@pulumi/aws-native 1.30.0-alpha.1749819116 → 1.30.0-alpha.1750076003

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (66) hide show
  1. package/appstream/getAppBlock.d.ts +5 -0
  2. package/appstream/getAppBlock.js.map +1 -1
  3. package/appstream/getAppBlockBuilder.d.ts +4 -0
  4. package/appstream/getAppBlockBuilder.js.map +1 -1
  5. package/appstream/getApplication.d.ts +4 -0
  6. package/appstream/getApplication.js.map +1 -1
  7. package/ec2/egressOnlyInternetGateway.d.ts +10 -0
  8. package/ec2/egressOnlyInternetGateway.js +2 -0
  9. package/ec2/egressOnlyInternetGateway.js.map +1 -1
  10. package/ec2/getEgressOnlyInternetGateway.d.ts +5 -0
  11. package/ec2/getEgressOnlyInternetGateway.js.map +1 -1
  12. package/ec2/getSubnet.d.ts +2 -1
  13. package/ec2/getSubnet.js.map +1 -1
  14. package/ec2/subnet.d.ts +3 -2
  15. package/ec2/subnet.js +2 -0
  16. package/ec2/subnet.js.map +1 -1
  17. package/efs/mountTarget.d.ts +16 -0
  18. package/efs/mountTarget.js.map +1 -1
  19. package/entityresolution/getMatchingWorkflow.d.ts +3 -1
  20. package/entityresolution/getMatchingWorkflow.js.map +1 -1
  21. package/entityresolution/matchingWorkflow.d.ts +6 -2
  22. package/entityresolution/matchingWorkflow.js.map +1 -1
  23. package/evs/environment.d.ts +90 -0
  24. package/evs/environment.js.map +1 -1
  25. package/evs/getEnvironment.d.ts +34 -0
  26. package/evs/getEnvironment.js.map +1 -1
  27. package/lambda/eventSourceMapping.d.ts +46 -46
  28. package/lambda/eventSourceMapping.js +1 -1
  29. package/lambda/eventSourceMapping.js.map +1 -1
  30. package/lambda/getEventSourceMapping.d.ts +22 -14
  31. package/lambda/getEventSourceMapping.js.map +1 -1
  32. package/mwaa/environment.d.ts +2 -0
  33. package/mwaa/environment.js +2 -0
  34. package/mwaa/environment.js.map +1 -1
  35. package/opsworkscm/getServer.d.ts +9 -4
  36. package/opsworkscm/getServer.js.map +1 -1
  37. package/opsworkscm/server.d.ts +9 -2
  38. package/opsworkscm/server.js +2 -2
  39. package/opsworkscm/server.js.map +1 -1
  40. package/package.json +3 -3
  41. package/package.json.dev +2 -2
  42. package/types/enums/efs/index.d.ts +5 -0
  43. package/types/enums/entityresolution/index.d.ts +3 -1
  44. package/types/enums/entityresolution/index.js.map +1 -1
  45. package/types/enums/evs/index.d.ts +16 -0
  46. package/types/enums/evs/index.js.map +1 -1
  47. package/types/enums/kms/index.d.ts +3 -0
  48. package/types/enums/kms/index.js +3 -0
  49. package/types/enums/kms/index.js.map +1 -1
  50. package/types/enums/lambda/index.d.ts +34 -9
  51. package/types/enums/lambda/index.js +14 -1
  52. package/types/enums/lambda/index.js.map +1 -1
  53. package/types/enums/mwaa/index.d.ts +8 -0
  54. package/types/enums/mwaa/index.js +5 -1
  55. package/types/enums/mwaa/index.js.map +1 -1
  56. package/types/enums/sagemaker/index.d.ts +13 -0
  57. package/types/enums/sagemaker/index.js +7 -3
  58. package/types/enums/sagemaker/index.js.map +1 -1
  59. package/types/enums/wafv2/index.d.ts +16 -0
  60. package/types/enums/wafv2/index.js +15 -2
  61. package/types/enums/wafv2/index.js.map +1 -1
  62. package/types/input.d.ts +288 -16
  63. package/types/output.d.ts +313 -16
  64. package/types/output.js.map +1 -1
  65. package/wafv2/getWebAcl.d.ts +2 -2
  66. package/wafv2/webAcl.d.ts +4 -4
package/types/input.d.ts CHANGED
@@ -6358,6 +6358,10 @@ export declare namespace athena {
6358
6358
  * Role used to access user resources in an Athena for Apache Spark session. This property applies only to Spark-enabled workgroups in Athena.
6359
6359
  */
6360
6360
  executionRole?: pulumi.Input<string>;
6361
+ /**
6362
+ * The configuration for storing results in Athena owned storage, which includes whether this feature is enabled; whether encryption configuration, if any, is used for encrypting query results.
6363
+ */
6364
+ managedQueryResultsConfiguration?: pulumi.Input<inputs.athena.WorkGroupManagedQueryResultsConfigurationArgs>;
6361
6365
  /**
6362
6366
  * Indicates that the Amazon CloudWatch metrics are enabled for the workgroup.
