aws-sdk-cloudwatchlogs 1.41.0 → 1.45.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: abc067a0bbc44791ff4a7682dd64f39735d0df05be86f795600f6b1927320a15
4
- data.tar.gz: 76487b31a10b9a52f8764a082b918fe9016bf196f05436a6f5374982992d39d5
3
+ metadata.gz: c3ac2cf95beee4ce0a2a0a541941fdf100fb351073a47e7bff93424233034e75
4
+ data.tar.gz: 5ae0a175cd50de5d906661e61fdfc54f2eab9bacfb86172abb0324b3a9462864
5
5
  SHA512:
6
- metadata.gz: c907a4445479b39a536d243395e86957bec05a5e082fe0c2d16171ff6b39a03920a38a0bf400442487685738241d41f41e5e0919a61932563da755ec480f1d65
7
- data.tar.gz: 6c18f4600667f422c9d3b8c91e84e2da6c12bf8eabcaf8592ffbf177cef99a62956ca22f5260ffb10359c990389e11fac74f3d869de1c67ccd40883685d2c00e
6
+ metadata.gz: 19d1c01d7189e18db6b7ce9fc04153fb2c9aa40f26fa426ad534ce1c624f5cf1028362f6e779da717966d04f100c7a3b8c9d89280a5a0e4922f826347e0c47a6
7
+ data.tar.gz: 9b9f7112eb73f130026f86631dbc0b5a9c5c202d6776210721fc8c4ffc333d4ff530a274bd80ed3aaae9d353c8f9928d76f16177845848691075ae6310fc0043
data/CHANGELOG.md CHANGED
@@ -1,6 +1,26 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.45.0 (2021-09-01)
5
+ ------------------
6
+
7
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
8
+
9
+ 1.44.0 (2021-08-17)
10
+ ------------------
11
+
12
+ * Feature - Documentation-only update for CloudWatch Logs
13
+
14
+ 1.43.0 (2021-07-30)
15
+ ------------------
16
+
17
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
18
+
19
+ 1.42.0 (2021-07-28)
20
+ ------------------
21
+
22
+ * Feature - Code Generated Changes, see `./build_tools` or `aws-sdk-core`'s CHANGELOG.md for details.
23
+
4
24
  1.41.0 (2021-05-24)
5
25
  ------------------
6
26
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.41.0
1
+ 1.45.0
@@ -337,16 +337,15 @@ module Aws::CloudWatchLogs
337
337
 
338
338
  # @!group API Operations
339
339
 
340
- # Associates the specified AWS Key Management Service (AWS KMS) customer
341
- # master key (CMK) with the specified log group.
340
+ # Associates the specified Key Management Service customer master key
341
+ # (CMK) with the specified log group.
342
342
  #
343
- # Associating an AWS KMS CMK with a log group overrides any existing
343
+ # Associating an KMS CMK with a log group overrides any existing
344
344
  # associations between the log group and a CMK. After a CMK is
345
345
  # associated with a log group, all newly ingested data for the log group
346
346
  # is encrypted using the CMK. This association is stored as long as the
347
- # data encrypted with the CMK is still within Amazon CloudWatch Logs.
348
- # This enables Amazon CloudWatch Logs to decrypt this data whenever it
349
- # is requested.
347
+ # data encrypted with the CMK is still within CloudWatch Logs. This
348
+ # enables CloudWatch Logs to decrypt this data whenever it is requested.
350
349
  #
351
350
  # CloudWatch Logs supports only symmetric CMKs. Do not use an associate
352
351
  # an asymmetric CMK with your log group. For more information, see
@@ -368,8 +367,8 @@ module Aws::CloudWatchLogs
368
367
  # @option params [required, String] :kms_key_id
369
368
  # The Amazon Resource Name (ARN) of the CMK to use when encrypting log
370
369
  # data. This must be a symmetric CMK. For more information, see [Amazon
371
- # Resource Names - AWS Key Management Service (AWS KMS)][1] and [Using
372
- # Symmetric and Asymmetric Keys][2].
370
+ # Resource Names - Key Management Service][1] and [Using Symmetric and
371
+ # Asymmetric Keys][2].
