aws-sdk-aiops 1.0.0 → 1.1.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-aiops/client.rb +67 -55
- data/lib/aws-sdk-aiops/client_api.rb +10 -0
- data/lib/aws-sdk-aiops/types.rb +83 -52
- data/lib/aws-sdk-aiops.rb +1 -1
- data/sig/client.rbs +13 -2
- data/sig/types.rbs +8 -0
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: ec2ea1c7720e48f07e65a0bcfb28c6e11c12e97058c457c62272fbad7636a760
|
4
|
+
data.tar.gz: 9a5bf8bb1db693d2bc9ff221962a3f98ac3cd3ed118d63ea8c7668e11fdf7c41
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8b460326c3ea1ea3cd044f7272c5330f87b5676a88dfc50c60416d78cfbfc054b8cba3cc6a514aa393202bf09e76a465511e9ea38945c4736269b6935c500489
|
7
|
+
data.tar.gz: '094b594aa5f8793b2fbc364509ff7d94cd10130f0a515f0809d34987b990d3664e6b1491f60993f8b466e09640e8d4da75e07283a99ed7eadd67f87fe603c413'
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.1.0
|
data/lib/aws-sdk-aiops/client.rb
CHANGED
@@ -487,11 +487,10 @@ module Aws::AIOps
|
|
487
487
|
# account. Each investigation in a Region is a part of the investigation
|
488
488
|
# group in that Region
|
489
489
|
#
|
490
|
-
# To create an investigation group and set up
|
491
|
-
#
|
492
|
-
#
|
493
|
-
#
|
494
|
-
# similar permissions.
|
490
|
+
# To create an investigation group and set up CloudWatch investigations,
|
491
|
+
# you must be signed in to an IAM principal that has the either the
|
492
|
+
# `AIOpsConsoleAdminPolicy` or the `AdministratorAccess` IAM policy
|
493
|
+
# attached, or to an account that has similar permissions.
|
495
494
|
#
|
496
495
|
# You can configure CloudWatch alarms to start investigations and add
|
497
496
|
# events to investigations. If you create your investigation group with
|
@@ -500,21 +499,20 @@ module Aws::AIOps
|
|
500
499
|
# policy that grants this permission to CloudWatch alarms.
|
501
500
|
#
|
502
501
|
# For more information about configuring CloudWatch alarms to work with
|
503
|
-
#
|
502
|
+
# CloudWatch investigations, see
|
504
503
|
#
|
505
504
|
#
|
506
505
|
#
|
507
506
|
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html
|
508
507
|
#
|
509
508
|
# @option params [required, String] :name
|
510
|
-
#
|
509
|
+
# Provides a name for the investigation group.
|
511
510
|
#
|
512
511
|
# @option params [required, String] :role_arn
|
513
|
-
# Specify the ARN of the IAM role that
|
514
|
-
#
|
515
|
-
#
|
516
|
-
#
|
517
|
-
# investigations.
|
512
|
+
# Specify the ARN of the IAM role that CloudWatch investigations will
|
513
|
+
# use when it gathers investigation data. The permissions in this role
|
514
|
+
# determine which of your resources that CloudWatch investigations will
|
515
|
+
# have access to during investigations.
|
518
516
|
#
|
519
517
|
# For more information, see [How to control what data Amazon Q has
|
520
518
|
# access to during investigations][1].
|
@@ -525,9 +523,9 @@ module Aws::AIOps
|
|
525
523
|
#
|
526
524
|
# @option params [Types::EncryptionConfiguration] :encryption_configuration
|
527
525
|
# Use this structure if you want to use a customer managed KMS key to
|
528
|
-
# encrypt your investigation data. If you omit this parameter,
|
529
|
-
#
|
530
|
-
#
|
526
|
+
# encrypt your investigation data. If you omit this parameter,
|
527
|
+
# CloudWatch investigations will use an Amazon Web Services key to
|
528
|
+
# encrypt the data. For more information, see [Encryption of
|
531
529
|
# investigation data][1].
|
532
530
|
#
|
533
