aws-sdk-cloudwatch 1.46.0 → 1.47.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1347762bcffca8868d6ad9213c7cfd1d938f9bd0ff3d625fa1150b5748b79258
4
- data.tar.gz: 004300b9fb06235b2e748fd7a948479bbb4a432f6e0f3b28a254356f62f9bf16
3
+ metadata.gz: 2379c5d1c9e958d02b06e4cec8bfdb9873dcd5e5144d94d91e89fb88b68fe60e
4
+ data.tar.gz: c757be7573fe87a3ac61fafd2d0a8065548bbed0f87f27a96d2d59c740c3adfa
5
5
  SHA512:
6
- metadata.gz: 3dd159ec62cf5bd822acde7677769e944236e22504d2cb03946063627ec1201e1be35e588aedf10a7c05f42667cfdcc90e807e3042b3561790026746d1f49418
7
- data.tar.gz: 7535b020ff585ca226f974cf0505f4d2d9b950beace1f7b61fc4af3d67b5ac3da89cf29db57b5c916d5138837b20d0998ede397cae04df03e7df9742d95a7ac6
6
+ metadata.gz: 7180e5482b172af9e6a4433172ad16dc83ab93deec325072f2e243ed57776652ec7e4c377826c5a61270a1c0de91f20024e2f3d3e8e35ed983bb56c69420a67e
7
+ data.tar.gz: 4df74f92d003542f141d3458b279e381da7521ece86a7c3e5a1a6eb936dbbe20b23ebe921b07e5720dbd108546cfdff8a1a0eebe1d6efe7f130d9ca9abfa4e37
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-cloudwatch/customizations'
52
52
  # @!group service
53
53
  module Aws::CloudWatch
54
54
 
55
- GEM_VERSION = '1.46.0'
55
+ GEM_VERSION = '1.47.0'
56
56
 
57
57
  end
@@ -557,7 +557,7 @@ module Aws::CloudWatch
557
557
  end
558
558
 
559
559
  # Retrieves the specified alarms. You can filter the results by
560
- # specifying a a prefix for the alarm name, the alarm state, or a prefix
560
+ # specifying a prefix for the alarm name, the alarm state, or a prefix
561
561
  # for any action.
562
562
  #
563
563
  # @option params [Array<String>] :alarm_names
@@ -2062,6 +2062,9 @@ module Aws::CloudWatch
2062
2062
  # the update completely overwrites the previous configuration of the
2063
2063
  # alarm.
2064
2064
  #
2065
+ # If you are an IAM user, you must have `iam:CreateServiceLinkedRole` to
2066
+ # create a composite alarm that has Systems Manager OpsItem actions.
2067
+ #
2065
2068
  # @option params [Boolean] :actions_enabled
2066
2069
  # Indicates whether actions should be executed during any changes to the
2067
2070
  # alarm state of the composite alarm. The default is `TRUE`.
@@ -2071,7 +2074,8 @@ module Aws::CloudWatch
2071
2074
  # state from any other state. Each action is specified as an Amazon
2072
2075
  # Resource Name (ARN).
2073
2076
  #
2074
- # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name `
2077
+ # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name ` \|
2078
+ # `arn:aws:ssm:region:account-id:opsitem:severity `
2075
2079
  #
2076
2080
  # @option params [String] :alarm_description
2077
2081
  # The description for the composite alarm.
@@ -2345,36 +2349,17 @@ module Aws::CloudWatch
2345
2349
  # If you are an IAM user, you must have Amazon EC2 permissions for some
2346
2350
  # alarm operations:
2347
2351
  #
2348
- # * `iam:CreateServiceLinkedRole` for all alarms with EC2 actions
2349
- #
2350
- # * `ec2:DescribeInstanceStatus` and `ec2:DescribeInstances` for all
2351
- # alarms on EC2 instance status metrics
2352
- #
2353
- # * `ec2:StopInstances` for alarms with stop actions
2354
- #
2355
- # * `ec2:TerminateInstances` for alarms with terminate actions
2356
- #
2357
- # * No specific permissions are needed for alarms with recover actions
2358
- #
2359
- # If you have read/write permissions for Amazon CloudWatch but not for
2360
- # Amazon EC2, you can still create an alarm, but the stop or terminate
2361
- # actions are not performed. However, if you are later granted the
2362
- # required permissions, the alarm actions that you created earlier are
2363
- # performed.
2352
+ # * The `iam:CreateServiceLinkedRole` for all alarms with EC2 actions
2364
2353
  #
2365
- # If you are using an IAM role (for example, an EC2 instance profile),
2366
- # you cannot stop or terminate the instance using alarm actions.
2367
- # However, you can still see the alarm state and perform any other
2368
- # actions such as Amazon SNS notifications or Auto Scaling policies.
2369
- #
2370
- # If you are using temporary security credentials granted using AWS STS,
2371
- # you cannot stop or terminate an EC2 instance using alarm actions.
2354
+ # * The `iam:CreateServiceLinkedRole` to create an alarm with Systems
2355
+ # Manager OpsItem actions.
2372
2356
  #
2373
2357
  # The first time you create an alarm in the AWS Management Console, the
2374
2358
  # CLI, or by using the PutMetricAlarm API, CloudWatch creates the
2375
- # necessary service-linked role for you. The service-linked role is
2376
- # called `AWSServiceRoleForCloudWatchEvents`. For more information, see
2377
- # [AWS service-linked role][1].
2359
+ # necessary service-linked rolea for you. The service-linked roles are
2360
+ # called `AWSServiceRoleForCloudWatchEvents` and
2361
+ # `AWSServiceRoleForCloudWatchAlarms_ActionSSM`. For more information,
2362
+ # see [AWS service-linked role][1].
2378
2363
  #
2379
2364
  #
2380
2365
  #
@@ -2421,7 +2406,7 @@ module Aws::CloudWatch
2421
2406
  # `arn:aws:automate:region:ec2:reboot` \|
2422
2407
  # `arn:aws:sns:region:account-id:sns-topic-name ` \|
2423
2408
  # `arn:aws:autoscaling:region:account-id:scalingPolicy:policy-id:autoScalingGroupName/group-friendly-name:policyName/policy-friendly-name
2424
- # `
2409
+ # ` \| `arn:aws:ssm:region:account-id:opsitem:severity `
2425
2410
  #
2426
2411
  # Valid Values (for use with IAM roles):
2427
2412
  # `arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0`
@@ -2622,6 +2607,15 @@ module Aws::CloudWatch
2622
2607
  # use them to scope user permissions by granting a user permission to
2623
2608
  # access or change only resources with certain tag values.
2624
2609
  #
2610
+ # If you are using this operation to update an existing alarm, any tags
2611
+ # you specify in this parameter are ignored. To change the tags of an
2612
+ # existing alarm, use [TagResource][1] or [UntagResource][2].
2613
+ #
2614
+ #
2615
+ #
2616
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_TagResource.html
2617
+ # [2]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_UntagResource.html
2618
+ #
2625
2619
  # @option params [String] :threshold_metric_id
2626
2620
  # If this is an alarm based on an anomaly detection model, make this
2627
2621
  # value match the ID of the `ANOMALY_DETECTION_BAND` function.
@@ -2987,7 +2981,7 @@ module Aws::CloudWatch
2987
2981
  params: params,
2988
2982
  config: config)
2989
2983
  context[:gem_name] = 'aws-sdk-cloudwatch'
2990
- context[:gem_version] = '1.46.0'
2984
+ context[:gem_version] = '1.47.0'
2991
2985
  Seahorse::Client::Request.new(handlers, context)
2992
2986
  end
2993
2987
 