6363
6367
  */
@@ -6381,6 +6385,7 @@ export declare namespace athena {
6381
6385
  enforceWorkGroupConfiguration?: pulumi.Input<boolean>;
6382
6386
  engineVersion?: pulumi.Input<inputs.athena.WorkGroupEngineVersionArgs>;
6383
6387
  executionRole?: pulumi.Input<string>;
6388
+ managedQueryResultsConfiguration?: pulumi.Input<inputs.athena.WorkGroupManagedQueryResultsConfigurationArgs>;
6384
6389
  publishCloudWatchMetricsEnabled?: pulumi.Input<boolean>;
6385
6390
  removeBytesScannedCutoffPerQuery?: pulumi.Input<boolean>;
6386
6391
  removeCustomerContentEncryptionConfiguration?: pulumi.Input<boolean>;
@@ -6424,6 +6429,25 @@ export declare namespace athena {
6424
6429
  */
6425
6430
  selectedEngineVersion?: pulumi.Input<string>;
6426
6431
  }
6432
+ /**
6433
+ * The configuration for the managed query results and encryption option. ResultConfiguration and ManagedQueryResultsConfiguration cannot be set at the same time
6434
+ */
6435
+ interface WorkGroupManagedQueryResultsConfigurationArgs {
6436
+ /**
6437
+ * If set to true, allows you to store query results in Athena owned storage. If set to false, workgroup member stores query results in location specified under `ResultConfiguration$OutputLocation` . The default is false. A workgroup cannot have the `ResultConfiguration$OutputLocation` parameter when you set this field to true.
6438
+ */
6439
+ enabled?: pulumi.Input<boolean>;
6440
+ /**
6441
+ * If you encrypt query and calculation results in Athena owned storage, this field indicates the encryption option (for example, SSE_KMS or CSE_KMS) and key information.
6442
+ */
6443
+ encryptionConfiguration?: pulumi.Input<inputs.athena.WorkGroupManagedStorageEncryptionConfigurationArgs>;
6444
+ }
6445
+ /**
6446
+ * Indicates the encryption configuration for Athena Managed Storage. If not setting this field, Managed Storage will encrypt the query results with Athena's encryption key
6447
+ */
6448
+ interface WorkGroupManagedStorageEncryptionConfigurationArgs {
6449
+ kmsKey?: pulumi.Input<string>;
6450
+ }
6427
6451
  /**
6428
6452
  * The location in Amazon S3 where query results are stored and the encryption option, if any, used for query results. These are known as "client-side settings". If workgroup settings override client-side settings, then the query uses the workgroup settings.
6429
6453
  */
@@ -22896,7 +22920,7 @@ export declare namespace dynamodb {
22896
22920
  */
22897
22921
  keySchema: pulumi.Input<pulumi.Input<inputs.dynamodb.TableKeySchemaArgs>[]>;
22898
22922
  /**
22899
- * The maximum number of read and write units for the specified global secondary index. If you use this parameter, you must specify ``MaxReadRequestUnits``, ``MaxWriteRequestUnits``, or both.
22923
+ * The maximum number of read and write units for the specified global secondary index. If you use this parameter, you must specify ``MaxReadRequestUnits``, ``MaxWriteRequestUnits``, or both. You must use either ``OnDemandThroughput`` or ``ProvisionedThroughput`` based on your table's capacity mode.
22900
22924
  */
22901
22925
  onDemandThroughput?: pulumi.Input<inputs.dynamodb.TableOnDemandThroughputArgs>;
22902
22926
  /**
@@ -22904,7 +22928,7 @@ export declare namespace dynamodb {
22904
22928
  */
22905
22929
  projection: pulumi.Input<inputs.dynamodb.TableProjectionArgs>;
22906
22930
  /**
22907
- * Represents the provisioned throughput settings for the specified global secondary index.
22931
+ * Represents the provisioned throughput settings for the specified global secondary index. You must use either ``OnDemandThroughput`` or ``ProvisionedThroughput`` based on your table's capacity mode.
22908
22932
  * For current minimum and maximum provisioned throughput values, see [Service, Account, and Table Quotas](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/Limits.html) in the *Amazon DynamoDB Developer Guide*.
22909
22933
  */
22910
22934
  provisionedThroughput?: pulumi.Input<inputs.dynamodb.TableProvisionedThroughputArgs>;
@@ -31322,7 +31346,9 @@ export declare namespace entityresolution {
31322
31346
  }
31323
31347
  interface MatchingWorkflowIncrementalRunConfigArgs {
31324
31348
  /**
31325
- * The type of incremental run. It takes only one value: `IMMEDIATE` .
31349
+ * The type of incremental run. The only valid value is `IMMEDIATE` . This appears as "Automatic" in the console.
31350
+ *
31351
+ * > For workflows where `resolutionType` is `ML_MATCHING` , incremental processing is not supported.
31326
31352
  */
31327
31353
  incrementalRunType: pulumi.Input<enums.entityresolution.MatchingWorkflowIncrementalRunConfigIncrementalRunType>;
31328
31354
  }
@@ -32281,53 +32307,151 @@ export declare namespace evidently {
32281
32307
  }
32282
32308
  }
32283
32309
  export declare namespace evs {
32310
+ /**
32311
+ * The connectivity configuration for the environment. Amazon EVS requires that you specify two route server peer IDs. During environment creation, the route server endpoints peer with the NSX uplink VLAN for connectivity to the NSX overlay network.
