociation.js.map +1 -0
  33. package/opsworkscm/getServer.d.ts +29 -8
  34. package/opsworkscm/getServer.js +2 -2
  35. package/opsworkscm/getServer.js.map +1 -1
  36. package/opsworkscm/server.d.ts +1 -4
  37. package/opsworkscm/server.js +4 -2
  38. package/opsworkscm/server.js.map +1 -1
  39. package/package.json +3 -3
  40. package/package.json.dev +2 -2
  41. package/types/enums/amplify/index.d.ts +2 -2
  42. package/types/enums/ec2/index.d.ts +13 -0
  43. package/types/enums/ec2/index.js +11 -2
  44. package/types/enums/ec2/index.js.map +1 -1
  45. package/types/enums/efs/index.d.ts +6 -0
  46. package/types/enums/efs/index.js +6 -1
  47. package/types/enums/efs/index.js.map +1 -1
  48. package/types/enums/index.d.ts +4 -0
  49. package/types/enums/index.js +4 -0
  50. package/types/enums/index.js.map +1 -1
  51. package/types/input.d.ts +114 -4
  52. package/types/output.d.ts +114 -4
  53. package/types/output.js.map +1 -1
package/types/input.d.ts CHANGED
@@ -846,9 +846,9 @@ export declare namespace amplify {
846
846
  /**
847
847
  * The type of cache configuration to use for an Amplify app.
848
848
  *
849
- * The `AMPLIFY_MANAGED` cache configuration automatically applies an optimized cache configuration for your app based on its platform, routing rules, and rewrite rules. This is the default setting.
849
+ * The `AMPLIFY_MANAGED` cache configuration automatically applies an optimized cache configuration for your app based on its platform, routing rules, and rewrite rules.
850
850
  *
851
- * The `AMPLIFY_MANAGED_NO_COOKIES` cache configuration type is the same as `AMPLIFY_MANAGED` , except that it excludes all cookies from the cache key.
851
+ * The `AMPLIFY_MANAGED_NO_COOKIES` cache configuration type is the same as `AMPLIFY_MANAGED` , except that it excludes all cookies from the cache key. This is the default setting.
852
852
  */
853
853
  type?: pulumi.Input<enums.amplify.AppCacheConfigType>;
854
854
  }
@@ -1909,7 +1909,7 @@ export declare namespace apigateway {
1909
1909
  [key: string]: pulumi.Input<string>;
1910
1910
  }>;
1911
1911
  /**
1912
- * Custom timeout between 50 and 29,000 milliseconds. The default value is 29,000 milliseconds or 29 seconds.
1912
+ * Custom timeout between 50 and 29,000 milliseconds. The default value is 29,000 milliseconds or 29 seconds. You can increase the default value to longer than 29 seconds for Regional or private APIs only.
1913
1913
  */
1914
1914
  timeoutInMillis?: pulumi.Input<number>;
1915
1915
  /**
@@ -11364,6 +11364,13 @@ export declare namespace bedrock {
11364
11364
  * Input to a node in a flow
11365
11365
  */
11366
11366
  interface FlowNodeInputArgs {
11367
+ /**
11368
+ * Specifies how input data flows between iterations in a DoWhile loop.
11369
+ *
11370
+ * - `LoopCondition` - Controls whether the loop continues by evaluating condition expressions against the input data. Use this category to define the condition that determines if the loop should continue.
11371
+ * - `ReturnValueToLoopStart` - Defines data to pass back to the start of the loop's next iteration. Use this category for variables that you want to update for each loop iteration.
11372
+ * - `ExitLoop` - Defines the value that's available once the loop ends. Use this category to expose loop results to nodes outside the loop.
11373
+ */
11367
11374
  category?: pulumi.Input<enums.bedrock.FlowNodeInputCategory>;
11368
11375
  /**
11369
11376
  * Expression for a node input in a flow
@@ -23308,6 +23315,28 @@ export declare namespace ec2 {
23308
23315
  */
23309
23316
  cpu?: pulumi.Input<inputs.ec2.Ec2FleetCpuPerformanceFactorRequestArgs>;
23310
23317
  }
23318
+ interface Ec2FleetBlockDeviceMappingArgs {
23319
+ /**
23320
+ * The device name (for example, `/dev/sdh` or `xvdh` ).
