aws-sdk-cloudwatchlogs 1.43.0 → 1.44.0
Sign up to get free protection for your applications and to get access to all the features.
- checksums.yaml +4 -4
- data/CHANGELOG.md +5 -0
- data/VERSION +1 -1
- data/lib/aws-sdk-cloudwatchlogs.rb +1 -1
- data/lib/aws-sdk-cloudwatchlogs/client.rb +101 -49
- data/lib/aws-sdk-cloudwatchlogs/types.rb +56 -21
- metadata +2 -2
checksums.yaml
CHANGED
@@ -1,7 +1,7 @@
|
|
1
1
|
---
|
2
2
|
SHA256:
|
3
|
-
metadata.gz:
|
4
|
-
data.tar.gz:
|
3
|
+
metadata.gz: 2b53cd0ed00817e7a3a578da98970372835120baf8213b2c3d740253b2352b1f
|
4
|
+
data.tar.gz: db879b8a853bba93646734cfbbfb1859fa8671a63acbb6b9df2173f0180bdb3e
|
5
5
|
SHA512:
|
6
|
-
metadata.gz:
|
7
|
-
data.tar.gz:
|
6
|
+
metadata.gz: db6210ec6c5194c6a1ff96dfa66af9219ce979d3019babaa9e1713aa854aef519f6b131e8870f8c368851ffc0499685e268ed08c112cdc98a27c7568a701d88e
|
7
|
+
data.tar.gz: 87f5db69bfb43a4141d09c5ce0fe8c3c7fe3bb676b4a6d20c98b633ac1e28d3d32e6ca82b05e7fd55f58ab8bd520176b0d818cb7838336bef43242a98e5a076d
|
data/CHANGELOG.md
CHANGED
data/VERSION
CHANGED
@@ -1 +1 @@
|
|
1
|
-
1.
