From 052e547fd7db7f3cff5fc1929d501fd1a1c7841e Mon Sep 17 00:00:00 2001 From: AWS SDK For Ruby Date: Wed, 25 Sep 2024 18:20:16 +0000 Subject: [PATCH] Updated API models and rebuilt service gems. --- apis/cloudtrail/2013-11-01/docs-2.json | 24 +- apis/ec2/2016-11-15/docs-2.json | 12 +- apis/fsx/2018-03-01/docs-2.json | 10 +- gems/aws-partitions/CHANGELOG.md | 5 + gems/aws-partitions/VERSION | 2 +- gems/aws-partitions/partitions.json | 2 + gems/aws-sdk-cloudtrail/CHANGELOG.md | 5 + gems/aws-sdk-cloudtrail/VERSION | 2 +- .../lib/aws-sdk-cloudtrail.rb | 2 +- .../lib/aws-sdk-cloudtrail/client.rb | 120 ++- .../lib/aws-sdk-cloudtrail/types.rb | 771 +++++------------- gems/aws-sdk-core/CHANGELOG.md | 3 + gems/aws-sdk-core/VERSION | 2 +- gems/aws-sdk-core/lib/aws-sdk-sso.rb | 2 +- gems/aws-sdk-core/lib/aws-sdk-sso/client.rb | 2 +- gems/aws-sdk-core/lib/aws-sdk-ssooidc.rb | 2 +- .../lib/aws-sdk-ssooidc/client.rb | 2 +- gems/aws-sdk-core/lib/aws-sdk-sts.rb | 2 +- gems/aws-sdk-core/lib/aws-sdk-sts/client.rb | 2 +- gems/aws-sdk-ec2/CHANGELOG.md | 5 + gems/aws-sdk-ec2/VERSION | 2 +- gems/aws-sdk-ec2/lib/aws-sdk-ec2.rb | 2 +- gems/aws-sdk-ec2/lib/aws-sdk-ec2/client.rb | 2 +- gems/aws-sdk-ec2/lib/aws-sdk-ec2/types.rb | 128 ++- gems/aws-sdk-fsx/CHANGELOG.md | 5 + gems/aws-sdk-fsx/VERSION | 2 +- gems/aws-sdk-fsx/lib/aws-sdk-fsx.rb | 2 +- gems/aws-sdk-fsx/lib/aws-sdk-fsx/client.rb | 9 +- gems/aws-sdk-fsx/lib/aws-sdk-fsx/types.rb | 21 +- 29 files changed, 427 insertions(+), 723 deletions(-) diff --git a/apis/cloudtrail/2013-11-01/docs-2.json b/apis/cloudtrail/2013-11-01/docs-2.json index a8227a42b76..d2eac7fd4f3 100644 --- a/apis/cloudtrail/2013-11-01/docs-2.json +++ b/apis/cloudtrail/2013-11-01/docs-2.json @@ -18,7 +18,7 @@ "EnableFederation": "

Enables Lake query federation on the specified event data store. Federating an event data store lets you view the metadata associated with the event data store in the Glue Data Catalog and run SQL queries against your event data using Amazon Athena. The table metadata stored in the Glue Data Catalog lets the Athena query engine know how to find, read, and process the data that you want to query.

When you enable Lake query federation, CloudTrail creates a managed database named aws:cloudtrail (if the database doesn't already exist) and a managed federated table in the Glue Data Catalog. The event data store ID is used for the table name. CloudTrail registers the role ARN and event data store in Lake Formation, the service responsible for allowing fine-grained access control of the federated resources in the Glue Data Catalog.

For more information about Lake query federation, see Federate an event data store.

", "GetChannel": "

Returns information about a specific channel.

", "GetEventDataStore": "

Returns information about an event data store specified as either an ARN or the ID portion of the ARN.

", - "GetEventSelectors": "

Describes the settings for the event selectors that you configured for your trail. The information returned for your event selectors includes the following:

For more information about logging management and data events, see the following topics in the CloudTrail User Guide:

", + "GetEventSelectors": "

Describes the settings for the event selectors that you configured for your trail. The information returned for your event selectors includes the following:

For more information about logging management, data, and network activity events, see the following topics in the CloudTrail User Guide:

", "GetImport": "

Returns information about a specific import.

", "GetInsightSelectors": "

Describes the settings for the Insights event selectors that you configured for your trail or event data store. GetInsightSelectors shows if CloudTrail Insights event logging is enabled on the trail or event data store, and if it is, which Insights types are enabled. If you run GetInsightSelectors on a trail or event data store that does not have Insights events enabled, the operation throws the exception InsightNotEnabledException

Specify either the EventDataStore parameter to get Insights event selectors for an event data store, or the TrailName parameter to the get Insights event selectors for a trail. You cannot specify these parameters together.

For more information, see Logging CloudTrail Insights events in the CloudTrail User Guide.

", "GetQueryResults": "

Gets event data results of a query. You must specify the QueryID value returned by the StartQuery operation.

", @@ -35,21 +35,21 @@ "ListTags": "

Lists the tags for the specified trails, event data stores, or channels in the current Region.

", "ListTrails": "

Lists trails that are in the current account.

", "LookupEvents": "

Looks up management events or CloudTrail Insights events that are captured by CloudTrail. You can look up events that occurred in a Region within the last 90 days.

LookupEvents returns recent Insights events for trails that enable Insights. To view Insights events for an event data store, you can run queries on your Insights event data store, and you can also view the Lake dashboard for Insights.

Lookup supports the following attributes for management events:

Lookup supports the following attributes for Insights events:

All attributes are optional. The default number of results returned is 50, with a maximum of 50 possible. The response includes a token that you can use to get the next page of results.

The rate of lookup requests is limited to two per second, per account, per Region. If this limit is exceeded, a throttling error occurs.

", - "PutEventSelectors": "

Configures an event selector or advanced event selectors for your trail. Use event selectors or advanced event selectors to specify management and data event settings for your trail. If you want your trail to log Insights events, be sure the event selector enables logging of the Insights event types you want configured for your trail. For more information about logging Insights events, see Logging Insights events in the CloudTrail User Guide. By default, trails created without specific event selectors are configured to log all read and write management events, and no data events.

When an event occurs in your account, CloudTrail evaluates the event selectors or advanced event selectors in all trails. For each trail, if the event matches any event selector, the trail processes and logs the event. If the event doesn't match any event selector, the trail doesn't log the event.

Example

  1. You create an event selector for a trail and specify that you want write-only events.

  2. The EC2 GetConsoleOutput and RunInstances API operations occur in your account.

  3. CloudTrail evaluates whether the events match your event selectors.

  4. The RunInstances is a write-only event and it matches your event selector. The trail logs the event.

  5. The GetConsoleOutput is a read-only event that doesn't match your event selector. The trail doesn't log the event.

The PutEventSelectors operation must be called from the Region in which the trail was created; otherwise, an InvalidHomeRegionException exception is thrown.

You can configure up to five event selectors for each trail. For more information, see Logging management events, Logging data events, and Quotas in CloudTrail in the CloudTrail User Guide.

You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either AdvancedEventSelectors or EventSelectors, but not both. If you apply AdvancedEventSelectors to a trail, any existing EventSelectors are overwritten. For more information about advanced event selectors, see Logging data events in the CloudTrail User Guide.

", + "PutEventSelectors": "

Configures event selectors (also referred to as basic event selectors) or advanced event selectors for your trail. You can use either AdvancedEventSelectors or EventSelectors, but not both. If you apply AdvancedEventSelectors to a trail, any existing EventSelectors are overwritten.

You can use AdvancedEventSelectors to log management events, data events for all resource types, and network activity events.

You can use EventSelectors to log management events and data events for the following resource types:

You can't use EventSelectors to log network activity events.

If you want your trail to log Insights events, be sure the event selector or advanced event selector enables logging of the Insights event types you want configured for your trail. For more information about logging Insights events, see Logging Insights events in the CloudTrail User Guide. By default, trails created without specific event selectors are configured to log all read and write management events, and no data events or network activity events.

When an event occurs in your account, CloudTrail evaluates the event selectors or advanced event selectors in all trails. For each trail, if the event matches any event selector, the trail processes and logs the event. If the event doesn't match any event selector, the trail doesn't log the event.

Example

  1. You create an event selector for a trail and specify that you want to log write-only events.

  2. The EC2 GetConsoleOutput and RunInstances API operations occur in your account.

  3. CloudTrail evaluates whether the events match your event selectors.

  4. The RunInstances is a write-only event and it matches your event selector. The trail logs the event.

  5. The GetConsoleOutput is a read-only event that doesn't match your event selector. The trail doesn't log the event.

The PutEventSelectors operation must be called from the Region in which the trail was created; otherwise, an InvalidHomeRegionException exception is thrown.

You can configure up to five event selectors for each trail.

You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. For more information, see Logging management events, Logging data events, Logging network activity events, and Quotas in CloudTrail in the CloudTrail User Guide.

", "PutInsightSelectors": "

Lets you enable Insights event logging by specifying the Insights selectors that you want to enable on an existing trail or event data store. You also use PutInsightSelectors to turn off Insights event logging, by passing an empty list of Insights types. The valid Insights event types are ApiErrorRateInsight and ApiCallRateInsight.

To enable Insights on an event data store, you must specify the ARNs (or ID suffix of the ARNs) for the source event data store (EventDataStore) and the destination event data store (InsightsDestination). The source event data store logs management events and enables Insights. The destination event data store logs Insights events based upon the management event activity of the source event data store. The source and destination event data stores must belong to the same Amazon Web Services account.

To log Insights events for a trail, you must specify the name (TrailName) of the CloudTrail trail for which you want to change or add Insights selectors.

To log CloudTrail Insights events on API call volume, the trail or event data store must log write management events. To log CloudTrail Insights events on API error rate, the trail or event data store must log read or write management events. You can call GetEventSelectors on a trail to check whether the trail logs management events. You can call GetEventDataStore on an event data store to check whether the event data store logs management events.

For more information, see Logging CloudTrail Insights events in the CloudTrail User Guide.

", "PutResourcePolicy": "

Attaches a resource-based permission policy to a CloudTrail channel that is used for an integration with an event source outside of Amazon Web Services. For more information about resource-based policies, see CloudTrail resource-based policy examples in the CloudTrail User Guide.

", "RegisterOrganizationDelegatedAdmin": "

Registers an organization’s member account as the CloudTrail delegated administrator.

", "RemoveTags": "

Removes the specified tags from a trail, event data store, or channel.

", "RestoreEventDataStore": "

Restores a deleted event data store specified by EventDataStore, which accepts an event data store ARN. You can only restore a deleted event data store within the seven-day wait period after deletion. Restoring an event data store can take several minutes, depending on the size of the event data store.

", - "StartEventDataStoreIngestion": "

Starts the ingestion of live events on an event data store specified as either an ARN or the ID portion of the ARN. To start ingestion, the event data store Status must be STOPPED_INGESTION and the eventCategory must be Management, Data, or ConfigurationItem.

", + "StartEventDataStoreIngestion": "

Starts the ingestion of live events on an event data store specified as either an ARN or the ID portion of the ARN. To start ingestion, the event data store Status must be STOPPED_INGESTION and the eventCategory must be Management, Data, NetworkActivity, or ConfigurationItem.