32312
+ */
32284
32313
  interface ConnectivityInfoPropertiesArgs {
32314
+ /**
32315
+ * The unique IDs for private route server peers.
32316
+ */
32285
32317
  privateRouteServerPeerings: pulumi.Input<pulumi.Input<string>[]>;
32286
32318
  }
32287
32319
  interface EnvironmentHostInfoForCreateArgs {
32320
+ /**
32321
+ * The unique ID of the Amazon EC2 Dedicated Host.
32322
+ */
32288
32323
  dedicatedHostId?: pulumi.Input<string>;
32324
+ /**
32325
+ * The DNS hostname of the host. DNS hostnames for hosts must be unique across Amazon EVS environments and within VCF.
32326
+ */
32289
32327
  hostName: pulumi.Input<string>;
32328
+ /**
32329
+ * The EC2 instance type that represents the host.
32330
+ */
32290
32331
  instanceType: pulumi.Input<enums.evs.EnvironmentHostInfoForCreateInstanceType>;
32332
+ /**
32333
+ * The name of the SSH key that is used to access the host.
32334
+ */
32291
32335
  keyName: pulumi.Input<string>;
32336
+ /**
32337
+ * The unique ID of the placement group where the host is placed.
32338
+ */
32292
32339
  placementGroupId?: pulumi.Input<string>;
32293
32340
  }
32294
32341
  interface EnvironmentInitialVlanInfoArgs {
32342
+ /**
32343
+ * The CIDR block that you provide to create an Amazon EVS VLAN subnet. Amazon EVS VLAN subnets have a minimum CIDR block size of /28 and a maximum size of /24. Amazon EVS VLAN subnet CIDR blocks must not overlap with other subnets in the VPC.
32344
+ */
32295
32345
  cidr: pulumi.Input<string>;
32296
32346
  }
32297
32347
  /**
32298
32348
  * The initial Vlan configuration only required upon creation. Modification after creation will have no effect
32299
32349
  */
32300
32350
  interface InitialVlansPropertiesArgs {
32351
+ /**
32352
+ * The edge VTEP VLAN subnet. This VLAN subnet manages traffic flowing between the internal network and external networks, including internet access and other site connections.
32353
+ */
32301
32354
  edgeVTep: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32355
+ /**
32356
+ * An additional VLAN subnet that can be used to extend VCF capabilities once configured. For example, you can configure an expansion VLAN subnet to use NSX Federation for centralized management and synchronization of multiple NSX deployments across different locations.
32357
+ */
32302
32358
  expansionVlan1: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32359
+ /**
32360
+ * An additional VLAN subnet that can be used to extend VCF capabilities once configured. For example, you can configure an expansion VLAN subnet to use NSX Federation for centralized management and synchronization of multiple NSX deployments across different locations.
32361
+ */
32303
32362
  expansionVlan2: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32363
+ /**
32364
+ * The HCX VLAN subnet. This VLAN subnet allows the HCX Interconnnect (IX) and HCX Network Extension (NE) to reach their peers and enable HCX Service Mesh creation.
32365
+ */
32304
32366
  hcx: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32367
+ /**
32368
+ * The NSX uplink VLAN subnet. This VLAN subnet allows connectivity to the NSX overlay network.
32369
+ */
32305
32370
  nsxUpLink: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32371
+ /**
32372
+ * The vMotion VLAN subnet. This VLAN subnet carries traffic for vSphere vMotion.
32373
+ */
32306
32374
  vMotion: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32375
+ /**
32376
+ * The vSAN VLAN subnet. This VLAN subnet carries the communication between ESXi hosts to implement a vSAN shared storage pool.
32377
+ */
32307
32378
  vSan: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32379
+ /**
32380
+ * The VTEP VLAN subnet. This VLAN subnet handles internal network traffic between virtual machines within a VCF instance.
32381
+ */
32308
32382
  vTep: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32383
+ /**
32384
+ * The VM management VLAN subnet. This VLAN subnet carries traffic for vSphere virtual machines.
32385
+ */
32309
32386
  vmManagement: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32387
+ /**
32388
+ * The host VMkernel management VLAN subnet. This VLAN subnet carries traffic for managing ESXi hosts and communicating with VMware vCenter Server.
32389
+ */
32310
32390
  vmkManagement: pulumi.Input<inputs.evs.EnvironmentInitialVlanInfoArgs>;
32311
32391
  }
32312
32392
  /**
32313
32393
  * The license information for an EVS environment
32314
32394
  */
32315
32395
  interface LicenseInfoPropertiesArgs {
32396
+ /**
32397
+ * The VCF solution key. This license unlocks VMware VCF product features, including vSphere, NSX, SDDC Manager, and vCenter Server.
32398
+ */
32316
32399
  solutionKey: pulumi.Input<string>;
32400
+ /**
32401
+ * The VSAN license key. This license unlocks vSAN features.
32402
+ */
32317
32403
  vsanKey: pulumi.Input<string>;
32318
32404
  }
32405
+ /**
32406
+ * The security groups that allow traffic between the Amazon EVS control plane and your VPC for service access. If a security group is not specified, Amazon EVS uses the default security group in your account for service access.
32407
+ */
32319
32408
  interface ServiceAccessSecurityGroupsPropertiesArgs {
32409
+ /**
32410
+ * The security groups that allow service access.
