cdk-lambda-subminute 2.0.347 → 2.0.349

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (30) hide show
  1. package/.jsii +29 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/README.md +1 -1
  4. package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +12 -0
  5. package/node_modules/aws-sdk/apis/ecs-2014-11-13.min.json +255 -130
  6. package/node_modules/aws-sdk/apis/eventbridge-2015-10-07.min.json +12 -3
  7. package/node_modules/aws-sdk/apis/location-2020-11-19.min.json +37 -27
  8. package/node_modules/aws-sdk/apis/logs-2014-03-28.min.json +39 -37
  9. package/node_modules/aws-sdk/apis/qconnect-2020-10-19.min.json +6 -2
  10. package/node_modules/aws-sdk/apis/route53-2013-04-01.min.json +95 -74
  11. package/node_modules/aws-sdk/apis/secretsmanager-2017-10-17.examples.json +57 -0
  12. package/node_modules/aws-sdk/apis/wisdom-2020-10-19.min.json +6 -2
  13. package/node_modules/aws-sdk/clients/cloudwatchlogs.d.ts +23 -14
  14. package/node_modules/aws-sdk/clients/ec2.d.ts +40 -24
  15. package/node_modules/aws-sdk/clients/ecs.d.ts +175 -13
  16. package/node_modules/aws-sdk/clients/eventbridge.d.ts +13 -2
  17. package/node_modules/aws-sdk/clients/iot.d.ts +4 -4
  18. package/node_modules/aws-sdk/clients/iotfleetwise.d.ts +2 -2
  19. package/node_modules/aws-sdk/clients/location.d.ts +10 -0
  20. package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +4 -4
  21. package/node_modules/aws-sdk/clients/route53.d.ts +44 -7
  22. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +8 -8
  23. package/node_modules/aws-sdk/clients/workspaces.d.ts +5 -5
  24. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
  25. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +9 -9
  26. package/node_modules/aws-sdk/dist/aws-sdk.js +441 -271
  27. package/node_modules/aws-sdk/dist/aws-sdk.min.js +67 -67
  28. package/node_modules/aws-sdk/lib/core.js +1 -1
  29. package/node_modules/aws-sdk/package.json +1 -1
  30. package/package.json +3 -3
@@ -69,11 +69,11 @@ declare class CloudWatchLogs extends Service {
69
69
  */
70
70
  createLogStream(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
71
71
  /**
72
- * Deletes a CloudWatch Logs account policy. To use this operation, you must be signed on with the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions.
72
+ * Deletes a CloudWatch Logs account policy. This stops the policy from applying to all log groups or a subset of log groups in the account. Log-group level policies will still be in effect. To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are deleting. To delete a data protection policy, you must have the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions. To delete a subscription filter policy, you must have the logs:DeleteSubscriptionFilter and logs:DeleteAccountPolicy permissions.
73
73
  */
74
74
  deleteAccountPolicy(params: CloudWatchLogs.Types.DeleteAccountPolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
75
75
  /**
76
- * Deletes a CloudWatch Logs account policy. To use this operation, you must be signed on with the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions.
76
+ * Deletes a CloudWatch Logs account policy. This stops the policy from applying to all log groups or a subset of log groups in the account. Log-group level policies will still be in effect. To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are deleting. To delete a data protection policy, you must have the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions. To delete a subscription filter policy, you must have the logs:DeleteSubscriptionFilter and logs:DeleteAccountPolicy permissions.
77
77
  */
78
78
  deleteAccountPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
79
79
  /**
@@ -421,11 +421,11 @@ declare class CloudWatchLogs extends Service {
421
421
  */
422
422
  listTagsLogGroup(callback?: (err: AWSError, data: CloudWatchLogs.Types.ListTagsLogGroupResponse) => void): Request<CloudWatchLogs.Types.ListTagsLogGroupResponse, AWSError>;
423
423
  /**
424
- * Creates an account-level data protection policy that applies to all log groups in the account. A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can also use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked.
424
+ * Creates an account-level data protection policy or subscription filter policy that applies to all log groups or a subset of log groups in the account. Data protection policy A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level data protection policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account-level policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation for a data protection policy, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked. Subscription filter policy A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to both existing log groups and log groups that are created later in this account. Supported destinations are Kinesis Data Streams, Kinesis Data Firehose, and Lambda. When log events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP format. The following destinations are supported for subscription filters: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. Each account can have one account-level subscription filter policy. If you are updating an existing filter, you must specify the correct name in PolicyName. To perform a PutAccountPolicy subscription filter operation for any destination except a Lambda function, you must also have the iam:PassRole permission.