", "StartImport": "

Starts an import of logged trail events from a source S3 bucket to a destination event data store. By default, CloudTrail only imports events contained in the S3 bucket's CloudTrail prefix and the prefixes inside the CloudTrail prefix, and does not check prefixes for other Amazon Web Services services. If you want to import CloudTrail events contained in another prefix, you must include the prefix in the S3LocationUri. For more considerations about importing trail events, see Considerations for copying trail events in the CloudTrail User Guide.

When you start a new import, the Destinations and ImportSource parameters are required. Before starting a new import, disable any access control lists (ACLs) attached to the source S3 bucket. For more information about disabling ACLs, see Controlling ownership of objects and disabling ACLs for your bucket.

When you retry an import, the ImportID parameter is required.

If the destination event data store is for an organization, you must use the management account to import trail events. You cannot use the delegated administrator account for the organization.

", "StartLogging": "

Starts the recording of Amazon Web Services API calls and log file delivery for a trail. For a trail that is enabled in all Regions, this operation must be called from the Region in which the trail was created. This operation cannot be called on the shadow trails (replicated trails in other Regions) of a trail that is enabled in all Regions.

", "StartQuery": "

Starts a CloudTrail Lake query. Use the QueryStatement parameter to provide your SQL query, enclosed in single quotation marks. Use the optional DeliveryS3Uri parameter to deliver the query results to an S3 bucket.

StartQuery requires you specify either the QueryStatement parameter, or a QueryAlias and any QueryParameters. In the current release, the QueryAlias and QueryParameters parameters are used only for the queries that populate the CloudTrail Lake dashboards.

", - "StopEventDataStoreIngestion": "

Stops the ingestion of live events on an event data store specified as either an ARN or the ID portion of the ARN. To stop ingestion, the event data store Status must be ENABLED and the eventCategory must be Management, Data, or ConfigurationItem.

", + "StopEventDataStoreIngestion": "

Stops the ingestion of live events on an event data store specified as either an ARN or the ID portion of the ARN. To stop ingestion, the event data store Status must be ENABLED and the eventCategory must be Management, Data, NetworkActivity, or ConfigurationItem.

", "StopImport": "

Stops a specified import.

", "StopLogging": "

Suspends the recording of Amazon Web Services API calls and log file delivery for the specified trail. Under most circumstances, there is no need to use this action. You can update a trail without stopping it first. This action is the only way to stop recording. For a trail enabled in all Regions, this operation must be called from the Region in which the trail was created, or an InvalidHomeRegionException will occur. This operation cannot be called on the shadow trails (replicated trails in other Regions) of a trail enabled in all Regions.

", "UpdateChannel": "

Updates a channel specified by a required channel ARN or UUID.

", - "UpdateEventDataStore": "

Updates an event data store. The required EventDataStore value is an ARN or the ID portion of the ARN. Other parameters are optional, but at least one optional parameter must be specified, or CloudTrail throws an error. RetentionPeriod is in days, and valid values are integers between 7 and 3653 if the BillingMode is set to EXTENDABLE_RETENTION_PRICING, or between 7 and 2557 if BillingMode is set to FIXED_RETENTION_PRICING. By default, TerminationProtection is enabled.

For event data stores for CloudTrail events, AdvancedEventSelectors includes or excludes management or data events in your event data store. For more information about AdvancedEventSelectors, see AdvancedEventSelectors.

For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, AdvancedEventSelectors includes events of that type in your event data store.

", + "UpdateEventDataStore": "

Updates an event data store. The required EventDataStore value is an ARN or the ID portion of the ARN. Other parameters are optional, but at least one optional parameter must be specified, or CloudTrail throws an error. RetentionPeriod is in days, and valid values are integers between 7 and 3653 if the BillingMode is set to EXTENDABLE_RETENTION_PRICING, or between 7 and 2557 if BillingMode is set to FIXED_RETENTION_PRICING. By default, TerminationProtection is enabled.

For event data stores for CloudTrail events, AdvancedEventSelectors includes or excludes management, data, or network activity events in your event data store. For more information about AdvancedEventSelectors, see AdvancedEventSelectors.

For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, AdvancedEventSelectors includes events of that type in your event data store.

", "UpdateTrail": "

Updates trail settings that control what events you are logging, and how to handle log files. Changes to a trail do not require stopping the CloudTrail service. Use this action to designate an existing bucket for log delivery. If the existing bucket has previously been a target for CloudTrail log files, an IAM policy exists for the bucket. UpdateTrail must be called from the Region in which the trail was created; otherwise, an InvalidHomeRegionException is thrown.

" }, "shapes": { @@ -96,7 +96,7 @@ } }, "AdvancedEventSelector": { - "base": "

Advanced event selectors let you create fine-grained selectors for CloudTrail management and data events. They help you control costs by logging only those events that are important to you. For more information about advanced event selectors, see Logging management events and Logging data events in the CloudTrail User Guide.

You cannot apply both event selectors and advanced event selectors to a trail.

Supported CloudTrail event record fields for management events

Supported CloudTrail event record fields for data events

For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or events outside of Amazon Web Services, the only supported field is eventCategory.

", + "base": "

Advanced event selectors let you create fine-grained selectors for CloudTrail management, data, and network activity events. They help you control costs by logging only those events that are important to you. For more information about configuring advanced event selectors, see the Logging data events, Logging network activity events, and Logging management events topics in the CloudTrail User Guide.

You cannot apply both event selectors and advanced event selectors to a trail.

Supported CloudTrail event record fields for management events

Supported CloudTrail event record fields for data events

Supported CloudTrail event record fields for network activity events

Network activity events is in preview release for CloudTrail and is subject to change.

For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or events outside of Amazon Web Services, the only supported field is eventCategory.

", "refs": { "AdvancedEventSelectors$member": null } @@ -109,7 +109,7 @@ "EventDataStore$AdvancedEventSelectors": "

The advanced event selectors that were used to select events for the data store.

", "GetEventDataStoreResponse$AdvancedEventSelectors": "

The advanced event selectors used to select events for the data store.

", "GetEventSelectorsResponse$AdvancedEventSelectors": "

The advanced event selectors that are configured for the trail.

", - "PutEventSelectorsRequest$AdvancedEventSelectors": "

Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either AdvancedEventSelectors or EventSelectors, but not both. If you apply AdvancedEventSelectors to a trail, any existing EventSelectors are overwritten. For more information about advanced event selectors, see Logging data events in the CloudTrail User Guide.

", + "PutEventSelectorsRequest$AdvancedEventSelectors": "

Specifies the settings for advanced event selectors. You can use advanced event selectors to log management events, data events for all resource types, and network activity events.

You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either AdvancedEventSelectors or EventSelectors, but not both. If you apply AdvancedEventSelectors to a trail, any existing EventSelectors are overwritten. For more information about advanced event selectors, see Logging data events and Logging network activity events in the CloudTrail User Guide.

", "PutEventSelectorsResponse$AdvancedEventSelectors": "

Specifies the advanced event selectors configured for your trail.

", "RestoreEventDataStoreResponse$AdvancedEventSelectors": "

The advanced event selectors that were used to select events.

", "SourceConfig$AdvancedEventSelectors": "

The advanced event selectors that are configured for the channel.

", @@ -328,7 +328,7 @@ } }, "DataResource": { - "base": "

Data events provide information about the resource operations performed on or within a resource itself. These are also known as data plane operations. You can specify up to 250 data resources for a trail.

Configure the DataResource to specify the resource type and resource ARNs for which you want to log data events.

You can specify the following resource types in your event selectors for your trail:

The total number of allowed data resources is 250. This number can be distributed between 1 and 5 event selectors, but the total cannot exceed 250 across all selectors for the trail.

If you are using advanced event selectors, the maximum total number of values for all conditions, across all advanced event selectors for the trail, is 500.

The following example demonstrates how logging works when you configure logging of all data events for an S3 bucket named bucket-1. In this example, the CloudTrail user specified an empty prefix, and the option to log both Read and Write data events.

  1. A user uploads an image file to bucket-1.

  2. The PutObject API operation is an Amazon S3 object-level API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified an S3 bucket with an empty prefix, events that occur on any object in that bucket are logged. The trail processes and logs the event.

  3. A user uploads an object to an Amazon S3 bucket named arn:aws:s3:::bucket-2.

  4. The PutObject API operation occurred for an object in an S3 bucket that the CloudTrail user didn't specify for the trail. The trail doesn’t log the event.

The following example demonstrates how logging works when you configure logging of Lambda data events for a Lambda function named MyLambdaFunction, but not for all Lambda functions.

  1. A user runs a script that includes a call to the MyLambdaFunction function and the MyOtherLambdaFunction function.

  2. The Invoke API operation on MyLambdaFunction is an Lambda API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified logging data events for MyLambdaFunction, any invocations of that function are logged. The trail processes and logs the event.

  3. The Invoke API operation on MyOtherLambdaFunction is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the Invoke operation for MyOtherLambdaFunction does not match the function specified for the trail. The trail doesn’t log the event.

", + "base": "

You can configure the DataResource in an EventSelector to log data events for the following three resource types:

To log data events for all other resource types including objects stored in directory buckets, you must use AdvancedEventSelectors. You must also use AdvancedEventSelectors if you want to filter on the eventName field.

Configure the DataResource to specify the resource type and resource ARNs for which you want to log data events.

The total number of allowed data resources is 250. This number can be distributed between 1 and 5 event selectors, but the total cannot exceed 250 across all selectors for the trail.

The following example demonstrates how logging works when you configure logging of all data events for a general purpose bucket named amzn-s3-demo-bucket1. In this example, the CloudTrail user specified an empty prefix, and the option to log both Read and Write data events.

  1. A user uploads an image file to amzn-s3-demo-bucket1.

  2. The PutObject API operation is an Amazon S3 object-level API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified an S3 bucket with an empty prefix, events that occur on any object in that bucket are logged. The trail processes and logs the event.

  3. A user uploads an object to an Amazon S3 bucket named arn:aws:s3:::amzn-s3-demo-bucket1.

  4. The PutObject API operation occurred for an object in an S3 bucket that the CloudTrail user didn't specify for the trail. The trail doesn’t log the event.

The following example demonstrates how logging works when you configure logging of Lambda data events for a Lambda function named MyLambdaFunction, but not for all Lambda functions.

  1. A user runs a script that includes a call to the MyLambdaFunction function and the MyOtherLambdaFunction function.

  2. The Invoke API operation on MyLambdaFunction is an Lambda API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified logging data events for MyLambdaFunction, any invocations of that function are logged. The trail processes and logs the event.

  3. The Invoke API operation on MyOtherLambdaFunction is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the Invoke operation for MyOtherLambdaFunction does not match the function specified for the trail. The trail doesn’t log the event.

", "refs": { "DataResources$member": null } @@ -336,13 +336,13 @@ "DataResourceValues": { "base": null, "refs": { - "DataResource$Values": "

An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type.

" + "DataResource$Values": "

An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type.

" } }, "DataResources": { "base": null, "refs": { - "EventSelector$DataResources": "

CloudTrail supports data event logging for Amazon S3 objects, Lambda functions, and Amazon DynamoDB tables with basic event selectors. You can specify up to 250 resources for an individual event selector, but the total number of data resources cannot exceed 250 across all event selectors in a trail. This limit does not apply if you configure resource logging for all data events.

For more information, see Data Events and Limits in CloudTrail in the CloudTrail User Guide.