531
|
#
|
@@ -569,15 +567,14 @@ module Aws::AIOps
|
|
569
567
|
# CloudFormation, because Amazon Q can automatically detect those tags.
|
570
568
|
#
|
571
569
|
# @option params [Hash<String,Array>] :chatbot_notification_channel
|
572
|
-
# Use this structure to integrate
|
573
|
-
#
|
574
|
-
#
|
575
|
-
#
|
576
|
-
#
|
577
|
-
#
|
578
|
-
#
|
579
|
-
#
|
580
|
-
# Chatbot][2].
|
570
|
+
# Use this structure to integrate CloudWatch investigations with Amazon
|
571
|
+
# Q in chat applications. This structure is a string array. For the
|
572
|
+
# first string, specify the ARN of an Amazon SNS topic. For the array of
|
573
|
+
# strings, specify the ARNs of one or more Amazon Q in chat applications
|
574
|
+
# configurations that you want to associate with that topic. For more
|
575
|
+
# information about these configuration ARNs, see [Getting started with
|
576
|
+
# Amazon Q in chat applications][1] and [Resource type defined by Amazon
|
577
|
+
# Web Services Chatbot][2].
|
581
578
|
#
|
582
579
|
#
|
583
580
|
#
|
@@ -585,9 +582,12 @@ module Aws::AIOps
|
|
585
582
|
# [2]: https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies
|
586
583
|
#
|
587
584
|
# @option params [Boolean] :is_cloud_trail_event_history_enabled
|
588
|
-
# Specify `true` to enable
|
589
|
-
#
|
590
|
-
#
|
585
|
+
# Specify `true` to enable CloudWatch investigations to have access to
|
586
|
+
# change events that are recorded by CloudTrail. The default is `true`.
|
587
|
+
#
|
588
|
+
# @option params [Array<Types::CrossAccountConfiguration>] :cross_account_configurations
|
589
|
+
# Number of `sourceAccountId` values that have been configured for
|
590
|
+
# cross-account access.
|
591
591
|
#
|
592
592
|
# @return [Types::CreateInvestigationGroupOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
593
593
|
#
|
@@ -611,6 +611,11 @@ module Aws::AIOps
|
|
611
611
|
# "SNSTopicArn" => ["ChatConfigurationArn"],
|
612
612
|
# },
|
613
613
|
# is_cloud_trail_event_history_enabled: false,
|
614
|
+
# cross_account_configurations: [
|
615
|
+
# {
|
616
|
+
# source_role_arn: "RoleArn",
|
617
|
+
# },
|
618
|
+
# ],
|
614
619
|
# })
|
615
620
|
#
|
616
621
|
# @example Response structure
|
@@ -697,6 +702,7 @@ module Aws::AIOps
|
|
697
702
|
# * {Types::GetInvestigationGroupResponse#chatbot_notification_channel #chatbot_notification_channel} => Hash<String,Array<String>>
|
698
703
|
# * {Types::GetInvestigationGroupResponse#tag_key_boundaries #tag_key_boundaries} => Array<String>
|
699
704
|
# * {Types::GetInvestigationGroupResponse#is_cloud_trail_event_history_enabled #is_cloud_trail_event_history_enabled} => Boolean
|
705
|
+
# * {Types::GetInvestigationGroupResponse#cross_account_configurations #cross_account_configurations} => Array<Types::CrossAccountConfiguration>
|
700
706
|
#
|
701
707
|
# @example Request syntax with placeholder values
|
702
708
|
#
|
@@ -722,6 +728,8 @@ module Aws::AIOps
|
|
722
728
|
# resp.tag_key_boundaries #=> Array
|
723
729
|
# resp.tag_key_boundaries[0] #=> String
|
724
730
|
# resp.is_cloud_trail_event_history_enabled #=> Boolean
|
731
|
+
# resp.cross_account_configurations #=> Array
|
732
|
+
# resp.cross_account_configurations[0].source_role_arn #=> String
|
725
733
|
#
|
726
734
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/GetInvestigationGroup AWS API Documentation
|
727
735
|
#
|
@@ -804,15 +812,13 @@ module Aws::AIOps
|
|
804
812
|
req.send_request(options)