23321
+ */
23322
+ deviceName?: pulumi.Input<string>;
23323
+ /**
23324
+ * Parameters used to automatically set up EBS volumes when the instance is launched.
23325
+ */
23326
+ ebs?: pulumi.Input<inputs.ec2.Ec2FleetEbsBlockDeviceArgs>;
23327
+ /**
23328
+ * To omit the device from the block device mapping, specify an empty string. When this property is specified, the device is removed from the block device mapping regardless of the assigned value.
23329
+ */
23330
+ noDevice?: pulumi.Input<string>;
23331
+ /**
23332
+ * The virtual device name ( `ephemeral` N). Instance store volumes are numbered starting from 0. An instance type with 2 available instance store volumes can specify mappings for `ephemeral0` and `ephemeral1` . The number of available instance store volumes depends on the instance type. After you connect to the instance, you must mount the volume.
23333
+ *
23334
+ * NVMe instance store volumes are automatically enumerated and assigned a device name. Including them in your block device mapping has no effect.
23335
+ *
23336
+ * Constraints: For M3 instances, you must specify instance store volumes in the block device mapping for the instance. When you launch an M3 instance, we ignore any instance store volumes specified in the block device mapping for the AMI.
23337
+ */
23338
+ virtualName?: pulumi.Input<string>;
23339
+ }
23311
23340
  interface Ec2FleetCapacityRebalanceArgs {
23312
23341
  /**
23313
23342
  * The replacement strategy to use. Only available for fleets of type `maintain` .
@@ -23346,6 +23375,69 @@ export declare namespace ec2 {
23346
23375
  */
23347
23376
  references?: pulumi.Input<pulumi.Input<inputs.ec2.Ec2FleetPerformanceFactorReferenceRequestArgs>[]>;
23348
23377
  }
23378
+ interface Ec2FleetEbsBlockDeviceArgs {
23379
+ /**
23380
+ * Indicates whether the EBS volume is deleted on instance termination. For more information, see [Preserving Amazon EBS volumes on instance termination](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html#preserving-volumes-on-termination) in the *Amazon EC2 User Guide* .
23381
+ */
23382
+ deleteOnTermination?: pulumi.Input<boolean>;
23383
+ /**
23384
+ * Indicates whether the encryption state of an EBS volume is changed while being restored from a backing snapshot. The effect of setting the encryption state to `true` depends on the volume origin (new or from a snapshot), starting encryption state, ownership, and whether encryption by default is enabled. For more information, see [Amazon EBS encryption](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption.html#encryption-parameters) in the *Amazon EBS User Guide* .
23385
+ *
23386
+ * In no case can you remove encryption from an encrypted volume.
23387
+ *
23388
+ * Encrypted volumes can only be attached to instances that support Amazon EBS encryption. For more information, see [Supported instance types](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption-requirements.html#ebs-encryption_supported_instances) .
23389
+ *
23390
+ * This parameter is not returned by `DescribeImageAttribute` .
23391
+ *
23392
+ * For `CreateImage` and `RegisterImage` , whether you can include this parameter, and the allowed values differ depending on the type of block device mapping you are creating.
23393
+ *
23394
+ * - If you are creating a block device mapping for a *new (empty) volume* , you can include this parameter, and specify either `true` for an encrypted volume, or `false` for an unencrypted volume. If you omit this parameter, it defaults to `false` (unencrypted).
23395
+ * - If you are creating a block device mapping from an *existing encrypted or unencrypted snapshot* , you must omit this parameter. If you include this parameter, the request will fail, regardless of the value that you specify.
23396
+ * - If you are creating a block device mapping from an *existing unencrypted volume* , you can include this parameter, but you must specify `false` . If you specify `true` , the request will fail. In this case, we recommend that you omit the parameter.
23397
+ * - If you are creating a block device mapping from an *existing encrypted volume* , you can include this parameter, and specify either `true` or `false` . However, if you specify `false` , the parameter is ignored and the block device mapping is always encrypted. In this case, we recommend that you omit the parameter.
23398
+ */
23399
+ encrypted?: pulumi.Input<boolean>;
23400
+ /**
23401
+ * The number of I/O operations per second (IOPS). For `gp3` , `io1` , and `io2` volumes, this represents the number of IOPS that are provisioned for the volume. For `gp2` volumes, this represents the baseline performance of the volume and the rate at which the volume accumulates I/O credits for bursting.