425
425
  */
426
426
  putAccountPolicy(params: CloudWatchLogs.Types.PutAccountPolicyRequest, callback?: (err: AWSError, data: CloudWatchLogs.Types.PutAccountPolicyResponse) => void): Request<CloudWatchLogs.Types.PutAccountPolicyResponse, AWSError>;
427
427
  /**
428
- * Creates an account-level data protection policy that applies to all log groups in the account. A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can also use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked.
428
+ * Creates an account-level data protection policy or subscription filter policy that applies to all log groups or a subset of log groups in the account. Data protection policy A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level data protection policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account-level policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation for a data protection policy, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked. Subscription filter policy A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to both existing log groups and log groups that are created later in this account. Supported destinations are Kinesis Data Streams, Kinesis Data Firehose, and Lambda. When log events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP format. The following destinations are supported for subscription filters: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. Each account can have one account-level subscription filter policy. If you are updating an existing filter, you must specify the correct name in PolicyName. To perform a PutAccountPolicy subscription filter operation for any destination except a Lambda function, you must also have the iam:PassRole permission.
429
429
  */
430
430
  putAccountPolicy(callback?: (err: AWSError, data: CloudWatchLogs.Types.PutAccountPolicyResponse) => void): Request<CloudWatchLogs.Types.PutAccountPolicyResponse, AWSError>;
431
431
  /**
@@ -525,11 +525,11 @@ declare class CloudWatchLogs extends Service {
525
525
  */
526
526
  putSubscriptionFilter(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
527
527
  /**
528
- * Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks.
528
+ * Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks. For examples of using an SDK to start a Live Tail session, see Start a Live Tail session using an Amazon Web Services SDK.
529
529
  */
530
530
  startLiveTail(params: CloudWatchLogs.Types.StartLiveTailRequest, callback?: (err: AWSError, data: CloudWatchLogs.Types.StartLiveTailResponse) => void): Request<CloudWatchLogs.Types.StartLiveTailResponse, AWSError>;
531
531
  /**
532
- * Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks.
532
+ * Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks. For examples of using an SDK to start a Live Tail session, see Start a Live Tail session using an Amazon Web Services SDK.
533
533
  */
534
534
  startLiveTail(callback?: (err: AWSError, data: CloudWatchLogs.Types.StartLiveTailResponse) => void): Request<CloudWatchLogs.Types.StartLiveTailResponse, AWSError>;
535
535
  /**
@@ -631,6 +631,10 @@ declare namespace CloudWatchLogs {
631
631
  * The scope of the account policy.
632
632
  */
633
633
  scope?: Scope;
634
+ /**
635
+ * The log group selection criteria for this subscription filter policy.
636
+ */
637
+ selectionCriteria?: SelectionCriteria;
634
638
  /**
635
639
  * The Amazon Web Services account ID that the policy applies to.
636
640
  */
@@ -891,7 +895,7 @@ declare namespace CloudWatchLogs {
891
895
  */
892
896
  tags?: Tags;
893
897
  /**
894
- * Use this parameter to specify the log group class for this log group. There are two classes: The Standard log class supports all CloudWatch Logs features. The Infrequent Access log class supports a subset of CloudWatch Logs features and incurs lower costs. If you omit this parameter, the default of STANDARD is used. After a log group is created, its class can't be changed. For details about the features supported by each class, see Log classes
898
+ * Use this parameter to specify the log group class for this log group. There are two classes: The Standard log class supports all CloudWatch Logs features. The Infrequent Access log class supports a subset of CloudWatch Logs features and incurs lower costs. If you omit this parameter, the default of STANDARD is used. The value of logGroupClass can't be changed after a log group is created. For details about the features supported by each class, see Log classes
895
899
  */
896
900
  logGroupClass?: LogGroupClass;
897
901
  }
@@ -915,7 +919,7 @@ declare namespace CloudWatchLogs {
915
919
  */
916
920
  policyName: PolicyName;
917
921
  /**
918
- * The type of policy to delete. Currently, the only valid value is DATA_PROTECTION_POLICY.
922
+ * The type of policy to delete.
919
923
  */
920
924
  policyType: PolicyType;
921
925
  }
@@ -1116,7 +1120,7 @@ declare namespace CloudWatchLogs {
1116
1120
  export type Descending = boolean;
1117
1121
  export interface DescribeAccountPoliciesRequest {
1118
1122
  /**
1119
- * Use this parameter to limit the returned policies to only the policies that match the policy type that you specify. Currently, the only valid value is DATA_PROTECTION_POLICY.
