cdk-lambda-subminute 2.0.376 → 2.0.378

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (40) hide show
  1. package/.jsii +3 -3
  2. package/lib/cdk-lambda-subminute.js +3 -3
  3. package/node_modules/aws-sdk/README.md +1 -1
  4. package/node_modules/aws-sdk/apis/artifact-2018-05-10.examples.json +5 -0
  5. package/node_modules/aws-sdk/apis/artifact-2018-05-10.min.json +258 -0
  6. package/node_modules/aws-sdk/apis/artifact-2018-05-10.paginators.json +10 -0
  7. package/node_modules/aws-sdk/apis/codepipeline-2015-07-09.min.json +76 -73
  8. package/node_modules/aws-sdk/apis/elasticmapreduce-2009-03-31.min.json +26 -0
  9. package/node_modules/aws-sdk/apis/firehose-2015-08-04.min.json +260 -171
  10. package/node_modules/aws-sdk/apis/guardduty-2017-11-28.min.json +73 -59
  11. package/node_modules/aws-sdk/apis/healthlake-2017-07-01.min.json +29 -0
  12. package/node_modules/aws-sdk/apis/metadata.json +3 -0
  13. package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +24 -4
  14. package/node_modules/aws-sdk/apis/sns-2010-03-31.min.json +35 -9
  15. package/node_modules/aws-sdk/clients/all.d.ts +1 -0
  16. package/node_modules/aws-sdk/clients/all.js +2 -1
  17. package/node_modules/aws-sdk/clients/artifact.d.ts +333 -0
  18. package/node_modules/aws-sdk/clients/artifact.js +18 -0
  19. package/node_modules/aws-sdk/clients/codepipeline.d.ts +5 -0
  20. package/node_modules/aws-sdk/clients/connectparticipant.d.ts +7 -7
  21. package/node_modules/aws-sdk/clients/detective.d.ts +49 -49
  22. package/node_modules/aws-sdk/clients/emr.d.ts +32 -2
  23. package/node_modules/aws-sdk/clients/firehose.d.ts +195 -118
  24. package/node_modules/aws-sdk/clients/guardduty.d.ts +11 -10
  25. package/node_modules/aws-sdk/clients/healthlake.d.ts +42 -2
  26. package/node_modules/aws-sdk/clients/lambda.d.ts +15 -15
  27. package/node_modules/aws-sdk/clients/opensearch.d.ts +19 -19
  28. package/node_modules/aws-sdk/clients/polly.d.ts +1 -1
  29. package/node_modules/aws-sdk/clients/rds.d.ts +2 -2
  30. package/node_modules/aws-sdk/clients/sagemaker.d.ts +22 -2
  31. package/node_modules/aws-sdk/clients/secretsmanager.d.ts +3 -3
  32. package/node_modules/aws-sdk/clients/sns.d.ts +20 -20
  33. package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
  34. package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +48 -11
  35. package/node_modules/aws-sdk/dist/aws-sdk.js +403 -256
  36. package/node_modules/aws-sdk/dist/aws-sdk.min.js +72 -72
  37. package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +2 -0
  38. package/node_modules/aws-sdk/lib/core.js +1 -1
  39. package/node_modules/aws-sdk/package.json +1 -1
  40. package/package.json +3 -3
@@ -36,11 +36,11 @@ declare class Detective extends Service {
36
36
  */
37
37
  batchGetMembershipDatasources(callback?: (err: AWSError, data: Detective.Types.BatchGetMembershipDatasourcesResponse) => void): Request<Detective.Types.BatchGetMembershipDatasourcesResponse, AWSError>;
38
38
  /**
39
- * Creates a new behavior graph for the calling account, and sets that account as the administrator account. This operation is called by the account that is enabling Detective. Before you try to enable Detective, make sure that your account has been enrolled in Amazon GuardDuty for at least 48 hours. If you do not meet this requirement, you cannot enable Detective. If you do meet the GuardDuty prerequisite, then when you make the request to enable Detective, it checks whether your data volume is within the Detective quota. If it exceeds the quota, then you cannot enable Detective. The operation also enables Detective for the calling account in the currently selected Region. It returns the ARN of the new behavior graph. CreateGraph triggers a process to create the corresponding data tables for the new behavior graph. An account can only be the administrator account for one behavior graph within a Region. If the same account calls CreateGraph with the same administrator account, it always returns the same behavior graph ARN. It does not create a new behavior graph.