|
805
813
|
end
|
806
814
|
|
807
|
-
# Displays the tags associated with a
|
808
|
-
#
|
809
|
-
# tagging.
|
815
|
+
# Displays the tags associated with a CloudWatch investigations
|
816
|
+
# resource. Currently, investigation groups support tagging.
|
810
817
|
#
|
811
818
|
# @option params [required, String] :resource_arn
|
812
|
-
# The ARN of the
|
813
|
-
#
|
814
|
-
#
|
815
|
-
# investigation groups.
|
819
|
+
# The ARN of the CloudWatch investigations resource that you want to
|
820
|
+
# view tags for. You can use the [ListInvestigationGroups][1] operation
|
821
|
+
# to find the ARNs of investigation groups.
|
816
822
|
#
|
817
823
|
# The ARN format for an investigation group is
|
818
824
|
# `arn:aws:aiops:Region:account-id:investigation-group:investigation-group-id
|
@@ -975,13 +981,12 @@ module Aws::AIOps
|
|
975
981
|
# want to modify.
|
976
982
|
#
|
977
983
|
# @option params [String] :role_arn
|
978
|
-
# Specify this field if you want to change the IAM role that
|
979
|
-
#
|
980
|
-
#
|
984
|
+
# Specify this field if you want to change the IAM role that CloudWatch
|
985
|
+
# investigations will use when it gathers investigation data. To do so,
|
986
|
+
# specify the ARN of the new role.
|
981
987
|
#
|
982
988
|
# The permissions in this role determine which of your resources that
|
983
|
-
#
|
984
|
-
# during investigations.
|
989
|
+
# CloudWatch investigations will have access to during investigations.
|
985
990
|
#
|
986
991
|
# For more information, see [EHow to control what data Amazon Q has
|
987
992
|
# access to during investigations][1].
|
@@ -992,9 +997,9 @@ module Aws::AIOps
|
|
992
997
|
#
|
993
998
|
# @option params [Types::EncryptionConfiguration] :encryption_configuration
|
994
999
|
# Use this structure if you want to use a customer managed KMS key to
|
995
|
-
# encrypt your investigation data. If you omit this parameter,
|
996
|
-
#
|
997
|
-
#
|
1000
|
+
# encrypt your investigation data. If you omit this parameter,
|
1001
|
+
# CloudWatch investigations will use an Amazon Web Services key to
|
1002
|
+
# encrypt the data. For more information, see [Encryption of
|
998
1003
|
# investigation data][1].
|
999
1004
|
#
|
1000
1005
|
#
|
@@ -1016,15 +1021,14 @@ module Aws::AIOps
|
|
1016
1021
|
# CloudFormation, because Amazon Q can automatically detect those tags.
|
1017
1022
|
#
|
1018
1023
|
# @option params [Hash<String,Array>] :chatbot_notification_channel
|
1019
|
-
# Use this structure to integrate
|
1020
|
-
#
|
1021
|
-
#
|
1022
|
-
#
|
1023
|
-
#
|
1024
|
-
#
|
1025
|
-
#
|
1026
|
-
#
|
1027
|
-
# Chatbot][2].
|
1024
|
+
# Use this structure to integrate CloudWatch investigations with Amazon
|
1025
|
+
# Q in chat applications. This structure is a string array. For the
|
1026
|
+
# first string, specify the ARN of an Amazon SNS topic. For the array of
|
1027
|
+
# strings, specify the ARNs of one or more Amazon Q in chat applications
|
1028
|
+
# configurations that you want to associate with that topic. For more
|
1029
|
+
# information about these configuration ARNs, see [Getting started with
|
1030
|
+
# Amazon Q in chat applications][1] and [Resource type defined by Amazon
|
1031
|
+
# Web Services Chatbot][2].
|
1028
1032
|
#
|
1029
1033
|
#
|
1030
1034
|
#
|
@@ -1032,9 +1036,12 @@ module Aws::AIOps
|
|
1032
1036
|
# [2]: https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies
|
1033
1037
|
#
|
1034
1038
|
# @option params [Boolean] :is_cloud_trail_event_history_enabled
|
1035
|
-
# Specify `true` to enable
|
1036
|
-
#
|
1037
|
-
#
|
1039
|
+
# Specify `true` to enable CloudWatch investigations to have access to
|
1040
|
+
# change events that are recorded by CloudTrail. The default is `true`.
|
1041
|
+
#
|
1042
|
+
# @option params [Array<Types::CrossAccountConfiguration>] :cross_account_configurations
|
1043
|
+
# Used to configure cross-account access for an investigation group. It
|
1044
|
+
# allows the investigation group to access resources in other accounts.
|
1038
1045
|
#
|
1039
1046
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
1040
1047
|
#
|
@@ -1052,6 +1059,11 @@ module Aws::AIOps
|
|
1052
1059
|
# "SNSTopicArn" => ["ChatConfigurationArn"],
|
1053
1060
|
# },
|
1054
1061
|
# is_cloud_trail_event_history_enabled: false,
|
1062
|
+
# cross_account_configurations: [
|
1063
|
+
# {
|
1064
|
+
# source_role_arn: "RoleArn",
|
1065
|
+
# },
|
1066
|
+
# ],
|
1055
1067
|
# })
|
1056
1068
|
#
|
1057
1069
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/UpdateInvestigationGroup AWS API Documentation
|
@@ -1081,7 +1093,7 @@ module Aws::AIOps
|
|
1081
1093
|
tracer: tracer
|
1082
1094
|
)
|
1083
1095
|
context[:gem_name] = 'aws-sdk-aiops'
|
1084
|
-
context[:gem_version] = '1.