1123
+ * Use this parameter to limit the returned policies to only the policies that match the policy type that you specify.
1120
1124
  */
1121
1125
  policyType: PolicyType;
1122
1126
  /**
@@ -2207,7 +2211,7 @@ declare namespace CloudWatchLogs {
2207
2211
  }
2208
2212
  export type PolicyDocument = string;
2209
2213
  export type PolicyName = string;
2210
- export type PolicyType = "DATA_PROTECTION_POLICY"|string;
2214
+ export type PolicyType = "DATA_PROTECTION_POLICY"|"SUBSCRIPTION_FILTER_POLICY"|string;
2211
2215
  export type Priority = string;
2212
2216
  export interface PutAccountPolicyRequest {
2213
2217
  /**
@@ -2215,17 +2219,21 @@ declare namespace CloudWatchLogs {
2215
2219
  */
2216
2220
  policyName: PolicyName;
2217
2221
  /**
2218
- * Specify the data protection policy, in JSON. This policy must include two JSON blocks: The first block must include both a DataIdentifer array and an Operation property with an Audit action. The DataIdentifer array lists the types of sensitive data that you want to mask. For more information about the available options, see Types of data that you can mask. The Operation property with an Audit action is required to find the sensitive data terms. This Audit action must contain a FindingsDestination object. You can optionally use that FindingsDestination object to list one or more destinations to send audit findings to. If you specify destinations such as log groups, Kinesis Data Firehose streams, and S3 buckets, they must already exist. The second block must include both a DataIdentifer array and an Operation property with an Deidentify action. The DataIdentifer array must exactly match the DataIdentifer array in the first block of the policy. The Operation property with the Deidentify action is what actually masks the data, and it must contain the "MaskConfig": {} object. The "MaskConfig": {} object must be empty. For an example data protection policy, see the Examples section on this page. The contents of the two DataIdentifer arrays must match exactly. In addition to the two JSON blocks, the policyDocument can also include Name, Description, and Version fields. The Name is different than the operation's policyName parameter, and is used as a dimension when CloudWatch Logs reports audit findings metrics to CloudWatch. The JSON specified in policyDocument can be up to 30,720 characters.
2222
+ * Specify the policy, in JSON. Data protection policy A data protection policy must include two JSON blocks: The first block must include both a DataIdentifer array and an Operation property with an Audit action. The DataIdentifer array lists the types of sensitive data that you want to mask. For more information about the available options, see Types of data that you can mask. The Operation property with an Audit action is required to find the sensitive data terms. This Audit action must contain a FindingsDestination object. You can optionally use that FindingsDestination object to list one or more destinations to send audit findings to. If you specify destinations such as log groups, Kinesis Data Firehose streams, and S3 buckets, they must already exist. The second block must include both a DataIdentifer array and an Operation property with an Deidentify action. The DataIdentifer array must exactly match the DataIdentifer array in the first block of the policy. The Operation property with the Deidentify action is what actually masks the data, and it must contain the "MaskConfig": {} object. The "MaskConfig": {} object must be empty. For an example data protection policy, see the Examples section on this page. The contents of the two DataIdentifer arrays must match exactly. In addition to the two JSON blocks, the policyDocument can also include Name, Description, and Version fields. The Name is different than the operation's policyName parameter, and is used as a dimension when CloudWatch Logs reports audit findings metrics to CloudWatch. The JSON specified in policyDocument can be up to 30,720 characters long. Subscription filter policy A subscription filter policy can include the following attributes in a JSON block: DestinationArn The ARN of the destination to deliver log events to. Supported destinations are: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. RoleArn The ARN of an IAM role that grants CloudWatch Logs permissions to deliver ingested log events to the destination stream. You don't need to provide the ARN when you are working with a logical destination for cross-account delivery. FilterPattern A filter pattern for subscribing to a filtered stream of log events. DistributionThe method used to distribute log data to the destination. By default, log data is grouped by log stream, but the grouping can be set to Random for a more even distribution. This property is only applicable when the destination is an Kinesis Data Streams data stream.
2219
2223
  */
2220
2224
  policyDocument: AccountPolicyDocument;
2221
2225
  /**
2222
- * Currently the only valid value for this parameter is DATA_PROTECTION_POLICY.
2226
+ * The type of policy that you're creating or updating.
2223
2227
  */
2224
2228
  policyType: PolicyType;
2225
2229
  /**
2226
2230
  * Currently the only valid value for this parameter is ALL, which specifies that the data protection policy applies to all log groups in the account. If you omit this parameter, the default of ALL is used.
