cdk-lambda-subminute 2.0.347 → 2.0.349
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +29 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +12 -0
- package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +255 -130
- package/node_modules/aws-sdk/apis/eventbridge-2015-10-07.min.json +12 -3
- package/node_modules/aws-sdk/apis/location-2020-11-19.min.json +37 -27
- package/node_modules/aws-sdk/apis/logs-2014-03-28.min.json +39 -37
- package/node_modules/aws-sdk/apis/qconnect-2020-10-19.min.json +6 -2
- package/node_modules/aws-sdk/apis/route53-2013-04-01.min.json +95 -74
- package/node_modules/aws-sdk/apis/secretsmanager-2017-10-17.examples.json +57 -0
- package/node_modules/aws-sdk/apis/wisdom-2020-10-19.min.json +6 -2
- package/node_modules/aws-sdk/clients/cloudwatchlogs.d.ts +23 -14
- package/node_modules/aws-sdk/clients/ec2.d.ts +40 -24
- package/node_modules/aws-sdk/clients/ecs.d.ts +175 -13
- package/node_modules/aws-sdk/clients/eventbridge.d.ts +13 -2
- package/node_modules/aws-sdk/clients/iot.d.ts +4 -4
- package/node_modules/aws-sdk/clients/iotfleetwise.d.ts +2 -2
- package/node_modules/aws-sdk/clients/location.d.ts +10 -0
- package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +4 -4
- package/node_modules/aws-sdk/clients/route53.d.ts +44 -7
- package/node_modules/aws-sdk/clients/secretsmanager.d.ts +8 -8
- package/node_modules/aws-sdk/clients/workspaces.d.ts +5 -5
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +9 -9
- package/node_modules/aws-sdk/dist/aws-sdk.js +441 -271
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +67 -67
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -3
@@ -69,11 +69,11 @@ declare class CloudWatchLogs extends Service {
|
|
69
69
|
*/
|
70
70
|
createLogStream(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
71
71
|
/**
|
72
|
-
* Deletes a CloudWatch Logs account policy. To use this operation, you must be signed on with the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions.
|
72
|
+
* Deletes a CloudWatch Logs account policy. This stops the policy from applying to all log groups or a subset of log groups in the account. Log-group level policies will still be in effect. To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are deleting. To delete a data protection policy, you must have the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions. To delete a subscription filter policy, you must have the logs:DeleteSubscriptionFilter and logs:DeleteAccountPolicy permissions.
|
73
73
|
*/
|
74
74
|
deleteAccountPolicy(params: CloudWatchLogs.Types.DeleteAccountPolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
75
75
|
/**
|
76
|
-
* Deletes a CloudWatch Logs account policy. To use this operation, you must be signed on with the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions.
|
76
|
+
* Deletes a CloudWatch Logs account policy. This stops the policy from applying to all log groups or a subset of log groups in the account. Log-group level policies will still be in effect. To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are deleting. To delete a data protection policy, you must have the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions. To delete a subscription filter policy, you must have the logs:DeleteSubscriptionFilter and logs:DeleteAccountPolicy permissions.
|
77
77
|
*/
|
78
78
|
deleteAccountPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
79
79
|
/**
|
@@ -421,11 +421,11 @@ declare class CloudWatchLogs extends Service {
|
|
421
421
|
*/
|
422
422
|
listTagsLogGroup(callback?: (err: AWSError, data: CloudWatchLogs.Types.ListTagsLogGroupResponse) => void): Request<CloudWatchLogs.Types.ListTagsLogGroupResponse, AWSError>;
|
423
423
|
/**
|
424
|
-
* Creates an account-level data protection policy that applies to all log groups in the account. A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can
|
424
|
+
* Creates an account-level data protection policy or subscription filter policy that applies to all log groups or a subset of log groups in the account. Data protection policy A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level data protection policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account-level policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation for a data protection policy, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked. Subscription filter policy A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to both existing log groups and log groups that are created later in this account. Supported destinations are Kinesis Data Streams, Kinesis Data Firehose, and Lambda. When log events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP format. The following destinations are supported for subscription filters: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. Each account can have one account-level subscription filter policy. If you are updating an existing filter, you must specify the correct name in PolicyName. To perform a PutAccountPolicy subscription filter operation for any destination except a Lambda function, you must also have the iam:PassRole permission.