373
372
  #
374
373
  #
375
374
  #
@@ -466,7 +465,7 @@ module Aws::CloudWatchLogs
466
465
  #
467
466
  # @option params [required, String] :destination
468
467
  # The name of S3 bucket for the exported log data. The bucket must be in
469
- # the same AWS region.
468
+ # the same Amazon Web Services region.
470
469
  #
471
470
  # @option params [String] :destination_prefix
472
471
  # The prefix used as the start of the key for every object exported. If
@@ -506,7 +505,8 @@ module Aws::CloudWatchLogs
506
505
  #
507
506
  # You must use the following guidelines when naming a log group:
508
507
  #
509
- # * Log group names must be unique within a region for an AWS account.
508
+ # * Log group names must be unique within a region for an Amazon Web
509
+ # Services account.
510
510
  #
511
511
  # * Log group names can be between 1 and 512 characters long.
512
512
  #
@@ -518,11 +518,11 @@ module Aws::CloudWatchLogs
518
518
  # group never expire. To set a retention policy so that events expire
519
519
  # and are deleted after a specified time, use [PutRetentionPolicy][1].
520
520
  #
521
- # If you associate a AWS Key Management Service (AWS KMS) customer
522
- # master key (CMK) with the log group, ingested data is encrypted using
523
- # the CMK. This association is stored as long as the data encrypted with
524
- # the CMK is still within Amazon CloudWatch Logs. This enables Amazon
525
- # CloudWatch Logs to decrypt this data whenever it is requested.
521
+ # If you associate a Key Management Service customer master key (CMK)
522
+ # with the log group, ingested data is encrypted using the CMK. This
523
+ # association is stored as long as the data encrypted with the CMK is
524
+ # still within CloudWatch Logs. This enables CloudWatch Logs to decrypt
525
+ # this data whenever it is requested.
526
526
  #
527
527
  # If you attempt to associate a CMK with the log group but the CMK does
528
528
  # not exist or the CMK is disabled, you receive an
@@ -542,8 +542,8 @@ module Aws::CloudWatchLogs
542
542
  #
543
543
  # @option params [String] :kms_key_id
544
544
  # The Amazon Resource Name (ARN) of the CMK to use when encrypting log
545
- # data. For more information, see [Amazon Resource Names - AWS Key
546
- # Management Service (AWS KMS)][1].
545
+ # data. For more information, see [Amazon Resource Names - Key
546
+ # Management Service][1].
547
547
  #
548
548
  #
549
549
  #
@@ -552,6 +552,16 @@ module Aws::CloudWatchLogs
552
552
  # @option params [Hash<String,String>] :tags
553
553
  # The key-value pairs to use for the tags.
554
554
  #
555
+ # CloudWatch Logs doesn’t support IAM policies that prevent users from
556
+ # assigning specified tags to log groups using the
557
+ # `aws:Resource/key-name ` or `aws:TagKeys` condition keys. For more
558
+ # information about using tags to control access, see [Controlling
559
+ # access to Amazon Web Services resources using tags][1].
560
+ #
561
+ #
562
+ #
563
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
564
+ #
555
565
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
556
566
  #
557
567
  # @example Request syntax with placeholder values
@@ -941,6 +951,17 @@ module Aws::CloudWatchLogs
941
951
  # filter the results by prefix. The results are ASCII-sorted by log
942
952
  # group name.
943
953
  #
954
+ # CloudWatch Logs doesn’t support IAM policies that control access to
955
+ # the `DescribeLogGroups` action by using the `aws:ResourceTag/key-name
956
+ # ` condition key. Other CloudWatch Logs actions do support the use of
957
+ # the `aws:ResourceTag/key-name ` condition key to control access. For
958
+ # more information about using tags to control access, see [Controlling
959
+ # access to Amazon Web Services resources using tags][1].
960
+ #
961
+ #
962
+ #
963
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
964
+ #
944
965
  # @option params [String] :log_group_name_prefix
945
966
  # The prefix to match.
946
967
  #
@@ -1344,14 +1365,13 @@ module Aws::CloudWatchLogs
1344
1365
  req.send_request(options)
1345
1366
  end
1346
1367
 
1347
- # Disassociates the associated AWS Key Management Service (AWS KMS)
1348
- # customer master key (CMK) from the specified log group.