2227
2231
  */
2228
2232
  scope?: Scope;
2233
+ /**
2234
+ * Use this parameter to apply the subscription filter policy to a subset of log groups in the account. Currently, the only supported filter is LogGroupName NOT IN []. The selectionCriteria string can be up to 25KB in length. The length is determined by using its UTF-8 bytes. Using the selectionCriteria parameter is useful to help prevent infinite loops. For more information, see Log recursion prevention. Specifing selectionCriteria is valid only when you specify SUBSCRIPTION_FILTER_POLICY for policyType.
2235
+ */
2236
+ selectionCriteria?: SelectionCriteria;
2229
2237
  }
2230
2238
  export interface PutAccountPolicyResponse {
2231
2239
  /**
@@ -2605,6 +2613,7 @@ declare namespace CloudWatchLogs {
2605
2613
  searchedCompletely?: LogStreamSearchedCompletely;
2606
2614
  }
2607
2615
  export type SearchedLogStreams = SearchedLogStream[];
2616
+ export type SelectionCriteria = string;
2608
2617
  export type SequenceToken = string;
2609
2618
  export type Service = string;
2610
2619
  export type SessionId = string;
@@ -2623,11 +2632,11 @@ declare namespace CloudWatchLogs {
2623
2632
  */
2624
2633
  logGroupIdentifiers: StartLiveTailLogGroupIdentifiers;
2625
2634
  /**
2626
- * If you specify this parameter, then only log events in the log streams that you specify here are included in the Live Tail session. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
2635
+ * If you specify this parameter, then only log events in the log streams that you specify here are included in the Live Tail session. If you specify this field, you can't also specify the logStreamNamePrefixes field. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
2627
2636
  */
2628
2637
  logStreamNames?: InputLogStreamNames;
2629
2638
  /**
2630
- * If you specify this parameter, then only log events in the log streams that have names that start with the prefixes that you specify here are included in the Live Tail session. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
2639
+ * If you specify this parameter, then only log events in the log streams that have names that start with the prefixes that you specify here are included in the Live Tail session. If you specify this field, you can't also specify the logStreamNames field. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
2631
2640
  */
2632
2641
  logStreamNamePrefixes?: InputLogStreamNames;
2633
2642
  /**
@@ -2989,11 +2989,11 @@ declare class EC2 extends Service {
2989
2989
  */
2990
2990
  detachVerifiedAccessTrustProvider(callback?: (err: AWSError, data: EC2.Types.DetachVerifiedAccessTrustProviderResult) => void): Request<EC2.Types.DetachVerifiedAccessTrustProviderResult, AWSError>;
2991
2991
  /**
2992
- * Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
2992
+ * Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. You can't detach or force detach volumes that are attached to Amazon ECS or Fargate tasks. Attempting to do this results in the UnsupportedOperationException exception with the Unable to detach volume attached to ECS tasks error message. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
2993
2993
  */
2994
2994
  detachVolume(params: EC2.Types.DetachVolumeRequest, callback?: (err: AWSError, data: EC2.Types.VolumeAttachment) => void): Request<EC2.Types.VolumeAttachment, AWSError>;
2995
2995
  /**
2996
- * Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
2996
+ * Detaches an EBS volume from an instance. Make sure to unmount any file systems on the device within your operating system before detaching the volume. Failure to do so can result in the volume becoming stuck in the busy state while detaching. If this happens, detachment can be delayed indefinitely until you unmount the volume, force detachment, reboot the instance, or all three. If an EBS volume is the root device of an instance, it can't be detached while the instance is running. To detach the root volume, stop the instance first. When a volume with an Amazon Web Services Marketplace product code is detached from an instance, the product code is no longer associated with the instance. You can't detach or force detach volumes that are attached to Amazon ECS or Fargate tasks. Attempting to do this results in the UnsupportedOperationException exception with the Unable to detach volume attached to ECS tasks error message. For more information, see Detach an Amazon EBS volume in the Amazon Elastic Compute Cloud User Guide.
2997
2997
  */
2998
2998
  detachVolume(callback?: (err: AWSError, data: EC2.Types.VolumeAttachment) => void): Request<EC2.Types.VolumeAttachment, AWSError>;
2999
2999
  /**
@@ -13725,7 +13725,7 @@ declare namespace EC2 {
13725
13725
  */
13726
13726
  NextToken?: String;
13727
13727
  /**
13728
- * The maximum number of results to return for the request in a single page. The remaining results can be seen by sending another request with the returned nextToken value. This value can be between 5 and 500. If maxResults is given a larger value than 500, you receive an error.
