aws-sdk-cloudwatch 1.46.0 → 1.47.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: 1347762bcffca8868d6ad9213c7cfd1d938f9bd0ff3d625fa1150b5748b79258
4
- data.tar.gz: 004300b9fb06235b2e748fd7a948479bbb4a432f6e0f3b28a254356f62f9bf16
3
+ metadata.gz: 2379c5d1c9e958d02b06e4cec8bfdb9873dcd5e5144d94d91e89fb88b68fe60e
4
+ data.tar.gz: c757be7573fe87a3ac61fafd2d0a8065548bbed0f87f27a96d2d59c740c3adfa
5
5
  SHA512:
6
- metadata.gz: 3dd159ec62cf5bd822acde7677769e944236e22504d2cb03946063627ec1201e1be35e588aedf10a7c05f42667cfdcc90e807e3042b3561790026746d1f49418
7
- data.tar.gz: 7535b020ff585ca226f974cf0505f4d2d9b950beace1f7b61fc4af3d67b5ac3da89cf29db57b5c916d5138837b20d0998ede397cae04df03e7df9742d95a7ac6
6
+ metadata.gz: 7180e5482b172af9e6a4433172ad16dc83ab93deec325072f2e243ed57776652ec7e4c377826c5a61270a1c0de91f20024e2f3d3e8e35ed983bb56c69420a67e
7
+ data.tar.gz: 4df74f92d003542f141d3458b279e381da7521ece86a7c3e5a1a6eb936dbbe20b23ebe921b07e5720dbd108546cfdff8a1a0eebe1d6efe7f130d9ca9abfa4e37
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-cloudwatch/customizations'
52
52
  # @!group service
53
53
  module Aws::CloudWatch
54
54
 
55
- GEM_VERSION = '1.46.0'
55
+ GEM_VERSION = '1.47.0'
56
56
 
57
57
  end
@@ -557,7 +557,7 @@ module Aws::CloudWatch
557
557
  end
558
558
 
559
559
  # Retrieves the specified alarms. You can filter the results by
560
- # specifying a a prefix for the alarm name, the alarm state, or a prefix
560
+ # specifying a prefix for the alarm name, the alarm state, or a prefix
561
561
  # for any action.
562
562
  #
563
563
  # @option params [Array<String>] :alarm_names
@@ -2062,6 +2062,9 @@ module Aws::CloudWatch
2062
2062
  # the update completely overwrites the previous configuration of the
2063
2063
  # alarm.
2064
2064
  #
2065
+ # If you are an IAM user, you must have `iam:CreateServiceLinkedRole` to
2066
+ # create a composite alarm that has Systems Manager OpsItem actions.
2067
+ #
2065
2068
  # @option params [Boolean] :actions_enabled
2066
2069
  # Indicates whether actions should be executed during any changes to the
2067
2070
  # alarm state of the composite alarm. The default is `TRUE`.
@@ -2071,7 +2074,8 @@ module Aws::CloudWatch
2071
2074
  # state from any other state. Each action is specified as an Amazon
2072
2075
  # Resource Name (ARN).
2073
2076
  #
2074
- # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name `
2077
+ # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name ` \|
2078
+ # `arn:aws:ssm:region:account-id:opsitem:severity `
2075
2079
  #
2076
2080
  # @option params [String] :alarm_description
2077
2081
  # The description for the composite alarm.
@@ -2345,36 +2349,17 @@ module Aws::CloudWatch
2345
2349
  # If you are an IAM user, you must have Amazon EC2 permissions for some
2346
2350
  # alarm operations:
2347
2351
  #
2348
- # * `iam:CreateServiceLinkedRole` for all alarms with EC2 actions
2349
- #
2350
- # * `ec2:DescribeInstanceStatus` and `ec2:DescribeInstances` for all
2351
- # alarms on EC2 instance status metrics
2352
- #
2353
- # * `ec2:StopInstances` for alarms with stop actions
2354
- #
2355
- # * `ec2:TerminateInstances` for alarms with terminate actions
2356
- #
2357
- # * No specific permissions are needed for alarms with recover actions
2358
- #
2359
- # If you have read/write permissions for Amazon CloudWatch but not for
2360
- # Amazon EC2, you can still create an alarm, but the stop or terminate
2361
- # actions are not performed. However, if you are later granted the
2362
- # required permissions, the alarm actions that you created earlier are
2363
- # performed.
2352
+ # * The `iam:CreateServiceLinkedRole` for all alarms with EC2 actions
2364
2353
  #
2365
- # If you are using an IAM role (for example, an EC2 instance profile),
2366
- # you cannot stop or terminate the instance using alarm actions.
2367
- # However, you can still see the alarm state and perform any other
2368
- # actions such as Amazon SNS notifications or Auto Scaling policies.
2369
- #
2370
- # If you are using temporary security credentials granted using AWS STS,
2371
- # you cannot stop or terminate an EC2 instance using alarm actions.
2354
+ # * The `iam:CreateServiceLinkedRole` to create an alarm with Systems
2355
+ # Manager OpsItem actions.
2372
2356
  #
2373
2357
  # The first time you create an alarm in the AWS Management Console, the
2374
2358
  # CLI, or by using the PutMetricAlarm API, CloudWatch creates the
2375
- # necessary service-linked role for you. The service-linked role is
2376
- # called `AWSServiceRoleForCloudWatchEvents`. For more information, see
2377
- # [AWS service-linked role][1].
2359
+ # necessary service-linked rolea for you. The service-linked roles are
2360
+ # called `AWSServiceRoleForCloudWatchEvents` and
2361
+ # `AWSServiceRoleForCloudWatchAlarms_ActionSSM`. For more information,
2362
+ # see [AWS service-linked role][1].
2378
2363
  #
2379
2364
  #
2380
2365
  #
@@ -2421,7 +2406,7 @@ module Aws::CloudWatch
2421
2406
  # `arn:aws:automate:region:ec2:reboot` \|
2422
2407
  # `arn:aws:sns:region:account-id:sns-topic-name ` \|
2423
2408
  # `arn:aws:autoscaling:region:account-id:scalingPolicy:policy-id:autoScalingGroupName/group-friendly-name:policyName/policy-friendly-name
2424
- # `
2409
+ # ` \| `arn:aws:ssm:region:account-id:opsitem:severity `
2425
2410
  #
2426
2411
  # Valid Values (for use with IAM roles):
2427
2412
  # `arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0`
@@ -2622,6 +2607,15 @@ module Aws::CloudWatch
2622
2607
  # use them to scope user permissions by granting a user permission to
2623
2608
  # access or change only resources with certain tag values.
2624
2609
  #
2610
+ # If you are using this operation to update an existing alarm, any tags
2611
+ # you specify in this parameter are ignored. To change the tags of an
2612
+ # existing alarm, use [TagResource][1] or [UntagResource][2].
2613
+ #
2614
+ #
2615
+ #
2616
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_TagResource.html
2617
+ # [2]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_UntagResource.html
2618
+ #
2625
2619
  # @option params [String] :threshold_metric_id
2626
2620
  # If this is an alarm based on an anomaly detection model, make this
2627
2621
  # value match the ID of the `ANOMALY_DETECTION_BAND` function.
@@ -2987,7 +2981,7 @@ module Aws::CloudWatch
2987
2981
  params: params,
2988
2982
  config: config)
2989
2983
  context[:gem_name] = 'aws-sdk-cloudwatch'
2990
- context[:gem_version] = '1.46.0'
2984
+ context[:gem_version] = '1.47.0'
2991
2985
  Seahorse::Client::Request.new(handlers, context)
2992
2986
  end
2993
2987
 
