aws-cdk-lib 2.218.0__py3-none-any.whl → 2.220.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +31 -36
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.218.0.jsii.tgz → aws-cdk-lib@2.220.0.jsii.tgz} +0 -0
- aws_cdk/aws_amazonmq/__init__.py +98 -87
- aws_cdk/aws_apigateway/__init__.py +39 -0
- aws_cdk/aws_applicationsignals/__init__.py +450 -2
- aws_cdk/aws_arcregionswitch/__init__.py +8 -0
- aws_cdk/aws_backup/__init__.py +29 -0
- aws_cdk/aws_batch/__init__.py +109 -7
- aws_cdk/aws_bcmdataexports/__init__.py +9 -0
- aws_cdk/aws_bedrock/__init__.py +384 -1
- aws_cdk/aws_bedrockagentcore/__init__.py +7862 -1568
- aws_cdk/aws_cloudfront/experimental/__init__.py +4 -0
- aws_cdk/aws_cloudfront_origins/__init__.py +87 -6
- aws_cdk/aws_cloudwatch/__init__.py +5 -5
- aws_cdk/aws_codebuild/__init__.py +339 -62
- aws_cdk/aws_cognito/__init__.py +6 -4
- aws_cdk/aws_connect/__init__.py +9 -9
- aws_cdk/aws_cur/__init__.py +5 -3
- aws_cdk/aws_datasync/__init__.py +44 -22
- aws_cdk/aws_datazone/__init__.py +35 -33
- aws_cdk/aws_dax/__init__.py +12 -3
- aws_cdk/aws_dms/__init__.py +3 -5
- aws_cdk/aws_ec2/__init__.py +2721 -30
- aws_cdk/aws_ecs/__init__.py +2900 -90
- aws_cdk/aws_eks/__init__.py +114 -9
- aws_cdk/aws_entityresolution/__init__.py +18 -0
- aws_cdk/aws_fsx/__init__.py +4 -4
- aws_cdk/aws_greengrassv2/__init__.py +29 -0
- aws_cdk/aws_imagebuilder/__init__.py +397 -0
- aws_cdk/aws_iotsitewise/__init__.py +136 -80
- aws_cdk/aws_kinesis/__init__.py +95 -4
- aws_cdk/aws_lambda/__init__.py +43 -0
- aws_cdk/aws_lightsail/__init__.py +584 -0
- aws_cdk/aws_logs/__init__.py +57 -0
- aws_cdk/aws_lookoutmetrics/__init__.py +14 -2
- aws_cdk/aws_m2/__init__.py +59 -13
- aws_cdk/aws_medialive/__init__.py +108 -0
- aws_cdk/aws_msk/__init__.py +4 -2
- aws_cdk/aws_mwaa/__init__.py +5 -5
- aws_cdk/aws_neptune/__init__.py +133 -70
- aws_cdk/aws_networkfirewall/__init__.py +6 -2
- aws_cdk/aws_networkmanager/__init__.py +29 -0
- aws_cdk/aws_observabilityadmin/__init__.py +1227 -83
- aws_cdk/aws_omics/__init__.py +7 -1
- aws_cdk/aws_opensearchservice/__init__.py +64 -0
- aws_cdk/aws_opsworkscm/__init__.py +0 -29
- aws_cdk/aws_pcs/__init__.py +224 -33
- aws_cdk/aws_pinpoint/__init__.py +58 -0
- aws_cdk/aws_quicksight/__init__.py +118 -0
- aws_cdk/aws_rds/__init__.py +62 -37
- aws_cdk/aws_refactorspaces/__init__.py +18 -6
- aws_cdk/aws_route53/__init__.py +138 -8
- aws_cdk/aws_s3/__init__.py +29 -2
- aws_cdk/aws_s3objectlambda/__init__.py +44 -12
- aws_cdk/aws_servicecatalog/__init__.py +103 -106
- aws_cdk/aws_smsvoice/__init__.py +319 -0
- aws_cdk/aws_ssmquicksetup/__init__.py +3 -3
- aws_cdk/aws_synthetics/__init__.py +21 -1
- {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/METADATA +2 -2
- {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/RECORD +65 -65
- {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/top_level.txt +0 -0
aws_cdk/aws_rds/__init__.py
CHANGED
|
@@ -3272,6 +3272,12 @@ class AuroraMysqlEngineVersion(
|
|
|
3272
3272
|
'''Version "8.0.mysql_aurora.3.10.0".'''
