aws-cdk-lib 2.218.0__py3-none-any.whl → 2.220.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (65) hide show
  1. aws_cdk/__init__.py +31 -36
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.218.0.jsii.tgz → aws-cdk-lib@2.220.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_amazonmq/__init__.py +98 -87
  5. aws_cdk/aws_apigateway/__init__.py +39 -0
  6. aws_cdk/aws_applicationsignals/__init__.py +450 -2
  7. aws_cdk/aws_arcregionswitch/__init__.py +8 -0
  8. aws_cdk/aws_backup/__init__.py +29 -0
  9. aws_cdk/aws_batch/__init__.py +109 -7
  10. aws_cdk/aws_bcmdataexports/__init__.py +9 -0
  11. aws_cdk/aws_bedrock/__init__.py +384 -1
  12. aws_cdk/aws_bedrockagentcore/__init__.py +7862 -1568
  13. aws_cdk/aws_cloudfront/experimental/__init__.py +4 -0
  14. aws_cdk/aws_cloudfront_origins/__init__.py +87 -6
  15. aws_cdk/aws_cloudwatch/__init__.py +5 -5
  16. aws_cdk/aws_codebuild/__init__.py +339 -62
  17. aws_cdk/aws_cognito/__init__.py +6 -4
  18. aws_cdk/aws_connect/__init__.py +9 -9
  19. aws_cdk/aws_cur/__init__.py +5 -3
  20. aws_cdk/aws_datasync/__init__.py +44 -22
  21. aws_cdk/aws_datazone/__init__.py +35 -33
  22. aws_cdk/aws_dax/__init__.py +12 -3
  23. aws_cdk/aws_dms/__init__.py +3 -5
  24. aws_cdk/aws_ec2/__init__.py +2721 -30
  25. aws_cdk/aws_ecs/__init__.py +2900 -90
  26. aws_cdk/aws_eks/__init__.py +114 -9
  27. aws_cdk/aws_entityresolution/__init__.py +18 -0
  28. aws_cdk/aws_fsx/__init__.py +4 -4
  29. aws_cdk/aws_greengrassv2/__init__.py +29 -0
  30. aws_cdk/aws_imagebuilder/__init__.py +397 -0
  31. aws_cdk/aws_iotsitewise/__init__.py +136 -80
  32. aws_cdk/aws_kinesis/__init__.py +95 -4
  33. aws_cdk/aws_lambda/__init__.py +43 -0
  34. aws_cdk/aws_lightsail/__init__.py +584 -0
  35. aws_cdk/aws_logs/__init__.py +57 -0
  36. aws_cdk/aws_lookoutmetrics/__init__.py +14 -2
  37. aws_cdk/aws_m2/__init__.py +59 -13
  38. aws_cdk/aws_medialive/__init__.py +108 -0
  39. aws_cdk/aws_msk/__init__.py +4 -2
  40. aws_cdk/aws_mwaa/__init__.py +5 -5
  41. aws_cdk/aws_neptune/__init__.py +133 -70
  42. aws_cdk/aws_networkfirewall/__init__.py +6 -2
  43. aws_cdk/aws_networkmanager/__init__.py +29 -0
  44. aws_cdk/aws_observabilityadmin/__init__.py +1227 -83
  45. aws_cdk/aws_omics/__init__.py +7 -1
  46. aws_cdk/aws_opensearchservice/__init__.py +64 -0
  47. aws_cdk/aws_opsworkscm/__init__.py +0 -29
  48. aws_cdk/aws_pcs/__init__.py +224 -33
  49. aws_cdk/aws_pinpoint/__init__.py +58 -0
  50. aws_cdk/aws_quicksight/__init__.py +118 -0
  51. aws_cdk/aws_rds/__init__.py +62 -37
  52. aws_cdk/aws_refactorspaces/__init__.py +18 -6
  53. aws_cdk/aws_route53/__init__.py +138 -8
  54. aws_cdk/aws_s3/__init__.py +29 -2
  55. aws_cdk/aws_s3objectlambda/__init__.py +44 -12
  56. aws_cdk/aws_servicecatalog/__init__.py +103 -106
  57. aws_cdk/aws_smsvoice/__init__.py +319 -0
  58. aws_cdk/aws_ssmquicksetup/__init__.py +3 -3
  59. aws_cdk/aws_synthetics/__init__.py +21 -1
  60. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/METADATA +2 -2
  61. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/RECORD +65 -65
  62. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/LICENSE +0 -0
  63. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/NOTICE +0 -0
  64. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/WHEEL +0 -0
  65. {aws_cdk_lib-2.218.0.dist-info → aws_cdk_lib-2.220.0.dist-info}/top_level.txt +0 -0
@@ -3272,6 +3272,12 @@ class AuroraMysqlEngineVersion(
3272
3272
  '''Version "8.0.mysql_aurora.3.10.0".'''
3273
3273
  return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_10_0"))
3274
3274
 