23402
+ *
23403
+ * The following are the supported values for each volume type:
23404
+ *
23405
+ * - `gp3` : 3,000 - 16,000 IOPS
23406
+ * - `io1` : 100 - 64,000 IOPS
23407
+ * - `io2` : 100 - 256,000 IOPS
23408
+ *
23409
+ * For `io2` volumes, you can achieve up to 256,000 IOPS on [instances built on the Nitro System](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html#ec2-nitro-instances) . On other instances, you can achieve performance up to 32,000 IOPS.
23410
+ *
23411
+ * This parameter is required for `io1` and `io2` volumes. The default for `gp3` volumes is 3,000 IOPS.
23412
+ */
23413
+ iops?: pulumi.Input<number>;
23414
+ /**
23415
+ * Identifier (key ID, key alias, key ARN, or alias ARN) of the customer managed KMS key to use for EBS encryption.
23416
+ *
23417
+ * This parameter is only supported on `BlockDeviceMapping` objects called by [RunInstances](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RunInstances.html) , [RequestSpotFleet](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RequestSpotFleet.html) , and [RequestSpotInstances](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RequestSpotInstances.html) .
23418
+ */
23419
+ kmsKeyId?: pulumi.Input<string>;
23420
+ /**
23421
+ * The ID of the snapshot.
23422
+ */
23423
+ snapshotId?: pulumi.Input<string>;
23424
+ /**
23425
+ * The size of the volume, in GiBs. You must specify either a snapshot ID or a volume size. If you specify a snapshot, the default is the snapshot size. You can specify a volume size that is equal to or larger than the snapshot size.
23426
+ *
23427
+ * The following are the supported sizes for each volume type:
23428
+ *
23429
+ * - `gp2` and `gp3` : 1 - 16,384 GiB
23430
+ * - `io1` : 4 - 16,384 GiB
23431
+ * - `io2` : 4 - 65,536 GiB
23432
+ * - `st1` and `sc1` : 125 - 16,384 GiB
23433
+ * - `standard` : 1 - 1024 GiB
23434
+ */
23435
+ volumeSize?: pulumi.Input<number>;
23436
+ /**
23437
+ * The volume type. For more information, see [Amazon EBS volume types](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volume-types.html) in the *Amazon EBS User Guide* .
23438
+ */
23439
+ volumeType?: pulumi.Input<enums.ec2.Ec2FleetEbsBlockDeviceVolumeType>;
23440
+ }
23349
23441
  interface Ec2FleetFleetLaunchTemplateConfigRequestArgs {
23350
23442
  /**
23351
23443
  * The launch template to use. You must specify either the launch template ID or launch template name in the request.
@@ -23363,6 +23455,14 @@ export declare namespace ec2 {
23363
23455
  * The Availability Zone in which to launch the instances.
23364
23456
  */
23365
23457
  availabilityZone?: pulumi.Input<string>;
23458
+ /**
23459
+ * The block device mappings, which define the EBS volumes and instance store volumes to attach to the instance at launch.
23460
+ *
23461
+ * Supported only for fleets of type `instant` .
23462
+ *
23463
+ * For more information, see [Block device mappings for volumes on Amazon EC2 instances](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html) in the *Amazon EC2 User Guide* .
23464
+ */
23465
+ blockDeviceMappings?: pulumi.Input<pulumi.Input<inputs.ec2.Ec2FleetBlockDeviceMappingArgs>[]>;
23366
23466
  /**
23367
23467
  * The attributes for the instance types. When you specify instance attributes, Amazon EC2 will identify instance types with those attributes.
