aws-sdk-aiops 1.3.0 → 1.5.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- checksums.yaml +4 -4
- data/CHANGELOG.md +10 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-aiops/client.rb +77 -87
- data/lib/aws-sdk-aiops/client_api.rb +3 -3
- data/lib/aws-sdk-aiops/types.rb +61 -70
- data/lib/aws-sdk-aiops.rb +1 -1
- data/sig/client.rbs +2 -2
- data/sig/types.rbs +2 -2
- metadata +1 -1
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 48cc75f7fc97f98562ff56b69dd343f261f498b5336d4e84c9ed1c6e5639c665
|
4
|
+
data.tar.gz: 0d7db4ca0bc25aaa6777c3bda08877c4cdb3aad5cbc89f7593ac0bb5ebb24a9c
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: 8e0859a01583c84a527954a41d116b0b05691d9ab75e5f07a0d82e551b5d54f22e566241c3ecbbe56742d855a6a8d2b45058731265c4beeb2abdc521bf375745
|
7
|
+
data.tar.gz: e64b5f04e17d86f0a317e4e65054eae1aa3ef21592e36f44f0708dda06bc503d8cbc7202449e69f0a76d33dd67e3764c3b952a2e79196ad1d5f40c25fb25b73e
|
data/CHANGELOG.md
CHANGED
@@ -1,6 +1,16 @@
|
|
1
1
|
Unreleased Changes
|
2
2
|
------------------
|
3
3
|
|
4
|
+
1.5.0 (2025-08-04)
|
5
|
+
------------------
|
6
|
+
|
7
|
+
* Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
|
8
|
+
|
9
|
+
1.4.0 (2025-08-01)
|
10
|
+
------------------
|
11
|
+
|
12
|
+
* Feature - This release includes fix for InvestigationGroup timestamp conversion issue.
|
13
|
+
|
4
14
|
1.3.0 (2025-07-31)