3275
+ @jsii.python.classproperty
3276
+ @jsii.member(jsii_name="VER_3_10_1")
3277
+ def VER_3_10_1(cls) -> "AuroraMysqlEngineVersion":
3278
+ '''Version "8.0.mysql_aurora.3.10.1".'''
3279
+ return typing.cast("AuroraMysqlEngineVersion", jsii.sget(cls, "VER_3_10_1"))
3280
+
3275
3281
  @jsii.python.classproperty
3276
3282
  @jsii.member(jsii_name="VER_5_7_12")
3277
3283
  def VER_5_7_12(cls) -> "AuroraMysqlEngineVersion":
@@ -5403,7 +5409,7 @@ class CfnDBClusterProps:
5403
5409
  :param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
5404
5410
  :param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5405
5411
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
5406
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
5412
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
5407
5413
  :param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5408
5414
  :param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
5409
5415
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
@@ -6297,7 +6303,7 @@ class CfnDBClusterProps:
6297
6303
 
6298
6304
  Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters
6299
6305
 
6300
- This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
6306
+ This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
6301
6307
 
6302
6308
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbcluster.html#cfn-rds-dbcluster-masteruserauthenticationtype
6303
6309
  '''
@@ -7025,7 +7031,7 @@ class CfnDBInstanceProps:
7025
7031
  :param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
7026
7032
  :param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
7027
7033
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
7028
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
7034
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
7029
7035
  :param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
7030
7036
  :param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
7031
7037
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
@@ -8385,7 +8391,7 @@ class CfnDBInstanceProps:
8385
8391
  - ``password`` - Use standard database authentication with a password.
8386
8392
  - ``iam-db-auth`` - Use IAM database authentication for the master user.
8387
8393
 
8388
- This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
8394
+ This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
8389
8395
 
8390
8396
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbinstance.html#cfn-rds-dbinstance-masteruserauthenticationtype
8391
8397
  '''
@@ -9243,7 +9249,7 @@ class CfnDBProxyEndpointProps:
9243
9249
  :param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
9244
9250
  :param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
9245
9251
  :param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
9246
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
9252
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9247
9253
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
9248
9254
  :param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
9249
9255
  :param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
@@ -9333,6 +9339,12 @@ class CfnDBProxyEndpointProps:
9333
9339
 
9334
9340
  The network type determines the IP version that the proxy endpoint supports.
9335
9341
 
9342
+ Valid values:
9343
+
9344
+ - ``IPV4`` - The proxy endpoint supports IPv4 only.
9345
+ - ``IPV6`` - The proxy endpoint supports IPv6 only.
9346
+ - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9347
+
9336
9348
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxyendpoint.html#cfn-rds-dbproxyendpoint-endpointnetworktype
9337
9349
  '''
9338
9350
  result = self._values.get("endpoint_network_type")
@@ -9426,12 +9438,12 @@ class CfnDBProxyProps:
9426
9438
  :param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
9427
9439
  :param auth: The authorization mechanism that the proxy uses.
9428
9440
  :param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
9429
- :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
9430
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
9441
+ :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database. Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
9442
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9431
9443
  :param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
9432
9444
  :param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
9433
9445
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
9434
- :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
9446
+ :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database. Valid values: - ``IPV4`` - The proxy connects to the database using IPv4 only. - ``IPV6`` - The proxy connects to the database using IPv6 only.
9435
9447
  :param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
9436
9448
 