23368
23468
  *
@@ -27882,7 +27982,7 @@ export declare namespace ecs {
27882
27982
  * The options you can specify depend on the log driver. Some of the options you can specify when you use the ``awslogs`` log driver to route logs to Amazon CloudWatch include the following:
27883
27983
  * + awslogs-create-group Required: No Specify whether you want the log group to be created automatically. If this option isn't specified, it defaults to false. Your IAM policy must include the logs:CreateLogGroup permission before you attempt to use awslogs-create-group. + awslogs-region Required: Yes Specify the Region that the awslogs log driver is to send your Docker logs to. You can choose to send all of your logs from clusters in different Regions to a single region in CloudWatch Logs. This is so that they're all visible in one location. Otherwise, you can separate them by Region for more granularity. Make sure that the specified log group exists in the Region that you specify with this option. + awslogs-group Required: Yes Make sure to specify a log group that the awslogs log driver sends its log streams to. + awslogs-stream-prefix Required: Yes, when using Fargate.Optional when using EC2. Use the awslogs-stream-prefix option to associate a log stream with the specified prefix, the container name, and the ID of the Amazon ECS task that the container belongs to. If you specify a prefix with this option, then the log stream takes the format prefix-name/container-name/ecs-task-id. If you don't specify a prefix with this option, then the log stream is named after the container ID that's assigned by the Docker daemon on the container instance. Because it's difficult to trace logs back to the container that sent them with just the Docker container ID (which is only available on the container instance), we recommend that you specify a prefix with this option. For Amazon ECS services, you can use the service name as the prefix. Doing so, you can trace log streams to the service that the container belongs to, the name of the container that sent them, and the ID of the task that the container belongs to. You must specify a stream-prefix for your logs to have your logs appear in the Log pane when using the Amazon ECS console. + awslogs-datetime-format Required: No This option defines a multiline start pattern in Python strftime format. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. One example of a use case for using this format is for parsing output such as a stack dump, which might otherwise be logged in multiple entries. The correct pattern allows it to be captured in a single entry. For more information, see awslogs-datetime-format. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance. + awslogs-multiline-pattern Required: No This option defines a multiline start pattern that uses a regular expression. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. For more information, see awslogs-multiline-pattern. This option is ignored if awslogs-datetime-format is also configured. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance.
27884
27984
  * The following options apply to all supported log drivers.
27885
- * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
27985
+ * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. On June 25, 2025, Amazon ECS is changing the default log driver mode from blocking to non-blocking to prioritize task availability over logging. To continue using the blocking mode after this change, do one of the following: Set the mode option in your container definition's logConfiguration as blocking. Set the defaultLogDriverMode account setting to blocking. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
27886
27986
  * To route logs using the ``splunk`` log router, you need to specify a ``splunk-token`` and a ``splunk-url``.
27887
27987
  * When you use the ``awsfirelens`` log router to route logs to an AWS Service or AWS Partner Network destination for log storage and analytics, you can set the ``log-driver-buffer-limit`` option to limit the number of events that are buffered in memory, before being sent to the log router container. It can help to resolve potential log loss issue because high throughput might result in memory running out for the buffer inside of Docker.
27888
27988
  * Other options you can specify when using ``awsfirelens`` to route logs depend on the destination. When you export logs to Amazon Data Firehose, you can specify the AWS Region with ``region`` and a name for the log stream with ``delivery_stream``.
@@ -51338,6 +51438,16 @@ export declare namespace networkfirewall {
51338
51438
  */
51339
51439
  serverCertificateConfigurations?: pulumi.Input<pulumi.Input<inputs.networkfirewall.TlsInspectionConfigurationServerCertificateConfigurationArgs>[]>;
51340
51440
  }
51441
+ interface VpcEndpointAssociationSubnetMappingArgs {
51442
+ /**
51443
+ * A IPAddressType
51444
+ */
51445
+ ipAddressType?: pulumi.Input<string>;
51446
+ /**
51447
+ * A SubnetId.
51448
+ */
51449
+ subnetId: pulumi.Input<string>;
51450
+ }
51341
51451
  }
51342
51452
  export declare namespace networkmanager {
51343
51453
  /**
package/types/output.d.ts CHANGED
@@ -723,9 +723,9 @@ export declare namespace amplify {
723
723
  /**
724
724
  * The type of cache configuration to use for an Amplify app.
725
725
  *
726
- * The `AMPLIFY_MANAGED` cache configuration automatically applies an optimized cache configuration for your app based on its platform, routing rules, and rewrite rules. This is the default setting.
726
+ * The `AMPLIFY_MANAGED` cache configuration automatically applies an optimized cache configuration for your app based on its platform, routing rules, and rewrite rules.
727
727
  *
728
- * The `AMPLIFY_MANAGED_NO_COOKIES` cache configuration type is the same as `AMPLIFY_MANAGED` , except that it excludes all cookies from the cache key.