|
5
15
|
------------------
|
6
16
|
|
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.5.0
|
data/lib/aws-sdk-aiops/client.rb
CHANGED
@@ -95,8 +95,8 @@ module Aws::AIOps
|
|
95
95
|
# class name or an instance of a plugin class.
|
96
96
|
#
|
97
97
|
# @option options [required, Aws::CredentialProvider] :credentials
|
98
|
-
# Your AWS credentials used for authentication. This can be
|
99
|
-
# following classes:
|
98
|
+
# Your AWS credentials used for authentication. This can be any class that includes and implements
|
99
|
+
# `Aws::CredentialProvider`, or instance of any one of the following classes:
|
100
100
|
#
|
101
101
|
# * `Aws::Credentials` - Used for configuring static, non-refreshing
|
102
102
|
# credentials.
|
@@ -124,8 +124,7 @@ module Aws::AIOps
|
|
124
124
|
# * `Aws::CognitoIdentityCredentials` - Used for loading credentials
|
125
125
|
# from the Cognito Identity service.
|
126
126
|
#
|
127
|
-
# When `:credentials` are not configured directly, the following
|
128
|
-
# locations will be searched for credentials:
|
127
|
+
# When `:credentials` are not configured directly, the following locations will be searched for credentials:
|
129
128
|
#
|
130
129
|
# * `Aws.config[:credentials]`
|
131
130
|
#
|
@@ -139,12 +138,10 @@ module Aws::AIOps
|
|
139
138
|
#
|
140
139
|
# * `~/.aws/config`
|
141
140
|
#
|
142
|
-
# * EC2/ECS IMDS instance profile - When used by default, the timeouts
|
143
|
-
#
|
144
|
-
#
|
145
|
-
#
|
146
|
-
# fetching can be disabled by setting `ENV['AWS_EC2_METADATA_DISABLED']`
|
147
|
-
# to `true`.
|
141
|
+
# * EC2/ECS IMDS instance profile - When used by default, the timeouts are very aggressive.
|
142
|
+
# Construct and pass an instance of `Aws::InstanceProfileCredentials` or `Aws::ECSCredentials` to
|
143
|
+
# enable retries and extended timeouts. Instance profile credential fetching can be disabled by
|
144
|
+
# setting `ENV['AWS_EC2_METADATA_DISABLED']` to `true`.
|
148
145
|
#
|
149
146
|
# @option options [required, String] :region
|
150
147
|
# The AWS region to connect to. The configured `:region` is
|
@@ -377,8 +374,8 @@ module Aws::AIOps
|
|
377
374
|
# `Aws::Telemetry::OTelProvider` for telemetry provider.
|
378
375
|
#
|
379
376
|
# @option options [Aws::TokenProvider] :token_provider
|
380
|
-
# Your Bearer token used for authentication. This can be
|
381
|
-
# following classes:
|
377
|
+
# Your Bearer token used for authentication. This can be any class that includes and implements
|
378
|
+
# `Aws::TokenProvider`, or instance of any one of the following classes:
|
382
379
|
#
|
383
380
|
# * `Aws::StaticTokenProvider` - Used for configuring static, non-refreshing
|
384
381
|
# tokens.
|
@@ -498,22 +495,22 @@ module Aws::AIOps
|
|
498
495
|
# group in that Region
|
499
496
|
#
|
500
497
|
# To create an investigation group and set up CloudWatch investigations,
|
501
|
-
# you must be signed in to an IAM principal that has
|
498
|
+
# you must be signed in to an IAM principal that has either the
|
502
499
|
# `AIOpsConsoleAdminPolicy` or the `AdministratorAccess` IAM policy
|
503
500
|
# attached, or to an account that has similar permissions.
|
504
501
|
#
|
505
502
|
# You can configure CloudWatch alarms to start investigations and add
|
506
503
|
# events to investigations. If you create your investigation group with
|
507
504
|
# `CreateInvestigationGroup` and you want to enable alarms to do this,
|
508
|
-
# you must use
|
509
|
-
#
|
505
|
+
# you must use `PutInvestigationGroupPolicy` to create a resource policy
|
506
|
+
# that grants this permission to CloudWatch alarms.
|
510
507
|
#
|
511
|
-
# For more information about configuring CloudWatch alarms
|
512
|
-
# CloudWatch
|
508
|
+
# For more information about configuring CloudWatch alarms, see [Using
|
509
|
+
# Amazon CloudWatch alarms][1]
|
513
510
|
#
|
514
511
|
#
|
515
512
|
#
|
516
|
-
# [1]: https://docs.aws.amazon.com/
|
513
|
+
# [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/AlarmThatSendsEmail.html
|
517
514
|
#
|
518
515
|
# @option params [required, String] :name
|
519
516
|
# Provides a name for the investigation group.
|
@@ -524,8 +521,8 @@ module Aws::AIOps
|
|
524
521
|
# determine which of your resources that CloudWatch investigations will
|
525
522
|
# have access to during investigations.
|
526
523
|
#
|
527
|
-
# For more information, see [How to control what data
|
528
|
-
# access to during investigations][1].
|
524
|
+
# For more information, see [How to control what data CloudWatch
|
525
|
+
# investigations has access to during investigations][1].
|
529
526
|
#
|
530
527
|
#
|
531
528
|
#
|
@@ -564,27 +561,29 @@ module Aws::AIOps
|
|
564
561
|
#
|
565
562
|
# @option params [Array<String>] :tag_key_boundaries
|
566
563
|
# Enter the existing custom tag keys for custom applications in your
|
567
|
-
# system. Resource tags help
|
568
|
-