9437
9449
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html
@@ -9582,6 +9594,8 @@ class CfnDBProxyProps:
9582
9594
  def default_auth_scheme(self) -> typing.Optional[builtins.str]:
9583
9595
  '''The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
9584
9596
 
9597
+ Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
9598
+
9585
9599
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-defaultauthscheme
9586
9600
  '''
9587
9601
  result = self._values.get("default_auth_scheme")
@@ -9593,6 +9607,12 @@ class CfnDBProxyProps:
9593
9607
 
9594
9608
  The network type determines the IP version that the proxy endpoint supports.
9595
9609
 
9610
+ Valid values:
9611
+
9612
+ - ``IPV4`` - The proxy endpoint supports IPv4 only.
9613
+ - ``IPV6`` - The proxy endpoint supports IPv6 only.
9614
+ - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
9615
+
9596
9616
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-endpointnetworktype
9597
9617
  '''
9598
9618
  result = self._values.get("endpoint_network_type")
@@ -9637,6 +9657,11 @@ class CfnDBProxyProps:
9637
9657
 
9638
9658
  The network type determines the IP version that the proxy uses for connections to the database.
9639
9659
 
9660
+ Valid values:
9661
+
9662
+ - ``IPV4`` - The proxy connects to the database using IPv4 only.
9663
+ - ``IPV6`` - The proxy connects to the database using IPv6 only.
9664
+
9640
9665
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-rds-dbproxy.html#cfn-rds-dbproxy-targetconnectionnetworktype
9641
9666
  '''
9642
9667
  result = self._values.get("target_connection_network_type")
@@ -16990,7 +17015,7 @@ class DatabaseInstanceNewProps:
16990
17015
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
16991
17016
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
16992
17017
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
16993
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
17018
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
16994
17019
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
16995
17020
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
16996
17021
 
@@ -17698,11 +17723,11 @@ class DatabaseInstanceNewProps:
17698
17723
 
17699
17724
  @builtins.property
17700
17725
  def storage_type(self) -> typing.Optional["StorageType"]:
17701
- '''The storage type.
17726
+ '''The storage type to associate with the DB instance.
17702
17727
 
17703
- Storage types supported are gp2, io1, standard.
17728
+ Storage types supported are gp2, gp3, io1, io2, and standard.
17704
17729
 
17705
- :default: GP2
17730
+ :default: StorageType.GP2
17706
17731
 
17707
17732
  :see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
17708
17733
  '''
@@ -17891,7 +17916,7 @@ class DatabaseInstanceReadReplicaProps(DatabaseInstanceNewProps):
17891
17916
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
17892
17917
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
17893
17918
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
17894
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
17919
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
17895
17920
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
17896
17921
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
17897
17922
  :param instance_type: The name of the compute and memory capacity classes.
@@ -18552,11 +18577,11 @@ class DatabaseInstanceReadReplicaProps(DatabaseInstanceNewProps):
18552
18577
 
18553
18578
  @builtins.property
18554
18579
  def storage_type(self) -> typing.Optional["StorageType"]:
18555
- '''The storage type.
18580
+ '''The storage type to associate with the DB instance.
18556
18581
 
18557
- Storage types supported are gp2, io1, standard.
18582
+ Storage types supported are gp2, gp3, io1, io2, and standard.
18558
18583
 
18559
- :default: GP2
18584
+ :default: StorageType.GP2
18560
18585
 
18561
18586
  :see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
18562
18587
  '''
@@ -18796,7 +18821,7 @@ class DatabaseInstanceSourceProps(DatabaseInstanceNewProps):
18796
18821
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
18797
18822
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
18798
18823
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
18799
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
18824
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
18800
18825
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
18801
18826
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
18802
18827
  :param engine: The database engine.
@@ -19547,11 +19572,11 @@ class DatabaseInstanceSourceProps(DatabaseInstanceNewProps):
19547
19572
 
19548
19573
  @builtins.property
19549
19574
  def storage_type(self) -> typing.Optional["StorageType"]:
19550
- '''The storage type.
19575
+ '''The storage type to associate with the DB instance.
19551
19576
 