32411
+ */
32320
32412
  securityGroups?: pulumi.Input<pulumi.Input<string>[]>;
32321
32413
  }
32414
+ /**
32415
+ * The DNS hostnames to be used by the VCF management appliances in your environment.
32416
+ *
32417
+ * For environment creation to be successful, each hostname entry must resolve to a domain name that you've registered in your DNS service of choice and configured in the DHCP option set of your VPC. DNS hostnames cannot be changed after environment creation has started.
32418
+ */
32322
32419
  interface VcfHostnamesPropertiesArgs {
32420
+ /**
32421
+ * The hostname for VMware Cloud Builder.
32422
+ */
32323
32423
  cloudBuilder: pulumi.Input<string>;
32424
+ /**
32425
+ * The VMware NSX hostname.
32426
+ */
32324
32427
  nsx: pulumi.Input<string>;
32428
+ /**
32429
+ * The hostname for the first NSX Edge node.
32430
+ */
32325
32431
  nsxEdge1: pulumi.Input<string>;
32432
+ /**
32433
+ * The hostname for the second NSX Edge node.
32434
+ */
32326
32435
  nsxEdge2: pulumi.Input<string>;
32436
+ /**
32437
+ * The hostname for the first VMware NSX Manager virtual machine (VM).
32438
+ */
32327
32439
  nsxManager1: pulumi.Input<string>;
32440
+ /**
32441
+ * The hostname for the second VMware NSX Manager virtual machine (VM).
32442
+ */
32328
32443
  nsxManager2: pulumi.Input<string>;
32444
+ /**
32445
+ * The hostname for the third VMware NSX Manager virtual machine (VM).
32446
+ */
32329
32447
  nsxManager3: pulumi.Input<string>;
32448
+ /**
32449
+ * The hostname for SDDC Manager.
32450
+ */
32330
32451
  sddcManager: pulumi.Input<string>;
32452
+ /**
32453
+ * The VMware vCenter hostname.
32454
+ */
32331
32455
  vCenter: pulumi.Input<string>;
32332
32456
  }
32333
32457
  }
@@ -44809,6 +44933,7 @@ export declare namespace lambda {
44809
44933
  * The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-msk.html#services-msk-consumer-group-id).
44810
44934
  */
44811
44935
  consumerGroupId?: pulumi.Input<string>;
44936
+ schemaRegistryConfig?: pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryConfigArgs>;
44812
44937
  }
44813
44938
  /**
44814
44939
  * A configuration object that specifies the destination of an event after Lambda processes it.
@@ -44873,7 +44998,7 @@ export declare namespace lambda {
44873
44998
  metrics?: pulumi.Input<pulumi.Input<enums.lambda.EventSourceMappingMetricsConfigMetricsItem>[]>;
44874
44999
  }
44875
45000
  /**
44876
- * A destination for events that failed processing.
45001
+ * A destination for events that failed processing. See [Capturing records of Lambda asynchronous invocations](https://docs.aws.amazon.com/lambda/latest/dg/invocation-async-retain-records.html) for more information.
44877
45002
  */
44878
45003
  interface EventSourceMappingOnFailureArgs {
44879
45004
  /**
@@ -44905,6 +45030,40 @@ export declare namespace lambda {
44905
45030
  */
44906
45031
  maximumConcurrency?: pulumi.Input<number>;
44907
45032
  }
45033
+ interface EventSourceMappingSchemaRegistryAccessConfigArgs {
45034
+ /**
45035
+ * The type of authentication Lambda uses to access your schema registry.
45036
+ */
45037
+ type?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryAccessConfigType>;
45038
+ /**
45039
+ * The URI of the secret (Secrets Manager secret ARN) to authenticate with your schema registry.
45040
+ */
45041
+ uri?: pulumi.Input<string>;
45042
+ }
45043
+ interface EventSourceMappingSchemaRegistryConfigArgs {
45044
+ /**
45045
+ * An array of access configuration objects that tell Lambda how to authenticate with your schema registry.
45046
+ */
45047
+ accessConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryAccessConfigArgs>[]>;
45048
+ /**
45049
+ * The record format that Lambda delivers to your function after schema validation.
45050
+ */
45051
+ eventRecordFormat?: pulumi.Input<enums.lambda.EventSourceMappingSchemaRegistryConfigEventRecordFormat>;
45052
+ /**
45053
+ * The URI for your schema registry. The correct URI format depends on the type of schema registry you're using.
45054
+ */
45055
+ schemaRegistryUri?: pulumi.Input<string>;
45056
+ /**
45057
+ * An array of schema validation configuration objects, which tell Lambda the message attributes you want to validate and filter using your schema registry.
45058
+ */
45059
+ schemaValidationConfigs?: pulumi.Input<pulumi.Input<inputs.lambda.EventSourceMappingSchemaValidationConfigArgs>[]>;
45060
+ }
45061
+ interface EventSourceMappingSchemaValidationConfigArgs {
45062
+ /**
45063
+ * The attribute you want your schema registry to validate and filter for.
45064
+ */
45065
+ attribute?: pulumi.Input<enums.lambda.EventSourceMappingSchemaValidationConfigAttribute>;
45066
+ }
44908
45067
  /**
44909
45068
  * The self-managed Apache Kafka cluster for your event source.