# unable to discover definite relationships between
|
569
|
-
# example, to discover that an Amazon ECS service depends
|
570
|
-
# RDS database,
|
571
|
-
# sources such as X-Ray and CloudWatch
|
572
|
-
# you haven't deployed these features,
|
573
|
-
#
|
574
|
-
#
|
564
|
+
# system. Resource tags help CloudWatch investigations narrow the search
|
565
|
+
# space when it is unable to discover definite relationships between
|
566
|
+
# resources. For example, to discover that an Amazon ECS service depends
|
567
|
+
# on an Amazon RDS database, CloudWatch investigations can discover this
|
568
|
+
# relationship using data sources such as X-Ray and CloudWatch
|
569
|
+
# Application Signals. However, if you haven't deployed these features,
|
570
|
+
# CloudWatch investigations will attempt to identify possible
|
571
|
+
# relationships. Tag boundaries can be used to narrow the resources that
|
572
|
+
# will be discovered by CloudWatch investigations in these cases.
|
575
573
|
#
|
576
574
|
# You don't need to enter tags created by myApplications or
|
577
|
-
# CloudFormation, because
|
575
|
+
# CloudFormation, because CloudWatch investigations can automatically
|
576
|
+
# detect those tags.
|
578
577
|
#
|
579
578
|
# @option params [Hash<String,Array>] :chatbot_notification_channel
|
580
|
-
# Use this structure to integrate CloudWatch investigations with
|
581
|
-
#
|
582
|
-
#
|
583
|
-
#
|
584
|
-
#
|
585
|
-
#
|
586
|
-
#
|
587
|
-
#
|
579
|
+
# Use this structure to integrate CloudWatch investigations with chat
|
580
|
+
# applications. This structure is a string array. For the first string,
|
581
|
+
# specify the ARN of an Amazon SNS topic. For the array of strings,
|
582
|
+
# specify the ARNs of one or more chat applications configurations that
|
583
|
+
# you want to associate with that topic. For more information about
|
584
|
+
# these configuration ARNs, see [Getting started with Amazon Q in chat
|
585
|
+
# applications][1] and [Resource type defined by Amazon Web Services
|
586
|
+
# Chatbot][2].
|
588
587
|
#
|
589
588
|
#
|
590
589
|
#
|
@@ -596,7 +595,7 @@ module Aws::AIOps
|
|
596
595
|
# change events that are recorded by CloudTrail. The default is `true`.
|
597
596
|
#
|
598
597
|
# @option params [Array<Types::CrossAccountConfiguration>] :cross_account_configurations
|
599
|
-
#
|
598
|
+
# List of `sourceRoleArn` values that have been configured for
|
600
599
|
# cross-account access.
|
601
600
|
#
|
602
601
|
# @return [Types::CreateInvestigationGroupOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
@@ -696,14 +695,14 @@ module Aws::AIOps
|
|
696
695
|
#
|
697
696
|
# @option params [required, String] :identifier
|
698
697
|
# Specify either the name or the ARN of the investigation group that you
|
699
|
-
# want to view.
|
698
|
+
# want to view. This is used to set the name of the investigation group.
|
700
699
|
#
|
701
700
|
# @return [Types::GetInvestigationGroupResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
702
701
|
#
|
703
702
|
# * {Types::GetInvestigationGroupResponse#created_by #created_by} => String
|
704
|
-
# * {Types::GetInvestigationGroupResponse#created_at #created_at} =>
|
703
|
+
# * {Types::GetInvestigationGroupResponse#created_at #created_at} => Integer
|
705
704
|
# * {Types::GetInvestigationGroupResponse#last_modified_by #last_modified_by} => String
|
706
|
-
# * {Types::GetInvestigationGroupResponse#last_modified_at #last_modified_at} =>
|
705
|
+
# * {Types::GetInvestigationGroupResponse#last_modified_at #last_modified_at} => Integer
|
707
706
|
# * {Types::GetInvestigationGroupResponse#name #name} => String
|
708
707
|
# * {Types::GetInvestigationGroupResponse#arn #arn} => String
|
709
708
|
# * {Types::GetInvestigationGroupResponse#role_arn #role_arn} => String
|
@@ -723,9 +722,9 @@ module Aws::AIOps
|
|
723
722
|
# @example Response structure
|
724
723
|
#
|
725
724
|
# resp.created_by #=> String
|
726
|
-
# resp.created_at #=>
|
725
|
+
# resp.created_at #=> Integer
|
727
726
|
# resp.last_modified_by #=> String
|
728
|
-
# resp.last_modified_at #=>
|
727
|
+
# resp.last_modified_at #=> Integer
|
729
728
|
# resp.name #=> String
|
730
729
|
# resp.arn #=> String
|
731
730
|
# resp.role_arn #=> String
|
@@ -750,8 +749,9 @@ module Aws::AIOps
|
|
750
749
|
req.send_request(options)
|
751
750
|
end
|
752
751
|
|
753
|
-
# Returns the IAM resource policy
|
754
|
-
# investigation group.
|
752
|
+
# Returns the JSON of the IAM resource policy associated with the
|
753
|
+
# specified investigation group in a string. For example,
|
754
|
+
# `{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"Service":"aiops.alarms.cloudwatch.amazonaws.com"},"Action":["aiops:CreateInvestigation","aiops:CreateInvestigationEvent"],"Resource":"*","Condition":{"StringEquals":{"aws:SourceAccount":"111122223333"},"ArnLike":{"aws:SourceArn":"arn:aws:cloudwatch:us-east-1:111122223333:alarm:*"}}}]}`.