19552
- Storage types supported are gp2, io1, standard.
19577
+ Storage types supported are gp2, gp3, io1, io2, and standard.
19553
19578
 
19554
- :default: GP2
19579
+ :default: StorageType.GP2
19555
19580
 
19556
19581
  :see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
19557
19582
  '''
@@ -36962,7 +36987,7 @@ class CfnDBCluster(
36962
36987
  :param iops: The amount of Provisioned IOPS (input/output operations per second) to be initially allocated for each DB instance in the Multi-AZ DB cluster. For information about valid IOPS values, see `Provisioned IOPS storage <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#USER_PIOPS>`_ in the *Amazon RDS User Guide* . This setting is required to create a Multi-AZ DB cluster. Valid for Cluster Type: Multi-AZ DB clusters only Constraints: - Must be a multiple between .5 and 50 of the storage amount for the DB cluster.
36963
36988
  :param kms_key_id: The Amazon Resource Name (ARN) of the AWS KMS key that is used to encrypt the database instances in the DB cluster, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the ``StorageEncrypted`` property but don't specify this property, the default KMS key is used. If you specify this property, you must set the ``StorageEncrypted`` property to ``true`` . If you specify the ``SnapshotIdentifier`` property, the ``StorageEncrypted`` property value is inherited from the snapshot, and if the DB cluster is encrypted, the specified ``KmsKeyId`` property is used. If you create a read replica of an encrypted DB cluster in another AWS Region, make sure to set ``KmsKeyId`` to a KMS key identifier that is valid in the destination AWS Region. This KMS key is used to encrypt the read replica in that AWS Region. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36964
36989
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.* Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
36965
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
36990
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB cluster. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. Valid for Cluster Type: Aurora DB clusters and Multi-AZ DB clusters This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
36966
36991
  :param master_username: The name of the master user for the DB cluster. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36967
36992
  :param master_user_password: The master password for the DB instance. .. epigraph:: If you specify the ``SourceDBClusterIdentifier`` , ``SnapshotIdentifier`` , or ``GlobalClusterIdentifier`` property, don't specify this property. The value is inherited from the source DB cluster, the snapshot, or the primary DB cluster for the global database cluster, respectively. Valid for: Aurora DB clusters and Multi-AZ DB clusters
36968
36993
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. .. epigraph:: When you restore a DB cluster from a snapshot, Amazon RDS generates a new secret instead of reusing the secret specified in the ``SecretArn`` property. This ensures that the restored DB cluster is securely managed with a dedicated secret. To maintain consistent integration with your application, you might need to update resource configurations to reference the newly created secret. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide* and `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/AuroraUserGuide/rds-secrets-manager.html>`_ in the *Amazon Aurora User Guide.*
@@ -39105,7 +39130,7 @@ class CfnDBInstance(
39105
39130
  :param kms_key_id: The ARN of the AWS KMS key that's used to encrypt the DB instance, such as ``arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef`` . If you enable the StorageEncrypted property but don't specify this property, AWS CloudFormation uses the default KMS key. If you specify this property, you must set the StorageEncrypted property to true. If you specify the ``SourceDBInstanceIdentifier`` or ``SourceDbiResourceId`` property, don't specify this property. The value is inherited from the source DB instance, and if the DB instance is encrypted, the specified ``KmsKeyId`` property is used. However, if the source DB instance is in a different AWS Region, you must specify a KMS key ID. If you specify the ``SourceDBInstanceAutomatedBackupsArn`` property, don't specify this property. The value is inherited from the source DB instance automated backup, and if the automated backup is encrypted, the specified ``KmsKeyId`` property is used. If you create an encrypted read replica in a different AWS Region, then you must specify a KMS key for the destination AWS Region. KMS encryption keys are specific to the region that they're created in, and you can't use encryption keys from one region in another region. If you specify the ``DBSnapshotIdentifier`` property, don't specify this property. The ``StorageEncrypted`` property value is inherited from the snapshot. If the DB instance is encrypted, the specified ``KmsKeyId`` property is also inherited from the snapshot. If you specify ``DBSecurityGroups`` , AWS CloudFormation ignores this property. To specify both a security group and this property, you must use a VPC security group. For more information about Amazon RDS and VPC, see `Using Amazon RDS with Amazon VPC <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/USER_VPC.html>`_ in the *Amazon RDS User Guide* . *Amazon Aurora* Not applicable. The KMS key identifier is managed by the DB cluster.