|
425
425
|
*/
|
426
426
|
putAccountPolicy(params: CloudWatchLogs.Types.PutAccountPolicyRequest, callback?: (err: AWSError, data: CloudWatchLogs.Types.PutAccountPolicyResponse) => void): Request<CloudWatchLogs.Types.PutAccountPolicyResponse, AWSError>;
|
427
427
|
/**
|
428
|
-
* Creates an account-level data protection policy that applies to all log groups in the account. A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can
|
428
|
+
* Creates an account-level data protection policy or subscription filter policy that applies to all log groups or a subset of log groups in the account. Data protection policy A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level data protection policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account-level policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation for a data protection policy, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked. Subscription filter policy A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to both existing log groups and log groups that are created later in this account. Supported destinations are Kinesis Data Streams, Kinesis Data Firehose, and Lambda. When log events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP format. The following destinations are supported for subscription filters: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. Each account can have one account-level subscription filter policy. If you are updating an existing filter, you must specify the correct name in PolicyName. To perform a PutAccountPolicy subscription filter operation for any destination except a Lambda function, you must also have the iam:PassRole permission.
|
429
429
|
*/
|
430
430
|
putAccountPolicy(callback?: (err: AWSError, data: CloudWatchLogs.Types.PutAccountPolicyResponse) => void): Request<CloudWatchLogs.Types.PutAccountPolicyResponse, AWSError>;
|
431
431
|
/**
|
@@ -525,11 +525,11 @@ declare class CloudWatchLogs extends Service {
|
|
525
525
|
*/
|
526
526
|
putSubscriptionFilter(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
527
527
|
/**
|
528
|
-
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks.
|
528
|
+
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks. For examples of using an SDK to start a Live Tail session, see Start a Live Tail session using an Amazon Web Services SDK.
|
529
529
|
*/
|
530
530
|
startLiveTail(params: CloudWatchLogs.Types.StartLiveTailRequest, callback?: (err: AWSError, data: CloudWatchLogs.Types.StartLiveTailResponse) => void): Request<CloudWatchLogs.Types.StartLiveTailResponse, AWSError>;
|
531
531
|
/**
|
532
|
-
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks.
|
532
|
+
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks. For examples of using an SDK to start a Live Tail session, see Start a Live Tail session using an Amazon Web Services SDK.
|
533
533
|
*/
|
534
534
|
startLiveTail(callback?: (err: AWSError, data: CloudWatchLogs.Types.StartLiveTailResponse) => void): Request<CloudWatchLogs.Types.StartLiveTailResponse, AWSError>;
|
535
535
|
/**
|
@@ -631,6 +631,10 @@ declare namespace CloudWatchLogs {
|
|
631
631
|
* The scope of the account policy.
|
632
632
|
*/
|
633
633
|
scope?: Scope;
|
634
|
+
/**
|
635
|
+
* The log group selection criteria for this subscription filter policy.
|
636
|
+
*/
|
637
|
+
selectionCriteria?: SelectionCriteria;
|
634
638
|
/**
|
635
639
|
* The Amazon Web Services account ID that the policy applies to.
|
636
640
|
*/
|
@@ -891,7 +895,7 @@ declare namespace CloudWatchLogs {
|
|
891
895
|
*/
|
892
896
|
tags?: Tags;
|
893
897
|
/**
|
894
|
-
* Use this parameter to specify the log group class for this log group. There are two classes: The Standard log class supports all CloudWatch Logs features. The Infrequent Access log class supports a subset of CloudWatch Logs features and incurs lower costs. If you omit this parameter, the default of STANDARD is used.
|
898
|
+
* Use this parameter to specify the log group class for this log group. There are two classes: The Standard log class supports all CloudWatch Logs features. The Infrequent Access log class supports a subset of CloudWatch Logs features and incurs lower costs. If you omit this parameter, the default of STANDARD is used. The value of logGroupClass can't be changed after a log group is created. For details about the features supported by each class, see Log classes
|
895
899
|
*/
|
896
900
|
logGroupClass?: LogGroupClass;
|
897
901
|
}
|
@@ -915,7 +919,7 @@ declare namespace CloudWatchLogs {
|
|
915
919
|
*/
|
916
920
|
policyName: PolicyName;
|
917
921
|
/**
|
918
|
-
* The type of policy to delete.