728
+ * The `AMPLIFY_MANAGED_NO_COOKIES` cache configuration type is the same as `AMPLIFY_MANAGED` , except that it excludes all cookies from the cache key. This is the default setting.
729
729
  */
730
730
  type?: enums.amplify.AppCacheConfigType;
731
731
  }
@@ -1806,7 +1806,7 @@ export declare namespace apigateway {
1806
1806
  [key: string]: string;
1807
1807
  };
1808
1808
  /**
1809
- * Custom timeout between 50 and 29,000 milliseconds. The default value is 29,000 milliseconds or 29 seconds.
1809
+ * Custom timeout between 50 and 29,000 milliseconds. The default value is 29,000 milliseconds or 29 seconds. You can increase the default value to longer than 29 seconds for Regional or private APIs only.
1810
1810
  */
1811
1811
  timeoutInMillis?: number;
1812
1812
  /**
@@ -11300,6 +11300,13 @@ export declare namespace bedrock {
11300
11300
  * Input to a node in a flow
11301
11301
  */
11302
11302
  interface FlowNodeInput {
11303
+ /**
11304
+ * Specifies how input data flows between iterations in a DoWhile loop.
11305
+ *
11306
+ * - `LoopCondition` - Controls whether the loop continues by evaluating condition expressions against the input data. Use this category to define the condition that determines if the loop should continue.
11307
+ * - `ReturnValueToLoopStart` - Defines data to pass back to the start of the loop's next iteration. Use this category for variables that you want to update for each loop iteration.
11308
+ * - `ExitLoop` - Defines the value that's available once the loop ends. Use this category to expose loop results to nodes outside the loop.
11309
+ */
11303
11310
  category?: enums.bedrock.FlowNodeInputCategory;
11304
11311
  /**
11305
11312
  * Expression for a node input in a flow
@@ -24354,6 +24361,28 @@ export declare namespace ec2 {
24354
24361
  */
24355
24362
  cpu?: outputs.ec2.Ec2FleetCpuPerformanceFactorRequest;
24356
24363
  }
24364
+ interface Ec2FleetBlockDeviceMapping {
24365
+ /**
24366
+ * The device name (for example, `/dev/sdh` or `xvdh` ).
24367
+ */
24368
+ deviceName?: string;
24369
+ /**
24370
+ * Parameters used to automatically set up EBS volumes when the instance is launched.
24371
+ */
24372
+ ebs?: outputs.ec2.Ec2FleetEbsBlockDevice;
24373
+ /**
24374
+ * To omit the device from the block device mapping, specify an empty string. When this property is specified, the device is removed from the block device mapping regardless of the assigned value.
24375
+ */
24376
+ noDevice?: string;
24377
+ /**
24378
+ * The virtual device name ( `ephemeral` N). Instance store volumes are numbered starting from 0. An instance type with 2 available instance store volumes can specify mappings for `ephemeral0` and `ephemeral1` . The number of available instance store volumes depends on the instance type. After you connect to the instance, you must mount the volume.
24379
+ *
24380
+ * NVMe instance store volumes are automatically enumerated and assigned a device name. Including them in your block device mapping has no effect.
24381
+ *
24382
+ * Constraints: For M3 instances, you must specify instance store volumes in the block device mapping for the instance. When you launch an M3 instance, we ignore any instance store volumes specified in the block device mapping for the AMI.
24383
+ */
24384
+ virtualName?: string;
24385
+ }
24357
24386
  interface Ec2FleetCapacityRebalance {
24358
24387
  /**
24359
24388
  * The replacement strategy to use. Only available for fleets of type `maintain` .
@@ -24392,6 +24421,69 @@ export declare namespace ec2 {
24392
24421
  */
24393
24422
  references?: outputs.ec2.Ec2FleetPerformanceFactorReferenceRequest[];
24394
24423
  }
24424
+ interface Ec2FleetEbsBlockDevice {
24425
+ /**
24426
+ * Indicates whether the EBS volume is deleted on instance termination. For more information, see [Preserving Amazon EBS volumes on instance termination](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html#preserving-volumes-on-termination) in the *Amazon EC2 User Guide* .