39106
39131
  :param license_model: License model information for this DB instance. Valid Values: - Aurora MySQL - ``general-public-license`` - Aurora PostgreSQL - ``postgresql-license`` - RDS for Db2 - ``bring-your-own-license`` . For more information about RDS for Db2 licensing, see ` <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/db2-licensing.html>`_ in the *Amazon RDS User Guide.* - RDS for MariaDB - ``general-public-license`` - RDS for Microsoft SQL Server - ``license-included`` - RDS for MySQL - ``general-public-license`` - RDS for Oracle - ``bring-your-own-license`` or ``license-included`` - RDS for PostgreSQL - ``postgresql-license`` .. epigraph:: If you've specified ``DBSecurityGroups`` and then you update the license model, AWS CloudFormation replaces the underlying DB instance. This will incur some interruptions to database availability.
39107
39132
  :param manage_master_user_password: Specifies whether to manage the master user password with AWS Secrets Manager. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.* Constraints: - Can't manage the master user password with AWS Secrets Manager if ``MasterUserPassword`` is specified.
39108
- :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for PostgreSQL and Aurora PostgreSQL engines.
39133
+ :param master_user_authentication_type: Specifies the authentication type for the master user. With IAM master user authentication, you can configure the master DB user with IAM database authentication when you create a DB instance. You can specify one of the following values: - ``password`` - Use standard database authentication with a password. - ``iam-db-auth`` - Use IAM database authentication for the master user. This option is only valid for RDS for MySQL, RDS for MariaDB, RDS for PostgreSQL, Aurora MySQL, and Aurora PostgreSQL engines.
39109
39134
  :param master_username: The master user name for the DB instance. .. epigraph:: If you specify the ``SourceDBInstanceIdentifier`` or ``DBSnapshotIdentifier`` property, don't specify this property. The value is inherited from the source DB instance or snapshot. When migrating a self-managed Db2 database, we recommend that you use the same master username as your self-managed Db2 instance name. *Amazon Aurora* Not applicable. The name for the master user is managed by the DB cluster. *RDS for Db2* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MariaDB* Constraints: - Must be 1 to 16 letters or numbers. - Can't be a reserved word for the chosen database engine. *RDS for Microsoft SQL Server* Constraints: - Must be 1 to 128 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for MySQL* Constraints: - Must be 1 to 16 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for Oracle* Constraints: - Must be 1 to 30 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine. *RDS for PostgreSQL* Constraints: - Must be 1 to 63 letters or numbers. - First character must be a letter. - Can't be a reserved word for the chosen database engine.
39110
39135
  :param master_user_password: The password for the master user. The password can include any printable ASCII character except "/", """, or "@". *Amazon Aurora* Not applicable. The password for the master user is managed by the DB cluster. *RDS for Db2* Must contain from 8 to 255 characters. *RDS for MariaDB* Constraints: Must contain from 8 to 41 characters. *RDS for Microsoft SQL Server* Constraints: Must contain from 8 to 128 characters. *RDS for MySQL* Constraints: Must contain from 8 to 41 characters. *RDS for Oracle* Constraints: Must contain from 8 to 30 characters. *RDS for PostgreSQL* Constraints: Must contain from 8 to 128 characters.
39111
39136
  :param master_user_secret: The secret managed by RDS in AWS Secrets Manager for the master user password. For more information, see `Password management with AWS Secrets Manager <https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/rds-secrets-manager.html>`_ in the *Amazon RDS User Guide.*
@@ -41553,12 +41578,12 @@ class CfnDBProxy(
41553
41578
  :param vpc_subnet_ids: One or more VPC subnet IDs to associate with the new proxy.
41554