|
755
755
|
#
|
756
756
|
# @option params [required, String] :identifier
|
757
757
|
# Specify either the name or the ARN of the investigation group that you
|
@@ -827,17 +827,13 @@ module Aws::AIOps
|
|
827
827
|
#
|
828
828
|
# @option params [required, String] :resource_arn
|
829
829
|
# The ARN of the CloudWatch investigations resource that you want to
|
830
|
-
# view tags for. You can use the
|
831
|
-
#
|
830
|
+
# view tags for. You can use the `ListInvestigationGroups` operation to
|
831
|
+
# find the ARNs of investigation groups.
|
832
832
|
#
|
833
833
|
# The ARN format for an investigation group is
|
834
834
|
# `arn:aws:aiops:Region:account-id:investigation-group:investigation-group-id
|
835
835
|
# `.
|
836
836
|
#
|
837
|
-
#
|
838
|
-
#
|
839
|
-
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html
|
840
|
-
#
|
841
837
|
# @return [Types::ListTagsForResourceOutput] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
842
838
|
#
|
843
839
|
# * {Types::ListTagsForResourceOutput#tags #tags} => Hash<String,String>
|
@@ -870,13 +866,13 @@ module Aws::AIOps
|
|
870
866
|
# add events to investigations, you must use this operation to create a
|
871
867
|
# policy similar to this example.
|
872
868
|
#
|
873
|
-
# `{ "Version": "2008-10-17", "Statement": [{ "Effect": "Allow",
|
869
|
+
# ` { "Version": "2008-10-17", "Statement": [ { "Effect": "Allow",
|
874
870
|
# "Principal": { "Service": "aiops.alarms.cloudwatch.amazonaws.com" },
|
875
|
-
# "Action": ["aiops:CreateInvestigation",
|
876
|
-
# "aiops:CreateInvestigationEvent"], "Resource": "*", "Condition": {
|
871
|
+
# "Action": [ "aiops:CreateInvestigation",
|
872
|
+
# "aiops:CreateInvestigationEvent" ], "Resource": "*", "Condition": {
|
877
873
|
# "StringEquals": { "aws:SourceAccount": "account-id" }, "ArnLike": {
|
878
|
-
# "aws:SourceArn": "arn:aws:cloudwatch:region:account-id:alarm:*" } } }
|
879
|
-
# }`
|
874
|
+
# "aws:SourceArn": "arn:aws:cloudwatch:region:account-id:alarm:*" } } }
|
875
|
+
# ] } `
|
880
876
|
#
|
881
877
|
# @option params [required, String] :identifier
|
882
878
|
# Specify either the name or the ARN of the investigation group that you
|
@@ -922,13 +918,9 @@ module Aws::AIOps
|
|
922
918
|
#
|
923
919
|
# @option params [required, String] :resource_arn
|
924
920
|
# The Amazon Resource Name (ARN) of the resource that you want to apply
|
925
|
-
# the tags to. You can use the
|
921
|
+
# the tags to. You can use the `ListInvestigationGroups` operation to
|
926
922
|
# find the ARNs of investigation groups.
|
927
923
|
#
|
928
|
-
#
|
929
|
-
#
|
930
|
-
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html
|
931
|
-
#
|
932
924
|
# @option params [required, Hash<String,String>] :tags
|
933
925
|
# The list of key-value pairs to associate with the resource.
|
934
926
|
#
|
@@ -956,12 +948,8 @@ module Aws::AIOps
|
|
956
948
|
#
|
957
949
|
# @option params [required, String] :resource_arn
|
958
950
|
# The Amazon Resource Name (ARN) of the resource that you want to remove
|
959
|
-
# the tags from. You can use the
|
960
|
-
#
|
961
|
-
#
|
962
|
-
#
|
963
|
-
#
|
964
|
-
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html
|
951
|
+
# the tags from. You can use the`ListInvestigationGroups` operation to
|
952
|
+
# find the ARNs of investigation groups.
|
965
953
|
#
|
966
954
|
# @option params [required, Array<String>] :tag_keys
|
967
955
|
# The list of tag keys to remove from the resource.
|
@@ -998,8 +986,8 @@ module Aws::AIOps
|
|
998
986
|
# The permissions in this role determine which of your resources that
|
999
987
|
# CloudWatch investigations will have access to during investigations.
|
1000
988
|
#
|
1001
|
-
# For more information, see [
|
1002
|
-
# access to during investigations][1].
|
989
|
+
# For more information, see [How to control what data CloudWatch
|
990
|
+
# investigations has access to during investigations][1].
|
1003
991
|
#
|
1004
992
|
#
|
1005
993
|
#
|
@@ -1018,27 +1006,29 @@ module Aws::AIOps
|
|
1018
1006
|
#
|
1019
1007
|
# @option params [Array<String>] :tag_key_boundaries
|
1020
1008
|
# Enter the existing custom tag keys for custom applications in your
|
1021
|
-
# system. Resource tags help
|
1022
|
-
# unable to discover definite relationships between
|
1023
|
-
# example, to discover that an Amazon ECS service depends
|
1024
|
-
# RDS database,
|
1025
|
-
# sources such as X-Ray and CloudWatch
|
1026
|
-
# you haven't deployed these features,
|
1027
|
-
#
|
1028
|
-
#
|
1009
|
+
# system. Resource tags help CloudWatch investigations narrow the search
|
1010
|
+
# space when it is unable to discover definite relationships between
|
1011
|
+