24427
+ */
24428
+ deleteOnTermination?: boolean;
24429
+ /**
24430
+ * Indicates whether the encryption state of an EBS volume is changed while being restored from a backing snapshot. The effect of setting the encryption state to `true` depends on the volume origin (new or from a snapshot), starting encryption state, ownership, and whether encryption by default is enabled. For more information, see [Amazon EBS encryption](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption.html#encryption-parameters) in the *Amazon EBS User Guide* .
24431
+ *
24432
+ * In no case can you remove encryption from an encrypted volume.
24433
+ *
24434
+ * Encrypted volumes can only be attached to instances that support Amazon EBS encryption. For more information, see [Supported instance types](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-encryption-requirements.html#ebs-encryption_supported_instances) .
24435
+ *
24436
+ * This parameter is not returned by `DescribeImageAttribute` .
24437
+ *
24438
+ * For `CreateImage` and `RegisterImage` , whether you can include this parameter, and the allowed values differ depending on the type of block device mapping you are creating.
24439
+ *
24440
+ * - If you are creating a block device mapping for a *new (empty) volume* , you can include this parameter, and specify either `true` for an encrypted volume, or `false` for an unencrypted volume. If you omit this parameter, it defaults to `false` (unencrypted).
24441
+ * - If you are creating a block device mapping from an *existing encrypted or unencrypted snapshot* , you must omit this parameter. If you include this parameter, the request will fail, regardless of the value that you specify.
24442
+ * - If you are creating a block device mapping from an *existing unencrypted volume* , you can include this parameter, but you must specify `false` . If you specify `true` , the request will fail. In this case, we recommend that you omit the parameter.
24443
+ * - If you are creating a block device mapping from an *existing encrypted volume* , you can include this parameter, and specify either `true` or `false` . However, if you specify `false` , the parameter is ignored and the block device mapping is always encrypted. In this case, we recommend that you omit the parameter.
24444
+ */
24445
+ encrypted?: boolean;
24446
+ /**
24447
+ * The number of I/O operations per second (IOPS). For `gp3` , `io1` , and `io2` volumes, this represents the number of IOPS that are provisioned for the volume. For `gp2` volumes, this represents the baseline performance of the volume and the rate at which the volume accumulates I/O credits for bursting.
24448
+ *
24449
+ * The following are the supported values for each volume type:
24450
+ *
24451
+ * - `gp3` : 3,000 - 16,000 IOPS
24452
+ * - `io1` : 100 - 64,000 IOPS
24453
+ * - `io2` : 100 - 256,000 IOPS
24454
+ *
24455
+ * For `io2` volumes, you can achieve up to 256,000 IOPS on [instances built on the Nitro System](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html#ec2-nitro-instances) . On other instances, you can achieve performance up to 32,000 IOPS.
24456
+ *
24457
+ * This parameter is required for `io1` and `io2` volumes. The default for `gp3` volumes is 3,000 IOPS.
24458
+ */
24459
+ iops?: number;
24460
+ /**
24461
+ * Identifier (key ID, key alias, key ARN, or alias ARN) of the customer managed KMS key to use for EBS encryption.
24462
+ *
24463
+ * This parameter is only supported on `BlockDeviceMapping` objects called by [RunInstances](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RunInstances.html) , [RequestSpotFleet](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RequestSpotFleet.html) , and [RequestSpotInstances](https://docs.aws.amazon.com/AWSEC2/latest/APIReference/API_RequestSpotInstances.html) .
24464
+ */
24465
+ kmsKeyId?: string;
24466
+ /**
24467
+ * The ID of the snapshot.
24468
+ */
24469
+ snapshotId?: string;
24470
+ /**
24471
+ * The size of the volume, in GiBs. You must specify either a snapshot ID or a volume size. If you specify a snapshot, the default is the snapshot size. You can specify a volume size that is equal to or larger than the snapshot size.
24472
+ *
24473
+ * The following are the supported sizes for each volume type:
24474
+ *
24475
+ * - `gp2` and `gp3` : 1 - 16,384 GiB
24476
+ * - `io1` : 4 - 16,384 GiB
24477
+ * - `io2` : 4 - 65,536 GiB
24478
+ * - `st1` and `sc1` : 125 - 16,384 GiB
24479
+ * - `standard` : 1 - 1024 GiB
24480
+ */
24481
+ volumeSize?: number;
24482
+ /**
24483
+ * The volume type. For more information, see [Amazon EBS volume types](https://docs.aws.amazon.com/ebs/latest/userguide/ebs-volume-types.html) in the *Amazon EBS User Guide* .