1368
+ # Disassociates the associated Key Management Service customer master
1369
+ # key (CMK) from the specified log group.
1349
1370
  #
1350
- # After the AWS KMS CMK is disassociated from the log group, AWS
1351
- # CloudWatch Logs stops encrypting newly ingested data for the log
1352
- # group. All previously ingested data remains encrypted, and AWS
1353
- # CloudWatch Logs requires permissions for the CMK whenever the
1354
- # encrypted data is requested.
1371
+ # After the KMS CMK is disassociated from the log group, CloudWatch Logs
1372
+ # stops encrypting newly ingested data for the log group. All previously
1373
+ # ingested data remains encrypted, and CloudWatch Logs requires
1374
+ # permissions for the CMK whenever the encrypted data is requested.
1355
1375
  #
1356
1376
  # Note that it can take up to 5 minutes for this operation to take
1357
1377
  # effect.
@@ -1524,9 +1544,6 @@ module Aws::CloudWatchLogs
1524
1544
  # The token for the next set of items to return. (You received this
1525
1545
  # token from a previous call.)
1526
1546
  #
1527
- # Using this token works only when you specify `true` for
1528
- # `startFromHead`.
1529
- #
1530
1547
  # @option params [Integer] :limit
1531
1548
  # The maximum number of log events returned. If you don't specify a
1532
1549
  # value, the maximum is as many log events as can fit in a response size
@@ -1537,8 +1554,9 @@ module Aws::CloudWatchLogs
1537
1554
  # the value is false, the latest log events are returned first. The
1538
1555
  # default value is false.
1539
1556
  #
1540
- # If you are using `nextToken` in this operation, you must specify
1541
- # `true` for `startFromHead`.
1557
+ # If you are using a previous `nextForwardToken` value as the
1558
+ # `nextToken` in this operation, you must specify `true` for
1559
+ # `startFromHead`.
1542
1560
  #
1543
1561
  # @return [Types::GetLogEventsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1544
1562
  #
@@ -1823,10 +1841,10 @@ module Aws::CloudWatchLogs
1823
1841
  # used to authorize claims to register a subscription filter against a
1824
1842
  # given destination.
1825
1843
  #
1826
- # If multiple AWS accounts are sending logs to this destination, each
1827
- # sender account must be listed separately in the policy. The policy
1828
- # does not support specifying `*` as the Principal or the use of the
1829
- # `aws:PrincipalOrgId` global key.
1844
+ # If multiple Amazon Web Services accounts are sending logs to this
1845
+ # destination, each sender account must be listed separately in the
1846
+ # policy. The policy does not support specifying `*` as the Principal or
1847
+ # the use of the `aws:PrincipalOrgId` global key.
1830
1848
  #
1831
1849
  #
1832
1850
  #
@@ -1883,9 +1901,9 @@ module Aws::CloudWatchLogs
1883
1901
  # * The log events in the batch must be in chronological order by their
1884
1902
  # timestamp. The timestamp is the time the event occurred, expressed
1885
1903
  # as the number of milliseconds after Jan 1, 1970 00:00:00 UTC. (In
1886
- # AWS Tools for PowerShell and the AWS SDK for .NET, the timestamp is
1887
- # specified in .NET format: yyyy-mm-ddThh:mm:ss. For example,
1888
- # 2017-09-15T13:45:30.)
1904
+ # Amazon Web Services Tools for PowerShell and the Amazon Web Services
1905
+ # SDK for .NET, the timestamp is specified in .NET format:
1906
+ # yyyy-mm-ddThh:mm:ss. For example, 2017-09-15T13:45:30.)
1889
1907
  #
1890
1908
  # * A batch of log events in a single request cannot span more than 24
1891
1909
  # hours. Otherwise, the operation fails.
@@ -1896,7 +1914,8 @@ module Aws::CloudWatchLogs
1896
1914
  # requests are throttled. This quota can't be changed.
1897
1915
  #
1898
1916
  # If a call to `PutLogEvents` returns "UnrecognizedClientException"
1899
- # the most likely cause is an invalid AWS access key ID or secret key.
1917
+ # the most likely cause is an invalid Amazon Web Services access key ID
1918
+ # or secret key.