# resources. For example, to discover that an Amazon ECS service depends
|
1012
|
+
# on an Amazon RDS database, CloudWatch investigations can discover this
|
1013
|
+
# relationship using data sources such as X-Ray and CloudWatch
|
1014
|
+
# Application Signals. However, if you haven't deployed these features,
|
1015
|
+
# CloudWatch investigations will attempt to identify possible
|
1016
|
+
# relationships. Tag boundaries can be used to narrow the resources that
|
1017
|
+
# will be discovered by CloudWatch investigations in these cases.
|
1029
1018
|
#
|
1030
1019
|
# You don't need to enter tags created by myApplications or
|
1031
|
-
# CloudFormation, because
|
1020
|
+
# CloudFormation, because CloudWatch investigations can automatically
|
1021
|
+
# detect those tags.
|
1032
1022
|
#
|
1033
1023
|
# @option params [Hash<String,Array>] :chatbot_notification_channel
|
1034
|
-
# Use this structure to integrate CloudWatch investigations with
|
1035
|
-
#
|
1036
|
-
#
|
1037
|
-
#
|
1038
|
-
#
|
1039
|
-
#
|
1040
|
-
#
|
1041
|
-
#
|
1024
|
+
# Use this structure to integrate CloudWatch investigations with chat
|
1025
|
+
# applications. This structure is a string array. For the first string,
|
1026
|
+
# specify the ARN of an Amazon SNS topic. For the array of strings,
|
1027
|
+
# specify the ARNs of one or more chat applications configurations that
|
1028
|
+
# you want to associate with that topic. For more information about
|
1029
|
+
# these configuration ARNs, see [Getting started with Amazon Q in chat
|
1030
|
+
# applications][1] and [Resource type defined by Amazon Web Services
|
1031
|
+
# Chatbot][2].
|
1042
1032
|
#
|
1043
1033
|
#
|
1044
1034
|
#
|
@@ -1103,7 +1093,7 @@ module Aws::AIOps
|
|
1103
1093
|
tracer: tracer
|
1104
1094
|
)
|
1105
1095
|
context[:gem_name] = 'aws-sdk-aiops'
|
1106
|
-
context[:gem_version] = '1.
|
1096
|
+
context[:gem_version] = '1.5.0'
|
1107
1097
|
Seahorse::Client::Request.new(handlers, context)
|
1108
1098
|
end
|
1109
1099
|
|
@@ -47,6 +47,7 @@ module Aws::AIOps
|
|
47
47
|
ListInvestigationGroupsOutput = Shapes::StructureShape.new(name: 'ListInvestigationGroupsOutput')
|
48
48
|
ListTagsForResourceOutput = Shapes::StructureShape.new(name: 'ListTagsForResourceOutput')
|
49
49
|
ListTagsForResourceRequest = Shapes::StructureShape.new(name: 'ListTagsForResourceRequest')
|
50
|
+
Long = Shapes::IntegerShape.new(name: 'Long')
|
50
51
|
PutInvestigationGroupPolicyRequest = Shapes::StructureShape.new(name: 'PutInvestigationGroupPolicyRequest')
|
51
52
|
PutInvestigationGroupPolicyResponse = Shapes::StructureShape.new(name: 'PutInvestigationGroupPolicyResponse')
|
52
53
|
ResourceNotFoundException = Shapes::StructureShape.new(name: 'ResourceNotFoundException')
|
@@ -65,7 +66,6 @@ module Aws::AIOps
|
|
65
66
|
TagValue = Shapes::StringShape.new(name: 'TagValue')
|
66
67
|
Tags = Shapes::MapShape.new(name: 'Tags')
|
67
68
|
ThrottlingException = Shapes::StructureShape.new(name: 'ThrottlingException')
|
68
|
-
Timestamp = Shapes::TimestampShape.new(name: 'Timestamp')
|
69
69
|
UntagResourceRequest = Shapes::StructureShape.new(name: 'UntagResourceRequest')
|
70
70
|
UntagResourceResponse = Shapes::StructureShape.new(name: 'UntagResourceResponse')
|
71
71
|
UpdateInvestigationGroupOutput = Shapes::StructureShape.new(name: 'UpdateInvestigationGroupOutput')
|
@@ -128,9 +128,9 @@ module Aws::AIOps
|
|
128
128
|
GetInvestigationGroupRequest.struct_class = Types::GetInvestigationGroupRequest
|
129
129
|
|
130
130
|
GetInvestigationGroupResponse.add_member(:created_by, Shapes::ShapeRef.new(shape: IdentifierStringWithPatternAndLengthLimits, location_name: "createdBy"))
|
131
|
-
GetInvestigationGroupResponse.add_member(:created_at, Shapes::ShapeRef.new(shape:
|
131
|
+
GetInvestigationGroupResponse.add_member(:created_at, Shapes::ShapeRef.new(shape: Long, location_name: "createdAt"))
|
132
132
|
GetInvestigationGroupResponse.add_member(:last_modified_by, Shapes::ShapeRef.new(shape: IdentifierStringWithPatternAndLengthLimits, location_name: "lastModifiedBy"))
|
133
|
-
GetInvestigationGroupResponse.add_member(:last_modified_at, Shapes::ShapeRef.new(shape:
|
133
|
+
GetInvestigationGroupResponse.add_member(:last_modified_at, Shapes::ShapeRef.new(shape: Long, location_name: "lastModifiedAt"))
|
134
134
|
GetInvestigationGroupResponse.add_member(:name, Shapes::ShapeRef.new(shape: StringWithPatternAndLengthLimits, location_name: "name"))
|
135
135
|
GetInvestigationGroupResponse.add_member(:arn, Shapes::ShapeRef.new(shape: InvestigationGroupArn, location_name: "arn"))
|
136
136
|
GetInvestigationGroupResponse.add_member(:role_arn, Shapes::ShapeRef.new(shape: RoleArn, location_name: "roleArn"))