39
+ * Creates a new behavior graph for the calling account, and sets that account as the administrator account. This operation is called by the account that is enabling Detective. The operation also enables Detective for the calling account in the currently selected Region. It returns the ARN of the new behavior graph. CreateGraph triggers a process to create the corresponding data tables for the new behavior graph. An account can only be the administrator account for one behavior graph within a Region. If the same account calls CreateGraph with the same administrator account, it always returns the same behavior graph ARN. It does not create a new behavior graph.
40
40
  */
41
41
  createGraph(params: Detective.Types.CreateGraphRequest, callback?: (err: AWSError, data: Detective.Types.CreateGraphResponse) => void): Request<Detective.Types.CreateGraphResponse, AWSError>;
42
42
  /**
43
- * Creates a new behavior graph for the calling account, and sets that account as the administrator account. This operation is called by the account that is enabling Detective. Before you try to enable Detective, make sure that your account has been enrolled in Amazon GuardDuty for at least 48 hours. If you do not meet this requirement, you cannot enable Detective. If you do meet the GuardDuty prerequisite, then when you make the request to enable Detective, it checks whether your data volume is within the Detective quota. If it exceeds the quota, then you cannot enable Detective. The operation also enables Detective for the calling account in the currently selected Region. It returns the ARN of the new behavior graph. CreateGraph triggers a process to create the corresponding data tables for the new behavior graph. An account can only be the administrator account for one behavior graph within a Region. If the same account calls CreateGraph with the same administrator account, it always returns the same behavior graph ARN. It does not create a new behavior graph.
43
+ * Creates a new behavior graph for the calling account, and sets that account as the administrator account. This operation is called by the account that is enabling Detective. The operation also enables Detective for the calling account in the currently selected Region. It returns the ARN of the new behavior graph. CreateGraph triggers a process to create the corresponding data tables for the new behavior graph. An account can only be the administrator account for one behavior graph within a Region. If the same account calls CreateGraph with the same administrator account, it always returns the same behavior graph ARN. It does not create a new behavior graph.
44
44
  */
45
45
  createGraph(callback?: (err: AWSError, data: Detective.Types.CreateGraphResponse) => void): Request<Detective.Types.CreateGraphResponse, AWSError>;
46
46
  /**
@@ -96,11 +96,11 @@ declare class Detective extends Service {
96
96
  */
97
97
  enableOrganizationAdminAccount(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
98
98
  /**
99
- * Returns the investigation results of an investigation for a behavior graph.
99
+ * Detective investigations lets you investigate IAM users and IAM roles using indicators of compromise. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. GetInvestigation returns the investigation results of an investigation for a behavior graph.
100
100
  */
101
101
  getInvestigation(params: Detective.Types.GetInvestigationRequest, callback?: (err: AWSError, data: Detective.Types.GetInvestigationResponse) => void): Request<Detective.Types.GetInvestigationResponse, AWSError>;
102
102
  /**
103
- * Returns the investigation results of an investigation for a behavior graph.
103
+ * Detective investigations lets you investigate IAM users and IAM roles using indicators of compromise. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. GetInvestigation returns the investigation results of an investigation for a behavior graph.
104
104
  */
105
105
  getInvestigation(callback?: (err: AWSError, data: Detective.Types.GetInvestigationResponse) => void): Request<Detective.Types.GetInvestigationResponse, AWSError>;
106
106
  /**
@@ -128,19 +128,19 @@ declare class Detective extends Service {
128
128
  */
129
129
  listGraphs(callback?: (err: AWSError, data: Detective.Types.ListGraphsResponse) => void): Request<Detective.Types.ListGraphsResponse, AWSError>;
130
130
  /**
131
- * Get the indicators from an investigation
131
+ * Gets the indicators from an investigation. You can use the information from the indicators to determine if an IAM user and/or IAM role is involved in an unusual activity that could indicate malicious behavior and its impact.