|
|
3273
3273
|
return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_10_0"))
|
|
3274
3274
|
|
|
3275
|
+
@jsii.python.classproperty
|
|
3276
|
+
@jsii.member(jsii_name="VER_3_10_1")
|
|
3277
|
+
def VER_3_10_1(cls) -> "AuroraMysqlEngineVersion":
|
|
3278
|
+
'''Version "8.0.mysql_aurora.3.10.1".'''
|
|
3279
|
+
return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_10_1"))
|
|
3280
|
+
|
|
3275
3281
|
@jsii.python.classproperty
|
|
3276
3282
|
@jsii.member(jsii_name="VER_5_7_12")
|
|
3277
3283
|
def VER_5_7_12(cls) -> "AuroraMysqlEngineVersion":
|
|
@@ -5403,7 +5409,7 @@ class CfnDBClusterProps:
|
|
|
5403
5409
|
:param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
|
|
5404
5410
|
:param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
|
5405
5411
|
:param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
|
|
5406
|
-
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
|
|
5412
|
+
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
|
|
5407
5413
|
:param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
|
5408
5414
|
:param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
|
5409
5415
|
:param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
|
|
@@ -6297,7 +6303,7 @@ class CfnDBClusterProps:
|
|
|
6297
6303
|
|
|
6298
6304
|
Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters
|
|
6299
6305
|
|
|
6300
|
-
This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
|
|
6306
|
+
This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
|
|
6301
6307
|
|
|
6302
6308
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbcluster.html#cfn-rds-dbcluster-masteruserauthenticationtype
|
|
6303
6309
|
'''
|
|
@@ -7025,7 +7031,7 @@ class CfnDBInstanceProps:
|
|
|
7025
7031
|
:param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
|
|
7026
7032
|
:param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
|
|
7027
7033
|
:param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
|
|
7028
|
-
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
|
|
7034
|
+
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
|
|
7029
7035
|
:param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
|
|
7030
7036
|
:param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
|
|
7031
7037
|
:param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
|
|
@@ -8385,7 +8391,7 @@ class CfnDBInstanceProps:
|
|
|
8385
8391
|
- ``password`` - Use standard database authentication with a password.
|
|
8386
8392
|
- ``iam-db-auth`` - Use IAM database authentication for the master user.
|
|
8387
8393
|
|
|
8388
|
-
This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
|
|
8394
|
+
This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
|
|
8389
8395
|
|
|
8390
8396
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbinstance.html#cfn-rds-dbinstance-masteruserauthenticationtype
|
|
8391
8397
|
'''
|
|
@@ -9243,7 +9249,7 @@ class CfnDBProxyEndpointProps:
|
|
|
9243
9249
|
:param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
|
|
9244
9250
|
:param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
|
|
9245
9251
|
:param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
|
|
9246
|
-
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
|
|
9252
|
+
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
|
|
9247
9253
|
:param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
|
|
9248
9254
|
:param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
|
|
9249
9255
|
:param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
|
|
@@ -9333,6 +9339,12 @@ class CfnDBProxyEndpointProps:
|
|
|
9333
9339
|
|
|
9334
9340
|
The network type determines the IP version that the proxy endpoint supports.
|
|
9335
9341
|
|
|
9342
|
+
Valid values:
|
|
9343
|
+
|
|
9344
|
+
- ``IPV4`` - The proxy endpoint supports IPv4 only.
|
|
9345
|
+
- ``IPV6`` - The proxy endpoint supports IPv6 only.
|
|
9346
|
+
- ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
|
|
9347
|
+
|
|
9336
9348
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxyendpoint.html#cfn-rds-dbproxyendpoint-endpointnetworktype
|
|
9337
9349
|
'''
|
|
9338
9350
|
result = self._values.get("endpoint_network_type")
|
|
@@ -9426,12 +9438,12 @@ class CfnDBProxyProps:
|
|
|
9426
9438
|
:param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
|
|
9427
9439
|
:param auth: The authorization mechanism that the proxy uses.