|
922
|
+
* The type of policy to delete.
|
919
923
|
*/
|
920
924
|
policyType: PolicyType;
|
921
925
|
}
|
@@ -1116,7 +1120,7 @@ declare namespace CloudWatchLogs {
|
|
1116
1120
|
export type Descending = boolean;
|
1117
1121
|
export interface DescribeAccountPoliciesRequest {
|
1118
1122
|
/**
|
1119
|
-
* Use this parameter to limit the returned policies to only the policies that match the policy type that you specify.
|
1123
|
+
* Use this parameter to limit the returned policies to only the policies that match the policy type that you specify.
|
1120
1124
|
*/
|
1121
1125
|
policyType: PolicyType;
|
1122
1126
|
/**
|
@@ -2207,7 +2211,7 @@ declare namespace CloudWatchLogs {
|
|
2207
2211
|
}
|
2208
2212
|
export type PolicyDocument = string;
|
2209
2213
|
export type PolicyName = string;
|
2210
|
-
export type PolicyType = "DATA_PROTECTION_POLICY"|string;
|
2214
|
+
export type PolicyType = "DATA_PROTECTION_POLICY"|"SUBSCRIPTION_FILTER_POLICY"|string;
|
2211
2215
|
export type Priority = string;
|
2212
2216
|
export interface PutAccountPolicyRequest {
|
2213
2217
|
/**
|
@@ -2215,17 +2219,21 @@ declare namespace CloudWatchLogs {
|
|
2215
2219
|
*/
|
2216
2220
|
policyName: PolicyName;
|
2217
2221
|
/**
|
2218
|
-
* Specify the
|
2222
|
+
* Specify the policy, in JSON. Data protection policy A data protection policy must include two JSON blocks: The first block must include both a DataIdentifer array and an Operation property with an Audit action. The DataIdentifer array lists the types of sensitive data that you want to mask. For more information about the available options, see Types of data that you can mask. The Operation property with an Audit action is required to find the sensitive data terms. This Audit action must contain a FindingsDestination object. You can optionally use that FindingsDestination object to list one or more destinations to send audit findings to. If you specify destinations such as log groups, Kinesis Data Firehose streams, and S3 buckets, they must already exist. The second block must include both a DataIdentifer array and an Operation property with an Deidentify action. The DataIdentifer array must exactly match the DataIdentifer array in the first block of the policy. The Operation property with the Deidentify action is what actually masks the data, and it must contain the "MaskConfig": {} object. The "MaskConfig": {} object must be empty. For an example data protection policy, see the Examples section on this page. The contents of the two DataIdentifer arrays must match exactly. In addition to the two JSON blocks, the policyDocument can also include Name, Description, and Version fields. The Name is different than the operation's policyName parameter, and is used as a dimension when CloudWatch Logs reports audit findings metrics to CloudWatch. The JSON specified in policyDocument can be up to 30,720 characters long. Subscription filter policy A subscription filter policy can include the following attributes in a JSON block: DestinationArn The ARN of the destination to deliver log events to. Supported destinations are: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. RoleArn The ARN of an IAM role that grants CloudWatch Logs permissions to deliver ingested log events to the destination stream. You don't need to provide the ARN when you are working with a logical destination for cross-account delivery. FilterPattern A filter pattern for subscribing to a filtered stream of log events. DistributionThe method used to distribute log data to the destination. By default, log data is grouped by log stream, but the grouping can be set to Random for a more even distribution. This property is only applicable when the destination is an Kinesis Data Streams data stream.
|
2219
2223
|
*/
|
2220
2224
|
policyDocument: AccountPolicyDocument;
|
2221
2225
|
/**
|
2222
|
-
*
|
2226
|
+
* The type of policy that you're creating or updating.