" + "EventSelector$DataResources": "

CloudTrail supports data event logging for Amazon S3 objects in standard S3 buckets, Lambda functions, and Amazon DynamoDB tables with basic event selectors. You can specify up to 250 resources for an individual event selector, but the total number of data resources cannot exceed 250 across all event selectors in a trail. This limit does not apply if you configure resource logging for all data events.

For more information, see Data Events and Limits in CloudTrail in the CloudTrail User Guide.

To log data events for all other resource types including objects stored in directory buckets, you must use AdvancedEventSelectors. You must also use AdvancedEventSelectors if you want to filter on the eventName field.

" } }, "Date": { @@ -692,7 +692,7 @@ "base": null, "refs": { "GetEventSelectorsResponse$EventSelectors": "

The event selectors that are configured for the trail.

", - "PutEventSelectorsRequest$EventSelectors": "

Specifies the settings for your event selectors. You can configure up to five event selectors for a trail. You can use either EventSelectors or AdvancedEventSelectors in a PutEventSelectors request, but not both. If you apply EventSelectors to a trail, any existing AdvancedEventSelectors are overwritten.

", + "PutEventSelectorsRequest$EventSelectors": "

Specifies the settings for your event selectors. You can use event selectors to log management events and data events for the following resource types:

You can't use event selectors to log network activity events.

You can configure up to five event selectors for a trail. You can use either EventSelectors or AdvancedEventSelectors in a PutEventSelectors request, but not both. If you apply EventSelectors to a trail, any existing AdvancedEventSelectors are overwritten.

", "PutEventSelectorsResponse$EventSelectors": "

Specifies the event selectors configured for your trail.

" } }, @@ -1704,7 +1704,7 @@ "SelectorField": { "base": null, "refs": { - "AdvancedFieldSelector$Field": "

A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or events outside of Amazon Web Services, the field is used only for selecting events as filtering is not supported.

For CloudTrail management events, supported fields include readOnly, eventCategory, and eventSource.

For CloudTrail data events, supported fields include readOnly, eventCategory, eventName, resources.type, and resources.ARN.

For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or events outside of Amazon Web Services, the only supported field is eventCategory.

" + "AdvancedFieldSelector$Field": "

A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or events outside of Amazon Web Services, the field is used only for selecting events as filtering is not supported.

For CloudTrail management events, supported fields include eventCategory (required), eventSource, and readOnly.

For CloudTrail data events, supported fields include eventCategory (required), resources.type (required), eventName, readOnly, and resources.ARN.

For CloudTrail network activity events, supported fields include eventCategory (required), eventSource (required), eventName, errorCode, and vpcEndpointId.

For event data stores for CloudTrail Insights events, Config configuration items, Audit Manager evidence, or events outside of Amazon Web Services, the only supported field is eventCategory.

" } }, "SelectorName": { diff --git a/apis/ec2/2016-11-15/docs-2.json b/apis/ec2/2016-11-15/docs-2.json index 239bb2b49c4..77a63e0b7f5 100644 --- a/apis/ec2/2016-11-15/docs-2.json +++ b/apis/ec2/2016-11-15/docs-2.json @@ -18817,12 +18817,12 @@ "SecurityGroupReferencingSupportValue": { "base": null, "refs": { - "CreateTransitGatewayVpcAttachmentRequestOptions$SecurityGroupReferencingSupport": "

This parameter is in preview and may not be available for your account.

Enables you to reference a security group across VPCs attached to a transit gateway. Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.

If you don't enable or disable SecurityGroupReferencingSupport in the request, the attachment will inherit the security group referencing support setting on the transit gateway.

", - "ModifyTransitGatewayOptions$SecurityGroupReferencingSupport": "

This parameter is in preview and may not be available for your account.

Enables you to reference a security group across VPCs attached to a transit gateway. Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.

", - "ModifyTransitGatewayVpcAttachmentRequestOptions$SecurityGroupReferencingSupport": "

This parameter is in preview and may not be available for your account.

Enables you to reference a security group across VPCs attached to a transit gateway. Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.

", - "TransitGatewayOptions$SecurityGroupReferencingSupport": "

This parameter is in preview and may not be available for your account.

Enables you to reference a security group across VPCs attached to a transit gateway. Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.

", - "TransitGatewayRequestOptions$SecurityGroupReferencingSupport": "

This parameter is in preview and may not be available for your account.

Enables you to reference a security group across VPCs attached to a transit gateway. Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.

", - "TransitGatewayVpcAttachmentOptions$SecurityGroupReferencingSupport": "

This parameter is in preview and may not be available for your account.

Enables you to reference a security group across VPCs attached to a transit gateway. Use this option to simplify security group management and control of instance-to-instance traffic across VPCs that are connected by transit gateway. You can also use this option to migrate from VPC peering (which was the only option that supported security group referencing) to transit gateways (which now also support security group referencing). This option is disabled by default and there are no additional costs to use this feature.

" + "CreateTransitGatewayVpcAttachmentRequestOptions$SecurityGroupReferencingSupport": "

Enables you to reference a security group across VPCs attached to a transit gateway to simplify security group management.

This option is disabled by default.

If you don't enable or disable SecurityGroupReferencingSupport in the request, the attachment will inherit the security group referencing support setting on the transit gateway.

For more information about security group referencing, see Security group referencing in the Amazon Web Services Transit Gateways Guide.

", + "ModifyTransitGatewayOptions$SecurityGroupReferencingSupport": "

Enables you to reference a security group across VPCs attached to a transit gateway to simplify security group management.

This option is disabled by default.

For more information about security group referencing, see Security group referencing in the Amazon Web Services Transit Gateways Guide.

", + "ModifyTransitGatewayVpcAttachmentRequestOptions$SecurityGroupReferencingSupport": "

Enables you to reference a security group across VPCs attached to a transit gateway to simplify security group management.

This option is disabled by default.

For more information about security group referencing, see Security group referencing in the Amazon Web Services Transit Gateways Guide.

", + "TransitGatewayOptions$SecurityGroupReferencingSupport": "

Enables you to reference a security group across VPCs attached to a transit gateway to simplify security group management.

This option is enabled by default.

For more information about security group referencing, see Security group referencing in the Amazon Web Services Transit Gateways Guide.

", + "TransitGatewayRequestOptions$SecurityGroupReferencingSupport": "

Enables you to reference a security group across VPCs attached to a transit gateway to simplify security group management.

This option is disabled by default.

For more information about security group referencing, see Security group referencing in the Amazon Web Services Transit Gateways Guide.

", + "TransitGatewayVpcAttachmentOptions$SecurityGroupReferencingSupport": "

Enables you to reference a security group across VPCs attached to a transit gateway to simplify security group management.

This option is disabled by default.

For more information about security group referencing, see Security group referencing in the Amazon Web Services Transit Gateways Guide.

" } }, "SecurityGroupRule": { diff --git a/apis/fsx/2018-03-01/docs-2.json b/apis/fsx/2018-03-01/docs-2.json index 9cc606ce271..bd4e2955daf 100644 --- a/apis/fsx/2018-03-01/docs-2.json +++ b/apis/fsx/2018-03-01/docs-2.json @@ -186,14 +186,14 @@ "ArchivePath": { "base": null, "refs": { - "CompletionReport$Path": "

Required if Enabled is set to true. Specifies the location of the report on the file system's linked S3 data repository. An absolute path that defines where the completion report will be stored in the destination location. The Path you provide must be located within the file system’s ExportPath. An example Path value is \"s3://myBucket/myExportPath/optionalPrefix\". The report provides the following information for each file in the report: FilePath, FileStatus, and ErrorCode.

", - "CreateDataRepositoryAssociationRequest$DataRepositoryPath": "

The path to the Amazon S3 data repository that will be linked to the file system. The path can be an S3 bucket or prefix in the format s3://myBucket/myPrefix/. This path specifies where in the S3 data repository files will be imported from or exported to.

", + "CompletionReport$Path": "

Required if Enabled is set to true. Specifies the location of the report on the file system's linked S3 data repository. An absolute path that defines where the completion report will be stored in the destination location. The Path you provide must be located within the file system’s ExportPath. An example Path value is \"s3://amzn-s3-demo-bucket/myExportPath/optionalPrefix\". The report provides the following information for each file in the report: FilePath, FileStatus, and ErrorCode.

", + "CreateDataRepositoryAssociationRequest$DataRepositoryPath": "

The path to the Amazon S3 data repository that will be linked to the file system. The path can be an S3 bucket or prefix in the format s3://bucket-name/prefix/ (where prefix is optional). This path specifies where in the S3 data repository files will be imported from or exported to.

", "CreateFileSystemLustreConfiguration$ImportPath": "

(Optional) The path to the Amazon S3 bucket (including the optional prefix) that you're using as the data repository for your Amazon FSx for Lustre file system. The root of your FSx for Lustre file system will be mapped to the root of the Amazon S3 bucket you select. An example is s3://import-bucket/optional-prefix. If you specify a prefix after the Amazon S3 bucket name, only object keys with that prefix are loaded into the file system.

This parameter is not supported for file systems with a data repository association.

", "CreateFileSystemLustreConfiguration$ExportPath": "

(Optional) Specifies the path in the Amazon S3 bucket where the root of your Amazon FSx file system is exported. The path must use the same Amazon S3 bucket as specified in ImportPath. You can provide an optional prefix to which new and changed data is to be exported from your Amazon FSx for Lustre file system. If an ExportPath value is not provided, Amazon FSx sets a default export path, s3://import-bucket/FSxLustre[creation-timestamp]. The timestamp is in UTC format, for example s3://import-bucket/FSxLustre20181105T222312Z.

The Amazon S3 export bucket must be the same as the import bucket specified by ImportPath. If you specify only a bucket name, such as s3://import-bucket, you get a 1:1 mapping of file system objects to S3 bucket objects. This mapping means that the input data in S3 is overwritten on export. If you provide a custom prefix in the export path, such as s3://import-bucket/[custom-optional-prefix], Amazon FSx exports the contents of your file system to that export prefix in the Amazon S3 bucket.

This parameter is not supported for file systems with a data repository association.

", - "DataRepositoryAssociation$DataRepositoryPath": "

The path to the data repository that will be linked to the cache or file system.

", + "DataRepositoryAssociation$DataRepositoryPath": "

The path to the data repository that will be linked to the cache or file system.

", "DataRepositoryConfiguration$ImportPath": "

The import path to the Amazon S3 bucket (and optional prefix) that you're using as the data repository for your FSx for Lustre file system, for example s3://import-bucket/optional-prefix. If a prefix is specified after the Amazon S3 bucket name, only object keys with that prefix are loaded into the file system.

", "DataRepositoryConfiguration$ExportPath": "

The export path to the Amazon S3 bucket (and prefix) that you are using to store new and changed Lustre file system files in S3.

", - "FileCacheDataRepositoryAssociation$DataRepositoryPath": "

The path to the S3 or NFS data repository that links to the cache. You must provide one of the following paths:

" + "FileCacheDataRepositoryAssociation$DataRepositoryPath": "

The path to the S3 or NFS data repository that links to the cache. You must provide one of the following paths:

" } }, "AssociateFileSystemAliasesRequest": { @@ -811,7 +811,7 @@ "DataRepositoryTaskPaths": { "base": null, "refs": { - "CreateDataRepositoryTaskRequest$Paths": "

A list of paths for the data repository task to use when the task is processed. If a path that you provide isn't valid, the task fails. If you don't provide paths, the default behavior is to export all files to S3 (for export tasks), import all files from S3 (for import tasks), or release all exported files that meet the last accessed time criteria (for release tasks).