13728
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
13729
13729
  */
13730
13730
  MaxResults?: DescribeCapacityBlockOfferingsMaxResults;
13731
13731
  }
@@ -13750,7 +13750,7 @@ declare namespace EC2 {
13750
13750
  */
13751
13751
  NextToken?: String;
13752
13752
  /**
13753
- * The maximum number of results to return for the request in a single page. The remaining results can be seen by sending another request with the returned nextToken value. This value can be between 5 and 500. If maxResults is given a larger value than 500, you receive an error.
13753
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
13754
13754
  */
13755
13755
  MaxResults?: DescribeCapacityReservationFleetsMaxResults;
13756
13756
  /**
@@ -13783,7 +13783,7 @@ declare namespace EC2 {
13783
13783
  */
13784
13784
  NextToken?: String;
13785
13785
  /**
13786
- * The maximum number of results to return for the request in a single page. The remaining results can be seen by sending another request with the returned nextToken value. This value can be between 5 and 500. If maxResults is given a larger value than 500, you receive an error.
13786
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
13787
13787
  */
13788
13788
  MaxResults?: DescribeCapacityReservationsMaxResults;
13789
13789
  /**
@@ -19307,6 +19307,14 @@ declare namespace EC2 {
19307
19307
  * The ID of the EBS volume.
19308
19308
  */
19309
19309
  VolumeId?: String;
19310
+ /**
19311
+ * The ARN of the Amazon ECS or Fargate task to which the volume is attached.
19312
+ */
19313
+ AssociatedResource?: String;
19314
+ /**
19315
+ * The ID of the Amazon Web Services account that owns the volume. This parameter is returned only for volumes that are attached to Fargate tasks.
19316
+ */
19317
+ VolumeOwnerId?: String;
19310
19318
  }
19311
19319
  export interface EbsInstanceBlockDeviceSpecification {
19312
19320
  /**
@@ -19897,7 +19905,7 @@ declare namespace EC2 {
19897
19905
  }
19898
19906
  export interface EnableSnapshotBlockPublicAccessRequest {
19899
19907
  /**
19900
- * The mode in which to enable block public access for snapshots for the Region. Specify one of the following values: block-all-sharing - Prevents all public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. Additionally, snapshots that are already publicly shared are treated as private and they are no longer publicly available. If you enable block public access for snapshots in block-all-sharing mode, it does not change the permissions for snapshots that are already publicly shared. Instead, it prevents these snapshots from be publicly visible and publicly accessible. Therefore, the attributes for these snapshots still indicate that they are publicly shared, even though they are not publicly available. block-new-sharing - Prevents only new public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. However, snapshots that are already publicly shared, remain publicly available.
19908
+ * The mode in which to enable block public access for snapshots for the Region. Specify one of the following values: block-all-sharing - Prevents all public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. Additionally, snapshots that are already publicly shared are treated as private and they are no longer publicly available. If you enable block public access for snapshots in block-all-sharing mode, it does not change the permissions for snapshots that are already publicly shared. Instead, it prevents these snapshots from be publicly visible and publicly accessible. Therefore, the attributes for these snapshots still indicate that they are publicly shared, even though they are not publicly available. block-new-sharing - Prevents only new public sharing of snapshots in the Region. Users in the account will no longer be able to request new public sharing. However, snapshots that are already publicly shared, remain publicly available. unblocked is not a valid value for EnableSnapshotBlockPublicAccess.
19901
19909
  */
19902
19910
  State: SnapshotBlockPublicAccessState;
19903
19911
  /**
@@ -21294,7 +21302,7 @@ declare namespace EC2 {
21294
21302
  */
21295
21303
  NextToken?: String;
21296
21304
  /**
21297
- * The maximum number of results to return for the request in a single page. The remaining results can be seen by sending another request with the returned nextToken value. This value can be between 5 and 500. If maxResults is given a larger value than 500, you receive an error. Valid range: Minimum value of 1. Maximum value of 1000.
21305
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
21298
21306
  */
21299
21307
  MaxResults?: GetCapacityReservationUsageRequestMaxResults;
21300
21308
  /**
@@ -21503,7 +21511,7 @@ declare namespace EC2 {
21503
21511
  */
21504
21512
  NextToken?: String;
21505
21513
  /**
21506
- * The maximum number of results to return for the request in a single page. The remaining results can be seen by sending another request with the returned nextToken value. This value can be between 5 and 500. If maxResults is given a larger value than 500, you receive an error.
21514
+ * The maximum number of items to return for this request. To get the next page of items, make another request with the token returned in the output. For more information, see Pagination.