|
1096
|
+
context[:gem_version] = '1.1.0'
|
1085
1097
|
Seahorse::Client::Request.new(handlers, context)
|
1086
1098
|
end
|
1087
1099
|
|
@@ -22,6 +22,8 @@ module Aws::AIOps
|
|
22
22
|
ConflictException = Shapes::StructureShape.new(name: 'ConflictException')
|
23
23
|
CreateInvestigationGroupInput = Shapes::StructureShape.new(name: 'CreateInvestigationGroupInput')
|
24
24
|
CreateInvestigationGroupOutput = Shapes::StructureShape.new(name: 'CreateInvestigationGroupOutput')
|
25
|
+
CrossAccountConfiguration = Shapes::StructureShape.new(name: 'CrossAccountConfiguration')
|
26
|
+
CrossAccountConfigurations = Shapes::ListShape.new(name: 'CrossAccountConfigurations')
|
25
27
|
DeleteInvestigationGroupPolicyOutput = Shapes::StructureShape.new(name: 'DeleteInvestigationGroupPolicyOutput')
|
26
28
|
DeleteInvestigationGroupPolicyRequest = Shapes::StructureShape.new(name: 'DeleteInvestigationGroupPolicyRequest')
|
27
29
|
DeleteInvestigationGroupRequest = Shapes::StructureShape.new(name: 'DeleteInvestigationGroupRequest')
|
@@ -89,11 +91,17 @@ module Aws::AIOps
|
|
89
91
|
CreateInvestigationGroupInput.add_member(:tag_key_boundaries, Shapes::ShapeRef.new(shape: TagKeyBoundaries, location_name: "tagKeyBoundaries"))
|
90
92
|
CreateInvestigationGroupInput.add_member(:chatbot_notification_channel, Shapes::ShapeRef.new(shape: ChatbotNotificationChannel, location_name: "chatbotNotificationChannel"))
|
91
93
|
CreateInvestigationGroupInput.add_member(:is_cloud_trail_event_history_enabled, Shapes::ShapeRef.new(shape: Boolean, location_name: "isCloudTrailEventHistoryEnabled"))
|
94
|
+
CreateInvestigationGroupInput.add_member(:cross_account_configurations, Shapes::ShapeRef.new(shape: CrossAccountConfigurations, location_name: "crossAccountConfigurations"))
|
92
95
|
CreateInvestigationGroupInput.struct_class = Types::CreateInvestigationGroupInput
|
93
96
|
|
94
97
|
CreateInvestigationGroupOutput.add_member(:arn, Shapes::ShapeRef.new(shape: InvestigationGroupArn, location_name: "arn"))
|
95
98
|
CreateInvestigationGroupOutput.struct_class = Types::CreateInvestigationGroupOutput
|
96
99
|
|
100
|
+
CrossAccountConfiguration.add_member(:source_role_arn, Shapes::ShapeRef.new(shape: RoleArn, location_name: "sourceRoleArn"))
|
101
|
+
CrossAccountConfiguration.struct_class = Types::CrossAccountConfiguration
|
102
|
+
|
103
|
+
CrossAccountConfigurations.member = Shapes::ShapeRef.new(shape: CrossAccountConfiguration)
|
104
|
+
|
97
105
|
DeleteInvestigationGroupPolicyOutput.struct_class = Types::DeleteInvestigationGroupPolicyOutput
|
98
106
|
|
99
107
|
DeleteInvestigationGroupPolicyRequest.add_member(:identifier, Shapes::ShapeRef.new(shape: InvestigationGroupIdentifier, required: true, location: "uri", location_name: "identifier"))
|
@@ -131,6 +139,7 @@ module Aws::AIOps
|
|
131
139
|
GetInvestigationGroupResponse.add_member(:chatbot_notification_channel, Shapes::ShapeRef.new(shape: ChatbotNotificationChannel, location_name: "chatbotNotificationChannel"))
|
132
140
|
GetInvestigationGroupResponse.add_member(:tag_key_boundaries, Shapes::ShapeRef.new(shape: TagKeyBoundaries, location_name: "tagKeyBoundaries"))
|
133
141
|
GetInvestigationGroupResponse.add_member(:is_cloud_trail_event_history_enabled, Shapes::ShapeRef.new(shape: Boolean, location_name: "isCloudTrailEventHistoryEnabled"))
|
142
|
+
GetInvestigationGroupResponse.add_member(:cross_account_configurations, Shapes::ShapeRef.new(shape: CrossAccountConfigurations, location_name: "crossAccountConfigurations"))
|
134
143
|
GetInvestigationGroupResponse.struct_class = Types::GetInvestigationGroupResponse
|
135
144
|
|
136
145
|
InternalServerException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
|
@@ -203,6 +212,7 @@ module Aws::AIOps
|
|
203
212
|
UpdateInvestigationGroupRequest.add_member(:tag_key_boundaries, Shapes::ShapeRef.new(shape: TagKeyBoundaries, location_name: "tagKeyBoundaries"))
|
204
213
|
UpdateInvestigationGroupRequest.add_member(:chatbot_notification_channel, Shapes::ShapeRef.new(shape: ChatbotNotificationChannel, location_name: "chatbotNotificationChannel"))
|
205
214
|
UpdateInvestigationGroupRequest.add_member(:is_cloud_trail_event_history_enabled, Shapes::ShapeRef.new(shape: Boolean, location_name: "isCloudTrailEventHistoryEnabled"))
|
215
|
+
UpdateInvestigationGroupRequest.add_member(:cross_account_configurations, Shapes::ShapeRef.new(shape: CrossAccountConfigurations, location_name: "crossAccountConfigurations"))
|
206
216
|
UpdateInvestigationGroupRequest.struct_class = Types::UpdateInvestigationGroupRequest
|
207
217
|
|
208
218
|
ValidationException.add_member(:message, Shapes::ShapeRef.new(shape: String, location_name: "message"))