", + "CreateDataRepositoryTaskRequest$Paths": "

A list of paths for the data repository task to use when the task is processed. If a path that you provide isn't valid, the task fails. If you don't provide paths, the default behavior is to export all files to S3 (for export tasks), import all files from S3 (for import tasks), or release all exported files that meet the last accessed time criteria (for release tasks).

", "DataRepositoryTask$Paths": "

An array of paths that specify the data for the data repository task to process. For example, in an EXPORT_TO_REPOSITORY task, the paths specify which data to export to the linked data repository.

(Default) If Paths is not specified, Amazon FSx uses the file system root directory.

" } }, diff --git a/gems/aws-partitions/CHANGELOG.md b/gems/aws-partitions/CHANGELOG.md index 26cc1aab86c..d5c3b1c070e 100644 --- a/gems/aws-partitions/CHANGELOG.md +++ b/gems/aws-partitions/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.979.0 (2024-09-25) +------------------ + +* Feature - Updated the partitions source data the determines the AWS service regions and endpoints. + 1.978.0 (2024-09-24) ------------------ diff --git a/gems/aws-partitions/VERSION b/gems/aws-partitions/VERSION index 185ca43fd69..48788e35c5f 100644 --- a/gems/aws-partitions/VERSION +++ b/gems/aws-partitions/VERSION @@ -1 +1 @@ -1.978.0 +1.979.0 diff --git a/gems/aws-partitions/partitions.json b/gems/aws-partitions/partitions.json index a55056557b3..a7a3389535f 100644 --- a/gems/aws-partitions/partitions.json +++ b/gems/aws-partitions/partitions.json @@ -20913,6 +20913,7 @@ "vpc-lattice" : { "endpoints" : { "af-south-1" : { }, + "ap-east-1" : { }, "ap-northeast-1" : { }, "ap-northeast-2" : { }, "ap-south-1" : { }, @@ -20925,6 +20926,7 @@ "eu-west-1" : { }, "eu-west-2" : { }, "eu-west-3" : { }, + "me-south-1" : { }, "sa-east-1" : { }, "us-east-1" : { }, "us-east-2" : { }, diff --git a/gems/aws-sdk-cloudtrail/CHANGELOG.md b/gems/aws-sdk-cloudtrail/CHANGELOG.md index 2f8c15d0a2b..8543984b0cb 100644 --- a/gems/aws-sdk-cloudtrail/CHANGELOG.md +++ b/gems/aws-sdk-cloudtrail/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.92.0 (2024-09-25) +------------------ + +* Feature - Doc-only update for CloudTrail network activity events release (in preview) + 1.91.0 (2024-09-24) ------------------ diff --git a/gems/aws-sdk-cloudtrail/VERSION b/gems/aws-sdk-cloudtrail/VERSION index 6979a6c0661..7f229af9647 100644 --- a/gems/aws-sdk-cloudtrail/VERSION +++ b/gems/aws-sdk-cloudtrail/VERSION @@ -1 +1 @@ -1.91.0 +1.92.0 diff --git a/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail.rb b/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail.rb index 84b9a248157..84ed12adcf7 100644 --- a/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail.rb +++ b/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail.rb @@ -54,7 +54,7 @@ module Plugins autoload :EndpointProvider, 'aws-sdk-cloudtrail/endpoint_provider' autoload :Endpoints, 'aws-sdk-cloudtrail/endpoints' - GEM_VERSION = '1.91.0' + GEM_VERSION = '1.92.0' end diff --git a/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/client.rb b/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/client.rb index 912277b290f..b72895ed039 100644 --- a/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/client.rb +++ b/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/client.rb @@ -1535,25 +1535,32 @@ def get_event_data_store(params = {}, options = {}) # the following: # # * If your event selector includes read-only events, write-only events, - # or all events. This applies to both management events and data - # events. + # or all events. This applies to management events, data events, and + # network activity events. # # * If your event selector includes management events. # + # * If your event selector includes network activity events, the event + # sources for which you are logging network activity events. + # # * If your event selector includes data events, the resources on which # you are logging data events. # - # For more information about logging management and data events, see the - # following topics in the *CloudTrail User Guide*: + # For more information about logging management, data, and network + # activity events, see the following topics in the *CloudTrail User + # Guide*: # # * [Logging management events][1] # # * [Logging data events][2] # + # * [Logging network activity events][3] + # # # # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html + # [3]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html # # @option params [required, String] :trail_name # Specifies the name of the trail or trail ARN. If you specify a trail @@ -2628,16 +2635,33 @@ def lookup_events(params = {}, options = {}) req.send_request(options) end - # Configures an event selector or advanced event selectors for your - # trail. Use event selectors or advanced event selectors to specify - # management and data event settings for your trail. If you want your - # trail to log Insights events, be sure the event selector enables - # logging of the Insights event types you want configured for your - # trail. For more information about logging Insights events, see - # [Logging Insights events][1] in the *CloudTrail User Guide*. By - # default, trails created without specific event selectors are - # configured to log all read and write management events, and no data - # events. + # Configures event selectors (also referred to as *basic event + # selectors*) or advanced event selectors for your trail. You can use + # either `AdvancedEventSelectors` or `EventSelectors`, but not both. If + # you apply `AdvancedEventSelectors` to a trail, any existing + # `EventSelectors` are overwritten. + # + # You can use `AdvancedEventSelectors` to log management events, data + # events for all resource types, and network activity events. + # + # You can use `EventSelectors` to log management events and data events + # for the following resource types: + # + # * `AWS::DynamoDB::Table` + # + # * `AWS::Lambda::Function` + # + # * `AWS::S3::Object` + # + # You can't use `EventSelectors` to log network activity events. + # + # If you want your trail to log Insights events, be sure the event + # selector or advanced event selector enables logging of the Insights + # event types you want configured for your trail. For more information + # about logging Insights events, see [Logging Insights events][1] in the + # *CloudTrail User Guide*. By default, trails created without specific + # event selectors are configured to log all read and write management + # events, and no data events or network activity events. # # When an event occurs in your account, CloudTrail evaluates the event # selectors or advanced event selectors in all trails. For each trail, @@ -2648,7 +2672,7 @@ def lookup_events(params = {}, options = {}) # Example # # 1. You create an event selector for a trail and specify that you want - # write-only events. + # to log write-only events. # # 2. The EC2 `GetConsoleOutput` and `RunInstances` API operations occur # in your account. @@ -2666,25 +2690,22 @@ def lookup_events(params = {}, options = {}) # which the trail was created; otherwise, an # `InvalidHomeRegionException` exception is thrown. # - # You can configure up to five event selectors for each trail. For more - # information, see [Logging management events][2], [Logging data - # events][3], and [Quotas in CloudTrail][4] in the *CloudTrail User - # Guide*. + # You can configure up to five event selectors for each trail. # # You can add advanced event selectors, and conditions for your advanced # event selectors, up to a maximum of 500 values for all conditions and - # selectors on a trail. You can use either `AdvancedEventSelectors` or - # `EventSelectors`, but not both. If you apply `AdvancedEventSelectors` - # to a trail, any existing `EventSelectors` are overwritten. For more - # information about advanced event selectors, see [Logging data - # events][3] in the *CloudTrail User Guide*. + # selectors on a trail. For more information, see [Logging management + # events][2], [Logging data events][3], [Logging network activity + # events][4], and [Quotas in CloudTrail][5] in the *CloudTrail User + # Guide*. # # # # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-insights-events-with-cloudtrail.html # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html # [3]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html - # [4]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/WhatIsCloudTrail-Limits.html + # [4]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html + # [5]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/WhatIsCloudTrail-Limits.html # # @option params [required, String] :trail_name # Specifies the name of the trail or trail ARN. If you specify a trail @@ -2707,25 +2728,42 @@ def lookup_events(params = {}, options = {}) # `arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail` # # @option params [Array] :event_selectors - # Specifies the settings for your event selectors. You can configure up - # to five event selectors for a trail. You can use either - # `EventSelectors` or `AdvancedEventSelectors` in a `PutEventSelectors` - # request, but not both. If you apply `EventSelectors` to a trail, any - # existing `AdvancedEventSelectors` are overwritten. + # Specifies the settings for your event selectors. You can use event + # selectors to log management events and data events for the following + # resource types: + # + # * `AWS::DynamoDB::Table` + # + # * `AWS::Lambda::Function` + # + # * `AWS::S3::Object` + # + # You can't use event selectors to log network activity events. + # + # You can configure up to five event selectors for a trail. You can use + # either `EventSelectors` or `AdvancedEventSelectors` in a + # `PutEventSelectors` request, but not both. If you apply + # `EventSelectors` to a trail, any existing `AdvancedEventSelectors` are + # overwritten. # # @option params [Array] :advanced_event_selectors - # Specifies the settings for advanced event selectors. You can add - # advanced event selectors, and conditions for your advanced event - # selectors, up to a maximum of 500 values for all conditions and + # Specifies the settings for advanced event selectors. You can use + # advanced event selectors to log management events, data events for all + # resource types, and network activity events. + # + # You can add advanced event selectors, and conditions for your advanced + # event selectors, up to a maximum of 500 values for all conditions and # selectors on a trail. You can use either `AdvancedEventSelectors` or # `EventSelectors`, but not both. If you apply `AdvancedEventSelectors` # to a trail, any existing `EventSelectors` are overwritten. For more # information about advanced event selectors, see [Logging data - # events][1] in the *CloudTrail User Guide*. + # events][1] and [Logging network activity events][2] in the *CloudTrail + # User Guide*. # # # # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html + # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html # # @return [Types::PutEventSelectorsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods: # @@ -3111,7 +3149,8 @@ def restore_event_data_store(params = {}, options = {}) # Starts the ingestion of live events on an event data store specified # as either an ARN or the ID portion of the ARN. To start ingestion, the # event data store `Status` must be `STOPPED_INGESTION` and the - # `eventCategory` must be `Management`, `Data`, or `ConfigurationItem`. + # `eventCategory` must be `Management`, `Data`, `NetworkActivity`, or + # `ConfigurationItem`. # # @option params [required, String] :event_data_store # The ARN (or ID suffix of the ARN) of the event data store for which @@ -3323,7 +3362,8 @@ def start_query(params = {}, options = {}) # Stops the ingestion of live events on an event data store specified as # either an ARN or the ID portion of the ARN. To stop ingestion, the # event data store `Status` must be `ENABLED` and the `eventCategory` - # must be `Management`, `Data`, or `ConfigurationItem`. + # must be `Management`, `Data`, `NetworkActivity`, or + # `ConfigurationItem`. # # @option