|
1
|
+
1.44.0
|
@@ -337,16 +337,15 @@ module Aws::CloudWatchLogs
|
|
337
337
|
|
338
338
|
# @!group API Operations
|
339
339
|
|
340
|
-
# Associates the specified
|
341
|
-
#
|
340
|
+
# Associates the specified Key Management Service customer master key
|
341
|
+
# (CMK) with the specified log group.
|
342
342
|
#
|
343
|
-
# Associating an
|
343
|
+
# Associating an KMS CMK with a log group overrides any existing
|
344
344
|
# associations between the log group and a CMK. After a CMK is
|
345
345
|
# associated with a log group, all newly ingested data for the log group
|
346
346
|
# is encrypted using the CMK. This association is stored as long as the
|
347
|
-
# data encrypted with the CMK is still within
|
348
|
-
#
|
349
|
-
# is requested.
|
347
|
+
# data encrypted with the CMK is still within CloudWatch Logs. This
|
348
|
+
# enables CloudWatch Logs to decrypt this data whenever it is requested.
|
350
349
|
#
|
351
350
|
# CloudWatch Logs supports only symmetric CMKs. Do not use an associate
|
352
351
|
# an asymmetric CMK with your log group. For more information, see
|
@@ -368,8 +367,8 @@ module Aws::CloudWatchLogs
|
|
368
367
|
# @option params [required, String] :kms_key_id
|
369
368
|
# The Amazon Resource Name (ARN) of the CMK to use when encrypting log
|
370
369
|
# data. This must be a symmetric CMK. For more information, see [Amazon
|
371
|
-
# Resource Names -
|
372
|
-
#
|
370
|
+
# Resource Names - Key Management Service][1] and [Using Symmetric and
|
371
|
+
# Asymmetric Keys][2].
|
373
372
|
#
|
374
373
|
#
|
375
374
|
#
|
@@ -466,7 +465,7 @@ module Aws::CloudWatchLogs
|
|
466
465
|
#
|
467
466
|
# @option params [required, String] :destination
|
468
467
|
# The name of S3 bucket for the exported log data. The bucket must be in
|
469
|
-
# the same
|
468
|
+
# the same Amazon Web Services region.
|
470
469
|
#
|
471
470
|
# @option params [String] :destination_prefix
|
472
471
|
# The prefix used as the start of the key for every object exported. If
|
@@ -506,7 +505,8 @@ module Aws::CloudWatchLogs
|
|
506
505
|
#
|
507
506
|
# You must use the following guidelines when naming a log group:
|
508
507
|
#
|
509
|
-
# * Log group names must be unique within a region for an
|
508
|
+
# * Log group names must be unique within a region for an Amazon Web
|
509
|
+
# Services account.
|
510
510
|
#
|
511
511
|
# * Log group names can be between 1 and 512 characters long.
|
512
512
|
#
|
@@ -518,11 +518,11 @@ module Aws::CloudWatchLogs
|
|
518
518
|
# group never expire. To set a retention policy so that events expire
|
519
519
|
# and are deleted after a specified time, use [PutRetentionPolicy][1].
|
520
520
|
#
|
521
|
-
# If you associate a
|
522
|
-
#
|
523
|
-
#
|
524
|