|
|
9428
9440
|
:param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
|
|
9429
|
-
:param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
|
|
9430
|
-
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
|
|
9441
|
+
:param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database. Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
|
|
9442
|
+
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
|
|
9431
9443
|
:param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
|
|
9432
9444
|
:param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
|
|
9433
9445
|
:param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
|
|
9434
|
-
:param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
|
|
9446
|
+
:param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database. Valid values: - ``IPV4`` - The proxy connects to the database using IPv4 only. - ``IPV6`` - The proxy connects to the database using IPv6 only.
|
|
9435
9447
|
:param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
|
|
9436
9448
|
|
|
9437
9449
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html
|
|
@@ -9582,6 +9594,8 @@ class CfnDBProxyProps:
|
|
|
9582
9594
|
def default_auth_scheme(self) -> typing.Optional[builtins.str]:
|
|
9583
9595
|
'''The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
|
|
9584
9596
|
|
|
9597
|
+
Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
|
|
9598
|
+
|
|
9585
9599
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-defaultauthscheme
|
|
9586
9600
|
'''
|
|
9587
9601
|
result = self._values.get("default_auth_scheme")
|
|
@@ -9593,6 +9607,12 @@ class CfnDBProxyProps:
|
|
|
9593
9607
|
|
|
9594
9608
|
The network type determines the IP version that the proxy endpoint supports.
|
|
9595
9609
|
|
|
9610
|
+
Valid values:
|
|
9611
|
+
|
|
9612
|
+
- ``IPV4`` - The proxy endpoint supports IPv4 only.
|
|
9613
|
+
- ``IPV6`` - The proxy endpoint supports IPv6 only.
|
|
9614
|
+
- ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
|
|
9615
|
+
|
|
9596
9616
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-endpointnetworktype
|
|
9597
9617
|
'''
|
|
9598
9618
|
result = self._values.get("endpoint_network_type")
|
|
@@ -9637,6 +9657,11 @@ class CfnDBProxyProps:
|
|
|
9637
9657
|
|
|
9638
9658
|
The network type determines the IP version that the proxy uses for connections to the database.
|
|
9639
9659
|
|
|
9660
|
+
Valid values:
|
|
9661
|
+
|
|
9662
|
+
- ``IPV4`` - The proxy connects to the database using IPv4 only.
|
|
9663
|
+
- ``IPV6`` - The proxy connects to the database using IPv6 only.
|
|
9664
|
+
|
|
9640
9665
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-targetconnectionnetworktype
|
|
9641
9666
|
'''
|
|
9642
9667
|
result = self._values.get("target_connection_network_type")
|
|
@@ -16990,7 +17015,7 @@ class DatabaseInstanceNewProps:
|
|
|
16990
17015
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
16991
17016
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
16992
17017
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
16993
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
17018
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
16994
17019
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
16995
17020
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
16996
17021
|
|
|
@@ -17698,11 +17723,11 @@ class DatabaseInstanceNewProps:
|
|
|
17698
17723
|
|
|
17699
17724
|
@builtins.property
|
|
17700
17725
|
def storage_type(self) -> typing.Optional["StorageType"]:
|
|
17701
|
-
'''The storage type.
|
|
17726
|
+
'''The storage type to associate with the DB instance.
|
|
17702
17727
|
|
|
17703
|
-
Storage types supported are gp2, io1, standard.
|
|
17728
|
+
Storage types supported are gp2, gp3, io1, io2, and standard.
|
|
17704
17729
|
|
|
17705
|
-
:default: GP2
|
|
17730
|
+
:default: StorageType.GP2
|
|
17706
17731
|
|
|
17707
17732
|
:see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
|
|
17708
17733
|
'''
|
|
@@ -17891,7 +17916,7 @@ class DatabaseInstanceReadReplicaProps(DatabaseInstanceNewProps):
|
|
|
17891
17916
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
17892
17917
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
17893
17918
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
17894
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
17919
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
17895
17920
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
17896
17921
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
17897
17922
|
:param instance_type: The name of the compute and memory capacity classes.
|
|
@@ -18552,11 +18577,11 @@ class DatabaseInstanceReadReplicaProps(DatabaseInstanceNewProps):
|
|
|
18552
18577
|
|
|
18553
18578
|
@builtins.property
|
|
18554
18579
|
def storage_type(self) -> typing.Optional["StorageType"]:
|
|
18555
|
-
'''The storage type.