41579
  :param auth: The authorization mechanism that the proxy uses.
41555
41580
  :param debug_logging: Specifies whether the proxy logs detailed connection and query information. When you enable ``DebugLogging`` , the proxy captures connection details and connection pool behavior from your queries. Debug logging increases CloudWatch costs and can impact proxy performance. Enable this option only when you need to troubleshoot connection or performance issues.
41556
- :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database.
41557
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
41581
+ :param default_auth_scheme: The default authentication scheme that the proxy uses for client connections to the proxy and connections from the proxy to the underlying database. Valid values are ``NONE`` and ``IAM_AUTH`` . When set to ``IAM_AUTH`` , the proxy uses end-to-end IAM authentication to connect to the database.
41582
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
41558
41583
  :param idle_client_timeout: The number of seconds that a connection to the proxy can be inactive before the proxy disconnects it. You can set this value higher or lower than the connection timeout limit for the associated database.
41559
41584
  :param require_tls: Specifies whether Transport Layer Security (TLS) encryption is required for connections to the proxy. By enabling this setting, you can enforce encrypted TLS connections to the proxy.
41560
41585
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
41561
- :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database.
41586
+ :param target_connection_network_type: The network type that the proxy uses to connect to the target database. The network type determines the IP version that the proxy uses for connections to the database. Valid values: - ``IPV4`` - The proxy connects to the database using IPv4 only. - ``IPV6`` - The proxy connects to the database using IPv6 only.
41562
41587
  :param vpc_security_group_ids: One or more VPC security group IDs to associate with the new proxy. If you plan to update the resource, don't specify VPC security groups in a shared VPC.
41563
41588
  '''
41564
41589
  if __debug__:
@@ -42111,7 +42136,7 @@ class CfnDBProxyEndpoint(
42111
42136
  :param db_proxy_endpoint_name: The name of the DB proxy endpoint to create.
42112
42137
  :param db_proxy_name: The name of the DB proxy associated with the DB proxy endpoint that you create.
42113
42138
  :param vpc_subnet_ids: The VPC subnet IDs for the DB proxy endpoint that you create. You can specify a different set of subnet IDs than for the original DB proxy.
42114
- :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports.
42139
+ :param endpoint_network_type: The network type of the DB proxy endpoint. The network type determines the IP version that the proxy endpoint supports. Valid values: - ``IPV4`` - The proxy endpoint supports IPv4 only. - ``IPV6`` - The proxy endpoint supports IPv6 only. - ``DUAL`` - The proxy endpoint supports both IPv4 and IPv6.
42115
42140
  :param tags: An optional set of key-value pairs to associate arbitrary data of your choosing with the proxy.
42116
42141
  :param target_role: A value that indicates whether the DB proxy endpoint can be used for read/write or read-only operations.
42117
42142
  :param vpc_security_group_ids: The VPC security group IDs for the DB proxy endpoint that you create. You can specify a different set of security group IDs than for the original DB proxy. The default is the default security group for the VPC.
@@ -47695,7 +47720,7 @@ class DatabaseInstanceFromSnapshot(
47695
47720
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
47696
47721
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
47697
47722
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
47698
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
47723
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
47699
47724
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
47700
47725
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
47701
47726
  '''
@@ -48129,7 +48154,7 @@ class DatabaseInstanceFromSnapshotProps(DatabaseInstanceSourceProps):
48129
48154
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
48130
48155
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
48131
48156
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
48132
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
48157
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
48133
48158
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
48134
48159
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
48135
48160
  :param engine: The database engine.
@@ -48814,11 +48839,11 @@ class DatabaseInstanceFromSnapshotProps(DatabaseInstanceSourceProps):
48814
48839
 