21507
21515
  */
21508
21516
  MaxResults?: GetGroupsForCapacityReservationRequestMaxResults;
21509
21517
  /**
@@ -22167,7 +22175,7 @@ declare namespace EC2 {
22167
22175
  */
22168
22176
  TargetCapacity: SpotPlacementScoresTargetCapacity;
22169
22177
  /**
22170
- * The unit for the target capacity. Default: units (translates to number of instances)
22178
+ * The unit for the target capacity.
22171
22179
  */
22172
22180
  TargetCapacityUnitType?: TargetCapacityUnitType;
22173
22181
  /**
@@ -24415,7 +24423,7 @@ declare namespace EC2 {
24415
24423
  export type InstanceMetadataEndpointState = "disabled"|"enabled"|string;
24416
24424
  export interface InstanceMetadataOptionsRequest {
24417
24425
  /**
24418
- * IMDSv2 uses token-backed sessions. Set the use of HTTP tokens to optional (in other words, set the use of IMDSv2 to optional) or required (in other words, set the use of IMDSv2 to required). optional - When IMDSv2 is optional, you can choose to retrieve instance metadata with or without a session token in your request. If you retrieve the IAM role credentials without a token, the IMDSv1 role credentials are returned. If you retrieve the IAM role credentials using a valid session token, the IMDSv2 role credentials are returned. required - When IMDSv2 is required, you must send a session token with any instance metadata retrieval requests. In this state, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: optional
24426
+ * Indicates whether IMDSv2 is required. optional - IMDSv2 is optional. You can choose whether to send a session token in your instance metadata retrieval requests. If you retrieve IAM role credentials without a session token, you receive the IMDSv1 role credentials. If you retrieve IAM role credentials using a valid session token, you receive the IMDSv2 role credentials. required - IMDSv2 is required. You must send a session token in your instance metadata retrieval requests. With this option, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: If the value of ImdsSupport for the Amazon Machine Image (AMI) for your instance is v2.0, the default is required.
24419
24427
  */
24420
24428
  HttpTokens?: HttpTokensState;
24421
24429
  /**
@@ -24441,7 +24449,7 @@ declare namespace EC2 {
24441
24449
  */
24442
24450
  State?: InstanceMetadataOptionsState;
24443
24451
  /**
24444
- * IMDSv2 uses token-backed sessions. Indicates whether the use of HTTP tokens is optional (in other words, indicates whether the use of IMDSv2 is optional) or required (in other words, indicates whether the use of IMDSv2 is required). optional - When IMDSv2 is optional, you can choose to retrieve instance metadata with or without a session token in your request. If you retrieve the IAM role credentials without a token, the IMDSv1 role credentials are returned. If you retrieve the IAM role credentials using a valid session token, the IMDSv2 role credentials are returned. required - When IMDSv2 is required, you must send a session token with any instance metadata retrieval requests. In this state, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: optional
24452
+ * Indicates whether IMDSv2 is required. optional - IMDSv2 is optional. You can choose whether to send a session token in your instance metadata retrieval requests. If you retrieve IAM role credentials without a session token, you receive the IMDSv1 role credentials. If you retrieve IAM role credentials using a valid session token, you receive the IMDSv2 role credentials. required - IMDSv2 is required. You must send a session token in your instance metadata retrieval requests. With this option, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available.
24445
24453
  */
24446
24454
  HttpTokens?: HttpTokensState;
24447
24455
  /**
@@ -28216,7 +28224,7 @@ declare namespace EC2 {
28216
28224
  */
28217
28225
  Attribute?: InstanceAttributeName;
28218
28226
  /**
28219
- * Modifies the DeleteOnTermination attribute for volumes that are currently attached. The volume must be owned by the caller. If no value is specified for DeleteOnTermination, the default is true and the volume is deleted when the instance is terminated. To add instance store volumes to an Amazon EBS-backed instance, you must add them when you launch the instance. For more information, see Update the block device mapping when launching an instance in the Amazon EC2 User Guide.
28227
+ * Modifies the DeleteOnTermination attribute for volumes that are currently attached. The volume must be owned by the caller. If no value is specified for DeleteOnTermination, the default is true and the volume is deleted when the instance is terminated. You can't modify the DeleteOnTermination attribute for volumes that are attached to Fargate tasks. To add instance store volumes to an Amazon EBS-backed instance, you must add them when you launch the instance. For more information, see Update the block device mapping when launching an instance in the Amazon EC2 User Guide.