|
|
18580
|
+
'''The storage type to associate with the DB instance.
|
|
18556
18581
|
|
|
18557
|
-
Storage types supported are gp2, io1, standard.
|
|
18582
|
+
Storage types supported are gp2, gp3, io1, io2, and standard.
|
|
18558
18583
|
|
|
18559
|
-
:default: GP2
|
|
18584
|
+
:default: StorageType.GP2
|
|
18560
18585
|
|
|
18561
18586
|
:see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
|
|
18562
18587
|
'''
|
|
@@ -18796,7 +18821,7 @@ class DatabaseInstanceSourceProps(DatabaseInstanceNewProps):
|
|
|
18796
18821
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
18797
18822
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
18798
18823
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
18799
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
18824
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
18800
18825
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
18801
18826
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
18802
18827
|
:param engine: The database engine.
|
|
@@ -19547,11 +19572,11 @@ class DatabaseInstanceSourceProps(DatabaseInstanceNewProps):
|
|
|
19547
19572
|
|
|
19548
19573
|
@builtins.property
|
|
19549
19574
|
def storage_type(self) -> typing.Optional["StorageType"]:
|
|
19550
|
-
'''The storage type.
|
|
19575
|
+
'''The storage type to associate with the DB instance.
|
|
19551
19576
|
|
|
19552
|
-
Storage types supported are gp2, io1, standard.
|
|
19577
|
+
Storage types supported are gp2, gp3, io1, io2, and standard.
|
|
19553
19578
|
|
|
19554
|
-
:default: GP2
|
|
19579
|
+
:default: StorageType.GP2
|
|
19555
19580
|
|
|
19556
19581
|
:see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
|
|
19557
19582
|
'''
|
|
@@ -36962,7 +36987,7 @@ class CfnDBCluster(
|
|
|
36962
36987
|
:param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
|
|
36963
36988
|
:param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
|
36964
36989
|
:param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
|
|
36965
|
-
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
|
|
36990
|
+
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
|
|
36966
36991
|
:param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
|
36967
36992
|
:param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
|
|
36968
36993
|
:param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
|
|
@@ -39105,7 +39130,7 @@ class CfnDBInstance(
|
|
|
39105
39130
|
:param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
|
|
39106
39131
|
:param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
|
|
39107
39132
|
:param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
|
|
39108
|
-
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
|
|
39133
|
+
:param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
|
|
39109
39134
|
:param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
|
|
39110
39135
|
:param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
|
|
39111
39136
|
:param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
|
|
@@ -41553,12 +41578,12 @@ class CfnDBProxy(
|
|
|
41553
41578
|
:param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
|
|
41554
41579
|
:param auth: The authorization mechanism that the proxy uses.
|
|
41555
41580
|
:param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
|
|
41556
|
-
:param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
|
|
41557
|
-
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
|
|
41581
|
+
:param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database. Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
|
|
41582
|
+
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
|
|
41558
41583
|
:param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
|
|
41559
41584
|
:param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
|
|
41560
41585
|
:param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
|
|
41561
|
-
:param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
|
|
41586
|
+
:param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database. Valid values: - ``IPV4`` - The proxy connects to the database using IPv4 only. - ``IPV6`` - The proxy connects to the database using IPv6 only.
|
|
41562
41587
|
:param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
|
|
41563
41588
|
'''
|
|
41564
41589
|
if __debug__:
|
|
@@ -42111,7 +42136,7 @@ class CfnDBProxyEndpoint(
|
|
|
42111
42136
|
:param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
|
|
42112
42137
|
:param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
|
|
42113
42138
|
:param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
|
|
42114
|
-
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
|
|
42139
|
+
:param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
|
|
42115
42140
|
:param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
|
|
42116
42141
|
:param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
|
|
42117
42142
|
:param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
|
|
@@ -47695,7 +47720,7 @@ class DatabaseInstanceFromSnapshot(
|
|
|
47695
47720
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
47696
47721
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
47697
47722
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
47698
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
47723
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
47699
47724
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
47700
47725
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
47701
47726
|
'''
|
|
@@ -48129,7 +48154,7 @@ class DatabaseInstanceFromSnapshotProps(DatabaseInstanceSourceProps):
|
|
|
48129
48154
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
48130
48155
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
48131
48156
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
48132
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
48157
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
48133
48158
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
48134
48159
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
48135
48160
|
:param engine: The database engine.