132
132
  */
133
133
  listIndicators(params: Detective.Types.ListIndicatorsRequest, callback?: (err: AWSError, data: Detective.Types.ListIndicatorsResponse) => void): Request<Detective.Types.ListIndicatorsResponse, AWSError>;
134
134
  /**
135
- * Get the indicators from an investigation
135
+ * Gets the indicators from an investigation. You can use the information from the indicators to determine if an IAM user and/or IAM role is involved in an unusual activity that could indicate malicious behavior and its impact.
136
136
  */
137
137
  listIndicators(callback?: (err: AWSError, data: Detective.Types.ListIndicatorsResponse) => void): Request<Detective.Types.ListIndicatorsResponse, AWSError>;
138
138
  /**
139
- * List all Investigations.
139
+ * Detective investigations lets you investigate IAM users and IAM roles using indicators of compromise. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. ListInvestigations lists all active Detective investigations.
140
140
  */
141
141
  listInvestigations(params: Detective.Types.ListInvestigationsRequest, callback?: (err: AWSError, data: Detective.Types.ListInvestigationsResponse) => void): Request<Detective.Types.ListInvestigationsResponse, AWSError>;
142
142
  /**
143
- * List all Investigations.
143
+ * Detective investigations lets you investigate IAM users and IAM roles using indicators of compromise. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. ListInvestigations lists all active Detective investigations.
144
144
  */
145
145
  listInvestigations(callback?: (err: AWSError, data: Detective.Types.ListInvestigationsResponse) => void): Request<Detective.Types.ListInvestigationsResponse, AWSError>;
146
146
  /**
@@ -184,11 +184,11 @@ declare class Detective extends Service {
184
184
  */
185
185
  rejectInvitation(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
186
186
  /**
187
- * initiate an investigation on an entity in a graph
187
+ * Detective investigations lets you investigate IAM users and IAM roles using indicators of compromise. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. StartInvestigation initiates an investigation on an entity in a behavior graph.
188
188
  */
189
189
  startInvestigation(params: Detective.Types.StartInvestigationRequest, callback?: (err: AWSError, data: Detective.Types.StartInvestigationResponse) => void): Request<Detective.Types.StartInvestigationResponse, AWSError>;
190
190
  /**
191
- * initiate an investigation on an entity in a graph
191
+ * Detective investigations lets you investigate IAM users and IAM roles using indicators of compromise. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident. StartInvestigation initiates an investigation on an entity in a behavior graph.
192
192
  */
193
193
  startInvestigation(callback?: (err: AWSError, data: Detective.Types.StartInvestigationResponse) => void): Request<Detective.Types.StartInvestigationResponse, AWSError>;
194
194
  /**
@@ -224,11 +224,11 @@ declare class Detective extends Service {
224
224
  */
225
225
  updateDatasourcePackages(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
226
226
  /**
227
- * Update the state of an investigation.
227
+ * Updates the state of an investigation.
228
228
  */
229
229
  updateInvestigationState(params: Detective.Types.UpdateInvestigationStateRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
230
230
  /**
231
- * Update the state of an investigation.
231
+ * Updates the state of an investigation.
232
232
  */
233
233
  updateInvestigationState(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
234
234
  /**
@@ -391,7 +391,7 @@ declare namespace Detective {
391
391
  */
392
392
  StartInclusive: Timestamp;
393
393
  /**
394
- * A timestamp representing the end date of the time period until when data is filtered , including the end date.
394
+ * A timestamp representing the end date of the time period until when data is filtered, including the end date.
395
395
  */
396
396
  EndInclusive: Timestamp;
397
397
  }
@@ -484,7 +484,7 @@ declare namespace Detective {
484
484
  }
485
485
  export interface GetInvestigationRequest {
486
486
  /**
487
- * The ARN of the behavior graph.
487
+ * The Amazon Resource Name (ARN) of the behavior graph.
488
488
  */
489
489
  GraphArn: GraphArn;
490
490
  /**
@@ -494,7 +494,7 @@ declare namespace Detective {
494
494
  }
495
495
  export interface GetInvestigationResponse {
496
496
  /**
497
- * The ARN of the behavior graph.
497
+ * The Amazon Resource Name (ARN) of the behavior graph.