-
#
|
525
|
-
#
|
521
|
+
# If you associate a Key Management Service customer master key (CMK)
|
522
|
+
# with the log group, ingested data is encrypted using the CMK. This
|
523
|
+
# association is stored as long as the data encrypted with the CMK is
|
524
|
+
# still within CloudWatch Logs. This enables CloudWatch Logs to decrypt
|
525
|
+
# this data whenever it is requested.
|
526
526
|
#
|
527
527
|
# If you attempt to associate a CMK with the log group but the CMK does
|
528
528
|
# not exist or the CMK is disabled, you receive an
|
@@ -542,8 +542,8 @@ module Aws::CloudWatchLogs
|
|
542
542
|
#
|
543
543
|
# @option params [String] :kms_key_id
|
544
544
|
# The Amazon Resource Name (ARN) of the CMK to use when encrypting log
|
545
|
-
# data. For more information, see [Amazon Resource Names -
|
546
|
-
# Management Service
|
545
|
+
# data. For more information, see [Amazon Resource Names - Key
|
546
|
+
# Management Service][1].
|
547
547
|
#
|
548
548
|
#
|
549
549
|
#
|
@@ -552,6 +552,16 @@ module Aws::CloudWatchLogs
|
|
552
552
|
# @option params [Hash<String,String>] :tags
|
553
553
|
# The key-value pairs to use for the tags.
|
554
554
|
#
|
555
|
+
# CloudWatch Logs doesn’t support IAM policies that prevent users from
|
556
|
+
# assigning specified tags to log groups using the
|
557
|
+
# `aws:Resource/key-name ` or `aws:TagKeys` condition keys. For more
|
558
|
+
# information about using tags to control access, see [Controlling
|
559
|
+
# access to Amazon Web Services resources using tags][1].
|
560
|
+
#
|
561
|
+
#
|
562
|
+
#
|
563
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
564
|
+
#
|
555
565
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
556
566
|
#
|
557
567
|
# @example Request syntax with placeholder values
|
@@ -941,6 +951,17 @@ module Aws::CloudWatchLogs
|
|
941
951
|
# filter the results by prefix. The results are ASCII-sorted by log
|
942
952
|
# group name.
|
943
953
|
#
|
954
|
+
# CloudWatch Logs doesn’t support IAM policies that control access to
|
955
|
+
# the `DescribeLogGroups` action by using the `aws:ResourceTag/key-name
|
956
|
+
# ` condition key. Other CloudWatch Logs actions do support the use of
|
957
|
+
# the `aws:ResourceTag/key-name ` condition key to control access. For
|
958
|
+
# more information about using tags to control access, see [Controlling
|
959
|
+
# access to Amazon Web Services resources using tags][1].
|
960
|
+
#
|
961
|
+
#
|
962
|
+
#
|
963
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
964
|
+
#
|
944
965
|
# @option params [String] :log_group_name_prefix
|
945
966
|
# The prefix to match.
|
946
967
|
#
|
@@ -1344,14 +1365,13 @@ module Aws::CloudWatchLogs
|
|
1344
1365
|
req.send_request(options)