44910
45069
  */
@@ -44919,9 +45078,10 @@ export declare namespace lambda {
44919
45078
  */
44920
45079
  interface EventSourceMappingSelfManagedKafkaEventSourceConfigArgs {
44921
45080
  /**
44922
- * The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-msk.html#services-msk-consumer-group-id).
45081
+ * The identifier for the Kafka consumer group to join. The consumer group ID must be unique among all your Kafka event sources. After creating a Kafka event source mapping with the consumer group ID specified, you cannot update this value. For more information, see [Customizable consumer group ID](https://docs.aws.amazon.com/lambda/latest/dg/with-kafka-process.html#services-smaa-topic-add).
44923
45082
  */
44924
45083
  consumerGroupId?: pulumi.Input<string>;
45084
+ schemaRegistryConfig?: pulumi.Input<inputs.lambda.EventSourceMappingSchemaRegistryConfigArgs>;
44925
45085
  }
44926
45086
  /**
44927
45087
  * An array of the authentication protocol, VPC components, or virtual host to secure and define your event source.
@@ -44929,15 +45089,15 @@ export declare namespace lambda {
44929
45089
  interface EventSourceMappingSourceAccessConfigurationArgs {
44930
45090
  /**
44931
45091
  * The type of authentication protocol, VPC components, or virtual host for your event source. For example: ``"Type":"SASL_SCRAM_512_AUTH"``.
44932
- * + ``BASIC_AUTH`` – (Amazon MQ) The ASMlong secret that stores your broker credentials.
44933
- * + ``BASIC_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL/PLAIN authentication of your Apache Kafka brokers.
44934
- * + ``VPC_SUBNET`` – (Self-managed Apache Kafka) The subnets associated with your VPC. Lambda connects to these subnets to fetch data from your self-managed Apache Kafka cluster.
44935
- * + ``VPC_SECURITY_GROUP`` – (Self-managed Apache Kafka) The VPC security group used to manage access to your self-managed Apache Kafka brokers.
44936
- * + ``SASL_SCRAM_256_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-256 authentication of your self-managed Apache Kafka brokers.
44937
- * + ``SASL_SCRAM_512_AUTH`` – (Amazon MSK, Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-512 authentication of your self-managed Apache Kafka brokers.
44938
- * + ``VIRTUAL_HOST`` –- (RabbitMQ) The name of the virtual host in your RabbitMQ broker. Lambda uses this RabbitMQ host as the event source. This property cannot be specified in an UpdateEventSourceMapping API call.
44939
- * + ``CLIENT_CERTIFICATE_TLS_AUTH`` – (Amazon MSK, self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the certificate chain (X.509 PEM), private key (PKCS#8 PEM), and private key password (optional) used for mutual TLS authentication of your MSK/Apache Kafka brokers.
44940
- * + ``SERVER_ROOT_CA_CERTIFICATE`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the root CA certificate (X.509 PEM) used for TLS encryption of your Apache Kafka brokers.
45092
+ * + ``BASIC_AUTH`` – (Amazon MQ) The ASMlong secret that stores your broker credentials.
45093
+ * + ``BASIC_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL/PLAIN authentication of your Apache Kafka brokers.
45094
+ * + ``VPC_SUBNET`` – (Self-managed Apache Kafka) The subnets associated with your VPC. Lambda connects to these subnets to fetch data from your self-managed Apache Kafka cluster.
45095
+ * + ``VPC_SECURITY_GROUP`` – (Self-managed Apache Kafka) The VPC security group used to manage access to your self-managed Apache Kafka brokers.
45096
+ * + ``SASL_SCRAM_256_AUTH`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-256 authentication of your self-managed Apache Kafka brokers.
45097
+ * + ``SASL_SCRAM_512_AUTH`` – (Amazon MSK, Self-managed Apache Kafka) The Secrets Manager ARN of your secret key used for SASL SCRAM-512 authentication of your self-managed Apache Kafka brokers.
45098
+ * + ``VIRTUAL_HOST`` –- (RabbitMQ) The name of the virtual host in your RabbitMQ broker. Lambda uses this RabbitMQ host as the event source. This property cannot be specified in an UpdateEventSourceMapping API call.
45099
+ * + ``CLIENT_CERTIFICATE_TLS_AUTH`` – (Amazon MSK, self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the certificate chain (X.509 PEM), private key (PKCS#8 PEM), and private key password (optional) used for mutual TLS authentication of your MSK/Apache Kafka brokers.
45100
+ * + ``SERVER_ROOT_CA_CERTIFICATE`` – (Self-managed Apache Kafka) The Secrets Manager ARN of your secret key containing the root CA certificate (X.509 PEM) used for TLS encryption of your Apache Kafka brokers.
44941
45101
  */
44942
45102
  type?: pulumi.Input<enums.lambda.EventSourceMappingSourceAccessConfigurationType>;
44943
45103
  /**
@@ -50297,7 +50457,21 @@ export declare namespace msk {
50297
50457
  */
50298
50458
  connectivityInfo?: pulumi.Input<inputs.msk.ClusterConnectivityInfoArgs>;
50299
50459
  /**
50300
- * The type of Amazon EC2 instances to use for brokers. The following instance types are allowed: kafka.m5.large, kafka.m5.xlarge, kafka.m5.2xlarge, kafka.m5.4xlarge, kafka.m5.8xlarge, kafka.m5.12xlarge, kafka.m5.16xlarge, kafka.m5.24xlarge, and kafka.t3.small.