1900
1919
  #
1901
1920
  # @option params [required, String] :log_group_name
1902
1921
  # The name of the log group.
@@ -1977,7 +1996,7 @@ module Aws::CloudWatchLogs
1977
1996
  #
1978
1997
  # You can also set up a billing alarm to alert you if your charges are
1979
1998
  # higher than expected. For more information, see [ Creating a Billing
1980
- # Alarm to Monitor Your Estimated AWS Charges][2].
1999
+ # Alarm to Monitor Your Estimated Amazon Web Services Charges][2].
1981
2000
  #
1982
2001
  #
1983
2002
  #
@@ -2114,9 +2133,10 @@ module Aws::CloudWatchLogs
2114
2133
  req.send_request(options)
2115
2134
  end
2116
2135
 
2117
- # Creates or updates a resource policy allowing other AWS services to
2118
- # put log events to this account, such as Amazon Route 53. An account
2119
- # can have up to 10 resource policies per AWS Region.
2136
+ # Creates or updates a resource policy allowing other Amazon Web
2137
+ # Services services to put log events to this account, such as Amazon
2138
+ # Route 53. An account can have up to 10 resource policies per Amazon
2139
+ # Web Services Region.
2120
2140
  #
2121
2141
  # @option params [String] :policy_name
2122
2142
  # Name of the new policy. This parameter is required.
@@ -2131,10 +2151,27 @@ module Aws::CloudWatchLogs
2131
2151
  # `"logArn"` with the ARN of your CloudWatch Logs resource, such as a
2132
2152
  # log group or log stream.
2133
2153
  #
2154
+ # CloudWatch Logs also supports [aws:SourceArn][1] and
2155
+ # [aws:SourceAccount][2] condition context keys.
2156
+ #
2157
+ # In the example resource policy, you would replace the value of
2158
+ # `SourceArn` with the resource making the call from Route 53 to
2159
+ # CloudWatch Logs and replace the value of `SourceAccount` with the
2160
+ # Amazon Web Services account ID making that call.
2161
+ #
2162
+ #
2163
+ #
2134
2164
  # `\{ "Version": "2012-10-17", "Statement": [ \{ "Sid":
2135
2165
  # "Route53LogsToCloudWatchLogs", "Effect": "Allow", "Principal": \{
2136
- # "Service": [ "route53.amazonaws.com" ] \},
2137
- # "Action":"logs:PutLogEvents", "Resource": "logArn" \} ] \} `
2166
+ # "Service": [ "route53.amazonaws.com" ] \}, "Action":
2167
+ # "logs:PutLogEvents", "Resource": "logArn", "Condition": \{ "ArnLike":
2168
+ # \{ "aws:SourceArn": "myRoute53ResourceArn" \}, "StringEquals": \{
2169
+ # "aws:SourceAccount": "myAwsAccountId" \} \} \} ] \}`
2170
+ #
2171
+ #
2172
+ #
2173
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourcearn
2174
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceaccount
2138
2175
  #
2139
2176
  # @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
2140
2177
  #
@@ -2174,8 +2211,12 @@ module Aws::CloudWatchLogs
2174
2211
  # group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180,
2175
2212
  # 365, 400, 545, 731, 1827, and 3653.
2176
2213
  #
2177
- # If you omit `retentionInDays` in a `PutRetentionPolicy` operation, the
2178
- # events in the log group are always retained and never expire.
2214
+ # To set a log group to never have log events expire, use
2215
+ # [DeleteRetentionPolicy][1].
2216
+ #
2217
+ #
2218
+ #
2219
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DeleteRetentionPolicy.html
2179
2220
  #
2180
2221
  # @return [Struct] Returns an empty {Seahorse::Client::Response response}.
2181
2222
  #
@@ -2213,7 +2254,7 @@ module Aws::CloudWatchLogs
2213
2254
  # * An Amazon Kinesis Firehose delivery stream that belongs to the same
2214
2255
  # account as the subscription filter, for same-account delivery.
2215
2256
  #
2216
- # * An AWS Lambda function that belongs to the same account as the
2257
+ # * An Lambda function that belongs to the same account as the
2217
2258
  # subscription filter, for same-account delivery.
2218
2259
  #
2219
2260
  # Each log group can have up to two subscription filters associated with
@@ -2261,8 +2302,8 @@ module Aws::CloudWatchLogs
2261
2302
  # * An Amazon Kinesis Firehose delivery stream belonging to the same
2262
2303
  # account as the subscription filter, for same-account delivery.
2263
2304
  #
2264
- # * An AWS Lambda function belonging to the same account as the
2265
- # subscription filter, for same-account delivery.