|
1345
1366
|
end
|
1346
1367
|
|
1347
|
-
# Disassociates the associated
|
1348
|
-
#
|
1368
|
+
# Disassociates the associated Key Management Service customer master
|
1369
|
+
# key (CMK) from the specified log group.
|
1349
1370
|
#
|
1350
|
-
# After the
|
1351
|
-
#
|
1352
|
-
#
|
1353
|
-
#
|
1354
|
-
# encrypted data is requested.
|
1371
|
+
# After the KMS CMK is disassociated from the log group, CloudWatch Logs
|
1372
|
+
# stops encrypting newly ingested data for the log group. All previously
|
1373
|
+
# ingested data remains encrypted, and CloudWatch Logs requires
|
1374
|
+
# permissions for the CMK whenever the encrypted data is requested.
|
1355
1375
|
#
|
1356
1376
|
# Note that it can take up to 5 minutes for this operation to take
|
1357
1377
|
# effect.
|
@@ -1524,9 +1544,6 @@ module Aws::CloudWatchLogs
|
|
1524
1544
|
# The token for the next set of items to return. (You received this
|
1525
1545
|
# token from a previous call.)
|
1526
1546
|
#
|
1527
|
-
# Using this token works only when you specify `true` for
|
1528
|
-
# `startFromHead`.
|
1529
|
-
#
|
1530
1547
|
# @option params [Integer] :limit
|
1531
1548
|
# The maximum number of log events returned. If you don't specify a
|
1532
1549
|
# value, the maximum is as many log events as can fit in a response size
|
@@ -1537,8 +1554,9 @@ module Aws::CloudWatchLogs
|
|
1537
1554
|
# the value is false, the latest log events are returned first. The
|
1538
1555
|
# default value is false.
|
1539
1556
|
#
|
1540
|
-
# If you are using `
|
1541
|
-
# `true` for
|
1557
|
+
# If you are using a previous `nextForwardToken` value as the
|
1558
|
+
# `nextToken` in this operation, you must specify `true` for
|
1559
|
+
# `startFromHead`.
|
1542
1560
|
#
|
1543
1561
|
# @return [Types::GetLogEventsResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
1544
1562
|
#
|
@@ -1823,10 +1841,10 @@ module Aws::CloudWatchLogs
|
|
1823
1841
|
# used to authorize claims to register a subscription filter against a
|
1824
1842
|
# given destination.
|
1825
1843
|
#
|
1826
|
-
# If multiple
|
1827
|
-
# sender account must be listed separately in the
|
1828
|
-
# does not support specifying `*` as the Principal or
|
1829
|
-
# `aws:PrincipalOrgId` global key.
|
1844
|
+
# If multiple Amazon Web Services accounts are sending logs to this
|
1845
|
+
# destination, each sender account must be listed separately in the
|
1846
|
+
# policy. The policy does not support specifying `*` as the Principal or
|
1847
|
+
# the use of the `aws:PrincipalOrgId` global key.
|
1830
1848
|
#
|
1831
1849
|
#
|
1832
1850
|
#
|
@@ -1883,9 +1901,9 @@ module Aws::CloudWatchLogs
|
|
1883
1901
|
# * The log events in the batch must be in chronological order by their
|
1884
1902
|
# timestamp. The timestamp is the time the event occurred, expressed
|
1885
1903
|
# as the number of milliseconds after Jan 1, 1970 00:00:00 UTC. (In
|
1886
|
-
#
|
1887
|
-
# specified in .NET format:
|
1888
|
-
# 2017-09-15T13:45:30.)
|
1904
|
+
# Amazon Web Services Tools for PowerShell and the Amazon Web Services
|
1905
|
+
# SDK for .NET, the timestamp is specified in .NET format:
|
1906
|
+
# yyyy-mm-ddThh:mm:ss. For example, 2017-09-15T13:45:30.)
|
1889
1907
|
#
|
1890
1908
|
# * A batch of log events in a single request cannot span more than 24
|
1891
1909
|
# hours. Otherwise, the operation fails.
|
@@ -1896,7 +1914,8 @@ module Aws::CloudWatchLogs
|
|
1896
1914
|
# requests are throttled. This quota can't be changed.
|
1897
1915
|
#
|
1898
1916
|
# If a call to `PutLogEvents` returns "UnrecognizedClientException"
|
1899
|
-
# the most likely cause is an invalid
|
1917
|
+
# the most likely cause is an invalid Amazon Web Services access key ID
|
1918
|
+
# or secret key.
|
1900
1919
|
#
|
1901
1920
|
# @option params [required, String] :log_group_name
|
1902
1921
|
# The name of the log group.
|
@@ -1977,7 +1996,7 @@ module Aws::CloudWatchLogs
|
|
1977
1996
|
#
|
1978
1997
|
# You can also set up a billing alarm to alert you if your charges are
|
1979
1998
|
# higher than expected. For more information, see [ Creating a Billing
|
1980
|
-
# Alarm to Monitor Your Estimated
|
1999
|
+
# Alarm to Monitor Your Estimated Amazon Web Services Charges][2].
|
1981
2000
|
#
|
1982
2001
|
#
|
1983
2002
|
#
|
@@ -2114,9 +2133,10 @@ module Aws::CloudWatchLogs
|
|
2114
2133
|
req.send_request(options)