params [required, String] :event_data_store # The ARN (or ID suffix of the ARN) of the event data store for which @@ -3491,9 +3531,9 @@ def update_channel(params = {}, options = {}) # `TerminationProtection` is enabled. # # For event data stores for CloudTrail events, `AdvancedEventSelectors` - # includes or excludes management or data events in your event data - # store. For more information about `AdvancedEventSelectors`, see - # [AdvancedEventSelectors][1]. + # includes or excludes management, data, or network activity events in + # your event data store. For more information about + # `AdvancedEventSelectors`, see [AdvancedEventSelectors][1]. # # For event data stores for CloudTrail Insights events, Config # configuration items, Audit Manager evidence, or non-Amazon Web @@ -3918,7 +3958,7 @@ def build_request(operation_name, params = {}) tracer: tracer ) context[:gem_name] = 'aws-sdk-cloudtrail' - context[:gem_version] = '1.91.0' + context[:gem_version] = '1.92.0' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/types.rb b/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/types.rb index ab5f14db035..9891f8d6bd8 100644 --- a/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/types.rb +++ b/gems/aws-sdk-cloudtrail/lib/aws-sdk-cloudtrail/types.rb @@ -81,11 +81,12 @@ class AddTagsRequest < Struct.new( class AddTagsResponse < Aws::EmptyStructure; end # Advanced event selectors let you create fine-grained selectors for - # CloudTrail management and data events. They help you control costs by - # logging only those events that are important to you. For more - # information about advanced event selectors, see [Logging management - # events][1] and [Logging data events][2] in the *CloudTrail User - # Guide*. + # CloudTrail management, data, and network activity events. They help + # you control costs by logging only those events that are important to + # you. For more information about configuring advanced event selectors, + # see the [Logging data events][1], [Logging network activity + # events][2], and [Logging management events][3] topics in the + # *CloudTrail User Guide*. # # You cannot apply both event selectors and advanced event selectors to # a trail. @@ -110,6 +111,25 @@ class AddTagsResponse < Aws::EmptyStructure; end # # * `resources.ARN` # + # **Supported CloudTrail event record fields for network activity + # events** + # + # Network activity events is in preview release for CloudTrail and is + # subject to change. + # + # + # + # * `eventCategory` (required) + # + # * `eventSource` (required) + # + # * `eventName` + # + # * `errorCode` - The only valid value for `errorCode` is + # `VpceAccessDenied`. + # + # * `vpcEndpointId` + # # For event data stores for CloudTrail Insights events, Config # configuration items, Audit Manager evidence, or events outside of # Amazon Web Services, the only supported field is `eventCategory`. @@ -118,8 +138,9 @@ class AddTagsResponse < Aws::EmptyStructure; end # # # - # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html - # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html + # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html + # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html + # [3]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html # # @!attribute [rw] name # An optional, descriptive name for an advanced event selector, such @@ -149,38 +170,68 @@ class AdvancedEventSelector < Struct.new( # filtering is not supported. # # For CloudTrail management events, supported fields include - # `readOnly`, `eventCategory`, and `eventSource`. + # `eventCategory` (required), `eventSource`, and `readOnly`. + # + # For CloudTrail data events, supported fields include `eventCategory` + # (required), `resources.type` (required), `eventName`, `readOnly`, + # and `resources.ARN`. # - # For CloudTrail data events, supported fields include `readOnly`, - # `eventCategory`, `eventName`, `resources.type`, and `resources.ARN`. + # For CloudTrail network activity events, supported fields include + # `eventCategory` (required), `eventSource` (required), `eventName`, + # `errorCode`, and `vpcEndpointId`. # # For event data stores for CloudTrail Insights events, Config # configuration items, Audit Manager evidence, or events outside of # Amazon Web Services, the only supported field is `eventCategory`. # - # * readOnly - Optional. Can be set to `Equals` - # a value of `true` or `false`. If you do not add this field, - # CloudTrail logs both `read` and `write` events. A value of `true` - # logs only `read` events. A value of `false` logs only `write` - # events. + # * readOnly - This is an optional field that is + # only used for management events and data events. This field can be + # set to `Equals` with a value of `true` or `false`. If you do not + # add this field, CloudTrail logs both `read` and `write` events. A + # value of `true` logs only `read` events. A value of `false` logs + # only `write` events. + # + # * eventSource - This field is only used for + # management events and network activity events. + # + # For management events, this is an optional field that can be set + # to `NotEquals` `kms.amazonaws.com` to exclude KMS management + # events, or `NotEquals` `rdsdata.amazonaws.com` to exclude RDS + # management events. + # + # For network activity events, this is a required field that only + # uses the `Equals` operator. Set this field to the event source for + # which you want to log network activity events. If you want to log + # network activity events for multiple event sources, you must + # create a separate field selector for each event source. + # + # The following are valid values for network activity events: # - # * eventSource - For filtering management - # events only. This can be set to `NotEquals` `kms.amazonaws.com` or - # `NotEquals` `rdsdata.amazonaws.com`. + # * `cloudtrail.amazonaws.com` # - # * eventName - Can use any operator. You can - # use it to filter in or filter out any data event logged to - # CloudTrail, such as `PutBucket` or `GetSnapshotBlock`. You can - # have multiple values for this field, separated by commas. + # * `ec2.amazonaws.com` # - # * eventCategory - This is required and must be - # set to `Equals`. + # * `kms.amazonaws.com` + # + # * `secretsmanager.amazonaws.com` + # + # * eventName - This is an optional field that + # is only used for data events and network activity events. You can + # use any operator with `eventName`. You can use it to filter in or + # filter out specific events. You can have multiple values for this + # field, separated by commas. + # + # * eventCategory - This field is required and + # must be set to `Equals`. # # * For CloudTrail management events, the value must be # `Management`. # # * For CloudTrail data events, the value must be `Data`. # + # * For CloudTrail network activity events, the value must be + # `NetworkActivity`. + # # The following are used only for event data stores: # # * For CloudTrail Insights events, the value must be `Insight`. @@ -193,15 +244,17 @@ class AdvancedEventSelector < Struct.new( # * For non-Amazon Web Services events, the value must be # `ActivityAuditLog`. # + # * errorCode - This field is only used to filter + # CloudTrail network activity events and is optional. This is the + # error code to filter on. Currently, the only valid `errorCode` is + # `VpceAccessDenied`. `errorCode` can only use the `Equals` + # operator. + # # * resources.type - This field is required for # CloudTrail data events. `resources.type` can only use the `Equals` - # operator, and the value can be one of the following: - # - # * `AWS::DynamoDB::Table` - # - # * `AWS::Lambda::Function` + # operator. # - # * `AWS::S3::Object` + # The value can be one of the following: # # * `AWS::AppConfig::Configuration` # @@ -209,6 +262,10 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::Bedrock::AgentAlias` # + # * `AWS::Bedrock::FlowAlias` + # + # * `AWS::Bedrock::Guardrail` + # # * `AWS::Bedrock::KnowledgeBase` # # * `AWS::Cassandra::Table` @@ -217,6 +274,8 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::CloudTrail::Channel` # + # * `AWS::CloudWatch::Metric` + # # * `AWS::CodeWhisperer::Customization` # # * `AWS::CodeWhisperer::Profile` @@ -225,6 +284,8 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::DynamoDB::Stream` # + # * `AWS::DynamoDB::Table` + # # * `AWS::EC2::Snapshot` # # * `AWS::EMRWAL::Workspace` @@ -253,8 +314,16 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::KendraRanking::ExecutionPlan` # + # * `AWS::Kinesis::Stream` + # + # * `AWS::Kinesis::StreamConsumer` + # # * `AWS::KinesisVideo::Stream` # + # * `AWS::Lambda::Function` + # + # * `AWS::MachineLearning::MlModel` + # # * `AWS::ManagedBlockchain::Network` # # * `AWS::ManagedBlockchain::Node` @@ -263,8 +332,18 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::NeptuneGraph::Graph` # + # * `AWS::One::UKey` + # + # * `AWS::One::User` + # + # * `AWS::PaymentCryptography::Alias` + # + # * `AWS::PaymentCryptography::Key` + # # * `AWS::PCAConnectorAD::Connector` # + # * `AWS::PCAConnectorSCEP::Connector` + # # * `AWS::QApps:QApp` # # * `AWS::QBusiness::Application` @@ -277,8 +356,14 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::RDS::DBCluster` # + # * `AWS::RUM::AppMonitor` + # # * `AWS::S3::AccessPoint` # + # * `AWS::S3::Object` + # + # * `AWS::S3Express::Object` + # # * `AWS::S3ObjectLambda::AccessPoint` # # * `AWS::S3Outposts::Object` @@ -305,6 +390,8 @@ class AdvancedEventSelector < Struct.new( # # * `AWS::SSMMessages::ControlChannel` # + # * `AWS::StepFunctions::StateMachine` + # # * `AWS::SWF::Domain` # # * `AWS::ThinClient::Device` @@ -320,509 +407,34 @@ class AdvancedEventSelector < Struct.new( # * `AWS::XRay::Trace` # # You can have only one `resources.type` field per selector. To log - # data events on more than one resource type, add another selector. + # events on more than one resource type, add another selector. # - # * resources.ARN - You can use any operator - # with `resources.ARN`, but if you use `Equals` or `NotEquals`, the - # value must exactly match the ARN of a valid resource of the type - # you've specified in the template as the value of resources.type. + # * resources.ARN - The `resources.ARN` is an + # optional field for data events. You can use any operator with + # `resources.ARN`, but if you use `Equals` or `NotEquals`, the value + # must exactly match the ARN of a valid resource of the type you've + # specified in the template as the value of resources.type. To log + # all data events for all objects in a specific S3 bucket, use the + # `StartsWith` operator, and include only the bucket ARN as the + # matching value. + # + # For information about filtering data events on the `resources.ARN` + # field, see [Filtering data events by resources.ARN][1] in the + # *CloudTrail User Guide*. # # You can't use the `resources.ARN` field to filter resource types # that do not have ARNs. # # # - # The `resources.ARN` field can be set one of the following. - # - # If resources.type equals `AWS::S3::Object`, the ARN must be in one - # of the following formats. To log all data events for all objects - # in a specific S3 bucket, use the `StartsWith` operator, and - # include only the bucket ARN as the matching value. - # - # The trailing slash is intentional; do not exclude it. Replace the - # text between less than and greater than symbols (<>) with - # resource-specific information. - # - # * `arn::s3:::/` - # - # * `arn::s3::://` - # - # When resources.type equals `AWS::DynamoDB::Table`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::dynamodb:::table/` - # - # ^ - # - # When resources.type equals `AWS::Lambda::Function`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::lambda:::function:` - # - # ^ - # - # When resources.type equals `AWS::AppConfig::Configuration`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::appconfig:::application//environment//configuration/` - # - # ^ - # - # When resources.type equals `AWS::B2BI::Transformer`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::b2bi:::transformer/` - # - # ^ - # - # When resources.type equals `AWS::Bedrock::AgentAlias`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::bedrock:::agent-alias//` - # - # ^ - # - # When resources.type equals `AWS::Bedrock::KnowledgeBase`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::bedrock:::knowledge-base/` - # - # ^ - # - # When resources.type equals `AWS::Cassandra::Table`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::cassandra:::/keyspace//table/` - # - # ^ - # - # When resources.type equals `AWS::CloudFront::KeyValueStore`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::cloudfront:::key-value-store/` - # - # ^ - # - # When resources.type equals `AWS::CloudTrail::Channel`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::cloudtrail:::channel/` - # - # ^ - # - # When resources.type equals `AWS::CodeWhisperer::Customization`, - # and the operator is set to `Equals` or `NotEquals`, the ARN must - # be in the following format: - # - # * `arn::codewhisperer:::customization/` - # - # ^ - # - # When resources.type equals `AWS::CodeWhisperer::Profile`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::codewhisperer:::profile/` - # - # ^ - # - # When resources.type equals `AWS::Cognito::IdentityPool`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::cognito-identity:::identitypool/` - # - # ^ - # - # When `resources.type` equals `AWS::DynamoDB::Stream`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::dynamodb:::table//stream/` - # - # ^ - # - # When `resources.type` equals `AWS::EC2::Snapshot`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::ec2:::snapshot/` - # - # ^ - # - # When `resources.type` equals `AWS::EMRWAL::Workspace`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::emrwal:::workspace/` - # - # ^ - # - # When `resources.type` equals `AWS::FinSpace::Environment`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::finspace:::environment/` - # - # ^ - # - # When `resources.type` equals `AWS::Glue::Table`, and the operator - # is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::glue:::table//` - # - # ^ - # - # When `resources.type` equals - # `AWS::GreengrassV2::ComponentVersion`, and the operator is set to - # `Equals` or `NotEquals`, the ARN must be in the following format: - # - # * `arn::greengrass:::components/` - # - # ^ - # - # When `resources.type` equals `AWS::GreengrassV2::Deployment`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::greengrass:::deployments/:guardduty:::detector/` - # - # ^ - # - # When `resources.type` equals `AWS::IoT::Certificate`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::iot:::cert/` - # - # ^ - # - # When `resources.type` equals `AWS::IoT::Thing`, and the operator - # is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::iot:::thing/` - # - # ^ - # - # When `resources.type` equals `AWS::IoTSiteWise::Asset`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::iotsitewise:::asset/` - # - # ^ - # - # When `resources.type` equals `AWS::IoTSiteWise::TimeSeries`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::iotsitewise:::timeseries/` - # - # ^ - # - # When `resources.type` equals `AWS::IoTTwinMaker::Entity`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::iottwinmaker:::workspace//entity/` + # * vpcEndpointId - This field is only used to + # filter CloudTrail network activity events and is optional. This + # field identifies the VPC endpoint that the request passed through. + # You can use any operator with `vpcEndpointId`. # - # ^ # - # When `resources.type` equals `AWS::IoTTwinMaker::Workspace`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: # - # * `arn::iottwinmaker:::workspace/` - # - # ^ - # - # When `resources.type` equals `AWS::KendraRanking::ExecutionPlan`, - # and the operator is set to `Equals` or `NotEquals`, the ARN must - # be in the following format: - # - # * `arn::kendra-ranking:::rescore-execution-plan/` - # - # ^ - # - # When `resources.type` equals `AWS::KinesisVideo::Stream`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::kinesisvideo:::stream//` - # - # ^ - # - # When `resources.type` equals `AWS::ManagedBlockchain::Network`, - # and the operator is set to `Equals` or `NotEquals`, the ARN must - # be in the following format: - # - # * `arn::managedblockchain:::networks/` - # - # ^ - # - # When `resources.type` equals `AWS::ManagedBlockchain::Node`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::managedblockchain:::nodes/` - # - # ^ - # - # When `resources.type` equals `AWS::MedicalImaging::Datastore`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::medical-imaging:::datastore/` - # - # ^ - # - # When `resources.type` equals `AWS::NeptuneGraph::Graph`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::neptune-graph:::graph/` - # - # ^ - # - # When `resources.type` equals `AWS::PCAConnectorAD::Connector`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::pca-connector-ad:::connector/` - # - # ^ - # - # When `resources.type` equals `AWS::QApps:QApp`, and the operator - # is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::qapps:::application//qapp/` - # - # ^ - # - # When `resources.type` equals `AWS::QBusiness::Application`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::qbusiness:::application/` - # - # ^ - # - # When `resources.type` equals `AWS::QBusiness::DataSource`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::qbusiness:::application//index//data-source/` - # - # ^ - # - # When `resources.type` equals `AWS::QBusiness::Index`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::qbusiness:::application//index/` - # - # ^ - # - # When `resources.type` equals `AWS::QBusiness::WebExperience`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::qbusiness:::application//web-experience/` - # - # ^ - # - # When `resources.type` equals `AWS::RDS::DBCluster`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::rds:::cluster/` - # - # ^ - # - # When `resources.type` equals `AWS::S3::AccessPoint`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in one - # of the following formats. To log events on all objects in an S3 - # access point, we recommend that you use only the access point ARN, - # don’t include the object path, and use the `StartsWith` or - # `NotStartsWith` operators. - # - # * `arn::s3:::accesspoint/` - # - # * `arn::s3:::accesspoint//object/` - # - # When `resources.type` equals `AWS::S3ObjectLambda::AccessPoint`, - # and the operator is set to `Equals` or `NotEquals`, the ARN must - # be in the following format: - # - # * `arn::s3-object-lambda:::accesspoint/` - # - # ^ - # - # When `resources.type` equals `AWS::S3Outposts::Object`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::s3-outposts:::` - # - # ^ - # - # When `resources.type` equals `AWS::SageMaker::Endpoint`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::sagemaker:::endpoint/` - # - # ^ - # - # When `resources.type` equals - # `AWS::SageMaker::ExperimentTrialComponent`, and the operator is - # set to `Equals` or `NotEquals`, the ARN must be in the following - # format: - # - # * `arn::sagemaker:::experiment-trial-component/` - # - # ^ - # - # When `resources.type` equals `AWS::SageMaker::FeatureGroup`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::sagemaker:::feature-group/` - # - # ^ - # - # When `resources.type` equals `AWS::SCN::Instance`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::scn:::instance/` - # - # ^ - # - # When `resources.type` equals `AWS::ServiceDiscovery::Namespace`, - # and the operator is set to `Equals` or `NotEquals`, the ARN must - # be in the following format: - # - # * `arn::servicediscovery:::namespace/` - # - # ^ - # - # When `resources.type` equals `AWS::ServiceDiscovery::Service`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::servicediscovery:::service/` - # - # ^ - # - # When `resources.type` equals `AWS::SNS::PlatformEndpoint`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::sns:::endpoint///` - # - # ^ - # - # When `resources.type` equals `AWS::SNS::Topic`, and the operator - # is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::sns:::` - # - # ^ - # - # When `resources.type` equals `AWS::SQS::Queue`, and the operator - # is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::sqs:::` - # - # ^ - # - # When `resources.type` equals `AWS::SSM::ManagedNode`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in one - # of the following formats: - # - # * `arn::ssm:::managed-instance/` - # - # * `arn::ec2:::instance/` - # - # When `resources.type` equals `AWS::SSMMessages::ControlChannel`, - # and the operator is set to `Equals` or `NotEquals`, the ARN must - # be in the following format: - # - # * `arn::ssmmessages:::control-channel/` - # - # ^ - # - # When `resources.type` equals `AWS::SWF::Domain`, and the operator - # is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::swf:::domain/` - # - # ^ - # - # When `resources.type` equals `AWS::ThinClient::Device`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::thinclient:::device/` - # - # ^ - # - # When `resources.type` equals `AWS::ThinClient::Environment`, and - # the operator is set to `Equals` or `NotEquals`, the ARN must be in - # the following format: - # - # * `arn::thinclient:::environment/` - # - # ^ - # - # When `resources.type` equals `AWS::Timestream::Database`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::timestream:::database/` - # - # ^ - # - # When `resources.type` equals `AWS::Timestream::Table`, and the - # operator is set to `Equals` or `NotEquals`, the ARN must be in the - # following format: - # - # * `arn::timestream:::database//table/` - # - # ^ - # - # When resources.type equals - # `AWS::VerifiedPermissions::PolicyStore`, and the operator is set - # to `Equals` or `NotEquals`, the ARN must be in the following - # format: - # - # * `arn::verifiedpermissions:::policy-store/` - # - # ^ + # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn # @return [String] # # @!attribute [rw] equals @@ -1591,16 +1203,8 @@ class CreateTrailResponse < Struct.new( include Aws::Structure end - # Data events provide information about the resource operations - # performed on or within a resource itself. These are also known as data - # plane operations. You can specify up to 250 data resources for a - # trail. - # - # Configure the `DataResource` to specify the resource type and resource - # ARNs for which you want to log data events. - # - # You can specify the following resource types in your event selectors - # for your trail: + # You can configure the `DataResource` in an `EventSelector` to log data + # events for the following three resource types: # # * `AWS::DynamoDB::Table` # @@ -1608,22 +1212,28 @@ class CreateTrailResponse < Struct.new( # # * `AWS::S3::Object` # + # To log data events for all other resource types including objects + # stored in [directory buckets][1], you must use + # [AdvancedEventSelectors][2]. You must also use + # `AdvancedEventSelectors` if you want to filter on the `eventName` + # field. + # + # Configure the `DataResource` to specify the resource type and resource + # ARNs for which you want to log data events. + # # The total number of allowed data resources is 250. This number can be # distributed between 1 and 5 event selectors, but the total cannot # exceed 250 across all selectors for the trail. # - # If you are using advanced event selectors, the maximum total number of - # values for all conditions, across all advanced event selectors for the - # trail, is 500. - # # # # The following example demonstrates how logging works when you - # configure logging of all data events for an S3 bucket named - # `bucket-1`. In this example, the CloudTrail user specified an empty - # prefix, and the option to log both `Read` and `Write` data events. + # configure logging of all data events for a general purpose bucket + # named `amzn-s3-demo-bucket1`. In this example, the CloudTrail user + # specified an empty prefix, and the option to log both `Read` and + # `Write` data events. # - # 1. A user uploads an image file to `bucket-1`. + # 1. A user uploads an image file to `amzn-s3-demo-bucket1`. # # 2. The `PutObject` API operation is an Amazon S3 object-level API. It # is recorded as a data event in CloudTrail. Because the CloudTrail @@ -1632,7 +1242,7 @@ class CreateTrailResponse < Struct.new( # and logs the event. # # 3. A user uploads an object to an Amazon S3 bucket named - # `arn:aws:s3:::bucket-2`. + # `arn:aws:s3:::amzn-s3-demo-bucket1`. # # 4. The `PutObject` API operation occurred for an object in an S3 # bucket that the CloudTrail user didn't specify for the trail. The @@ -1658,6 +1268,11 @@ class CreateTrailResponse < Struct.new( # *MyOtherLambdaFunction* does not match the function specified for # the trail. The trail doesn’t log the event. # + # + # + # [1]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-overview.html + # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedEventSelector.html + # # @!attribute [rw] type # The resource type in which you want to log data events. You can # specify the following *basic* event selector resource types: @@ -1693,13 +1308,13 @@ class CreateTrailResponse < Struct.new( # # * To log data events for all objects in an S3 bucket, specify the # bucket and an empty object prefix such as - # `arn:aws:s3:::bucket-1/`. The trail logs data events for all - # objects in this S3 bucket. + # `arn:aws:s3:::amzn-s3-demo-bucket1/`. The trail logs data events + # for all objects in this S3 bucket. # # * To log data events for specific objects, specify the S3 bucket and - # object prefix such as `arn:aws:s3:::bucket-1/example-images`. The - # trail logs data events for objects in this S3 bucket that match - # the prefix. + # object prefix such as + # `arn:aws:s3:::amzn-s3-demo-bucket1/example-images`. The trail logs + # data events for objects in this S3 bucket that match the prefix. # # * To log data events for all Lambda functions in your Amazon Web # Services account, specify the prefix as `arn:aws:lambda`. @@ -2306,20 +1921,31 @@ class EventDataStoreTerminationProtectedException < Aws::EmptyStructure; end # @return [Boolean] # # @!attribute [rw] data_resources - # CloudTrail supports data event logging for Amazon S3 objects, Lambda - # functions, and Amazon DynamoDB tables with basic event selectors. - # You can specify up to 250 resources for an individual event - # selector, but the total number of data resources cannot exceed 250 - # across all event selectors in a trail. This limit does not apply if - # you configure resource logging for all data events. + # CloudTrail supports data event logging for Amazon S3 objects in + # standard S3 buckets, Lambda functions, and Amazon DynamoDB tables + # with basic event selectors. You can specify up to 250 resources for + # an individual event selector, but the total number of data resources + # cannot exceed 250 across all event selectors in a trail. This limit + # does not apply if you configure resource logging for all data + # events. # # For more information, see [Data Events][1] and [Limits in # CloudTrail][2] in the *CloudTrail User Guide*. # + # To log data events for all other resource types including objects + # stored in [directory buckets][3], you must use + # [AdvancedEventSelectors][4]. You must also use + # `AdvancedEventSelectors` if you want to filter on the `eventName` + # field. + # + # + # # # # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/WhatIsCloudTrail-Limits.html + # [3]: https://docs.aws.amazon.com/AmazonS3/latest/userguide/directory-buckets-overview.html + # [4]: https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedEventSelector.html # @return [Array] # # @!attribute [rw] exclude_management_event_sources @@ -4234,28 +3860,43 @@ class PublicKey < Struct.new( # @return [String] # # @!attribute [rw] event_selectors - # Specifies the settings for your event selectors. You can configure - # up to five event selectors for a trail. You can use either - # `EventSelectors` or `AdvancedEventSelectors` in a + # Specifies the settings for your event selectors. You can use event + # selectors to log management events and data events for the following + # resource types: + # + # * `AWS::DynamoDB::Table` + # + # * `AWS::Lambda::Function` + # + # * `AWS::S3::Object` + # + # You can't use event selectors to log network activity events. + # + # You can configure up to five event selectors for a trail. You can + # use either `EventSelectors` or `AdvancedEventSelectors` in a # `PutEventSelectors` request, but not both. If you apply # `EventSelectors` to a trail, any existing `AdvancedEventSelectors` # are overwritten. # @return [Array] # # @!attribute [rw] advanced_event_selectors - # Specifies the settings for advanced event selectors. You can add - # advanced event selectors, and conditions for your advanced event - # selectors, up to a maximum of 500 values for all conditions and - # selectors on a trail. You can use either `AdvancedEventSelectors` or - # `EventSelectors`, but not both. If you apply - # `AdvancedEventSelectors` to a trail, any existing `EventSelectors` - # are overwritten. For more information about advanced event - # selectors, see [Logging data events][1] in the *CloudTrail User - # Guide*. + # Specifies the settings for advanced event selectors. You can use + # advanced event selectors to log management events, data events for + # all resource types, and network activity events. + # + # You can add advanced event selectors, and conditions for your + # advanced event selectors, up to a maximum of 500 values for all + # conditions and selectors on a trail. You can use either + # `AdvancedEventSelectors` or `EventSelectors`, but not both. If you + # apply `AdvancedEventSelectors` to a trail, any existing + # `EventSelectors` are overwritten. For more information about + # advanced event selectors, see [Logging data events][1] and [Logging + # network activity events][2] in the *CloudTrail User Guide*. # # # # [1]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html + # [2]: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html # @return [Array] # # @see http://docs.aws.amazon.com/goto/WebAPI/cloudtrail-2013-11-01/PutEventSelectorsRequest AWS API Documentation diff --git a/gems/aws-sdk-core/CHANGELOG.md b/gems/aws-sdk-core/CHANGELOG.md index c997bf71d8e..92f50c28c31 100644 --- a/gems/aws-sdk-core/CHANGELOG.md +++ b/gems/aws-sdk-core/CHANGELOG.md @@ -1,6 +1,9 @@ Unreleased Changes ------------------ +3.209.1 (2024-09-25) +------------------ + * Issue - Add all core plugins to autoloads. 3.209.0 (2024-09-24) diff --git a/gems/aws-sdk-core/VERSION b/gems/aws-sdk-core/VERSION index e9a61775e4f..27375ec6526 100644 --- a/gems/aws-sdk-core/VERSION +++ b/gems/aws-sdk-core/VERSION @@ -1 +1 @@ -3.209.0 +3.209.1 diff --git a/gems/aws-sdk-core/lib/aws-sdk-sso.rb b/gems/aws-sdk-core/lib/aws-sdk-sso.rb index 95b10799a87..dc80c7d1141 100644 --- a/gems/aws-sdk-core/lib/aws-sdk-sso.rb +++ b/gems/aws-sdk-core/lib/aws-sdk-sso.rb @@ -56,7 +56,7 @@ module Plugins autoload :EndpointProvider, 'aws-sdk-sso/endpoint_provider' autoload :Endpoints, 'aws-sdk-sso/endpoints' - GEM_VERSION = '3.209.0' + GEM_VERSION = '3.209.1' end diff --git a/gems/aws-sdk-core/lib/aws-sdk-sso/client.rb b/gems/aws-sdk-core/lib/aws-sdk-sso/client.rb index 0a92ff97ba9..818a55c7f4a 100644 --- a/gems/aws-sdk-core/lib/aws-sdk-sso/client.rb +++ b/gems/aws-sdk-core/lib/aws-sdk-sso/client.rb @@ -669,7 +669,7 @@ def build_request(operation_name, params = {}) tracer: tracer ) context[:gem_name] = 'aws-sdk-core' - context[:gem_version] = '3.209.0' + context[:gem_version] = '3.209.1' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-core/lib/aws-sdk-ssooidc.rb b/gems/aws-sdk-core/lib/aws-sdk-ssooidc.rb index c3db4b89ddb..8e386a3e1fb 100644 --- a/gems/aws-sdk-core/lib/aws-sdk-ssooidc.rb +++ b/gems/aws-sdk-core/lib/aws-sdk-ssooidc.rb @@ -56,7 +56,7 @@ module Plugins autoload :EndpointProvider, 'aws-sdk-ssooidc/endpoint_provider' autoload :Endpoints, 'aws-sdk-ssooidc/endpoints' - GEM_VERSION = '3.209.0' + GEM_VERSION = '3.209.1' end diff --git a/gems/aws-sdk-core/lib/aws-sdk-ssooidc/client.rb b/gems/aws-sdk-core/lib/aws-sdk-ssooidc/client.rb index 33145257c63..de134dee7fd 100644 --- a/gems/aws-sdk-core/lib/aws-sdk-ssooidc/client.rb +++ b/gems/aws-sdk-core/lib/aws-sdk-ssooidc/client.rb @@ -1022,7 +1022,7 @@ def build_request(operation_name, params = {}) tracer: tracer ) context[:gem_name] = 'aws-sdk-core' - context[:gem_version] = '3.209.0' + context[:gem_version] = '3.209.1' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-core/lib/aws-sdk-sts.rb b/gems/aws-sdk-core/lib/aws-sdk-sts.rb index 322db9a03c1..155f6e96f61 100644 --- a/gems/aws-sdk-core/lib/aws-sdk-sts.rb +++ b/gems/aws-sdk-core/lib/aws-sdk-sts.rb @@ -56,7 +56,7 @@ module Plugins autoload :EndpointProvider, 'aws-sdk-sts/endpoint_provider' autoload :Endpoints, 'aws-sdk-sts/endpoints' - GEM_VERSION = '3.209.0' + GEM_VERSION = '3.209.1' end diff --git a/gems/aws-sdk-core/lib/aws-sdk-sts/client.rb b/gems/aws-sdk-core/lib/aws-sdk-sts/client.rb index 8970edc31ee..f2ea902a3b5 100644 --- a/gems/aws-sdk-core/lib/aws-sdk-sts/client.rb +++ b/gems/aws-sdk-core/lib/aws-sdk-sts/client.rb @@ -2416,7 +2416,7 @@ def build_request(operation_name, params = {}) tracer: tracer ) context[:gem_name] = 'aws-sdk-core' - context[:gem_version] = '3.209.0' + context[:gem_version] = '3.209.1' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-ec2/CHANGELOG.md b/gems/aws-sdk-ec2/CHANGELOG.md index 9df89716fa1..46095c678e9 100644 --- a/gems/aws-sdk-ec2/CHANGELOG.md +++ b/gems/aws-sdk-ec2/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.478.0 (2024-09-25) +------------------ + +* Feature - Updates to documentation for the transit gateway security group referencing feature. + 1.477.0 (2024-09-24) ------------------ diff --git a/gems/aws-sdk-ec2/VERSION b/gems/aws-sdk-ec2/VERSION index 7f52d754ff4..71fcd94115c 100644 --- a/gems/aws-sdk-ec2/VERSION +++ b/gems/aws-sdk-ec2/VERSION @@ -1 +1 @@ -1.477.0 +1.478.0 diff --git a/gems/aws-sdk-ec2/lib/aws-sdk-ec2.rb b/gems/aws-sdk-ec2/lib/aws-sdk-ec2.rb index bbdc25ed662..fe5c64e3f65 100644 --- a/gems/aws-sdk-ec2/lib/aws-sdk-ec2.rb +++ b/gems/aws-sdk-ec2/lib/aws-sdk-ec2.rb @@ -78,7 +78,7 @@ module Plugins autoload :VpcPeeringConnection, 'aws-sdk-ec2/vpc_peering_connection' autoload :VpcAddress, 'aws-sdk-ec2/vpc_address' - GEM_VERSION = '1.477.0' + GEM_VERSION = '1.478.0' end diff --git a/gems/aws-sdk-ec2/lib/aws-sdk-ec2/client.rb b/gems/aws-sdk-ec2/lib/aws-sdk-ec2/client.rb index d839eed1135..48c59ecbbb0 100644 --- a/gems/aws-sdk-ec2/lib/aws-sdk-ec2/client.rb +++ b/gems/aws-sdk-ec2/lib/aws-sdk-ec2/client.rb @@ -60123,7 +60123,7 @@ def build_request(operation_name, params = {}) tracer: tracer ) context[:gem_name] = 'aws-sdk-ec2' - context[:gem_version] = '1.477.0' + context[:gem_version] = '1.478.0' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-ec2/lib/aws-sdk-ec2/types.rb b/gems/aws-sdk-ec2/lib/aws-sdk-ec2/types.rb index bbe2670b0de..9244dac9474 100644 --- a/gems/aws-sdk-ec2/lib/aws-sdk-ec2/types.rb +++ b/gems/aws-sdk-ec2/lib/aws-sdk-ec2/types.rb @@ -12055,23 +12055,22 @@ class CreateTransitGatewayVpcAttachmentRequest < Struct.new( # @return [String] # # @!attribute [rw] security_group_referencing_support - # This parameter is in preview and may not be available for your - # account. - # - # - # # Enables you to reference a security group across VPCs attached to a - # transit gateway. Use this option to simplify security group - # management and control of instance-to-instance traffic across VPCs - # that are connected by transit gateway. You can also use this option - # to migrate from VPC peering (which was the only option that - # supported security group referencing) to transit gateways (which now - # also support security group referencing). This option is disabled by - # default and there are no additional costs to use this feature. + # transit gateway to simplify security group management. + # + # This option is disabled by default. # # If you don't enable or disable SecurityGroupReferencingSupport in # the request, the attachment will inherit the security group # referencing support setting on the transit gateway. + # + # For more information about security group referencing, see [Security + # group referencing ][1] in the *Amazon Web Services Transit Gateways + # Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/vpc/latest/tgw/tgw-vpc-attachments.html#vpc-attachment-security # @return [String] # # @!attribute [rw] ipv_6_support @@ -50230,19 +50229,18 @@ class ModifyTrafficMirrorSessionResult < Struct.new( # @return [String] # # @!attribute [rw] security_group_referencing_support - # This parameter is in preview and may not be available for your - # account. + # Enables you to reference a security group across VPCs attached to a + # transit gateway to simplify security group management. # - # + # This option is disabled by default. # - # Enables you to reference a security group across VPCs attached to a - # transit gateway. Use this option to simplify security group - # management and control of instance-to-instance traffic across VPCs - # that are connected by transit gateway. You can also use this option - # to migrate from VPC peering (which was the only option that - # supported security group referencing) to transit gateways (which now - # also support security group referencing). This option is disabled by - # default and there are no additional costs to use this feature. + # For more information about security group referencing, see [Security + # group referencing][1] in the *Amazon Web Services Transit Gateways + # Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/vpc/latest/tgw/tgw-vpc-attachments.html#vpc-attachment-security # @return [String] # # @!attribute [rw] auto_accept_shared_attachments @@ -50437,19 +50435,18 @@ class ModifyTransitGatewayVpcAttachmentRequest < Struct.new( # @return [String] # # @!attribute [rw] security_group_referencing_support - # This parameter is in preview and may not be available for your - # account. + # Enables you to reference a security group across VPCs attached to a + # transit gateway to simplify security group management. # - # + # This option is disabled by default. # - # Enables you to reference a security group across VPCs attached to a - # transit gateway. Use this option to simplify security group - # management and control of instance-to-instance traffic across VPCs - # that are connected by transit gateway. You can also use this option - # to migrate from VPC peering (which was the only option that - # supported security group referencing) to transit gateways (which now - # also support security group referencing). This option is disabled by - # default and there are no additional costs to use this feature. + # For more information about security group referencing, see [Security + # group referencing][1] in the *Amazon Web Services Transit Gateways + # Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/vpc/latest/tgw/tgw-vpc-attachments.html#vpc-attachment-security # @return [String] # # @!attribute [rw] ipv_6_support @@ -65942,19 +65939,18 @@ class TransitGatewayMulticastRegisteredGroupSources < Struct.new( # @return [String] # # @!attribute [rw] security_group_referencing_support - # This parameter is in preview and may not be available for your - # account. + # Enables you to reference a security group across VPCs attached to a + # transit gateway to simplify security group management. # - # + # This option is enabled by default. # - # Enables you to reference a security group across VPCs attached to a - # transit gateway. Use this option to simplify security group - # management and control of instance-to-instance traffic across VPCs - # that are connected by transit gateway. You can also use this option - # to migrate from VPC peering (which was the only option that - # supported security group referencing) to transit gateways (which now - # also support security group referencing). This option is disabled by - # default and there are no additional costs to use this feature. + # For more information about security group referencing, see [Security + # group referencing][1] in the *Amazon Web Services Transit Gateways + # Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/vpc/latest/tgw/tgw-vpc-attachments.html#vpc-attachment-security # @return [String] # # @!attribute [rw] multicast_support @@ -66340,19 +66336,18 @@ class TransitGatewayPropagation < Struct.new( # @return [String] # # @!attribute [rw] security_group_referencing_support - # This parameter is in preview and may not be available for your - # account. + # Enables you to reference a security group across VPCs attached to a + # transit gateway to simplify security group management. # - # + # This option is disabled by default. # - # Enables you to reference a security group across VPCs attached to a - # transit gateway. Use this option to simplify security group - # management and control of instance-to-instance traffic across VPCs - # that are connected by transit gateway. You can also use this option - # to migrate from VPC peering (which was the only option that - # supported security group referencing) to transit gateways (which now - # also support security group referencing). This option is disabled by - # default and there are no additional costs to use this feature. + # For more information about security group referencing, see [Security + # group referencing][1] in the *Amazon Web Services Transit Gateways + # Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/vpc/latest/tgw/tgw-vpc-attachments.html#vpc-attachment-security # @return [String] # # @!attribute [rw] multicast_support @@ -66733,19 +66728,18 @@ class TransitGatewayVpcAttachment < Struct.new( # @return [String] # # @!attribute [rw] security_group_referencing_support - # This parameter is in preview and may not be available for your - # account. + # Enables you to reference a security group across VPCs attached to a + # transit gateway to simplify security group management. # - # + # This option is disabled by default. # - # Enables you to reference a security group across VPCs attached to a - # transit gateway. Use this option to simplify security group - # management and control of instance-to-instance traffic across VPCs - # that are connected by transit gateway. You can also use this option - # to migrate from VPC peering (which was the only option that - # supported security group referencing) to transit gateways (which now - # also support security group referencing). This option is disabled by - # default and there are no additional costs to use this feature. + # For more information about security group referencing, see [Security + # group referencing][1] in the *Amazon Web Services Transit Gateways + # Guide*. + # + # + # + # [1]: https://docs.aws.amazon.com/vpc/latest/tgw/tgw-vpc-attachments.html#vpc-attachment-security # @return [String] # # @!attribute [rw] ipv_6_support diff --git a/gems/aws-sdk-fsx/CHANGELOG.md b/gems/aws-sdk-fsx/CHANGELOG.md index 0db8dc96f12..500f930bf95 100644 --- a/gems/aws-sdk-fsx/CHANGELOG.md +++ b/gems/aws-sdk-fsx/CHANGELOG.md @@ -1,6 +1,11 @@ Unreleased Changes ------------------ +1.101.0 (2024-09-25) +------------------ + +* Feature - Doc-only update to address Lustre S3 hard-coded names. + 1.100.0 (2024-09-24) ------------------ diff --git a/gems/aws-sdk-fsx/VERSION b/gems/aws-sdk-fsx/VERSION index 7a9fecd3f0e..f19e6677313 100644 --- a/gems/aws-sdk-fsx/VERSION +++ b/gems/aws-sdk-fsx/VERSION @@ -1 +1 @@ -1.100.0 +1.101.0 diff --git a/gems/aws-sdk-fsx/lib/aws-sdk-fsx.rb b/gems/aws-sdk-fsx/lib/aws-sdk-fsx.rb index 1eb7aa27a77..65be53b2c7e 100644 --- a/gems/aws-sdk-fsx/lib/aws-sdk-fsx.rb +++ b/gems/aws-sdk-fsx/lib/aws-sdk-fsx.rb @@ -54,7 +54,7 @@ module Plugins autoload :EndpointProvider, 'aws-sdk-fsx/endpoint_provider' autoload :Endpoints, 'aws-sdk-fsx/endpoints' - GEM_VERSION = '1.100.0' + GEM_VERSION = '1.101.0' end diff --git a/gems/aws-sdk-fsx/lib/aws-sdk-fsx/client.rb b/gems/aws-sdk-fsx/lib/aws-sdk-fsx/client.rb index 4ecb6932573..30c86645470 100644 --- a/gems/aws-sdk-fsx/lib/aws-sdk-fsx/client.rb +++ b/gems/aws-sdk-fsx/lib/aws-sdk-fsx/client.rb @@ -2039,8 +2039,9 @@ def create_backup(params = {}, options = {}) # @option params [required, String] :data_repository_path # The path to the Amazon S3 data repository that will be linked to the # file system. The path can be an S3 bucket or prefix in the format - # `s3://myBucket/myPrefix/`. This path specifies where in the S3 data - # repository files will be imported from or exported to. + # `s3://bucket-name/prefix/` (where `prefix` is optional). This path + # specifies where in the S3 data repository files will be imported from + # or exported to. # # @option params [Boolean] :batch_import_meta_data_on_create # Set to `true` to run an import data repository task to import metadata @@ -2205,7 +2206,7 @@ def create_data_repository_association(params = {}, options = {}) # * For import tasks, the list contains paths in the Amazon S3 bucket # from which POSIX metadata changes are imported to the FSx for Lustre # file system. The path can be an S3 bucket or prefix in the format - # `s3://myBucket/myPrefix` (where `myPrefix` is optional). + # `s3://bucket-name/prefix` (where `prefix` is optional). # # * For release tasks, the list contains directory or file paths on the # FSx for Lustre file system from which to release exported files. If @@ -9330,7 +9331,7 @@ def build_request(operation_name, params = {}) tracer: tracer ) context[:gem_name] = 'aws-sdk-fsx' - context[:gem_version] = '1.100.0' + context[:gem_version] = '1.101.0' Seahorse::Client::Request.new(handlers, context) end diff --git a/gems/aws-sdk-fsx/lib/aws-sdk-fsx/types.rb b/gems/aws-sdk-fsx/lib/aws-sdk-fsx/types.rb index 10d98efbd0a..978cb64785d 100644 --- a/gems/aws-sdk-fsx/lib/aws-sdk-fsx/types.rb +++ b/gems/aws-sdk-fsx/lib/aws-sdk-fsx/types.rb @@ -840,9 +840,9 @@ class CancelDataRepositoryTaskResponse < Struct.new( # absolute path that defines where the completion report will be # stored in the destination location. The `Path` you provide must be # located within the file system’s ExportPath. An example `Path` value - # is "s3://myBucket/myExportPath/optionalPrefix". The report - # provides the following information for each file in the report: - # FilePath, FileStatus, and ErrorCode. + # is "s3://amzn-s3-demo-bucket/myExportPath/optionalPrefix". The + # report provides the following information for each file in the + # report: FilePath, FileStatus, and ErrorCode. # @return [String] # # @!attribute [rw] format @@ -1169,8 +1169,9 @@ class CreateBackupResponse < Struct.new( # @!attribute [rw] data_repository_path # The path to the Amazon S3 data repository that will be linked to the # file system. The path can be an S3 bucket or prefix in the format - # `s3://myBucket/myPrefix/`. This path specifies where in the S3 data - # repository files will be imported from or exported to. + # `s3://bucket-name/prefix/` (where `prefix` is optional). This path + # specifies where in the S3 data repository files will be imported + # from or exported to. # @return [String] # # @!attribute [rw] batch_import_meta_data_on_create @@ -1278,7 +1279,7 @@ class CreateDataRepositoryAssociationResponse < Struct.new( # * For import tasks, the list contains paths in the Amazon S3 bucket # from which POSIX metadata changes are imported to the FSx for # Lustre file system. The path can be an S3 bucket or prefix in the - # format `s3://myBucket/myPrefix` (where `myPrefix` is optional). + # format `s3://bucket-name/prefix` (where `prefix` is optional). # # * For release tasks, the list contains directory or file paths on # the FSx for Lustre file system from which to release exported @@ -3633,10 +3634,12 @@ class CreateVolumeResponse < Struct.new( # parameter. # # * For Amazon File Cache, the path can be an S3 bucket or prefix in - # the format `s3://myBucket/myPrefix/`. + # the format `s3://bucket-name/prefix/` (where `prefix` is + # optional). # # * For Amazon FSx for Lustre, the path can be an S3 bucket or prefix - # in the format `s3://myBucket/myPrefix/`. + # in the format `s3://bucket-name/prefix/` (where `prefix` is + # optional). # @return [String] # # @!attribute [rw] batch_import_meta_data_on_create @@ -5728,7 +5731,7 @@ class FileCacheCreating < Struct.new( # parameter. # # * The path can be an S3 bucket or prefix in the format - # `s3://myBucket/myPrefix/`. + # `s3://bucket-name/prefix/` (where `prefix` is optional). # @return [String] # # @!attribute [rw] data_repository_subdirectories