|
2223
2227
|
*/
|
2224
2228
|
policyType: PolicyType;
|
2225
2229
|
/**
|
2226
2230
|
* Currently the only valid value for this parameter is ALL, which specifies that the data protection policy applies to all log groups in the account. If you omit this parameter, the default of ALL is used.
|
2227
2231
|
*/
|
2228
2232
|
scope?: Scope;
|
2233
|
+
/**
|
2234
|
+
* Use this parameter to apply the subscription filter policy to a subset of log groups in the account. Currently, the only supported filter is LogGroupName NOT IN []. The selectionCriteria string can be up to 25KB in length. The length is determined by using its UTF-8 bytes. Using the selectionCriteria parameter is useful to help prevent infinite loops. For more information, see Log recursion prevention. Specifing selectionCriteria is valid only when you specify SUBSCRIPTION_FILTER_POLICY for policyType.
|
2235
|
+
*/
|
2236
|
+
selectionCriteria?: SelectionCriteria;
|
2229
2237
|
}
|
2230
2238
|
export interface PutAccountPolicyResponse {
|
2231
2239
|
/**
|
@@ -2605,6 +2613,7 @@ declare namespace CloudWatchLogs {
|
|
2605
2613
|
searchedCompletely?: LogStreamSearchedCompletely;
|
2606
2614
|
}
|
2607
2615
|
export type SearchedLogStreams = SearchedLogStream[];
|
2616
|
+
export type SelectionCriteria = string;
|
2608
2617
|
export type SequenceToken = string;
|
2609
2618
|
export type Service = string;
|
2610
2619
|
export type SessionId = string;
|
@@ -2623,11 +2632,11 @@ declare namespace CloudWatchLogs {
|
|
2623
2632
|
*/
|
2624
2633
|
logGroupIdentifiers: StartLiveTailLogGroupIdentifiers;
|
2625
2634
|
/**
|
2626
|
-
* If you specify this parameter, then only log events in the log streams that you specify here are included in the Live Tail session. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2635
|
+
* If you specify this parameter, then only log events in the log streams that you specify here are included in the Live Tail session. If you specify this field, you can't also specify the logStreamNamePrefixes field. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2627
2636
|
*/
|
2628
2637
|
logStreamNames?: InputLogStreamNames;
|
2629
2638
|
/**
|
2630
|
-
* If you specify this parameter, then only log events in the log streams that have names that start with the prefixes that you specify here are included in the Live Tail session. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2639
|
+
* If you specify this parameter, then only log events in the log streams that have names that start with the prefixes that you specify here are included in the Live Tail session. If you specify this field, you can't also specify the logStreamNames field. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2631
2640
|
*/
|
2632
2641
|
logStreamNamePrefixes?: InputLogStreamNames;
|
2633
2642
|
/**
|
@@ -2989,11 +2989,11 @@ declare class EC2 extends Service {
|
|
2989
2989
|
*/
|
2990
2990
|
detachVerifiedAccessTrustProvider(callback?: (err: AWSError, data: EC2.Types.DetachVerifiedAccessTrustProviderResult) => void): Request<EC2.Types.DetachVerifiedAccessTrustProviderResult, AWSError>;
|
2991
2991
|
/**
|
2992
|
-
* Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
|
2992
|
+
* Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. You can't detach or force detach volumes that are attached to Amazon ECS or Fargate tasks. Attempting to do this results in the UnsupportedOperationException exception with the Unable to detach volume attached to ECS tasks error message. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
|
2993
2993
|
*/
|
2994
2994
|
detachVolume(params: EC2.Types.DetachVolumeRequest, callback?: (err: AWSError, data: EC2.Types.VolumeAttachment) => void): Request<EC2.Types.VolumeAttachment, AWSError>;
|
2995
2995
|
/**
|
2996
|
-
* Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
|
2996
|
+
* Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. You can't detach or force detach volumes that are attached to Amazon ECS or Fargate tasks. Attempting to do this results in the UnsupportedOperationException exception with the Unable to detach volume attached to ECS tasks error message. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