|
data/lib/aws-sdk-aiops/types.rb
CHANGED
@@ -38,15 +38,14 @@ module Aws::AIOps
|
|
38
38
|
end
|
39
39
|
|
40
40
|
# @!attribute [rw] name
|
41
|
-
#
|
41
|
+
# Provides a name for the investigation group.
|
42
42
|
# @return [String]
|
43
43
|
#
|
44
44
|
# @!attribute [rw] role_arn
|
45
|
-
# Specify the ARN of the IAM role that
|
46
|
-
#
|
47
|
-
#
|
48
|
-
#
|
49
|
-
# during investigations.
|
45
|
+
# Specify the ARN of the IAM role that CloudWatch investigations will
|
46
|
+
# use when it gathers investigation data. The permissions in this role
|
47
|
+
# determine which of your resources that CloudWatch investigations
|
48
|
+
# will have access to during investigations.
|
50
49
|
#
|
51
50
|
# For more information, see [How to control what data Amazon Q has
|
52
51
|
# access to during investigations][1].
|
@@ -58,10 +57,10 @@ module Aws::AIOps
|
|
58
57
|
#
|
59
58
|
# @!attribute [rw] encryption_configuration
|
60
59
|
# Use this structure if you want to use a customer managed KMS key to
|
61
|
-
# encrypt your investigation data. If you omit this parameter,
|
62
|
-
#
|
63
|
-
#
|
64
|
-
#
|
60
|
+
# encrypt your investigation data. If you omit this parameter,
|
61
|
+
# CloudWatch investigations will use an Amazon Web Services key to
|
62
|
+
# encrypt the data. For more information, see [Encryption of
|
63
|
+
# investigation data][1].
|
65
64
|
#
|
66
65
|
#
|
67
66
|
#
|
@@ -109,15 +108,14 @@ module Aws::AIOps
|
|
109
108
|
# @return [Array<String>]
|
110
109
|
#
|
111
110
|
# @!attribute [rw] chatbot_notification_channel
|
112
|
-
# Use this structure to integrate
|
113
|
-
#
|
114
|
-
#
|
115
|
-
#
|
116
|
-
#
|
117
|
-
#
|
118
|
-
#
|
119
|
-
#
|
120
|
-
# Chatbot][2].
|
111
|
+
# Use this structure to integrate CloudWatch investigations with
|
112
|
+
# Amazon Q in chat applications. This structure is a string array. For
|
113
|
+
# the first string, specify the ARN of an Amazon SNS topic. For the
|
114
|
+
# array of strings, specify the ARNs of one or more Amazon Q in chat
|
115
|
+
# applications configurations that you want to associate with that
|
116
|
+
# topic. For more information about these configuration ARNs, see
|
117
|
+
# [Getting started with Amazon Q in chat applications][1] and
|
118
|
+
# [Resource type defined by Amazon Web Services Chatbot][2].
|
121
119
|
#
|
122
120
|
#
|
123
121
|
#
|
@@ -126,11 +124,16 @@ module Aws::AIOps
|
|
126
124
|
# @return [Hash<String,Array<String>>]
|
127
125
|
#
|
128
126
|
# @!attribute [rw] is_cloud_trail_event_history_enabled
|
129
|
-
# Specify `true` to enable
|
130
|
-
#
|
131
|
-
#
|
127
|
+
# Specify `true` to enable CloudWatch investigations to have access to
|
128
|
+
# change events that are recorded by CloudTrail. The default is
|
129
|
+
# `true`.
|
132
130
|
# @return [Boolean]
|
133
131
|
#
|
132
|
+
# @!attribute [rw] cross_account_configurations
|