498
498
  */
499
499
  GraphArn?: GraphArn;
500
500
  /**
@@ -502,19 +502,19 @@ declare namespace Detective {
502
502
  */
503
503
  InvestigationId?: InvestigationId;
504
504
  /**
505
- * The unique Amazon Resource Name (ARN) of the IAM user and IAM role.
505
+ * The unique Amazon Resource Name (ARN). Detective supports IAM user ARNs and IAM role ARNs.
506
506
  */
507
507
  EntityArn?: EntityArn;
508
508
  /**
509
- * Type of entity. For example, Amazon Web Services accounts, such as IAM user and role.
509
+ * Type of entity. For example, Amazon Web Services accounts, such as an IAM user and/or IAM role.
510
510
  */
511
511
  EntityType?: EntityType;
512
512
  /**
513
- * The UTC time stamp of the creation time of the investigation report.
513
+ * The creation time of the investigation report in UTC time stamp format.
514
514
  */
515
515
  CreatedTime?: Timestamp;
516
516
  /**
517
- * The start date and time for the scope time set to generate the investigation report.
517
+ * The start date and time used to set the scope time within which you want to generate the investigation report. The value is an UTC ISO8601 formatted string. For example, 2021-08-18T16:35:56.284Z.
518
518
  */
519
519
  ScopeStartTime?: Timestamp;
520
520
  /**
@@ -522,15 +522,15 @@ declare namespace Detective {
522
522
  */
523
523
  ScopeEndTime?: Timestamp;
524
524
  /**
525
- * Status based on the completion status of the investigation.
525
+ * The status based on the completion status of the investigation.
526
526
  */
527
527
  Status?: Status;
528
528
  /**
529
- * Severity based on the likelihood and impact of the indicators of compromise discovered in the investigation.
529
+ * The severity assigned is based on the likelihood and impact of the indicators of compromise discovered in the investigation.
530
530
  */
531
531
  Severity?: Severity;
532
532
  /**
533
- * The current state of the investigation. An archived investigation indicates you have completed reviewing the investigation.
533
+ * The current state of the investigation. An archived investigation indicates that you have completed reviewing the investigation.
534
534
  */
535
535
  State?: State;
536
536
  }
@@ -571,7 +571,7 @@ declare namespace Detective {
571
571
  export type Id = string;
572
572
  export interface ImpossibleTravelDetail {
573
573
  /**
574
- * IP address where the resource was first used in the impossible travel
574
+ * IP address where the resource was first used in the impossible travel.
575
575
  */
576
576
  StartingIpAddress?: IpAddress;
577
577
  /**
@@ -579,7 +579,7 @@ declare namespace Detective {
579
579
  */
580
580
  EndingIpAddress?: IpAddress;
581
581
  /**
582
- * Location where the resource was first used in the impossible travel
582
+ * Location where the resource was first used in the impossible travel.
583
583
  */
584
584
  StartingLocation?: Location;
585
585
  /**
@@ -593,11 +593,11 @@ declare namespace Detective {
593
593
  }
594
594
  export interface Indicator {
595
595
  /**
596
- * The type of indicator.
596
+ * The type of indicator.
597
597
  */
598
598
  IndicatorType?: IndicatorType;
599
599
  /**
600
- * Details about the indicator of compromise.
600
+ * Details about the indicators of compromise that are used to determine if a resource is involved in a security incident. An indicator of compromise (IOC) is an artifact observed in or on a network, system, or environment that can (with a high level of confidence) identify malicious activity or a security incident.
601
601
  */
602
602
  IndicatorDetail?: IndicatorDetail;
603
603
  }
@@ -611,7 +611,7 @@ declare namespace Detective {
611
611
  */
612
612
  ImpossibleTravelDetail?: ImpossibleTravelDetail;
613
613
  /**
614
- * Suspicious IP addresses that are flagged, which indicates critical or severe threats based on threat intelligence by Detective. This indicator is derived from AWS threat intelligence.
614
+ * Suspicious IP addresses that are flagged, which indicates critical or severe threats based on threat intelligence by Detective. This indicator is derived from Amazon Web Services threat intelligence.
615
615
  */
616
616
  FlaggedIpAddressDetail?: FlaggedIpAddressDetail;
617
617
  /**
@@ -655,7 +655,7 @@ declare namespace Detective {
655
655
  */
656
656
  State?: State;
657
657
  /**
658
- * The UTC time stamp of the creation time of the investigation report.