|
data/lib/aws-sdk-aiops/types.rb
CHANGED
@@ -47,8 +47,8 @@ module Aws::AIOps
|
|
47
47
|
# determine which of your resources that CloudWatch investigations
|
48
48
|
# will have access to during investigations.
|
49
49
|
#
|
50
|
-
# For more information, see [How to control what data
|
51
|
-
# access to during investigations][1].
|
50
|
+
# For more information, see [How to control what data CloudWatch
|
51
|
+
# investigations has access to during investigations][1].
|
52
52
|
#
|
53
53
|
#
|
54
54
|
#
|
@@ -92,30 +92,31 @@ module Aws::AIOps
|
|
92
92
|
#
|
93
93
|
# @!attribute [rw] tag_key_boundaries
|
94
94
|
# Enter the existing custom tag keys for custom applications in your
|
95
|
-
# system. Resource tags help
|
96
|
-
# is unable to discover definite relationships
|
97
|
-
# example, to discover that an Amazon ECS
|
98
|
-
#
|
99
|
-
# sources such as X-Ray and
|
100
|
-
# if you haven't deployed
|
101
|
-
#
|
102
|
-
#
|
103
|
-
#
|
95
|
+
# system. Resource tags help CloudWatch investigations narrow the
|
96
|
+
# search space when it is unable to discover definite relationships
|
97
|
+
# between resources. For example, to discover that an Amazon ECS
|
98
|
+
# service depends on an Amazon RDS database, CloudWatch investigations
|
99
|
+
# can discover this relationship using data sources such as X-Ray and
|
100
|
+
# CloudWatch Application Signals. However, if you haven't deployed
|
101
|
+
# these features, CloudWatch investigations will attempt to identify
|
102
|
+
# possible relationships. Tag boundaries can be used to narrow the
|
103
|
+
# resources that will be discovered by CloudWatch investigations in
|
104
|
+
# these cases.
|
104
105
|
#
|
105
106
|
# You don't need to enter tags created by myApplications or
|
106
|
-
# CloudFormation, because
|
107
|
-
# tags.
|
107
|
+
# CloudFormation, because CloudWatch investigations can automatically
|
108
|
+
# detect those tags.
|
108
109
|
# @return [Array<String>]
|
109
110
|
#
|
110
111
|
# @!attribute [rw] chatbot_notification_channel
|
111
|
-
# Use this structure to integrate CloudWatch investigations with
|
112
|
-
#
|
113
|
-
#
|
114
|
-
#
|
115
|
-
#
|
116
|
-
#
|
117
|
-
#
|
118
|
-
#
|
112
|
+
# Use this structure to integrate CloudWatch investigations with chat
|
113
|
+
# applications. This structure is a string array. For the first
|
114
|
+
# string, specify the ARN of an Amazon SNS topic. For the array of
|
115
|
+
# strings, specify the ARNs of one or more chat applications
|
116
|
+
# configurations that you want to associate with that topic. For more
|
117
|
+
# information about these configuration ARNs, see [Getting started
|
118
|
+
# with Amazon Q in chat applications][1] and [Resource type defined by
|
119
|
+
# Amazon Web Services Chatbot][2].
|
119
120
|
#
|
120
121
|
#
|
121
122
|
#
|
@@ -130,7 +131,7 @@ module Aws::AIOps
|
|
130
131
|
# @return [Boolean]
|
131
132
|
#
|
132
133
|
# @!attribute [rw] cross_account_configurations
|
133
|
-
#
|
134
|
+
# List of `sourceRoleArn` values that have been configured for
|
134
135
|
# cross-account access.
|
135
136
|
# @return [Array<Types::CrossAccountConfiguration>]
|
136
137
|
#
|
@@ -213,7 +214,7 @@ module Aws::AIOps
|
|
213
214
|
#
|
214
215
|
# @!attribute [rw] type
|
215
216
|
# Displays whether investigation data is encrypted by a customer
|
216
|
-
# managed key or an Amazon Web Services owned
|
217
|
+
# managed key or an Amazon Web Services owned key.
|
217
218
|
# @return [String]
|
218
219
|
#
|
219
220
|
# @!attribute [rw] kms_key_id
|
@@ -277,7 +278,8 @@ module Aws::AIOps
|
|
277
278
|
|
278
279
|
# @!attribute [rw] identifier
|
279
280
|
# Specify either the name or the ARN of the investigation group that
|
280
|
-
# you want to view.
|
281
|
+
# you want to view. This is used to set the name of the investigation
|
282
|
+
# group.
|
281
283
|
# @return [String]
|
282
284
|
#
|
283
285
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/GetInvestigationGroupRequest AWS API Documentation