2305
+ # * A Lambda function belonging to the same account as the subscription
2306
+ # filter, for same-account delivery.
2266
2307
  #
2267
2308
  #
2268
2309
  #
@@ -2419,11 +2460,18 @@ module Aws::CloudWatchLogs
2419
2460
  # For more information about tags, see [Tag Log Groups in Amazon
2420
2461
  # CloudWatch Logs][3] in the *Amazon CloudWatch Logs User Guide*.
2421
2462
  #
2463
+ # CloudWatch Logs doesn’t support IAM policies that prevent users from
2464
+ # assigning specified tags to log groups using the
2465
+ # `aws:Resource/key-name ` or `aws:TagKeys` condition keys. For more
2466
+ # information about using tags to control access, see [Controlling
2467
+ # access to Amazon Web Services resources using tags][4].
2468
+ #
2422
2469
  #
2423
2470
  #
2424
2471
  # [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_ListTagsLogGroup.html
2425
2472
  # [2]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_UntagLogGroup.html
2426
2473
  # [3]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/Working-with-log-groups-and-streams.html#log-group-tagging
2474
+ # [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
2427
2475
  #
2428
2476
  # @option params [required, String] :log_group_name
2429
2477
  # The name of the log group.
@@ -2497,6 +2545,10 @@ module Aws::CloudWatchLogs
2497
2545
  # To list the tags for a log group, use [ListTagsLogGroup][1]. To add
2498
2546
  # tags, use [TagLogGroup][2].
2499
2547
  #
2548
+ # CloudWatch Logs doesn’t support IAM policies that prevent users from
2549
+ # assigning specified tags to log groups using the
2550
+ # `aws:Resource/key-name ` or `aws:TagKeys` condition keys.
2551
+ #
2500
2552
  #
2501
2553
  #
2502
2554
  # [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_ListTagsLogGroup.html
@@ -2539,7 +2591,7 @@ module Aws::CloudWatchLogs
2539
2591
  params: params,
2540
2592
  config: config)
2541
2593
  context[:gem_name] = 'aws-sdk-cloudwatchlogs'
2542
- context[:gem_version] = '1.41.0'
2594
+ context[:gem_version] = '1.45.0'
2543
2595
  Seahorse::Client::Request.new(handlers, context)
2544
2596
  end
2545
2597
 
@@ -25,8 +25,8 @@ module Aws::CloudWatchLogs
25
25
  # @!attribute [rw] kms_key_id
26
26
  # The Amazon Resource Name (ARN) of the CMK to use when encrypting log
27
27
  # data. This must be a symmetric CMK. For more information, see
28
- # [Amazon Resource Names - AWS Key Management Service (AWS KMS)][1]
29
- # and [Using Symmetric and Asymmetric Keys][2].
28
+ # [Amazon Resource Names - Key Management Service][1] and [Using
29
+ # Symmetric and Asymmetric Keys][2].
30
30
  #
31
31
  #
32
32
  #
@@ -102,7 +102,7 @@ module Aws::CloudWatchLogs
102
102
  #
103
103
  # @!attribute [rw] destination
104
104
  # The name of S3 bucket for the exported log data. The bucket must be
105
- # in the same AWS region.
105
+ # in the same Amazon Web Services region.
106
106
  # @return [String]
107
107
  #
108
108
  # @!attribute [rw] destination_prefix
@@ -153,8 +153,8 @@ module Aws::CloudWatchLogs
153
153
  #
154
154
  # @!attribute [rw] kms_key_id
155
155
  # The Amazon Resource Name (ARN) of the CMK to use when encrypting log
156
- # data. For more information, see [Amazon Resource Names - AWS Key
157
- # Management Service (AWS KMS)][1].
156
+ # data. For more information, see [Amazon Resource Names - Key
157
+ # Management Service][1].