48815
48840
  @builtins.property
48816
48841
  def storage_type(self) -> typing.Optional[StorageType]:
48817
- '''The storage type.
48842
+ '''The storage type to associate with the DB instance.
48818
48843
 
48819
- Storage types supported are gp2, io1, standard.
48844
+ Storage types supported are gp2, gp3, io1, io2, and standard.
48820
48845
 
48821
- :default: GP2
48846
+ :default: StorageType.GP2
48822
48847
 
48823
48848
  :see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
48824
48849
  '''
@@ -49144,7 +49169,7 @@ class DatabaseInstanceProps(DatabaseInstanceSourceProps):
49144
49169
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
49145
49170
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
49146
49171
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
49147
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
49172
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
49148
49173
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
49149
49174
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
49150
49175
  :param engine: The database engine.
@@ -49835,11 +49860,11 @@ class DatabaseInstanceProps(DatabaseInstanceSourceProps):
49835
49860
 
49836
49861
  @builtins.property
49837
49862
  def storage_type(self) -> typing.Optional[StorageType]:
49838
- '''The storage type.
49863
+ '''The storage type to associate with the DB instance.
49839
49864
 
49840
- Storage types supported are gp2, io1, standard.
49865
+ Storage types supported are gp2, gp3, io1, io2, and standard.
49841
49866
 
49842
- :default: GP2
49867
+ :default: StorageType.GP2
49843
49868
 
49844
49869
  :see: https://docs.aws.amazon.com/AmazonRDS/latest/UserGuide/CHAP_Storage.html#Concepts.Storage.GeneralSSD
49845
49870
  '''
@@ -50122,7 +50147,7 @@ class DatabaseInstanceReadReplica(
50122
50147
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
50123
50148
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
50124
50149
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
50125
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
50150
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
50126
50151
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
50127
50152
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
50128
50153
  '''
@@ -51588,7 +51613,7 @@ class DatabaseInstance(
51588
51613
  :param s3_import_role: Role that will be associated with this DB instance to enable S3 import. This feature is only supported by the Microsoft SQL Server, Oracle, and PostgreSQL engines. This property must not be used if ``s3ImportBuckets`` is used. For Microsoft SQL Server: Default: - New role is created if ``s3ImportBuckets`` is set, no role is defined otherwise
51589
51614
  :param security_groups: The security groups to assign to the DB instance. Default: - a new security group is created
51590
51615
  :param storage_throughput: The storage throughput, specified in mebibytes per second (MiBps). Only applicable for GP3. Default: - 125 MiBps if allocated storage is less than 400 GiB for MariaDB, MySQL, and PostgreSQL, less than 200 GiB for Oracle and less than 20 GiB for SQL Server. 500 MiBps otherwise (except for SQL Server where the default is always 125 MiBps).
51591
- :param storage_type: The storage type. Storage types supported are gp2, io1, standard. Default: GP2
51616
+ :param storage_type: The storage type to associate with the DB instance. Storage types supported are gp2, gp3, io1, io2, and standard. Default: StorageType.GP2
51592
51617
  :param subnet_group: Existing subnet group for the instance. Default: - a new subnet group will be created.
51593
51618
  :param vpc_subnets: The type of subnets to add to the created DB subnet group. Default: - private subnets
51594
51619
  '''
@@ -1207,9 +1207,13 @@ class CfnApplication(
1207
1207
  metaclass=jsii.JSIIMeta,
1208
1208
  jsii_type="aws-cdk-lib.aws_refactorspaces.CfnApplication",
1209
1209
  ):
1210
- '''Creates an AWS Migration Hub Refactor Spaces application.
1210
+ '''.. epigraph::
1211
1211
 
1212
- The account that owns the environment also owns the applications created inside the environment, regardless of the account that creates the application. Refactor Spaces provisions an Amazon API Gateway, API Gateway VPC link, and Network Load Balancer for the application proxy inside your account.
1212
+ AWS Migration Hub will no longer be open to new customers starting November 7, 2025.
1213
+
1214
+ To continue using the service, sign up prior to November 7, 2025. For capabilities similar to AWS Migration Hub , explore `AWS Migration Hub <https://docs.aws.amazon.com/https://aws.amazon.com/transform>`_ .
1215
+
1216
+ Creates an AWS Migration Hub Refactor Spaces application. The account that owns the environment also owns the applications created inside the environment, regardless of the account that creates the application. Refactor Spaces provisions an Amazon API Gateway, API Gateway VPC link, and Network Load Balancer for the application proxy inside your account.
1213
1217
 