50460
+ * The type of Amazon EC2 instances to use for brokers. Depending on the [broker type](https://docs.aws.amazon.com/msk/latest/developerguide/broker-instance-types.html) , Amazon MSK supports the following broker sizes:
50461
+ *
50462
+ * *Standard broker sizes*
50463
+ *
50464
+ * - kafka.t3.small
50465
+ *
50466
+ * > You can't select the kafka.t3.small instance type when the metadata mode is KRaft.
50467
+ * - kafka.m5.large, kafka.m5.xlarge, kafka.m5.2xlarge, kafka.m5.4xlarge, kafka.m5.8xlarge, kafka.m5.12xlarge, kafka.m5.16xlarge, kafka.m5.24xlarge
50468
+ * - kafka.m7g.large, kafka.m7g.xlarge, kafka.m7g.2xlarge, kafka.m7g.4xlarge, kafka.m7g.8xlarge, kafka.m7g.12xlarge, kafka.m7g.16xlarge
50469
+ *
50470
+ * *Express broker sizes*
50471
+ *
50472
+ * - express.m7g.large, express.m7g.xlarge, express.m7g.2xlarge, express.m7g.4xlarge, express.m7g.8xlarge, express.m7g.12xlarge, express.m7g.16xlarge
50473
+ *
50474
+ * > Some broker sizes might not be available in certian AWS Regions. See the updated [Pricing tools](https://docs.aws.amazon.com/msk/pricing/) section on the Amazon MSK pricing page for the latest list of available instances by Region.
50301
50475
  */
50302
50476
  instanceType: pulumi.Input<string>;
50303
50477
  /**
@@ -85570,7 +85744,7 @@ export declare namespace s3 {
85570
85744
  */
85571
85745
  httpErrorCodeReturnedEquals?: pulumi.Input<string>;
85572
85746
  /**
85573
- * The object key name prefix when the redirect is applied. For example, to redirect requests for ``ExamplePage.html``, the key prefix will be ``ExamplePage.html``. To redirect request for all pages with the prefix ``docs/``, the key prefix will be ``/docs``, which identifies all objects in the docs/ folder.
85747
+ * The object key name prefix when the redirect is applied. For example, to redirect requests for ``ExamplePage.html``, the key prefix will be ``ExamplePage.html``. To redirect request for all pages with the prefix ``docs/``, the key prefix will be ``docs/``, which identifies all objects in the docs/ folder.
85574
85748
  * Required when the parent element ``Condition`` is specified and sibling ``HttpErrorCodeReturnedEquals`` is not specified. If both conditions are specified, both must be true for the redirect to be applied.
85575
85749
  */
85576
85750
  keyPrefixEquals?: pulumi.Input<string>;
@@ -87378,6 +87552,10 @@ export declare namespace sagemaker {
87378
87552
  * The security groups for the Amazon Virtual Private Cloud that the Domain uses for communication between Domain-level apps and user apps.
87379
87553
  */
87380
87554
  securityGroupIds?: pulumi.Input<pulumi.Input<string>[]>;
87555
+ /**
87556
+ * The settings that apply to an SageMaker AI domain when you use it in Amazon SageMaker Unified Studio.
87557
+ */
87558
+ unifiedStudioSettings?: pulumi.Input<inputs.sagemaker.DomainUnifiedStudioSettingsArgs>;
87381
87559
  }
87382
87560
  /**
87383
87561
  * Specifies options when sharing an Amazon SageMaker Studio notebook. These settings are specified as part of DefaultUserSettings when the CreateDomain API is called, and as part of UserSettings when the CreateUserProfile API is called.
@@ -87417,6 +87595,44 @@ export declare namespace sagemaker {
87417
87595
  */
87418
87596
  hiddenSageMakerImageVersionAliases?: pulumi.Input<pulumi.Input<inputs.sagemaker.DomainHiddenSageMakerImageArgs>[]>;
87419
87597
  }
87598
+ /**
87599
+ * A collection of settings that apply to an Amazon SageMaker AI domain when you use it in Amazon SageMaker Unified Studio.
87600
+ */
87601
+ interface DomainUnifiedStudioSettingsArgs {
87602
+ /**
87603
+ * The ID of the AWS account that has the Amazon SageMaker Unified Studio domain. The default value, if you don't specify an ID, is the ID of the account that has the Amazon SageMaker AI domain.
87604
+ */
87605
+ domainAccountId?: pulumi.Input<string>;
87606
+ /**
87607
+ * The ID of the Amazon SageMaker Unified Studio domain associated with this domain.
87608
+ */
87609
+ domainId?: pulumi.Input<string>;
87610
+ /**
87611
+ * The AWS Region where the domain is located in Amazon SageMaker Unified Studio. The default value, if you don't specify a Region, is the Region where the Amazon SageMaker AI domain is located.
87612
+ */
87613
+ domainRegion?: pulumi.Input<string>;
87614
+ /**
87615
+ * The ID of the environment that Amazon SageMaker Unified Studio associates with the domain.