|
2997
2997
|
*/
|
2998
2998
|
detachVolume(callback?: (err: AWSError, data: EC2.Types.VolumeAttachment) => void): Request<EC2.Types.VolumeAttachment, AWSError>;
|
2999
2999
|
/**
|
@@ -13725,7 +13725,7 @@ declare namespace EC2 {
|
|
13725
13725
|
*/
|
13726
13726
|
NextToken?: String;
|
13727
13727
|
/**
|
13728
|
-
* The maximum number of
|
13728
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
|
13729
13729
|
*/
|
13730
13730
|
MaxResults?: DescribeCapacityBlockOfferingsMaxResults;
|
13731
13731
|
}
|
@@ -13750,7 +13750,7 @@ declare namespace EC2 {
|
|
13750
13750
|
*/
|
13751
13751
|
NextToken?: String;
|
13752
13752
|
/**
|
13753
|
-
* The maximum number of
|
13753
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
|
13754
13754
|
*/
|
13755
13755
|
MaxResults?: DescribeCapacityReservationFleetsMaxResults;
|
13756
13756
|
/**
|
@@ -13783,7 +13783,7 @@ declare namespace EC2 {
|
|
13783
13783
|
*/
|
13784
13784
|
NextToken?: String;
|
13785
13785
|
/**
|
13786
|
-
* The maximum number of
|
13786
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
|
13787
13787
|
*/
|
13788
13788
|
MaxResults?: DescribeCapacityReservationsMaxResults;
|
13789
13789
|
/**
|
@@ -19307,6 +19307,14 @@ declare namespace EC2 {
|
|
19307
19307
|
* The ID of the EBS volume.
|
19308
19308
|
*/
|
19309
19309
|
VolumeId?: String;
|
19310
|
+
/**
|
19311
|
+
* The ARN of the Amazon ECS or Fargate task to which the volume is attached.
|
19312
|
+
*/
|
19313
|
+
AssociatedResource?: String;
|
19314
|
+
/**
|
19315
|
+
* The ID of the Amazon Web Services account that owns the volume. This parameter is returned only for volumes that are attached to Fargate tasks.
|
19316
|
+
*/
|
19317
|
+
VolumeOwnerId?: String;
|
19310
19318
|
}
|
19311
19319
|
export interface EbsInstanceBlockDeviceSpecification {
|
19312
19320
|
/**
|
@@ -19897,7 +19905,7 @@ declare namespace EC2 {
|
|
19897
19905
|
}
|
19898
19906
|
export interface EnableSnapshotBlockPublicAccessRequest {
|
19899
19907
|
/**
|
19900
|
-
* The mode in which to enable block public access for snapshots for the Region. Specify one of the following values: block-all-sharing - Prevents all public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. Additionally, snapshots that are already publicly shared are treated as private and they are no longer publicly available. If you enable block public access for snapshots in block-all-sharing mode, it does not change the permissions for snapshots that are already publicly shared. Instead, it prevents these snapshots from be publicly visible and publicly accessible. Therefore, the attributes for these snapshots still indicate that they are publicly shared, even though they are not publicly available. block-new-sharing - Prevents only new public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. However, snapshots that are already publicly shared, remain publicly available.
|
19908
|
+
* The mode in which to enable block public access for snapshots for the Region. Specify one of the following values: block-all-sharing - Prevents all public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. Additionally, snapshots that are already publicly shared are treated as private and they are no longer publicly available. If you enable block public access for snapshots in block-all-sharing mode, it does not change the permissions for snapshots that are already publicly shared. Instead, it prevents these snapshots from be publicly visible and publicly accessible. Therefore, the attributes for these snapshots still indicate that they are publicly shared, even though they are not publicly available. block-new-sharing - Prevents only new public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. However, snapshots that are already publicly shared, remain publicly available. unblocked is not a valid value for EnableSnapshotBlockPublicAccess.