1214
1218
  In environments created with a `CreateEnvironment:NetworkFabricType <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/APIReference/API_CreateEnvironment.html#migrationhubrefactorspaces-CreateEnvironment-request-NetworkFabricType>`_ of ``NONE`` you need to configure `VPC to VPC connectivity <https://docs.aws.amazon.com/whitepapers/latest/aws-vpc-connectivity-options/amazon-vpc-to-amazon-vpc-connectivity-options.html>`_ between your service VPC and the application proxy VPC to route traffic through the application proxy to a service with a private URL endpoint. For more information, see `Create an application <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/userguide/getting-started-create-application.html>`_ in the *Refactor Spaces User Guide* .
1215
1219
 
@@ -1565,9 +1569,13 @@ class CfnEnvironment(
1565
1569
  metaclass=jsii.JSIIMeta,
1566
1570
  jsii_type="aws-cdk-lib.aws_refactorspaces.CfnEnvironment",
1567
1571
  ):
1568
- '''Creates an AWS Migration Hub Refactor Spaces environment.
1572
+ '''.. epigraph::
1573
+
1574
+ AWS Migration Hub will no longer be open to new customers starting November 7, 2025.
1569
1575
 
1570
- The caller owns the environment resource, and all Refactor Spaces applications, services, and routes created within the environment. They are referred to as the *environment owner* . The environment owner has cross-account visibility and control of Refactor Spaces resources that are added to the environment by other accounts that the environment is shared with.
1576
+ To continue using the service, sign up prior to November 7, 2025. For capabilities similar to AWS Migration Hub , explore `AWS Migration Hub <https://docs.aws.amazon.com/https://aws.amazon.com/transform>`_ .
1577
+
1578
+ Creates an AWS Migration Hub Refactor Spaces environment. The caller owns the environment resource, and all Refactor Spaces applications, services, and routes created within the environment. They are referred to as the *environment owner* . The environment owner has cross-account visibility and control of Refactor Spaces resources that are added to the environment by other accounts that the environment is shared with.
1571
1579
 
1572
1580
  When creating an environment with a `CreateEnvironment:NetworkFabricType <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/APIReference/API_CreateEnvironment.html#migrationhubrefactorspaces-CreateEnvironment-request-NetworkFabricType>`_ of ``TRANSIT_GATEWAY`` , Refactor Spaces provisions a transit gateway to enable services in VPCs to communicate directly across accounts. If `CreateEnvironment:NetworkFabricType <https://docs.aws.amazon.com/migrationhub-refactor-spaces/latest/APIReference/API_CreateEnvironment.html#migrationhubrefactorspaces-CreateEnvironment-request-NetworkFabricType>`_ is ``NONE`` , Refactor Spaces does not create a transit gateway and you must use your network infrastructure to route traffic to services with private URL endpoints.
1573
1581
 
@@ -2235,9 +2243,13 @@ class CfnService(
2235
2243
  metaclass=jsii.JSIIMeta,
2236
2244
  jsii_type="aws-cdk-lib.aws_refactorspaces.CfnService",
2237
2245
  ):
2238
- '''Creates an AWS Migration Hub Refactor Spaces service.
2246
+ '''.. epigraph::
2247
+
2248
+ AWS Migration Hub will no longer be open to new customers starting November 7, 2025.
2249
+
2250
+ To continue using the service, sign up prior to November 7, 2025. For capabilities similar to AWS Migration Hub , explore `AWS Migration Hub <https://docs.aws.amazon.com/https://aws.amazon.com/transform>`_ .
2239
2251
 
2240
- The account owner of the service is always the environment owner, regardless of which account in the environment creates the service. Services have either a URL endpoint in a virtual private cloud (VPC), or a Lambda function endpoint.
2252
+ Creates an AWS Migration Hub Refactor Spaces service. The account owner of the service is always the environment owner, regardless of which account in the environment creates the service. Services have either a URL endpoint in a virtual private cloud (VPC), or a Lambda function endpoint.
2241
2253
  .. epigraph::
2242
2254
 
2243
2255
  If an AWS resource is launched in a service VPC, and you want it to be accessible to all of an environment’s services with VPCs and routes, apply the ``RefactorSpacesSecurityGroup`` to the resource. Alternatively, to add more cross-account constraints, apply your own security group.