658
+ * The time stamp of the creation time of the investigation report. The value is an UTC ISO8601 formatted string. For example, 2021-08-18T16:35:56.284Z.
659
659
  */
660
660
  CreatedTime?: Timestamp;
661
661
  /**
@@ -719,7 +719,7 @@ declare namespace Detective {
719
719
  }
720
720
  export interface ListIndicatorsRequest {
721
721
  /**
722
- * The ARN of the behavior graph.
722
+ * The Amazon Resource Name (ARN) of the behavior graph.
723
723
  */
724
724
  GraphArn: GraphArn;
725
725
  /**
@@ -727,21 +727,21 @@ declare namespace Detective {
727
727
  */
728
728
  InvestigationId: InvestigationId;
729
729
  /**
730
- * See Detective investigations..
730
+ * For the list of indicators of compromise that are generated by Detective investigations, see Detective investigations.
731
731
  */
732
732
  IndicatorType?: IndicatorType;
733
733
  /**
734
- * List if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return a Validation Exception error.
734
+ * Lists if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return a Validation Exception error.
735
735
  */
736
736
  NextToken?: AiPaginationToken;
737
737
  /**
738
- * List the maximum number of indicators in a page.
738
+ * Lists the maximum number of indicators in a page.
739
739
  */
740
740
  MaxResults?: MaxResults;
741
741
  }
742
742
  export interface ListIndicatorsResponse {
743
743
  /**
744
- * The ARN of the behavior graph.
744
+ * The Amazon Resource Name (ARN) of the behavior graph.
745
745
  */
746
746
  GraphArn?: GraphArn;
747
747
  /**
@@ -749,29 +749,29 @@ declare namespace Detective {
749
749
  */
750
750
  InvestigationId?: InvestigationId;
751
751
  /**
752
- * List if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return a Validation Exception error.
752
+ * Lists if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return a Validation Exception error.
753
753
  */
754
754
  NextToken?: AiPaginationToken;
755
755
  /**
756
- * Indicators of compromise listed based on severity.
756
+ * Lists the indicators of compromise.
757
757
  */
758
758
  Indicators?: Indicators;
759
759
  }
760
760
  export interface ListInvestigationsRequest {
761
761
  /**
762
- * The ARN of the behavior graph.
762
+ * The Amazon Resource Name (ARN) of the behavior graph.
763
763
  */
764
764
  GraphArn: GraphArn;
765
765
  /**
766
- * List if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return a Validation Exception error.
766
+ * Lists if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return a Validation Exception error.
767
767
  */
768
768
  NextToken?: AiPaginationToken;
769
769
  /**
770
- * List the maximum number of investigations in a page.
770
+ * Lists the maximum number of investigations in a page.
771
771
  */
772
772
  MaxResults?: MaxResults;
773
773
  /**
774
- * Filter the investigation results based on a criteria.
774
+ * Filters the investigation results based on a criteria.
775
775
  */
776
776
  FilterCriteria?: FilterCriteria;
777
777
  /**
@@ -781,11 +781,11 @@ declare namespace Detective {
781
781
  }
782
782
  export interface ListInvestigationsResponse {
783
783
  /**
784
- * Investigations details lists the summary of uncommon behavior or malicious activity which indicates a compromise.
784
+ * Lists the summary of uncommon behavior or malicious activity which indicates a compromise.
785
785
  */
786
786
  InvestigationDetails?: InvestigationDetails;
787
787
  /**
788
- * List if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours. Using an expired pagination token will return an HTTP 400 InvalidToken error.
788
+ * Lists if there are more results available. The value of nextToken is a unique pagination token for each page. Repeat the call using the returned token to retrieve the next page. Keep all other arguments unchanged. Each pagination token expires after 24 hours.
789
789
  */
790
790
  NextToken?: AiPaginationToken;
791
791
  }
@@ -958,7 +958,7 @@ declare namespace Detective {
958
958
  */
959
959
  Aso?: Aso;
960
960
  /**
961
- * Checks if the ASO is for new for the entire account.
961
+ * Checks if the Autonomous System Organization (ASO) is new for the entire account.