133
|
+
# Number of `sourceAccountId` values that have been configured for
|
134
|
+
# cross-account access.
|
135
|
+
# @return [Array<Types::CrossAccountConfiguration>]
|
136
|
+
#
|
134
137
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/CreateInvestigationGroupInput AWS API Documentation
|
135
138
|
#
|
136
139
|
class CreateInvestigationGroupInput < Struct.new(
|
@@ -141,7 +144,8 @@ module Aws::AIOps
|
|
141
144
|
:tags,
|
142
145
|
:tag_key_boundaries,
|
143
146
|
:chatbot_notification_channel,
|
144
|
-
:is_cloud_trail_event_history_enabled
|
147
|
+
:is_cloud_trail_event_history_enabled,
|
148
|
+
:cross_account_configurations)
|
145
149
|
SENSITIVE = []
|
146
150
|
include Aws::Structure
|
147
151
|
end
|
@@ -158,6 +162,22 @@ module Aws::AIOps
|
|
158
162
|
include Aws::Structure
|
159
163
|
end
|
160
164
|
|
165
|
+
# This structure contains information about the cross-account
|
166
|
+
# configuration in the account.
|
167
|
+
#
|
168
|
+
# @!attribute [rw] source_role_arn
|
169
|
+
# The ARN of an existing role which will be used to do investigations
|
170
|
+
# on your behalf.
|
171
|
+
# @return [String]
|
172
|
+
#
|
173
|
+
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/CrossAccountConfiguration AWS API Documentation
|
174
|
+
#
|
175
|
+
class CrossAccountConfiguration < Struct.new(
|
176
|
+
:source_role_arn)
|
177
|
+
SENSITIVE = []
|
178
|
+
include Aws::Structure
|
179
|
+
end
|
180
|
+
|
161
181
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/DeleteInvestigationGroupPolicyOutput AWS API Documentation
|
162
182
|
#
|
163
183
|
class DeleteInvestigationGroupPolicyOutput < Aws::EmptyStructure; end
|
@@ -330,10 +350,16 @@ module Aws::AIOps
|
|
330
350
|
# @return [Array<String>]
|
331
351
|
#
|
332
352
|
# @!attribute [rw] is_cloud_trail_event_history_enabled
|
333
|
-
# Specifies whether
|
334
|
-
#
|
353
|
+
# Specifies whether CloudWatch investigationshas access to change
|
354
|
+
# events that are recorded by CloudTrail.
|
335
355
|
# @return [Boolean]
|
336
356
|
#
|
357
|
+
# @!attribute [rw] cross_account_configurations
|
358
|
+
# Lists the `AWSAccountId` of the accounts configured for
|
359
|
+
# cross-account access and the results of the last scan performed on
|
360
|
+
# each account.
|
361
|
+
# @return [Array<Types::CrossAccountConfiguration>]
|
362
|
+
#
|
337
363
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/GetInvestigationGroupResponse AWS API Documentation
|
338
364
|
#
|
339
365
|
class GetInvestigationGroupResponse < Struct.new(
|
@@ -348,7 +374,8 @@ module Aws::AIOps
|
|
348
374
|
:retention_in_days,
|
349
375
|
:chatbot_notification_channel,
|
350
376
|
:tag_key_boundaries,
|
351
|
-
:is_cloud_trail_event_history_enabled
|
377
|
+
:is_cloud_trail_event_history_enabled,
|
378
|
+
:cross_account_configurations)
|
352
379
|
SENSITIVE = []