|
19901
19909
|
*/
|
19902
19910
|
State: SnapshotBlockPublicAccessState;
|
19903
19911
|
/**
|
@@ -21294,7 +21302,7 @@ declare namespace EC2 {
|
|
21294
21302
|
*/
|
21295
21303
|
NextToken?: String;
|
21296
21304
|
/**
|
21297
|
-
* The maximum number of
|
21305
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
|
21298
21306
|
*/
|
21299
21307
|
MaxResults?: GetCapacityReservationUsageRequestMaxResults;
|
21300
21308
|
/**
|
@@ -21503,7 +21511,7 @@ declare namespace EC2 {
|
|
21503
21511
|
*/
|
21504
21512
|
NextToken?: String;
|
21505
21513
|
/**
|
21506
|
-
* The maximum number of
|
21514
|
+
* The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
|
21507
21515
|
*/
|
21508
21516
|
MaxResults?: GetGroupsForCapacityReservationRequestMaxResults;
|
21509
21517
|
/**
|
@@ -22167,7 +22175,7 @@ declare namespace EC2 {
|
|
22167
22175
|
*/
|
22168
22176
|
TargetCapacity: SpotPlacementScoresTargetCapacity;
|
22169
22177
|
/**
|
22170
|
-
* The unit for the target capacity.
|
22178
|
+
* The unit for the target capacity.
|
22171
22179
|
*/
|
22172
22180
|
TargetCapacityUnitType?: TargetCapacityUnitType;
|
22173
22181
|
/**
|
@@ -24415,7 +24423,7 @@ declare namespace EC2 {
|
|
24415
24423
|
export type InstanceMetadataEndpointState = "disabled"|"enabled"|string;
|
24416
24424
|
export interface InstanceMetadataOptionsRequest {
|
24417
24425
|
/**
|
24418
|
-
*
|
24426
|
+
* Indicates whether IMDSv2 is required. optional - IMDSv2 is optional. You can choose whether to send a session token in your instance metadata retrieval requests. If you retrieve IAM role credentials without a session token, you receive the IMDSv1 role credentials. If you retrieve IAM role credentials using a valid session token, you receive the IMDSv2 role credentials. required - IMDSv2 is required. You must send a session token in your instance metadata retrieval requests. With this option, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: If the value of ImdsSupport for the Amazon Machine Image (AMI) for your instance is v2.0, the default is required.
|
24419
24427
|
*/
|
24420
24428
|
HttpTokens?: HttpTokensState;
|
24421
24429
|
/**
|
@@ -24441,7 +24449,7 @@ declare namespace EC2 {
|
|
24441
24449
|
*/
|
24442
24450
|
State?: InstanceMetadataOptionsState;
|
24443
24451
|
/**
|
24444
|
-
*
|
24452
|
+
* Indicates whether IMDSv2 is required. optional - IMDSv2 is optional. You can choose whether to send a session token in your instance metadata retrieval requests. If you retrieve IAM role credentials without a session token, you receive the IMDSv1 role credentials. If you retrieve IAM role credentials using a valid session token, you receive the IMDSv2 role credentials. required - IMDSv2 is required. You must send a session token in your instance metadata retrieval requests. With this option, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available.
|
24445
24453
|
*/
|
24446
24454
|
HttpTokens?: HttpTokensState;
|
24447
24455
|
/**
|
@@ -28216,7 +28224,7 @@ declare namespace EC2 {
|
|
28216
28224
|
*/
|
28217
28225
|
Attribute?: InstanceAttributeName;
|
28218
28226
|
/**
|
28219
|
-
* Modifies the DeleteOnTermination attribute for volumes that are currently attached. The volume must be owned by the caller. If no value is specified for DeleteOnTermination, the default is true and the volume is deleted when the instance is terminated. To add instance store volumes to an Amazon EBS-backed instance, you must add them when you launch the instance. For more information, see Update the block device mapping when launching an instance in the Amazon EC2 User Guide.
|
28227
|
+
* Modifies the DeleteOnTermination attribute for volumes that are currently attached. The volume must be owned by the caller. If no value is specified for DeleteOnTermination, the default is true and the volume is deleted when the instance is terminated. You can't modify the DeleteOnTermination attribute for volumes that are attached to Fargate tasks. To add instance store volumes to an Amazon EBS-backed instance, you must add them when you launch the instance. For more information, see Update the block device mapping when launching an instance in the Amazon EC2 User Guide.