962
962
  */
963
963
  IsNewForEntireAccount?: IsNewForEntireAccount;
964
964
  }
@@ -972,7 +972,7 @@ declare namespace Detective {
972
972
  */
973
973
  IpAddress?: IpAddress;
974
974
  /**
975
- * Checks if the gelocation is new for the entire account.
975
+ * Checks if the geolocation is new for the entire account.
976
976
  */
977
977
  IsNewForEntireAccount?: IsNewForEntireAccount;
978
978
  }
@@ -998,7 +998,7 @@ declare namespace Detective {
998
998
  }
999
999
  export interface RelatedFindingDetail {
1000
1000
  /**
1001
- * The ARN of the related finding.
1001
+ * The Amazon Resource Name (ARN) of the related finding.
1002
1002
  */
1003
1003
  Arn?: EntityArn;
1004
1004
  /**
@@ -1030,7 +1030,7 @@ declare namespace Detective {
1030
1030
  export type SortOrder = "ASC"|"DESC"|string;
1031
1031
  export interface StartInvestigationRequest {
1032
1032
  /**
1033
- * The ARN of the behavior graph.
1033
+ * The Amazon Resource Name (ARN) of the behavior graph.
1034
1034
  */
1035
1035
  GraphArn: GraphArn;
1036
1036
  /**
@@ -1042,7 +1042,7 @@ declare namespace Detective {
1042
1042
  */
1043
1043
  ScopeStartTime: Timestamp;
1044
1044
  /**
1045
- * The data and time when the investigation began. The value is an UTC ISO8601 formatted string. For example, 2021-08-18T16:35:56.284Z.
1045
+ * The data and time when the investigation ended. The value is an UTC ISO8601 formatted string. For example, 2021-08-18T16:35:56.284Z.
1046
1046
  */
1047
1047
  ScopeEndTime: Timestamp;
1048
1048
  }
@@ -1084,11 +1084,11 @@ declare namespace Detective {
1084
1084
  */
1085
1085
  Procedure?: Procedure;
1086
1086
  /**
1087
- * The IP address where the TTP was observed.
1087
+ * The IP address where the tactics, techniques, and procedure (TTP) was observed.
1088
1088
  */
1089
1089
  IpAddress?: IpAddress;
1090
1090
  /**
1091
- * The name of the API where the TTP was observed.
1091
+ * The name of the API where the tactics, techniques, and procedure (TTP) was observed.
1092
1092
  */
1093
1093
  APIName?: APIName;
1094
1094
  /**
@@ -1173,7 +1173,7 @@ declare namespace Detective {
1173
1173
  }
1174
1174
  export interface UpdateInvestigationStateRequest {
1175
1175
  /**
1176
- * The ARN of the behavior graph.
1176
+ * The Amazon Resource Name (ARN) of the behavior graph.
1177
1177
  */
1178
1178
  GraphArn: GraphArn;
1179
1179
  /**
@@ -397,13 +397,21 @@ declare class EMR extends Service {
397
397
  */
398
398
  setKeepJobFlowAliveWhenNoSteps(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
399
399
  /**
400
- * SetTerminationProtection locks a cluster (job flow) so the Amazon EC2 instances in the cluster cannot be terminated by user intervention, an API call, or in the event of a job-flow error. The cluster still terminates upon successful completion of the job flow. Calling SetTerminationProtection on a cluster is similar to calling the Amazon EC2 DisableAPITermination API on all Amazon EC2 instances in a cluster. SetTerminationProtection is used to prevent accidental termination of a cluster and to ensure that in the event of an error, the instances persist so that you can recover any data stored in their ephemeral instance storage. To terminate a cluster that has been locked by setting SetTerminationProtection to true, you must first unlock the job flow by a subsequent call to SetTerminationProtection in which you set the value to false. For more information, seeManaging Cluster Termination in the Amazon EMR Management Guide.