@@ -399,7 +399,7 @@ module Aws::CloudWatch
399
399
  # `arn:aws:automate:region:ec2:reboot` \|
400
400
  # `arn:aws:sns:region:account-id:sns-topic-name ` \|
401
401
  # `arn:aws:autoscaling:region:account-id:scalingPolicy:policy-id:autoScalingGroupName/group-friendly-name:policyName/policy-friendly-name
402
- # `
402
+ # ` \| `arn:aws:ssm:region:account-id:opsitem:severity `
403
403
  #
404
404
  # Valid Values (for use with IAM roles):
405
405
  # `arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0`
@@ -572,6 +572,15 @@ module Aws::CloudWatch
572
572
  # Tags can help you organize and categorize your resources. You can also
573
573
  # use them to scope user permissions by granting a user permission to
574
574
  # access or change only resources with certain tag values.
575
+ #
576
+ # If you are using this operation to update an existing alarm, any tags
577
+ # you specify in this parameter are ignored. To change the tags of an
578
+ # existing alarm, use [TagResource][1] or [UntagResource][2].
579
+ #
580
+ #
581
+ #
582
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_TagResource.html
583
+ # [2]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_UntagResource.html
575
584
  # @option options [String] :threshold_metric_id
576
585
  # If this is an alarm based on an anomaly detection model, make this
577
586
  # value match the ID of the `ANOMALY_DETECTION_BAND` function.
@@ -2876,7 +2876,8 @@ module Aws::CloudWatch
2876
2876
  # state from any other state. Each action is specified as an Amazon
2877
2877
  # Resource Name (ARN).
2878
2878
  #
2879
- # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name `
2879
+ # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name ` \|
2880
+ # `arn:aws:ssm:region:account-id:opsitem:severity `
2880
2881
  # @return [Array<String>]
2881
2882
  #
2882
2883
  # @!attribute [rw] alarm_description
@@ -3221,7 +3222,7 @@ module Aws::CloudWatch
3221
3222
  # `arn:aws:automate:region:ec2:reboot` \|
3222
3223
  # `arn:aws:sns:region:account-id:sns-topic-name ` \|
3223
3224
  # `arn:aws:autoscaling:region:account-id:scalingPolicy:policy-id:autoScalingGroupName/group-friendly-name:policyName/policy-friendly-name
3224
- # `
3225
+ # ` \| `arn:aws:ssm:region:account-id:opsitem:severity `
3225
3226
  #
3226
3227
  # Valid Values (for use with IAM roles):
3227
3228
  # `arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0`
@@ -3441,6 +3442,15 @@ module Aws::CloudWatch
3441
3442
  # also use them to scope user permissions by granting a user
3442
3443
  # permission to access or change only resources with certain tag
3443
3444
  # values.
3445
+ #
3446
+ # If you are using this operation to update an existing alarm, any
3447
+ # tags you specify in this parameter are ignored. To change the tags
3448
+ # of an existing alarm, use [TagResource][1] or [UntagResource][2].
3449
+ #
3450
+ #
3451
+ #
3452
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_TagResource.html
3453
+ # [2]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_UntagResource.html
3444
3454
  # @return [Array<Types::Tag>]
3445
3455
  #
3446
3456
  # @!attribute [rw] threshold_metric_id
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudwatch
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.46.0
4
+ version: 1.47.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-11-04 00:00:00.000000000 Z
11
+ date: 2020-12-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core