|
2115
2134
|
end
|
2116
2135
|
|
2117
|
-
# Creates or updates a resource policy allowing other
|
2118
|
-
# put log events to this account, such as Amazon
|
2119
|
-
# can have up to 10 resource policies per
|
2136
|
+
# Creates or updates a resource policy allowing other Amazon Web
|
2137
|
+
# Services services to put log events to this account, such as Amazon
|
2138
|
+
# Route 53. An account can have up to 10 resource policies per Amazon
|
2139
|
+
# Web Services Region.
|
2120
2140
|
#
|
2121
2141
|
# @option params [String] :policy_name
|
2122
2142
|
# Name of the new policy. This parameter is required.
|
@@ -2131,10 +2151,27 @@ module Aws::CloudWatchLogs
|
|
2131
2151
|
# `"logArn"` with the ARN of your CloudWatch Logs resource, such as a
|
2132
2152
|
# log group or log stream.
|
2133
2153
|
#
|
2154
|
+
# CloudWatch Logs also supports [aws:SourceArn][1] and
|
2155
|
+
# [aws:SourceAccount][2] condition context keys.
|
2156
|
+
#
|
2157
|
+
# In the example resource policy, you would replace the value of
|
2158
|
+
# `SourceArn` with the resource making the call from Route 53 to
|
2159
|
+
# CloudWatch Logs and replace the value of `SourceAccount` with the
|
2160
|
+
# Amazon Web Services account ID making that call.
|
2161
|
+
#
|
2162
|
+
#
|
2163
|
+
#
|
2134
2164
|
# `\{ "Version": "2012-10-17", "Statement": [ \{ "Sid":
|
2135
2165
|
# "Route53LogsToCloudWatchLogs", "Effect": "Allow", "Principal": \{
|
2136
|
-
# "Service": [ "route53.amazonaws.com" ] \},
|
2137
|
-
# "
|
2166
|
+
# "Service": [ "route53.amazonaws.com" ] \}, "Action":
|
2167
|
+
# "logs:PutLogEvents", "Resource": "logArn", "Condition": \{ "ArnLike":
|
2168
|
+
# \{ "aws:SourceArn": "myRoute53ResourceArn" \}, "StringEquals": \{
|
2169
|
+
# "aws:SourceAccount": "myAwsAccountId" \} \} \} ] \}`
|
2170
|
+
#
|
2171
|
+
#
|
2172
|
+
#
|
2173
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourcearn
|
2174
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceaccount
|
2138
2175
|
#
|
2139
2176
|
# @return [Types::PutResourcePolicyResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
|
2140
2177
|
#
|
@@ -2174,8 +2211,12 @@ module Aws::CloudWatchLogs
|
|
2174
2211
|
# group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150, 180,
|
2175
2212
|
# 365, 400, 545, 731, 1827, and 3653.
|
2176
2213
|
#
|
2177
|
-
#
|
2178
|
-
#
|
2214
|
+
# To set a log group to never have log events expire, use
|
2215
|
+
# [DeleteRetentionPolicy][1].
|
2216
|
+
#
|
2217
|
+
#
|
2218
|
+
#
|
2219
|
+
# [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DeleteRetentionPolicy.html
|
2179
2220
|
#
|
2180
2221
|
# @return [Struct] Returns an empty {Seahorse::Client::Response response}.
|
2181
2222
|
#
|
@@ -2213,7 +2254,7 @@ module Aws::CloudWatchLogs
|
|
2213
2254
|
# * An Amazon Kinesis Firehose delivery stream that belongs to the same
|
2214
2255
|
# account as the subscription filter, for same-account delivery.
|
2215
2256
|
#
|
2216
|
-
# * An
|
2257
|
+
# * An Lambda function that belongs to the same account as the
|
2217
2258
|
# subscription filter, for same-account delivery.
|
2218
2259
|
#
|
2219
2260
|
# Each log group can have up to two subscription filters associated with
|
@@ -2261,8 +2302,8 @@ module Aws::CloudWatchLogs
|
|
2261
2302
|
# * An Amazon Kinesis Firehose delivery stream belonging to the same
|
2262
2303
|
# account as the subscription filter, for same-account delivery.
|
2263
2304
|
#
|
2264
|
-
# *
|
2265
|
-
#
|
2305
|
+
# * A Lambda function belonging to the same account as the subscription
|
2306
|
+
# filter, for same-account delivery.
|
2266
2307
|
#
|
2267
2308
|
#
|
2268
2309
|
#
|
@@ -2419,11 +2460,18 @@ module Aws::CloudWatchLogs
|
|
2419
2460
|
# For more information about tags, see [Tag Log Groups in Amazon
|
2420
2461
|
# CloudWatch Logs][3] in the *Amazon CloudWatch Logs User Guide*.
|
2421
2462
|
#
|
2463
|
+
# CloudWatch Logs doesn’t support IAM policies that prevent users from
|
2464
|
+
# assigning specified tags to log groups using the
|
2465
|
+
# `aws:Resource/key-name ` or `aws:TagKeys` condition keys. For more
|
2466
|
+
# information about using tags to control access, see [Controlling
|
2467
|
+
# access to Amazon Web Services resources using tags][4].
|
2468
|
+
#
|
2422
2469
|
#
|
2423
2470
|
#
|
2424
2471
|
# [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_ListTagsLogGroup.html
|
2425
2472
|
# [2]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_UntagLogGroup.html
|
2426
2473
|
# [3]: https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/Working-with-log-groups-and-streams.html#log-group-tagging