|
|
@@ -48814,11 +48839,11 @@ class DatabaseInstanceFromSnapshotProps(DatabaseInstanceSourceProps):
|
|
|
48814
48839
|
|
|
48815
48840
|
@builtins.property
|
|
48816
48841
|
def storage_type(self) -> typing.Optional[StorageType]:
|
|
48817
|
-
'''The storage type.
|
|
48842
|
+
'''The storage type to associate with the DB instance.
|
|
48818
48843
|
|
|
48819
|
-
Storage types supported are gp2, io1, standard.
|
|
48844
|
+
Storage types supported are gp2, gp3, io1, io2, and standard.
|
|
48820
48845
|
|
|
48821
|
-
:default: GP2
|
|
48846
|
+
:default: StorageType.GP2
|
|
48822
48847
|
|
|
48823
48848
|
:see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
|
|
48824
48849
|
'''
|
|
@@ -49144,7 +49169,7 @@ class DatabaseInstanceProps(DatabaseInstanceSourceProps):
|
|
|
49144
49169
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
49145
49170
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
49146
49171
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
49147
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
49172
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
49148
49173
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
49149
49174
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
49150
49175
|
:param engine: The database engine.
|
|
@@ -49835,11 +49860,11 @@ class DatabaseInstanceProps(DatabaseInstanceSourceProps):
|
|
|
49835
49860
|
|
|
49836
49861
|
@builtins.property
|
|
49837
49862
|
def storage_type(self) -> typing.Optional[StorageType]:
|
|
49838
|
-
'''The storage type.
|
|
49863
|
+
'''The storage type to associate with the DB instance.
|
|
49839
49864
|
|
|
49840
|
-
Storage types supported are gp2, io1, standard.
|
|
49865
|
+
Storage types supported are gp2, gp3, io1, io2, and standard.
|
|
49841
49866
|
|
|
49842
|
-
:default: GP2
|
|
49867
|
+
:default: StorageType.GP2
|
|
49843
49868
|
|
|
49844
49869
|
:see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
|
|
49845
49870
|
'''
|
|
@@ -50122,7 +50147,7 @@ class DatabaseInstanceReadReplica(
|
|
|
50122
50147
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
50123
50148
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
50124
50149
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
50125
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
50150
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
50126
50151
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
50127
50152
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
50128
50153
|
'''
|
|
@@ -51588,7 +51613,7 @@ class DatabaseInstance(
|
|
|
51588
51613
|
:param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
|
|
51589
51614
|
:param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
|
|
51590
51615
|
:param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
|
|
51591
|
-
:param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
|
|
51616
|
+
:param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
|
|
51592
51617
|
:param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
|
|
51593
51618
|
:param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
|
|
51594
51619
|
'''
|
|
@@ -1207,9 +1207,13 @@ class CfnApplication(
|
|
|
1207
1207
|
metaclass=jsii.JSIIMeta,
|
|
1208
1208
|
jsii_type="aws-cdk-lib.aws_refactorspaces.CfnApplication",
|
|
1209
1209
|
):
|
|
1210
|
-
'''
|
|
1210
|
+
'''.. epigraph::
|
|
1211
1211
|
|
|
1212
|
-
|
|
1212
|
+
AWS Migration Hub will no longer be open to new customers starting November 7, 2025.
|
|
1213
|
+
|
|
1214
|
+
To continue using the service, sign up prior to November 7, 2025. For capabilities similar to AWS Migration Hub , explore `AWS Migration Hub <https://docs.aws.amazon.com/https://aws.amazon.com/transform>`_ .
|
|
1215
|
+
|
|
1216
|
+
Creates an AWS Migration Hub Refactor Spaces application. The account that owns the environment also owns the applications created inside the environment, regardless of the account that creates the application. Refactor Spaces provisions an Amazon API Gateway, API Gateway VPC link, and Network Load Balancer for the application proxy inside your account.