87616
+ */
87617
+ environmentId?: pulumi.Input<string>;
87618
+ /**
87619
+ * The ID of the Amazon SageMaker Unified Studio project that corresponds to the domain.
87620
+ */
87621
+ projectId?: pulumi.Input<string>;
87622
+ /**
87623
+ * The location where Amazon S3 stores temporary execution data and other artifacts for the project that corresponds to the domain.
87624
+ */
87625
+ projectS3Path?: pulumi.Input<string>;
87626
+ /**
87627
+ * Sets whether you can access the domain in Amazon SageMaker Studio:
87628
+ *
87629
+ * ENABLED
87630
+ * You can access the domain in Amazon SageMaker Studio. If you migrate the domain to Amazon SageMaker Unified Studio, you can access it in both studio interfaces.
87631
+ * DISABLED
87632
+ * You can't access the domain in Amazon SageMaker Studio. If you migrate the domain to Amazon SageMaker Unified Studio, you can access it only in that studio interface.
87633
+ */
87634
+ studioWebPortalAccess?: pulumi.Input<enums.sagemaker.DomainUnifiedStudioSettingsStudioWebPortalAccess>;
87635
+ }
87420
87636
  /**
87421
87637
  * A collection of settings that apply to users of Amazon SageMaker Studio. These settings are specified when the CreateUserProfile API is called, and as DefaultUserSettings when the CreateDomain API is called.
87422
87638
  */
@@ -95797,6 +96013,10 @@ export declare namespace wafv2 {
95797
96013
  */
95798
96014
  statements: pulumi.Input<pulumi.Input<inputs.wafv2.RuleGroupStatementArgs>[]>;
95799
96015
  }
96016
+ interface RuleGroupAsnMatchStatementArgs {
96017
+ asnList?: pulumi.Input<pulumi.Input<number>[]>;
96018
+ forwardedIpConfig?: pulumi.Input<inputs.wafv2.RuleGroupForwardedIpConfigurationArgs>;
96019
+ }
95800
96020
  /**
95801
96021
  * Block traffic towards application.
95802
96022
  */
@@ -96474,6 +96694,7 @@ export declare namespace wafv2 {
96474
96694
  * Specifies a single custom aggregate key for a rate-base rule.
96475
96695
  */
96476
96696
  interface RuleGroupRateBasedStatementCustomKeyArgs {
96697
+ asn?: pulumi.Input<inputs.wafv2.RuleGroupRateLimitAsnArgs>;
96477
96698
  /**
96478
96699
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
96479
96700
  */
@@ -96529,6 +96750,11 @@ export declare namespace wafv2 {
96529
96750
  */
96530
96751
  uriPath?: pulumi.Input<inputs.wafv2.RuleGroupRateLimitUriPathArgs>;
96531
96752
  }
96753
+ /**
96754
+ * Specifies the request's ASN as an aggregate key for a rate-based rule.
96755
+ */
96756
+ interface RuleGroupRateLimitAsnArgs {
96757
+ }
96532
96758
  /**
96533
96759
  * Specifies a cookie as an aggregate key for a rate-based rule.
96534
96760
  */
@@ -96797,6 +97023,7 @@ export declare namespace wafv2 {
96797
97023
  * A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
96798
97024
  */
96799
97025
  andStatement?: pulumi.Input<inputs.wafv2.RuleGroupAndStatementArgs>;
97026
+ asnMatchStatement?: pulumi.Input<inputs.wafv2.RuleGroupAsnMatchStatementArgs>;
96800
97027
  /**
96801
97028
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
96802
97029
  */
@@ -96994,6 +97221,10 @@ export declare namespace wafv2 {
96994
97221
  */
96995
97222
  statements: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclStatementArgs>[]>;
96996
97223
  }
97224
+ interface WebAclAsnMatchStatementArgs {
97225
+ asnList?: pulumi.Input<pulumi.Input<number>[]>;
97226
+ forwardedIpConfig?: pulumi.Input<inputs.wafv2.WebAclForwardedIpConfigurationArgs>;
97227
+ }
96997
97228
  /**
96998
97229
  * AssociationConfig for body inspection
96999
97230
  */
@@ -97046,6 +97277,13 @@ export declare namespace wafv2 {
97046
97277
  */
97047
97278
  responseInspection?: pulumi.Input<inputs.wafv2.WebAclResponseInspectionArgs>;
97048
97279
  }
97280
+ /**
97281
+ * Configures how to use the AntiDDOS AWS managed rule group in the web ACL
97282
+ */
97283
+ interface WebAclAwsManagedRulesAntiDDoSRuleSetArgs {
97284
+ clientSideActionConfig: pulumi.Input<inputs.wafv2.WebAclClientSideActionConfigArgs>;
97285
+ sensitivityToBlock?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
97286
+ }
97049
97287
  /**
97050
97288
  * Configures how to use the Account Takeover Prevention managed rule group in the web ACL
97051
97289
  */
@@ -97219,6 +97457,20 @@ export declare namespace wafv2 {
97219
97457
  */
97220
97458
  immunityTimeProperty?: pulumi.Input<inputs.wafv2.WebAclImmunityTimePropertyArgs>;
97221
97459
  }
97460
+ /**
97461
+ * Client side action config for AntiDDOS AMR.