|
353
380
|
include Aws::Structure
|
354
381
|
end
|
@@ -438,10 +465,9 @@ module Aws::AIOps
|
|
438
465
|
end
|
439
466
|
|
440
467
|
# @!attribute [rw] resource_arn
|
441
|
-
# The ARN of the
|
442
|
-
#
|
443
|
-
#
|
444
|
-
# investigation groups.
|
468
|
+
# The ARN of the CloudWatch investigations resource that you want to
|
469
|
+
# view tags for. You can use the [ListInvestigationGroups][1]
|
470
|
+
# operation to find the ARNs of investigation groups.
|
445
471
|
#
|
446
472
|
# The ARN format for an investigation group is
|
447
473
|
# `arn:aws:aiops:Region:account-id:investigation-group:investigation-group-id
|
@@ -614,13 +640,12 @@ module Aws::AIOps
|
|
614
640
|
# @return [String]
|
615
641
|
#
|
616
642
|
# @!attribute [rw] role_arn
|
617
|
-
# Specify this field if you want to change the IAM role that
|
618
|
-
#
|
619
|
-
#
|
643
|
+
# Specify this field if you want to change the IAM role that
|
644
|
+
# CloudWatch investigations will use when it gathers investigation
|
645
|
+
# data. To do so, specify the ARN of the new role.
|
620
646
|
#
|
621
647
|
# The permissions in this role determine which of your resources that
|
622
|
-
#
|
623
|
-
# during investigations.
|
648
|
+
# CloudWatch investigations will have access to during investigations.
|
624
649
|
#
|
625
650
|
# For more information, see [EHow to control what data Amazon Q has
|
626
651
|
# access to during investigations][1].
|
@@ -632,10 +657,10 @@ module Aws::AIOps
|
|
632
657
|
#
|
633
658
|
# @!attribute [rw] encryption_configuration
|
634
659
|
# Use this structure if you want to use a customer managed KMS key to
|
635
|
-
# encrypt your investigation data. If you omit this parameter,
|
636
|
-
#
|
637
|
-
#
|
638
|
-
#
|
660
|
+
# encrypt your investigation data. If you omit this parameter,
|
661
|
+
# CloudWatch investigations will use an Amazon Web Services key to
|
662
|
+
# encrypt the data. For more information, see [Encryption of
|
663
|
+
# investigation data][1].
|
639
664
|
#
|
640
665
|
#
|
641
666
|
#
|
@@ -660,15 +685,14 @@ module Aws::AIOps
|
|
660
685
|
# @return [Array<String>]
|
661
686
|
#
|
662
687
|
# @!attribute [rw] chatbot_notification_channel
|
663
|
-
# Use this structure to integrate
|
664
|
-
#
|
665
|
-
#
|
666
|
-
#
|
667
|
-
#
|
668
|
-
#
|
669
|
-
#
|
670
|
-
#
|
671
|
-
# Chatbot][2].
|
688
|
+
# Use this structure to integrate CloudWatch investigations with
|
689
|
+
# Amazon Q in chat applications. This structure is a string array. For
|
690
|
+
# the first string, specify the ARN of an Amazon SNS topic. For the
|
691
|
+
# array of strings, specify the ARNs of one or more Amazon Q in chat
|
692
|
+
# applications configurations that you want to associate with that
|
693
|
+
# topic. For more information about these configuration ARNs, see
|
694
|
+
# [Getting started with Amazon Q in chat applications][1] and
|
695
|
+
# [Resource type defined by Amazon Web Services Chatbot][2].
|
672
696
|
#
|
673
697
|
#
|
674
698
|
#
|
@@ -677,11 +701,17 @@ module Aws::AIOps
|
|
677
701
|
# @return [Hash<String,Array<String>>]
|
678
702
|
#
|
679
703
|
# @!attribute [rw] is_cloud_trail_event_history_enabled
|
680
|
-
# Specify `true` to enable
|
681
|
-
#
|
682
|
-
#
|
704
|
+
# Specify `true` to enable CloudWatch investigations to have access to
|
705
|
+
# change events that are recorded by CloudTrail. The default is
|
706
|
+
# `true`.
|
683
707
|
# @return [Boolean]
|
684
708
|
#
|
709
|
+
# @!attribute [rw] cross_account_configurations
|
710
|
+
# Used to configure cross-account access for an investigation group.
|
711
|
+
# It allows the investigation group to access resources in other
|
712
|
+
# accounts.
|
713
|
+
# @return [Array<Types::CrossAccountConfiguration>]
|
714
|
+
#
|
685
715
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/UpdateInvestigationGroupRequest AWS API Documentation
|
686
716
|
#
|
687
717
|
class UpdateInvestigationGroupRequest < Struct.new(
|
@@ -690,7 +720,8 @@ module Aws::AIOps
|
|
690
720
|
:encryption_configuration,
|
691
721
|
:tag_key_boundaries,
|
692
722
|
:chatbot_notification_channel,
|
693
|
-
:is_cloud_trail_event_history_enabled
|
723
|
+
:is_cloud_trail_event_history_enabled,
|
724
|
+
:cross_account_configurations)
|
694
725
|
SENSITIVE = []
|
695
726
|
include Aws::Structure
|
696
727
|
end
|
data/lib/aws-sdk-aiops.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -93,7 +93,12 @@ module Aws
|
|
93
93
|
?tags: Hash[::String, ::String],
|
94
94
|
?tag_key_boundaries: Array[::String],
|
95
95
|
?chatbot_notification_channel: Hash[::String, Array[::String]],
|
96
|
-
?is_cloud_trail_event_history_enabled: bool
|
96
|
+
?is_cloud_trail_event_history_enabled: bool,
|
97
|
+
?cross_account_configurations: Array[
|
98
|
+
{
|
99
|
+
source_role_arn: ::String?