|
28220
28228
|
*/
|
28221
28229
|
BlockDeviceMappings?: InstanceBlockDeviceMappingSpecificationList;
|
28222
28230
|
/**
|
@@ -28402,7 +28410,7 @@ declare namespace EC2 {
|
|
28402
28410
|
*/
|
28403
28411
|
InstanceId: InstanceId;
|
28404
28412
|
/**
|
28405
|
-
*
|
28413
|
+
* Indicates whether IMDSv2 is required. optional - IMDSv2 is optional. You can choose whether to send a session token in your instance metadata retrieval requests. If you retrieve IAM role credentials without a session token, you receive the IMDSv1 role credentials. If you retrieve IAM role credentials using a valid session token, you receive the IMDSv2 role credentials. required - IMDSv2 is required. You must send a session token in your instance metadata retrieval requests. With this option, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: If the value of ImdsSupport for the Amazon Machine Image (AMI) for your instance is v2.0, the default is required.
|
28406
28414
|
*/
|
28407
28415
|
HttpTokens?: HttpTokensState;
|
28408
28416
|
/**
|
@@ -34695,7 +34703,7 @@ declare namespace EC2 {
|
|
34695
34703
|
}
|
34696
34704
|
export interface ScheduledInstancesNetworkInterface {
|
34697
34705
|
/**
|
34698
|
-
* Indicates whether to assign a public IPv4 address to instances launched in a VPC. The public IPv4 address can only be assigned to a network interface for eth0, and can only be assigned to a new network interface, not an existing one. You cannot specify more than one network interface in the request. If launching into a default subnet, the default value is true.
|
34706
|
+
* Indicates whether to assign a public IPv4 address to instances launched in a VPC. The public IPv4 address can only be assigned to a network interface for eth0, and can only be assigned to a new network interface, not an existing one. You cannot specify more than one network interface in the request. If launching into a default subnet, the default value is true. Starting on February 1, 2024, Amazon Web Services will charge for all public IPv4 addresses, including public IPv4 addresses associated with running instances and Elastic IP addresses. For more information, see the Public IPv4 Address tab on the Amazon VPC pricing page.
|
34699
34707
|
*/
|
34700
34708
|
AssociatePublicIpAddress?: Boolean;
|
34701
34709
|
/**
|
@@ -35791,7 +35799,7 @@ declare namespace EC2 {
|
|
35791
35799
|
*/
|
35792
35800
|
Context?: String;
|
35793
35801
|
/**
|
35794
|
-
* The unit for the target capacity.
|
35802
|
+
* The unit for the target capacity. You can specify this parameter only when using attribute-based instance type selection. Default: units (the number of instances)
|
35795
35803
|
*/
|
35796
35804
|
TargetCapacityUnitType?: TargetCapacityUnitType;
|
35797
35805
|
/**
|
@@ -36225,7 +36233,7 @@ declare namespace EC2 {
|
|
36225
36233
|
*/
|
36226
36234
|
Code?: String;
|
36227
36235
|
/**
|
36228
|
-
* The message for the state change. Server.InsufficientInstanceCapacity: There was insufficient capacity available to satisfy the launch request. Server.InternalError: An internal error caused the instance to terminate during launch. Server.ScheduledStop: The instance was stopped due to a scheduled retirement. Server.SpotInstanceShutdown: The instance was stopped because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Server.SpotInstanceTermination: The instance was terminated because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Client.InstanceInitiatedShutdown: The instance was shut down
|
36236
|
+
* The message for the state change. Server.InsufficientInstanceCapacity: There was insufficient capacity available to satisfy the launch request. Server.InternalError: An internal error caused the instance to terminate during launch. Server.ScheduledStop: The instance was stopped due to a scheduled retirement. Server.SpotInstanceShutdown: The instance was stopped because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Server.SpotInstanceTermination: The instance was terminated because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Client.InstanceInitiatedShutdown: The instance was shut down from the operating system of the instance. Client.InstanceTerminated: The instance was terminated or rebooted during AMI creation. Client.InternalError: A client error caused the instance to terminate during launch. Client.InvalidSnapshot.NotFound: The specified snapshot was not found. Client.UserInitiatedHibernate: Hibernation was initiated on the instance. Client.UserInitiatedShutdown: The instance was shut down using the Amazon EC2 API. Client.VolumeLimitExceeded: The limit on the number of EBS volumes or total storage was exceeded. Decrease usage or request an increase in your account limits.