|
@@ -294,7 +296,7 @@ module Aws::AIOps
|
|
294
296
|
#
|
295
297
|
# @!attribute [rw] created_at
|
296
298
|
# The date and time that the investigation group was created.
|
297
|
-
# @return [
|
299
|
+
# @return [Integer]
|
298
300
|
#
|
299
301
|
# @!attribute [rw] last_modified_by
|
300
302
|
# The name of the user who created the investigation group.
|
@@ -303,7 +305,7 @@ module Aws::AIOps
|
|
303
305
|
# @!attribute [rw] last_modified_at
|
304
306
|
# The date and time that the investigation group was most recently
|
305
307
|
# modified.
|
306
|
-
# @return [
|
308
|
+
# @return [Integer]
|
307
309
|
#
|
308
310
|
# @!attribute [rw] name
|
309
311
|
# The name of the investigation group.
|
@@ -330,11 +332,11 @@ module Aws::AIOps
|
|
330
332
|
#
|
331
333
|
# @!attribute [rw] chatbot_notification_channel
|
332
334
|
# This structure is a string array. The first string is the ARN of a
|
333
|
-
# Amazon SNS topic. The array of strings display the ARNs of
|
334
|
-
#
|
335
|
-
#
|
336
|
-
#
|
337
|
-
#
|
335
|
+
# Amazon SNS topic. The array of strings display the ARNs of chat
|
336
|
+
# applications configurations that are associated with that topic. For
|
337
|
+
# more information about these configuration ARNs, see [Getting
|
338
|
+
# started with Amazon Q in chat applications][1] and [Resource type
|
339
|
+
# defined by Amazon Web Services Chatbot][2].
|
338
340
|
#
|
339
341
|
#
|
340
342
|
#
|
@@ -345,8 +347,8 @@ module Aws::AIOps
|
|
345
347
|
# @!attribute [rw] tag_key_boundaries
|
346
348
|
# Displays the custom tag keys for custom applications in your system
|
347
349
|
# that you have specified in the investigation group. Resource tags
|
348
|
-
# help
|
349
|
-
# definite relationships between resources.
|
350
|
+
# help CloudWatch investigations narrow the search space when it is
|
351
|
+
# unable to discover definite relationships between resources.
|
350
352
|
# @return [Array<String>]
|
351
353
|
#
|
352
354
|
# @!attribute [rw] is_cloud_trail_event_history_enabled
|
@@ -466,16 +468,12 @@ module Aws::AIOps
|
|
466
468
|
|
467
469
|
# @!attribute [rw] resource_arn
|
468
470
|
# The ARN of the CloudWatch investigations resource that you want to
|
469
|
-
# view tags for. You can use the
|
470
|
-
#
|
471
|
+
# view tags for. You can use the `ListInvestigationGroups` operation
|
472
|
+
# to find the ARNs of investigation groups.
|
471
473
|
#
|
472
474
|
# The ARN format for an investigation group is
|
473
475
|
# `arn:aws:aiops:Region:account-id:investigation-group:investigation-group-id
|
474
476
|
# `.
|
475
|
-
#
|
476
|
-
#
|
477
|
-
#
|
478
|
-
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html
|
479
477
|
# @return [String]
|
480
478
|
#
|
481
479
|
# @see http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/ListTagsForResourceRequest AWS API Documentation
|
@@ -564,12 +562,8 @@ module Aws::AIOps
|
|
564
562
|
|
565
563
|
# @!attribute [rw] resource_arn
|
566
564
|
# The Amazon Resource Name (ARN) of the resource that you want to
|
567
|
-
# apply the tags to. You can use the
|
565
|
+
# apply the tags to. You can use the `ListInvestigationGroups`
|
568
566
|
# operation to find the ARNs of investigation groups.
|
569
|
-
#
|
570
|
-
#
|
571
|
-
#
|
572
|
-
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html
|
573
567
|
# @return [String]
|
574
568
|
#
|
575
569
|
# @!attribute [rw] tags
|
@@ -605,12 +599,8 @@ module Aws::AIOps
|
|
605
599
|
|
606
600
|
# @!attribute [rw] resource_arn
|
607
601
|
# The Amazon Resource Name (ARN) of the resource that you want to
|
608
|
-
# remove the tags from. You can use the
|
602
|
+
# remove the tags from. You can use the`ListInvestigationGroups`
|
609
603
|
# operation to find the ARNs of investigation groups.
|
610
|
-
#
|
611
|
-
#
|
612
|
-
#
|
613
|
-
# [1]: https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html
|
614
604
|
# @return [String]
|
615
605
|
#
|
616
606
|
# @!attribute [rw] tag_keys
|