|
|
1213
1217
|
|
|
1214
1218
|
In environments created with a `CreateEnvironment:NetworkFabricType <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/APIReference/API_CreateEnvironment.html#migrationhubrefactorspaces-CreateEnvironment-request-NetworkFabricType>`_ of ``NONE`` you need to configure `VPC to VPC connectivity <https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/amazon-vpc-to-amazon-vpc-connectivity-options.html>`_ between your service VPC and the application proxy VPC to route traffic through the application proxy to a service with a private URL endpoint. For more information, see `Create an application <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/userguide/getting-started-create-application.html>`_ in the *Refactor Spaces User Guide* .
|
|
1215
1219
|
|
|
@@ -1565,9 +1569,13 @@ class CfnEnvironment(
|
|
|
1565
1569
|
metaclass=jsii.JSIIMeta,
|
|
1566
1570
|
jsii_type="aws-cdk-lib.aws_refactorspaces.CfnEnvironment",
|
|
1567
1571
|
):
|
|
1568
|
-
'''
|
|
1572
|
+
'''.. epigraph::
|
|
1573
|
+
|
|
1574
|
+
AWS Migration Hub will no longer be open to new customers starting November 7, 2025.
|
|
1569
1575
|
|
|
1570
|
-
|
|
1576
|
+
To continue using the service, sign up prior to November 7, 2025. For capabilities similar to AWS Migration Hub , explore `AWS Migration Hub <https://docs.aws.amazon.com/https://aws.amazon.com/transform>`_ .
|
|
1577
|
+
|
|
1578
|
+
Creates an AWS Migration Hub Refactor Spaces environment. The caller owns the environment resource, and all Refactor Spaces applications, services, and routes created within the environment. They are referred to as the *environment owner* . The environment owner has cross-account visibility and control of Refactor Spaces resources that are added to the environment by other accounts that the environment is shared with.
|
|
1571
1579
|
|
|
1572
1580
|
When creating an environment with a `CreateEnvironment:NetworkFabricType <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/APIReference/API_CreateEnvironment.html#migrationhubrefactorspaces-CreateEnvironment-request-NetworkFabricType>`_ of ``TRANSIT_GATEWAY`` , Refactor Spaces provisions a transit gateway to enable services in VPCs to communicate directly across accounts. If `CreateEnvironment:NetworkFabricType <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/APIReference/API_CreateEnvironment.html#migrationhubrefactorspaces-CreateEnvironment-request-NetworkFabricType>`_ is ``NONE`` , Refactor Spaces does not create a transit gateway and you must use your network infrastructure to route traffic to services with private URL endpoints.
|
|
1573
1581
|
|
|
@@ -2235,9 +2243,13 @@ class CfnService(
|
|
|
2235
2243
|
metaclass=jsii.JSIIMeta,
|
|
2236
2244
|
jsii_type="aws-cdk-lib.aws_refactorspaces.CfnService",
|
|
2237
2245
|
):
|
|
2238
|
-
'''
|
|
2246
|
+
'''.. epigraph::
|
|
2247
|
+
|
|
2248
|
+
AWS Migration Hub will no longer be open to new customers starting November 7, 2025.
|
|
2249
|
+
|
|
2250
|
+
To continue using the service, sign up prior to November 7, 2025. For capabilities similar to AWS Migration Hub , explore `AWS Migration Hub <https://docs.aws.amazon.com/https://aws.amazon.com/transform>`_ .
|
|
2239
2251
|
|
|
2240
|
-
The account owner of the service is always the environment owner, regardless of which account in the environment creates the service. Services have either a URL endpoint in a virtual private cloud (VPC), or a Lambda function endpoint.
|
|
2252
|
+
Creates an AWS Migration Hub Refactor Spaces service. The account owner of the service is always the environment owner, regardless of which account in the environment creates the service. Services have either a URL endpoint in a virtual private cloud (VPC), or a Lambda function endpoint.
|
|
2241
2253
|
.. epigraph::
|
|
2242
2254
|
|
|
2243
2255
|
If an AWS resource is launched in a service VPC, and you want it to be accessible to all of an environment’s services with VPCs and routes, apply the ``RefactorSpacesSecurityGroup`` to the resource. Alternatively, to add more cross-account constraints, apply your own security group.
|