400
+ * SetTerminationProtection locks a cluster (job flow) so the Amazon EC2 instances in the cluster cannot be terminated by user intervention, an API call, or in the event of a job-flow error. The cluster still terminates upon successful completion of the job flow. Calling SetTerminationProtection on a cluster is similar to calling the Amazon EC2 DisableAPITermination API on all Amazon EC2 instances in a cluster. SetTerminationProtection is used to prevent accidental termination of a cluster and to ensure that in the event of an error, the instances persist so that you can recover any data stored in their ephemeral instance storage. To terminate a cluster that has been locked by setting SetTerminationProtection to true, you must first unlock the job flow by a subsequent call to SetTerminationProtection in which you set the value to false. For more information, see Managing Cluster Termination in the Amazon EMR Management Guide.
401
401
  */
402
402
  setTerminationProtection(params: EMR.Types.SetTerminationProtectionInput, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
403
403
  /**
404
- * SetTerminationProtection locks a cluster (job flow) so the Amazon EC2 instances in the cluster cannot be terminated by user intervention, an API call, or in the event of a job-flow error. The cluster still terminates upon successful completion of the job flow. Calling SetTerminationProtection on a cluster is similar to calling the Amazon EC2 DisableAPITermination API on all Amazon EC2 instances in a cluster. SetTerminationProtection is used to prevent accidental termination of a cluster and to ensure that in the event of an error, the instances persist so that you can recover any data stored in their ephemeral instance storage. To terminate a cluster that has been locked by setting SetTerminationProtection to true, you must first unlock the job flow by a subsequent call to SetTerminationProtection in which you set the value to false. For more information, seeManaging Cluster Termination in the Amazon EMR Management Guide.
404
+ * SetTerminationProtection locks a cluster (job flow) so the Amazon EC2 instances in the cluster cannot be terminated by user intervention, an API call, or in the event of a job-flow error. The cluster still terminates upon successful completion of the job flow. Calling SetTerminationProtection on a cluster is similar to calling the Amazon EC2 DisableAPITermination API on all Amazon EC2 instances in a cluster. SetTerminationProtection is used to prevent accidental termination of a cluster and to ensure that in the event of an error, the instances persist so that you can recover any data stored in their ephemeral instance storage. To terminate a cluster that has been locked by setting SetTerminationProtection to true, you must first unlock the job flow by a subsequent call to SetTerminationProtection in which you set the value to false. For more information, see Managing Cluster Termination in the Amazon EMR Management Guide.
405
405
  */
406
406
  setTerminationProtection(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
407
+ /**
408
+ * Specify whether to enable unhealthy node replacement, which lets Amazon EMR gracefully replace core nodes on a cluster if any nodes become unhealthy. For example, a node becomes unhealthy if disk usage is above 90%. If unhealthy node replacement is on and TerminationProtected are off, Amazon EMR immediately terminates the unhealthy core nodes. To use unhealthy node replacement and retain unhealthy core nodes, use to turn on termination protection. In such cases, Amazon EMR adds the unhealthy nodes to a denylist, reducing job interruptions and failures. If unhealthy node replacement is on, Amazon EMR notifies YARN and other applications on the cluster to stop scheduling tasks with these nodes, moves the data, and then terminates the nodes. For more information, see graceful node replacement in the Amazon EMR Management Guide.
409
+ */
410
+ setUnhealthyNodeReplacement(params: EMR.Types.SetUnhealthyNodeReplacementInput, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
411
+ /**
412
+ * Specify whether to enable unhealthy node replacement, which lets Amazon EMR gracefully replace core nodes on a cluster if any nodes become unhealthy. For example, a node becomes unhealthy if disk usage is above 90%. If unhealthy node replacement is on and TerminationProtected are off, Amazon EMR immediately terminates the unhealthy core nodes. To use unhealthy node replacement and retain unhealthy core nodes, use to turn on termination protection. In such cases, Amazon EMR adds the unhealthy nodes to a denylist, reducing job interruptions and failures. If unhealthy node replacement is on, Amazon EMR notifies YARN and other applications on the cluster to stop scheduling tasks with these nodes, moves the data, and then terminates the nodes. For more information, see graceful node replacement in the Amazon EMR Management Guide.