158
158
  #
159
159
  #
160
160
  #
@@ -163,6 +163,16 @@ module Aws::CloudWatchLogs
163
163
  #
164
164
  # @!attribute [rw] tags
165
165
  # The key-value pairs to use for the tags.
166
+ #
167
+ # CloudWatch Logs doesn’t support IAM policies that prevent users from
168
+ # assigning specified tags to log groups using the
169
+ # `aws:Resource/key-name ` or `aws:TagKeys` condition keys. For more
170
+ # information about using tags to control access, see [Controlling
171
+ # access to Amazon Web Services resources using tags][1].
172
+ #
173
+ #
174
+ #
175
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
166
176
  # @return [Hash<String,String>]
167
177
  #
168
178
  # @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/CreateLogGroupRequest AWS API Documentation
@@ -959,8 +969,8 @@ module Aws::CloudWatchLogs
959
969
  # @return [String]
960
970
  #
961
971
  # @!attribute [rw] access_policy
962
- # An IAM policy document that governs which AWS accounts can create
963
- # subscription filters against this destination.
972
+ # An IAM policy document that governs which Amazon Web Services
973
+ # accounts can create subscription filters against this destination.
964
974
  # @return [String]
965
975
  #
966
976
  # @!attribute [rw] arn
@@ -1304,9 +1314,6 @@ module Aws::CloudWatchLogs
1304
1314
  # @!attribute [rw] next_token
1305
1315
  # The token for the next set of items to return. (You received this
1306
1316
  # token from a previous call.)
1307
- #
1308
- # Using this token works only when you specify `true` for
1309
- # `startFromHead`.
1310
1317
  # @return [String]
1311
1318
  #
1312
1319
  # @!attribute [rw] limit
@@ -1320,8 +1327,9 @@ module Aws::CloudWatchLogs
1320
1327
  # the value is false, the latest log events are returned first. The
1321
1328
  # default value is false.
1322
1329
  #
1323
- # If you are using `nextToken` in this operation, you must specify
1324
- # `true` for `startFromHead`.
1330
+ # If you are using a previous `nextForwardToken` value as the
1331
+ # `nextToken` in this operation, you must specify `true` for
1332
+ # `startFromHead`.
1325
1333
  # @return [Boolean]
1326
1334
  #
1327
1335
  # @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/GetLogEventsRequest AWS API Documentation
@@ -1608,8 +1616,12 @@ module Aws::CloudWatchLogs
1608
1616
  # group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150,
1609
1617
  # 180, 365, 400, 545, 731, 1827, and 3653.
1610
1618
  #
1611
- # If you omit `retentionInDays` in a `PutRetentionPolicy` operation,
1612
- # the events in the log group are always retained and never expire.
1619
+ # To set a log group to never have log events expire, use
1620
+ # [DeleteRetentionPolicy][1].
1621
+ #
1622
+ #
1623
+ #
1624
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DeleteRetentionPolicy.html
1613
1625
  # @return [Integer]
1614
1626
  #
1615
1627
  # @!attribute [rw] metric_filter_count
@@ -1873,7 +1885,7 @@ module Aws::CloudWatchLogs
1873
1885
  # You can also set up a billing alarm to alert you if your charges
1874
1886
  # are
1875
1887
  # higher than expected. For more information, see [ Creating a Billing
1876
- # Alarm to Monitor Your Estimated AWS Charges][1].
1888
+ # Alarm to Monitor Your Estimated Amazon Web Services Charges][1].
1877
1889
  #
1878
1890
  #
1879
1891
  #
@@ -2221,10 +2233,28 @@ module Aws::CloudWatchLogs
2221
2233
  # Replace `"logArn"` with the ARN of your CloudWatch Logs resource,
2222
2234
  # such as a log group or log stream.
2223
2235
  #
2236
+ # CloudWatch Logs also supports [aws:SourceArn][1] and
2237
+ # [aws:SourceAccount][2] condition context keys.
2238
+ #
2239
+ # In the example resource policy, you would replace the value of
2240
+ # `SourceArn` with the resource making the call from Route 53 to
2241
+ # CloudWatch Logs and replace the value of `SourceAccount` with the
2242
+ # Amazon Web Services account ID making that call.