97462
+ */
97463
+ interface WebAclClientSideActionArgs {
97464
+ exemptUriRegularExpressions?: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclRegexArgs>[]>;
97465
+ sensitivity?: pulumi.Input<enums.wafv2.WebAclSensitivityToAct>;
97466
+ usageOfAction: pulumi.Input<enums.wafv2.WebAclUsageOfAction>;
97467
+ }
97468
+ /**
97469
+ * Client side action config for AntiDDOS AMR.
97470
+ */
97471
+ interface WebAclClientSideActionConfigArgs {
97472
+ challenge: pulumi.Input<inputs.wafv2.WebAclClientSideActionArgs>;
97473
+ }
97222
97474
  /**
97223
97475
  * The pattern to look for in the request cookies.
97224
97476
  */
@@ -97759,6 +98011,7 @@ export declare namespace wafv2 {
97759
98011
  * For information about using the ACFP managed rule group, see [AWS WAF Fraud Control account creation fraud prevention (ACFP) rule group](https://docs.aws.amazon.com/waf/latest/developerguide/aws-managed-rule-groups-acfp.html) and [AWS WAF Fraud Control account creation fraud prevention (ACFP)](https://docs.aws.amazon.com/waf/latest/developerguide/waf-acfp.html) in the *AWS WAF Developer Guide* .
97760
98012
  */
97761
98013
  awsManagedRulesAcfpRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAcfpRuleSetArgs>;
98014
+ awsManagedRulesAntiDDoSRuleSet?: pulumi.Input<inputs.wafv2.WebAclAwsManagedRulesAntiDDoSRuleSetArgs>;
97762
98015
  /**
97763
98016
  * Additional configuration for using the account takeover prevention (ATP) managed rule group, `AWSManagedRulesATPRuleSet` . Use this to provide login request information to the rule group. For web ACLs that protect CloudFront distributions, use this to also provide the information about how your distribution responds to login requests.
97764
98017
  *
@@ -97826,6 +98079,12 @@ export declare namespace wafv2 {
97826
98079
  */
97827
98080
  statement: pulumi.Input<inputs.wafv2.WebAclStatementArgs>;
97828
98081
  }
98082
+ /**
98083
+ * Configures the options for on-source DDoS protection provided by supported resource type.
98084
+ */
98085
+ interface WebAclOnSourceDDoSProtectionConfigArgs {
98086
+ albLowReputationMode: pulumi.Input<enums.wafv2.WebAclOnSourceDDoSProtectionConfigAlbLowReputationMode>;
98087
+ }
97829
98088
  interface WebAclOrStatementArgs {
97830
98089
  /**
97831
98090
  * The statements to combine with OR logic. You can use any statements that can be nested.
@@ -97907,6 +98166,7 @@ export declare namespace wafv2 {
97907
98166
  * Specifies a single custom aggregate key for a rate-base rule.
97908
98167
  */
97909
98168
  interface WebAclRateBasedStatementCustomKeyArgs {
98169
+ asn?: pulumi.Input<inputs.wafv2.WebAclRateLimitAsnArgs>;
97910
98170
  /**
97911
98171
  * Use the value of a cookie in the request as an aggregate key. Each distinct value in the cookie contributes to the aggregation instance. If you use a single cookie as your custom key, then each value fully defines an aggregation instance.
97912
98172
  */
@@ -97962,6 +98222,11 @@ export declare namespace wafv2 {
97962
98222
  */
97963
98223
  uriPath?: pulumi.Input<inputs.wafv2.WebAclRateLimitUriPathArgs>;
97964
98224
  }
98225
+ /**
98226
+ * Specifies the request's ASN as an aggregate key for a rate-based rule.
98227
+ */
98228
+ interface WebAclRateLimitAsnArgs {
98229
+ }
97965
98230
  /**
97966
98231
  * Specifies a cookie as an aggregate key for a rate-based rule.
97967
98232
  */
@@ -98071,6 +98336,12 @@ export declare namespace wafv2 {
98071
98336
  */
98072
98337
  textTransformations: pulumi.Input<pulumi.Input<inputs.wafv2.WebAclTextTransformationArgs>[]>;
98073
98338
  }
98339
+ /**
98340
+ * Regex
98341
+ */
98342
+ interface WebAclRegexArgs {
98343
+ regexString?: pulumi.Input<string>;
98344
+ }
98074
98345
  interface WebAclRegexMatchStatementArgs {
98075
98346
  /**
98076
98347
  * The part of the web request that you want AWS WAF to inspect.
@@ -98502,6 +98773,7 @@ export declare namespace wafv2 {
98502
98773
  * A logical rule statement used to combine other rule statements with AND logic. You provide more than one `Statement` within the `AndStatement` .
98503
98774
  */
98504
98775
  andStatement?: pulumi.Input<inputs.wafv2.WebAclAndStatementArgs>;
98776
+ asnMatchStatement?: pulumi.Input<inputs.wafv2.WebAclAsnMatchStatementArgs>;
98505
98777
  /**
98506
98778
  * A rule statement that defines a string match search for AWS WAF to apply to web requests. The byte match statement provides the bytes to search for, the location in requests that you want AWS WAF to search, and other settings. The bytes to search for are typically a string that corresponds with ASCII characters. In the AWS WAF console and the developer guide, this is called a string match statement.
98507
98779
  */