24484
+ */
24485
+ volumeType?: enums.ec2.Ec2FleetEbsBlockDeviceVolumeType;
24486
+ }
24395
24487
  interface Ec2FleetFleetLaunchTemplateConfigRequest {
24396
24488
  /**
24397
24489
  * The launch template to use. You must specify either the launch template ID or launch template name in the request.
@@ -24409,6 +24501,14 @@ export declare namespace ec2 {
24409
24501
  * The Availability Zone in which to launch the instances.
24410
24502
  */
24411
24503
  availabilityZone?: string;
24504
+ /**
24505
+ * The block device mappings, which define the EBS volumes and instance store volumes to attach to the instance at launch.
24506
+ *
24507
+ * Supported only for fleets of type `instant` .
24508
+ *
24509
+ * For more information, see [Block device mappings for volumes on Amazon EC2 instances](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/block-device-mapping-concepts.html) in the *Amazon EC2 User Guide* .
24510
+ */
24511
+ blockDeviceMappings?: outputs.ec2.Ec2FleetBlockDeviceMapping[];
24412
24512
  /**
24413
24513
  * The attributes for the instance types. When you specify instance attributes, Amazon EC2 will identify instance types with those attributes.
24414
24514
  *
@@ -29469,7 +29569,7 @@ export declare namespace ecs {
29469
29569
  * The options you can specify depend on the log driver. Some of the options you can specify when you use the ``awslogs`` log driver to route logs to Amazon CloudWatch include the following:
29470
29570
  * + awslogs-create-group Required: No Specify whether you want the log group to be created automatically. If this option isn't specified, it defaults to false. Your IAM policy must include the logs:CreateLogGroup permission before you attempt to use awslogs-create-group. + awslogs-region Required: Yes Specify the Region that the awslogs log driver is to send your Docker logs to. You can choose to send all of your logs from clusters in different Regions to a single region in CloudWatch Logs. This is so that they're all visible in one location. Otherwise, you can separate them by Region for more granularity. Make sure that the specified log group exists in the Region that you specify with this option. + awslogs-group Required: Yes Make sure to specify a log group that the awslogs log driver sends its log streams to. + awslogs-stream-prefix Required: Yes, when using Fargate.Optional when using EC2. Use the awslogs-stream-prefix option to associate a log stream with the specified prefix, the container name, and the ID of the Amazon ECS task that the container belongs to. If you specify a prefix with this option, then the log stream takes the format prefix-name/container-name/ecs-task-id. If you don't specify a prefix with this option, then the log stream is named after the container ID that's assigned by the Docker daemon on the container instance. Because it's difficult to trace logs back to the container that sent them with just the Docker container ID (which is only available on the container instance), we recommend that you specify a prefix with this option. For Amazon ECS services, you can use the service name as the prefix. Doing so, you can trace log streams to the service that the container belongs to, the name of the container that sent them, and the ID of the task that the container belongs to. You must specify a stream-prefix for your logs to have your logs appear in the Log pane when using the Amazon ECS console. + awslogs-datetime-format Required: No This option defines a multiline start pattern in Python strftime format. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. One example of a use case for using this format is for parsing output such as a stack dump, which might otherwise be logged in multiple entries. The correct pattern allows it to be captured in a single entry. For more information, see awslogs-datetime-format. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance. + awslogs-multiline-pattern Required: No This option defines a multiline start pattern that uses a regular expression. A log message consists of a line that matches the pattern and any following lines that don’t match the pattern. The matched line is the delimiter between log messages. For more information, see awslogs-multiline-pattern. This option is ignored if awslogs-datetime-format is also configured. You cannot configure both the awslogs-datetime-format and awslogs-multiline-pattern options. Multiline logging performs regular expression parsing and matching of all log messages. This might have a negative impact on logging performance.
29471
29571
  * The following options apply to all supported log drivers.