@@ -399,7 +399,7 @@ module Aws::CloudWatch
399
399
  # `arn:aws:automate:region:ec2:reboot` \|
400
400
  # `arn:aws:sns:region:account-id:sns-topic-name ` \|
401
401
  # `arn:aws:autoscaling:region:account-id:scalingPolicy:policy-id:autoScalingGroupName/group-friendly-name:policyName/policy-friendly-name
402
- # `
402
+ # ` \| `arn:aws:ssm:region:account-id:opsitem:severity `
403
403
  #
404
404
  # Valid Values (for use with IAM roles):
405
405
  # `arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0`
@@ -572,6 +572,15 @@ module Aws::CloudWatch
572
572
  # Tags can help you organize and categorize your resources. You can also
573
573
  # use them to scope user permissions by granting a user permission to
574
574
  # access or change only resources with certain tag values.
575
+ #
576
+ # If you are using this operation to update an existing alarm, any tags
577
+ # you specify in this parameter are ignored. To change the tags of an
578
+ # existing alarm, use [TagResource][1] or [UntagResource][2].
579
+ #
580
+ #
581
+ #
582
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_TagResource.html
583
+ # [2]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_UntagResource.html
575
584
  # @option options [String] :threshold_metric_id
576
585
  # If this is an alarm based on an anomaly detection model, make this
577
586
  # value match the ID of the `ANOMALY_DETECTION_BAND` function.
@@ -2876,7 +2876,8 @@ module Aws::CloudWatch
2876
2876
  # state from any other state. Each action is specified as an Amazon
2877
2877
  # Resource Name (ARN).
2878
2878
  #
2879
- # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name `
2879
+ # Valid Values: `arn:aws:sns:region:account-id:sns-topic-name ` \|
2880
+ # `arn:aws:ssm:region:account-id:opsitem:severity `
2880
2881
  # @return [Array<String>]
2881
2882
  #
2882
2883
  # @!attribute [rw] alarm_description
@@ -3221,7 +3222,7 @@ module Aws::CloudWatch
3221
3222
  # `arn:aws:automate:region:ec2:reboot` \|
3222
3223
  # `arn:aws:sns:region:account-id:sns-topic-name ` \|
3223
3224
  # `arn:aws:autoscaling:region:account-id:scalingPolicy:policy-id:autoScalingGroupName/group-friendly-name:policyName/policy-friendly-name
3224
- # `
3225
+ # ` \| `arn:aws:ssm:region:account-id:opsitem:severity `
3225
3226
  #
3226
3227
  # Valid Values (for use with IAM roles):
3227
3228
  # `arn:aws:swf:region:account-id:action/actions/AWS_EC2.InstanceId.Stop/1.0`
@@ -3441,6 +3442,15 @@ module Aws::CloudWatch
3441
3442
  # also use them to scope user permissions by granting a user
3442
3443
  # permission to access or change only resources with certain tag
3443
3444
  # values.
3445
+ #
3446
+ # If you are using this operation to update an existing alarm, any
3447
+ # tags you specify in this parameter are ignored. To change the tags
3448
+ # of an existing alarm, use [TagResource][1] or [UntagResource][2].
3449
+ #
3450
+ #
3451
+ #
3452
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_TagResource.html
3453
+ # [2]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/APIReference/API_UntagResource.html
3444
3454
  # @return [Array<Types::Tag>]
3445
3455
  #
3446
3456
  # @!attribute [rw] threshold_metric_id
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudwatch
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.46.0
4
+ version: 1.47.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2020-11-04 00:00:00.000000000 Z
11
+ date: 2020-12-11 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core