|
100
|
+
},
|
101
|
+
]
|
97
102
|
) -> _CreateInvestigationGroupResponseSuccess
|
98
103
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _CreateInvestigationGroupResponseSuccess
|
99
104
|
|
@@ -126,6 +131,7 @@ module Aws
|
|
126
131
|
def chatbot_notification_channel: () -> ::Hash[::String, ::Array[::String]]
|
127
132
|
def tag_key_boundaries: () -> ::Array[::String]
|
128
133
|
def is_cloud_trail_event_history_enabled: () -> bool
|
134
|
+
def cross_account_configurations: () -> ::Array[Types::CrossAccountConfiguration]
|
129
135
|
end
|
130
136
|
# https://docs.aws.amazon.com/sdk-for-ruby/v3/api/Aws/AIOps/Client.html#get_investigation_group-instance_method
|
131
137
|
def get_investigation_group: (
|
@@ -210,7 +216,12 @@ module Aws
|
|
210
216
|
},
|
211
217
|
?tag_key_boundaries: Array[::String],
|
212
218
|
?chatbot_notification_channel: Hash[::String, Array[::String]],
|
213
|
-
?is_cloud_trail_event_history_enabled: bool
|
219
|
+
?is_cloud_trail_event_history_enabled: bool,
|
220
|
+
?cross_account_configurations: Array[
|
221
|
+
{
|
222
|
+
source_role_arn: ::String?
|
223
|
+
},
|
224
|
+
]
|
214
225
|
) -> _UpdateInvestigationGroupResponseSuccess
|
215
226
|
| (Hash[Symbol, untyped] params, ?Hash[Symbol, untyped] options) -> _UpdateInvestigationGroupResponseSuccess
|
216
227
|
end
|
data/sig/types.rbs
CHANGED
@@ -27,6 +27,7 @@ module Aws::AIOps
|
|
27
27
|
attr_accessor tag_key_boundaries: ::Array[::String]
|
28
28
|
attr_accessor chatbot_notification_channel: ::Hash[::String, ::Array[::String]]
|
29
29
|
attr_accessor is_cloud_trail_event_history_enabled: bool
|
30
|
+
attr_accessor cross_account_configurations: ::Array[Types::CrossAccountConfiguration]
|
30
31
|
SENSITIVE: []
|
31
32
|
end
|
32
33
|
|
@@ -35,6 +36,11 @@ module Aws::AIOps
|
|
35
36
|
SENSITIVE: []
|
36
37
|
end
|
37
38
|
|
39
|
+
class CrossAccountConfiguration
|
40
|
+
attr_accessor source_role_arn: ::String
|
41
|
+
SENSITIVE: []
|
42
|
+
end
|
43
|
+
|
38
44
|
class DeleteInvestigationGroupPolicyOutput < Aws::EmptyStructure
|
39
45
|
end
|
40
46
|
|
@@ -88,6 +94,7 @@ module Aws::AIOps
|
|
88
94
|
attr_accessor chatbot_notification_channel: ::Hash[::String, ::Array[::String]]
|
89
95
|
attr_accessor tag_key_boundaries: ::Array[::String]
|
90
96
|
attr_accessor is_cloud_trail_event_history_enabled: bool
|
97
|
+
attr_accessor cross_account_configurations: ::Array[Types::CrossAccountConfiguration]
|
91
98
|
SENSITIVE: []
|
92
99
|
end
|
93
100
|
|
@@ -182,6 +189,7 @@ module Aws::AIOps
|
|
182
189
|
attr_accessor tag_key_boundaries: ::Array[::String]
|
183
190
|
attr_accessor chatbot_notification_channel: ::Hash[::String, ::Array[::String]]
|
184
191
|
attr_accessor is_cloud_trail_event_history_enabled: bool
|
192
|
+
attr_accessor cross_account_configurations: ::Array[Types::CrossAccountConfiguration]
|
185
193
|
SENSITIVE: []
|
186
194
|
end
|
187
195
|
|