29472
- * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
29572
+ * + mode Required: No Valid values: non-blocking | blocking This option defines the delivery mode of log messages from the container to the log driver specified using logDriver. The delivery mode you choose affects application availability when the flow of logs from container is interrupted. If you use the blocking mode and the flow of logs is interrupted, calls from container code to write to the stdout and stderr streams will block. The logging thread of the application will block as a result. This may cause the application to become unresponsive and lead to container healthcheck failure. If you use the non-blocking mode, the container's logs are instead stored in an in-memory intermediate buffer configured with the max-buffer-size option. This prevents the application from becoming unresponsive when logs cannot be sent. We recommend using this mode if you want to ensure service availability and are okay with some log loss. For more information, see Preventing log loss with non-blocking mode in the awslogs container log driver. You can set a default mode for all containers in a specific Region by using the defaultLogDriverMode account setting. If you don't specify the mode option or configure the account setting, Amazon ECS will default to the blocking mode. For more information about the account setting, see Default log driver mode in the Amazon Elastic Container Service Developer Guide. On June 25, 2025, Amazon ECS is changing the default log driver mode from blocking to non-blocking to prioritize task availability over logging. To continue using the blocking mode after this change, do one of the following: Set the mode option in your container definition's logConfiguration as blocking. Set the defaultLogDriverMode account setting to blocking. + max-buffer-size Required: No Default value: 1m When non-blocking mode is used, the max-buffer-size log option controls the size of the buffer that's used for intermediate message storage. Make sure to specify an adequate buffer size based on your application. When the buffer fills up, further logs cannot be stored. Logs that cannot be stored are lost.
29473
29573
  * To route logs using the ``splunk`` log router, you need to specify a ``splunk-token`` and a ``splunk-url``.
29474
29574
  * When you use the ``awsfirelens`` log router to route logs to an AWS Service or AWS Partner Network destination for log storage and analytics, you can set the ``log-driver-buffer-limit`` option to limit the number of events that are buffered in memory, before being sent to the log router container. It can help to resolve potential log loss issue because high throughput might result in memory running out for the buffer inside of Docker.
29475
29575
  * Other options you can specify when using ``awsfirelens`` to route logs depend on the destination. When you export logs to Amazon Data Firehose, you can specify the AWS Region with ``region`` and a name for the log stream with ``delivery_stream``.
@@ -53126,6 +53226,16 @@ export declare namespace networkfirewall {
53126
53226
  */
53127
53227
  serverCertificateConfigurations?: outputs.networkfirewall.TlsInspectionConfigurationServerCertificateConfiguration[];
53128
53228
  }
53229
+ interface VpcEndpointAssociationSubnetMapping {
53230
+ /**
53231
+ * A IPAddressType
53232
+ */
53233
+ ipAddressType?: string;
53234
+ /**
53235
+ * A SubnetId.
53236
+ */
53237
+ subnetId: string;
53238
+ }
53129
53239
  }
53130
53240
  export declare namespace networkmanager {
53131
53241
  /**
@@ -1 +1 @@
1
- {"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAivmBjF,IAAiB,MAAM,CAgHtB;AAhHD,WAAiB,MAAM;IAoDnB;;OAEG;IACH,SAAgB,yBAAyB,CAAC,GAAe;;QACrD,uCACO,GAAG,KACN,qBAAqB,EAAE,MAAA,CAAC,GAAG,CAAC,qBAAqB,CAAC,mCAAI,CAAC,IACzD;IACN,CAAC;IALe,gCAAyB,4BAKxC,CAAA;AAoDL,CAAC,EAhHgB,MAAM,GAAN,cAAM,KAAN,cAAM,QAgHtB"}
1
+ {"version":3,"file":"output.js","sourceRoot":"","sources":["../../types/output.ts"],"names":[],"mappings":";AAAA,sEAAsE;AACtE,iFAAiF;;;AAwvmBjF,IAAiB,MAAM,CAgHtB;AAhHD,WAAiB,MAAM;IAoDnB;;OAEG;IACH,SAAgB,yBAAyB,CAAC,GAAe;;QACrD,uCACO,GAAG,KACN,qBAAqB,EAAE,MAAA,CAAC,GAAG,CAAC,qBAAqB,CAAC,mCAAI,CAAC,IACzD;IACN,CAAC;IALe,gCAAyB,4BAKxC,CAAA;AAoDL,CAAC,EAhHgB,MAAM,GAAN,cAAM,KAAN,cAAM,QAgHtB"}