@@ -647,8 +637,8 @@ module Aws::AIOps
|
|
647
637
|
# The permissions in this role determine which of your resources that
|
648
638
|
# CloudWatch investigations will have access to during investigations.
|
649
639
|
#
|
650
|
-
# For more information, see [
|
651
|
-
# access to during investigations][1].
|
640
|
+
# For more information, see [How to control what data CloudWatch
|
641
|
+
# investigations has access to during investigations][1].
|
652
642
|
#
|
653
643
|
#
|
654
644
|
#
|
@@ -669,30 +659,31 @@ module Aws::AIOps
|
|
669
659
|
#
|
670
660
|
# @!attribute [rw] tag_key_boundaries
|
671
661
|
# Enter the existing custom tag keys for custom applications in your
|
672
|
-
# system. Resource tags help
|
673
|
-
# is unable to discover definite relationships
|
674
|
-
# example, to discover that an Amazon ECS
|
675
|
-
#
|
676
|
-
# sources such as X-Ray and
|
677
|
-
# if you haven't deployed
|
678
|
-
#
|
679
|
-
#
|
680
|
-
#
|
662
|
+
# system. Resource tags help CloudWatch investigations narrow the
|
663
|
+
# search space when it is unable to discover definite relationships
|
664
|
+
# between resources. For example, to discover that an Amazon ECS
|
665
|
+
# service depends on an Amazon RDS database, CloudWatch investigations
|
666
|
+
# can discover this relationship using data sources such as X-Ray and
|
667
|
+
# CloudWatch Application Signals. However, if you haven't deployed
|
668
|
+
# these features, CloudWatch investigations will attempt to identify
|
669
|
+
# possible relationships. Tag boundaries can be used to narrow the
|
670
|
+
# resources that will be discovered by CloudWatch investigations in
|
671
|
+
# these cases.
|
681
672
|
#
|
682
673
|
# You don't need to enter tags created by myApplications or
|
683
|
-
# CloudFormation, because
|
684
|
-
# tags.
|
674
|
+
# CloudFormation, because CloudWatch investigations can automatically
|
675
|
+
# detect those tags.
|
685
676
|
# @return [Array<String>]
|
686
677
|
#
|
687
678
|
# @!attribute [rw] chatbot_notification_channel
|
688
|
-
# Use this structure to integrate CloudWatch investigations with
|
689
|
-
#
|
690
|
-
#
|
691
|
-
#
|
692
|
-
#
|
693
|
-
#
|
694
|
-
#
|
695
|
-
#
|
679
|
+
# Use this structure to integrate CloudWatch investigations with chat
|
680
|
+
# applications. This structure is a string array. For the first
|
681
|
+
# string, specify the ARN of an Amazon SNS topic. For the array of
|
682
|
+
# strings, specify the ARNs of one or more chat applications
|
683
|
+
# configurations that you want to associate with that topic. For more
|
684
|
+
# information about these configuration ARNs, see [Getting started
|
685
|
+
# with Amazon Q in chat applications][1] and [Resource type defined by
|
686
|
+
# Amazon Web Services Chatbot][2].
|
696
687
|
#
|
697
688
|
#
|
698
689
|
#
|
data/lib/aws-sdk-aiops.rb
CHANGED
data/sig/client.rbs
CHANGED
@@ -121,9 +121,9 @@ module Aws
|
|
121
121
|
interface _GetInvestigationGroupResponseSuccess
|
122
122
|
include ::Seahorse::Client::_ResponseSuccess[Types::GetInvestigationGroupResponse]
|
123
123
|
def created_by: () -> ::String
|
124
|
-
def created_at: () -> ::
|
124
|
+
def created_at: () -> ::Integer
|
125
125
|
def last_modified_by: () -> ::String
|
126
|
-
def last_modified_at: () -> ::
|
126
|
+
def last_modified_at: () -> ::Integer
|
127
127
|
def name: () -> ::String
|
128
128
|
def arn: () -> ::String
|
129
129
|
def role_arn: () -> ::String
|
data/sig/types.rbs
CHANGED
@@ -83,9 +83,9 @@ module Aws::AIOps
|
|
83
83
|
|
84
84
|
class GetInvestigationGroupResponse
|
85
85
|
attr_accessor created_by: ::String
|
86
|
-
attr_accessor created_at: ::
|
86
|
+
attr_accessor created_at: ::Integer
|
87
87
|
attr_accessor last_modified_by: ::String
|
88
|
-
attr_accessor last_modified_at: ::
|
88
|
+
attr_accessor last_modified_at: ::Integer
|
89
89
|
attr_accessor name: ::String
|
90
90
|
attr_accessor arn: ::String
|
91
91
|
attr_accessor role_arn: ::String
|