2243
+ #
2244
+ #
2245
+ #
2224
2246
  # `\{ "Version": "2012-10-17", "Statement": [ \{ "Sid":
2225
2247
  # "Route53LogsToCloudWatchLogs", "Effect": "Allow", "Principal": \{
2226
- # "Service": [ "route53.amazonaws.com" ] \},
2227
- # "Action":"logs:PutLogEvents", "Resource": "logArn" \} ] \} `
2248
+ # "Service": [ "route53.amazonaws.com" ] \}, "Action":
2249
+ # "logs:PutLogEvents", "Resource": "logArn", "Condition": \{
2250
+ # "ArnLike": \{ "aws:SourceArn": "myRoute53ResourceArn" \},
2251
+ # "StringEquals": \{ "aws:SourceAccount": "myAwsAccountId" \} \} \} ]
2252
+ # \}`
2253
+ #
2254
+ #
2255
+ #
2256
+ # [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourcearn
2257
+ # [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceaccount
2228
2258
  # @return [String]
2229
2259
  #
2230
2260
  # @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/PutResourcePolicyRequest AWS API Documentation
@@ -2265,8 +2295,12 @@ module Aws::CloudWatchLogs
2265
2295
  # group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150,
2266
2296
  # 180, 365, 400, 545, 731, 1827, and 3653.
2267
2297
  #
2268
- # If you omit `retentionInDays` in a `PutRetentionPolicy` operation,
2269
- # the events in the log group are always retained and never expire.
2298
+ # To set a log group to never have log events expire, use
2299
+ # [DeleteRetentionPolicy][1].
2300
+ #
2301
+ #
2302
+ #
2303
+ # [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DeleteRetentionPolicy.html
2270
2304
  # @return [Integer]
2271
2305
  #
2272
2306
  # @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/PutRetentionPolicyRequest AWS API Documentation
@@ -2327,7 +2361,7 @@ module Aws::CloudWatchLogs
2327
2361
  # * An Amazon Kinesis Firehose delivery stream belonging to the same
2328
2362
  # account as the subscription filter, for same-account delivery.
2329
2363
  #
2330
- # * An AWS Lambda function belonging to the same account as the
2364
+ # * A Lambda function belonging to the same account as the
2331
2365
  # subscription filter, for same-account delivery.
2332
2366
  #
2333
2367
  #
@@ -2845,7 +2879,8 @@ module Aws::CloudWatchLogs
2845
2879
  include Aws::Structure
2846
2880
  end
2847
2881
 
2848
- # The most likely cause is an invalid AWS access key ID or secret key.
2882
+ # The most likely cause is an invalid Amazon Web Services access key ID
2883
+ # or secret key.
2849
2884
  #
2850
2885
  # @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/UnrecognizedClientException AWS API Documentation
2851
2886
  #
@@ -48,6 +48,6 @@ require_relative 'aws-sdk-cloudwatchlogs/customizations'
48
48
  # @!group service
49
49
  module Aws::CloudWatchLogs
50
50
 
51
- GEM_VERSION = '1.41.0'
51
+ GEM_VERSION = '1.45.0'
52
52
 
53
53
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-cloudwatchlogs
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.41.0
4
+ version: 1.45.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2021-05-24 00:00:00.000000000 Z
11
+ date: 2021-09-01 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core
@@ -19,7 +19,7 @@ dependencies:
19
19
  version: '3'
20
20
  - - ">="
21
21
  - !ruby/object:Gem::Version
22
- version: 3.112.0
22
+ version: 3.120.0
23
23
  type: :runtime
24
24
  prerelease: false
25
25
  version_requirements: !ruby/object:Gem::Requirement
@@ -29,7 +29,7 @@ dependencies:
29
29
  version: '3'
30
30
  - - ">="
31
31
  - !ruby/object:Gem::Version
32
- version: 3.112.0
32
+ version: 3.120.0
33
33
  - !ruby/object:Gem::Dependency
34
34
  name: aws-sigv4
35
35
  requirement: !ruby/object:Gem::Requirement
@@ -76,7 +76,7 @@ required_ruby_version: !ruby/object:Gem::Requirement
76
76
  requirements:
77
77
  - - ">="
78
78
  - !ruby/object:Gem::Version
79
- version: '0'
79
+ version: '2.3'
80
80
  required_rubygems_version: !ruby/object:Gem::Requirement
81
81
  requirements:
82
82
  - - ">="