|
36229
36237
|
*/
|
36230
36238
|
Message?: String;
|
36231
36239
|
}
|
@@ -36570,7 +36578,7 @@ declare namespace EC2 {
|
|
36570
36578
|
export type TaggableResourceId = string;
|
36571
36579
|
export interface TargetCapacitySpecification {
|
36572
36580
|
/**
|
36573
|
-
* The number of units to request, filled
|
36581
|
+
* The number of units to request, filled the default target capacity type.
|
36574
36582
|
*/
|
36575
36583
|
TotalTargetCapacity?: Integer;
|
36576
36584
|
/**
|
@@ -36582,17 +36590,17 @@ declare namespace EC2 {
|
|
36582
36590
|
*/
|
36583
36591
|
SpotTargetCapacity?: Integer;
|
36584
36592
|
/**
|
36585
|
-
* The default
|
36593
|
+
* The default target capacity type.
|
36586
36594
|
*/
|
36587
36595
|
DefaultTargetCapacityType?: DefaultTargetCapacityType;
|
36588
36596
|
/**
|
36589
|
-
* The unit for the target capacity.
|
36597
|
+
* The unit for the target capacity.
|
36590
36598
|
*/
|
36591
36599
|
TargetCapacityUnitType?: TargetCapacityUnitType;
|
36592
36600
|
}
|
36593
36601
|
export interface TargetCapacitySpecificationRequest {
|
36594
36602
|
/**
|
36595
|
-
* The number of units to request, filled using
|
36603
|
+
* The number of units to request, filled using the default target capacity type.
|
36596
36604
|
*/
|
36597
36605
|
TotalTargetCapacity: Integer;
|
36598
36606
|
/**
|
@@ -36604,11 +36612,11 @@ declare namespace EC2 {
|
|
36604
36612
|
*/
|
36605
36613
|
SpotTargetCapacity?: Integer;
|
36606
36614
|
/**
|
36607
|
-
* The default
|
36615
|
+
* The default target capacity type.
|
36608
36616
|
*/
|
36609
36617
|
DefaultTargetCapacityType?: DefaultTargetCapacityType;
|
36610
36618
|
/**
|
36611
|
-
* The unit for the target capacity.
|
36619
|
+
* The unit for the target capacity. You can specify this parameter only when using attributed-based instance type selection. Default: units (the number of instances)
|
36612
36620
|
*/
|
36613
36621
|
TargetCapacityUnitType?: TargetCapacityUnitType;
|
36614
36622
|
}
|
@@ -39006,11 +39014,11 @@ declare namespace EC2 {
|
|
39006
39014
|
*/
|
39007
39015
|
AttachTime?: DateTime;
|
39008
39016
|
/**
|
39009
|
-
* The device name.
|
39017
|
+
* The device name. If the volume is attached to a Fargate task, this parameter returns null.
|
39010
39018
|
*/
|
39011
39019
|
Device?: String;
|
39012
39020
|
/**
|
39013
|
-
* The ID of the instance.
|
39021
|
+
* The ID of the instance. If the volume is attached to a Fargate task, this parameter returns null.
|
39014
39022
|
*/
|
39015
39023
|
InstanceId?: String;
|
39016
39024
|
/**
|
@@ -39025,6 +39033,14 @@ declare namespace EC2 {
|
|
39025
39033
|
* Indicates whether the EBS volume is deleted on instance termination.
|
39026
39034
|
*/
|
39027
39035
|
DeleteOnTermination?: Boolean;
|
39036
|
+
/**
|
39037
|
+
* The ARN of the Amazon ECS or Fargate task to which the volume is attached.
|
39038
|
+
*/
|
39039
|
+
AssociatedResource?: String;
|
39040
|
+
/**
|
39041
|
+
* The service principal of Amazon Web Services service that owns the underlying instance to which the volume is attached. This parameter is returned only for volumes that are attached to Fargate tasks.
|
39042
|
+
*/
|
39043
|
+
InstanceOwningService?: String;
|
39028
39044
|
}
|
39029
39045
|
export type VolumeAttachmentList = VolumeAttachment[];
|
39030
39046
|
export type VolumeAttachmentState = "attaching"|"attached"|"detaching"|"detached"|"busy"|string;
|