28220
28228
  */
28221
28229
  BlockDeviceMappings?: InstanceBlockDeviceMappingSpecificationList;
28222
28230
  /**
@@ -28402,7 +28410,7 @@ declare namespace EC2 {
28402
28410
  */
28403
28411
  InstanceId: InstanceId;
28404
28412
  /**
28405
- * IMDSv2 uses token-backed sessions. Set the use of HTTP tokens to optional (in other words, set the use of IMDSv2 to optional) or required (in other words, set the use of IMDSv2 to required). optional - When IMDSv2 is optional, you can choose to retrieve instance metadata with or without a session token in your request. If you retrieve the IAM role credentials without a token, the IMDSv1 role credentials are returned. If you retrieve the IAM role credentials using a valid session token, the IMDSv2 role credentials are returned. required - When IMDSv2 is required, you must send a session token with any instance metadata retrieval requests. In this state, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: optional
28413
+ * Indicates whether IMDSv2 is required. optional - IMDSv2 is optional. You can choose whether to send a session token in your instance metadata retrieval requests. If you retrieve IAM role credentials without a session token, you receive the IMDSv1 role credentials. If you retrieve IAM role credentials using a valid session token, you receive the IMDSv2 role credentials. required - IMDSv2 is required. You must send a session token in your instance metadata retrieval requests. With this option, retrieving the IAM role credentials always returns IMDSv2 credentials; IMDSv1 credentials are not available. Default: If the value of ImdsSupport for the Amazon Machine Image (AMI) for your instance is v2.0, the default is required.
28406
28414
  */
28407
28415
  HttpTokens?: HttpTokensState;
28408
28416
  /**
@@ -34695,7 +34703,7 @@ declare namespace EC2 {
34695
34703
  }
34696
34704
  export interface ScheduledInstancesNetworkInterface {
34697
34705
  /**
34698
- * Indicates whether to assign a public IPv4 address to instances launched in a VPC. The public IPv4 address can only be assigned to a network interface for eth0, and can only be assigned to a new network interface, not an existing one. You cannot specify more than one network interface in the request. If launching into a default subnet, the default value is true.
34706
+ * Indicates whether to assign a public IPv4 address to instances launched in a VPC. The public IPv4 address can only be assigned to a network interface for eth0, and can only be assigned to a new network interface, not an existing one. You cannot specify more than one network interface in the request. If launching into a default subnet, the default value is true. Starting on February 1, 2024, Amazon Web Services will charge for all public IPv4 addresses, including public IPv4 addresses associated with running instances and Elastic IP addresses. For more information, see the Public IPv4 Address tab on the Amazon VPC pricing page.
34699
34707
  */
34700
34708
  AssociatePublicIpAddress?: Boolean;
34701
34709
  /**
@@ -35791,7 +35799,7 @@ declare namespace EC2 {
35791
35799
  */
35792
35800
  Context?: String;
35793
35801
  /**
35794
- * The unit for the target capacity. TargetCapacityUnitType can only be specified when InstanceRequirements is specified. Default: units (translates to number of instances)
35802
+ * The unit for the target capacity. You can specify this parameter only when using attribute-based instance type selection. Default: units (the number of instances)
35795
35803
  */
35796
35804
  TargetCapacityUnitType?: TargetCapacityUnitType;
35797
35805
  /**
@@ -36225,7 +36233,7 @@ declare namespace EC2 {
36225
36233
  */
36226
36234
  Code?: String;
36227
36235
  /**
36228
- * The message for the state change. Server.InsufficientInstanceCapacity: There was insufficient capacity available to satisfy the launch request. Server.InternalError: An internal error caused the instance to terminate during launch. Server.ScheduledStop: The instance was stopped due to a scheduled retirement. Server.SpotInstanceShutdown: The instance was stopped because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Server.SpotInstanceTermination: The instance was terminated because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Client.InstanceInitiatedShutdown: The instance was shut down using the shutdown -h command from the instance. Client.InstanceTerminated: The instance was terminated or rebooted during AMI creation. Client.InternalError: A client error caused the instance to terminate during launch. Client.InvalidSnapshot.NotFound: The specified snapshot was not found. Client.UserInitiatedHibernate: Hibernation was initiated on the instance. Client.UserInitiatedShutdown: The instance was shut down using the Amazon EC2 API. Client.VolumeLimitExceeded: The limit on the number of EBS volumes or total storage was exceeded. Decrease usage or request an increase in your account limits.