413
+ */
414
+ setUnhealthyNodeReplacement(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
407
415
  /**
408
416
  * The SetVisibleToAllUsers parameter is no longer supported. Your cluster may be visible to all users in your account. To restrict cluster access using an IAM policy, see Identity and Access Management for Amazon EMR. Sets the Cluster$VisibleToAllUsers value for an Amazon EMR cluster. When true, IAM principals in the Amazon Web Services account can perform Amazon EMR cluster actions that their IAM policies allow. When false, only the IAM principal that created the cluster and the Amazon Web Services account root user can perform Amazon EMR actions on the cluster, regardless of IAM permissions policies attached to other IAM principals. This action works on running clusters. When you create a cluster, use the RunJobFlowInput$VisibleToAllUsers parameter. For more information, see Understanding the Amazon EMR Cluster VisibleToAllUsers Setting in the Amazon EMR Management Guide.
409
417
  */
@@ -796,6 +804,10 @@ declare namespace EMR {
796
804
  * Indicates whether Amazon EMR will lock the cluster to prevent the Amazon EC2 instances from being terminated by an API call or user intervention, or in the event of a cluster error.
797
805
  */
798
806
  TerminationProtected?: Boolean;
807
+ /**
808
+ * Indicates whether Amazon EMR should gracefully replace Amazon EC2 core instances that have degraded within the cluster.
809
+ */
810
+ UnhealthyNodeReplacement?: BooleanObject;
799
811
  /**
800
812
  * Indicates whether the cluster is visible to IAM principals in the Amazon Web Services account associated with the cluster. When true, IAM principals in the Amazon Web Services account can perform Amazon EMR cluster actions on the cluster that their IAM policies allow. When false, only the IAM principal that created the cluster and the Amazon Web Services account root user can perform Amazon EMR actions, regardless of IAM permissions policies attached to other IAM principals. The default value is true if a value is not provided when creating a cluster using the Amazon EMR API RunJobFlow command, the CLI create-cluster command, or the Amazon Web Services Management Console.
801
813
  */
@@ -2273,6 +2285,10 @@ declare namespace EMR {
2273
2285
  * Specifies whether to lock the cluster to prevent the Amazon EC2 instances from being terminated by API call, user intervention, or in the event of a job-flow error.
2274
2286
  */
2275
2287
  TerminationProtected?: Boolean;
2288
+ /**
2289
+ * Indicates whether Amazon EMR should gracefully replace core nodes that have degraded within the cluster.
2290
+ */
2291
+ UnhealthyNodeReplacement?: BooleanObject;
2276
2292
  /**
2277
2293
  * Applies only to Amazon EMR release versions earlier than 4.0. The Hadoop version for the cluster. Valid inputs are "0.18" (no longer maintained), "0.20" (no longer maintained), "0.20.205" (no longer maintained), "1.0.3", "2.2.0", or "2.4.0". If you do not set this value, the default of 0.18 is used, unless the AmiVersion parameter is set in the RunJobFlow call, in which case the default version of Hadoop for that AMI version is used.
2278
2294
  */
@@ -2355,6 +2371,10 @@ declare namespace EMR {
2355
2371
  * Specifies whether the Amazon EC2 instances in the cluster are protected from termination by API calls, user intervention, or in the event of a job-flow error.
2356
2372
  */
2357
2373
  TerminationProtected?: Boolean;
2374
+ /**
2375
+ * Indicates whether Amazon EMR should gracefully replace core nodes that have degraded within the cluster.
2376
+ */
2377
+ UnhealthyNodeReplacement?: BooleanObject;
2358
2378
  /**
2359
2379
  * The Hadoop version for the cluster.
2360
2380
  */
@@ -3361,6 +3381,16 @@ declare namespace EMR {
3361
3381
  */
3362
3382
  TerminationProtected: Boolean;
3363
3383
  }
3384
+ export interface SetUnhealthyNodeReplacementInput {
3385
+ /**
3386
+ * The list of strings that uniquely identify the clusters for which to turn on unhealthy node replacement. You can get these identifiers by running the RunJobFlow or the DescribeJobFlows operations.
3387
+ */
3388
+ JobFlowIds: XmlStringList;
3389
+ /**
3390
+ * Indicates whether to turn on or turn off graceful unhealthy node replacement.
3391
+ */
3392
+ UnhealthyNodeReplacement: BooleanObject;
3393
+ }
3364
3394
  export interface SetVisibleToAllUsersInput {
3365
3395
  /**
3366
3396
  * The unique identifier of the job flow (cluster).