36236
+ * The message for the state change. Server.InsufficientInstanceCapacity: There was insufficient capacity available to satisfy the launch request. Server.InternalError: An internal error caused the instance to terminate during launch. Server.ScheduledStop: The instance was stopped due to a scheduled retirement. Server.SpotInstanceShutdown: The instance was stopped because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Server.SpotInstanceTermination: The instance was terminated because the number of Spot requests with a maximum price equal to or higher than the Spot price exceeded available capacity or because of an increase in the Spot price. Client.InstanceInitiatedShutdown: The instance was shut down from the operating system of the instance. Client.InstanceTerminated: The instance was terminated or rebooted during AMI creation. Client.InternalError: A client error caused the instance to terminate during launch. Client.InvalidSnapshot.NotFound: The specified snapshot was not found. Client.UserInitiatedHibernate: Hibernation was initiated on the instance. Client.UserInitiatedShutdown: The instance was shut down using the Amazon EC2 API. Client.VolumeLimitExceeded: The limit on the number of EBS volumes or total storage was exceeded. Decrease usage or request an increase in your account limits.
36229
36237
  */
36230
36238
  Message?: String;
36231
36239
  }
@@ -36570,7 +36578,7 @@ declare namespace EC2 {
36570
36578
  export type TaggableResourceId = string;
36571
36579
  export interface TargetCapacitySpecification {
36572
36580
  /**
36573
- * The number of units to request, filled using DefaultTargetCapacityType.
36581
+ * The number of units to request, filled the default target capacity type.
36574
36582
  */
36575
36583
  TotalTargetCapacity?: Integer;
36576
36584
  /**
@@ -36582,17 +36590,17 @@ declare namespace EC2 {
36582
36590
  */
36583
36591
  SpotTargetCapacity?: Integer;
36584
36592
  /**
36585
- * The default TotalTargetCapacity, which is either Spot or On-Demand.
36593
+ * The default target capacity type.
36586
36594
  */
36587
36595
  DefaultTargetCapacityType?: DefaultTargetCapacityType;
36588
36596
  /**
36589
- * The unit for the target capacity. TargetCapacityUnitType can only be specified when InstanceRequirements is specified. Default: units (translates to number of instances)
36597
+ * The unit for the target capacity.
36590
36598
  */
36591
36599
  TargetCapacityUnitType?: TargetCapacityUnitType;
36592
36600
  }
36593
36601
  export interface TargetCapacitySpecificationRequest {
36594
36602
  /**
36595
- * The number of units to request, filled using DefaultTargetCapacityType.
36603
+ * The number of units to request, filled using the default target capacity type.
36596
36604
  */
36597
36605
  TotalTargetCapacity: Integer;
36598
36606
  /**
@@ -36604,11 +36612,11 @@ declare namespace EC2 {
36604
36612
  */
36605
36613
  SpotTargetCapacity?: Integer;
36606
36614
  /**
36607
- * The default TotalTargetCapacity, which is either Spot or On-Demand.
36615
+ * The default target capacity type.
36608
36616
  */
36609
36617
  DefaultTargetCapacityType?: DefaultTargetCapacityType;
36610
36618
  /**
36611
- * The unit for the target capacity. TargetCapacityUnitType can only be specified when InstanceRequirements is specified. Default: units (translates to number of instances)
36619
+ * The unit for the target capacity. You can specify this parameter only when using attributed-based instance type selection. Default: units (the number of instances)
36612
36620
  */
36613
36621
  TargetCapacityUnitType?: TargetCapacityUnitType;
36614
36622
  }
@@ -39006,11 +39014,11 @@ declare namespace EC2 {
39006
39014
  */
39007
39015
  AttachTime?: DateTime;
39008
39016
  /**
39009
- * The device name.
39017
+ * The device name. If the volume is attached to a Fargate task, this parameter returns null.
39010
39018
  */
39011
39019
  Device?: String;
39012
39020
  /**
39013
- * The ID of the instance.
39021
+ * The ID of the instance. If the volume is attached to a Fargate task, this parameter returns null.
39014
39022
  */
39015
39023
  InstanceId?: String;
39016
39024
  /**
@@ -39025,6 +39033,14 @@ declare namespace EC2 {
39025
39033
  * Indicates whether the EBS volume is deleted on instance termination.
39026
39034
  */
39027
39035
  DeleteOnTermination?: Boolean;
39036
+ /**
39037
+ * The ARN of the Amazon ECS or Fargate task to which the volume is attached.
39038
+ */
39039
+ AssociatedResource?: String;
39040
+ /**
39041
+ * The service principal of Amazon Web Services service that owns the underlying instance to which the volume is attached. This parameter is returned only for volumes that are attached to Fargate tasks.
39042
+ */
39043
+ InstanceOwningService?: String;
39028
39044
  }
39029
39045
  export type VolumeAttachmentList = VolumeAttachment[];
39030
39046
  export type VolumeAttachmentState = "attaching"|"attached"|"detaching"|"detached"|"busy"|string;