|
2474
|
+
# [4]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
2427
2475
|
#
|
2428
2476
|
# @option params [required, String] :log_group_name
|
2429
2477
|
# The name of the log group.
|
@@ -2497,6 +2545,10 @@ module Aws::CloudWatchLogs
|
|
2497
2545
|
# To list the tags for a log group, use [ListTagsLogGroup][1]. To add
|
2498
2546
|
# tags, use [TagLogGroup][2].
|
2499
2547
|
#
|
2548
|
+
# CloudWatch Logs doesn’t support IAM policies that prevent users from
|
2549
|
+
# assigning specified tags to log groups using the
|
2550
|
+
# `aws:Resource/key-name ` or `aws:TagKeys` condition keys.
|
2551
|
+
#
|
2500
2552
|
#
|
2501
2553
|
#
|
2502
2554
|
# [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_ListTagsLogGroup.html
|
@@ -2539,7 +2591,7 @@ module Aws::CloudWatchLogs
|
|
2539
2591
|
params: params,
|
2540
2592
|
config: config)
|
2541
2593
|
context[:gem_name] = 'aws-sdk-cloudwatchlogs'
|
2542
|
-
context[:gem_version] = '1.
|
2594
|
+
context[:gem_version] = '1.44.0'
|
2543
2595
|
Seahorse::Client::Request.new(handlers, context)
|
2544
2596
|
end
|
2545
2597
|
|
@@ -25,8 +25,8 @@ module Aws::CloudWatchLogs
|
|
25
25
|
# @!attribute [rw] kms_key_id
|
26
26
|
# The Amazon Resource Name (ARN) of the CMK to use when encrypting log
|
27
27
|
# data. This must be a symmetric CMK. For more information, see
|
28
|
-
# [Amazon Resource Names -
|
29
|
-
#
|
28
|
+
# [Amazon Resource Names - Key Management Service][1] and [Using
|
29
|
+
# Symmetric and Asymmetric Keys][2].
|
30
30
|
#
|
31
31
|
#
|
32
32
|
#
|
@@ -102,7 +102,7 @@ module Aws::CloudWatchLogs
|
|
102
102
|
#
|
103
103
|
# @!attribute [rw] destination
|
104
104
|
# The name of S3 bucket for the exported log data. The bucket must be
|
105
|
-
# in the same
|
105
|
+
# in the same Amazon Web Services region.
|
106
106
|
# @return [String]
|
107
107
|
#
|
108
108
|
# @!attribute [rw] destination_prefix
|
@@ -153,8 +153,8 @@ module Aws::CloudWatchLogs
|
|
153
153
|
#
|
154
154
|
# @!attribute [rw] kms_key_id
|
155
155
|
# The Amazon Resource Name (ARN) of the CMK to use when encrypting log
|
156
|
-
# data. For more information, see [Amazon Resource Names -
|
157
|
-
# Management Service
|
156
|
+
# data. For more information, see [Amazon Resource Names - Key
|
157
|
+
# Management Service][1].
|
158
158
|
#
|
159
159
|
#
|
160
160
|
#
|
@@ -163,6 +163,16 @@ module Aws::CloudWatchLogs
|
|
163
163
|
#
|
164
164
|
# @!attribute [rw] tags
|
165
165
|
# The key-value pairs to use for the tags.
|
166
|
+
#
|
167
|
+
# CloudWatch Logs doesn’t support IAM policies that prevent users from
|
168
|
+
# assigning specified tags to log groups using the
|
169
|
+
# `aws:Resource/key-name ` or `aws:TagKeys` condition keys. For more
|
170
|
+
# information about using tags to control access, see [Controlling
|
171
|
+
# access to Amazon Web Services resources using tags][1].
|
172
|
+
#
|
173
|
+
#
|
174
|
+
#
|
175
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_tags.html
|
166
176
|
# @return [Hash<String,String>]
|
167
177
|
#
|
168
178
|
# @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/CreateLogGroupRequest AWS API Documentation
|
@@ -959,8 +969,8 @@ module Aws::CloudWatchLogs
|
|
959
969
|
# @return [String]
|
960
970
|
#
|
961
971
|
# @!attribute [rw] access_policy
|
962
|
-
# An IAM policy document that governs which
|
963
|
-
# subscription filters against this destination.
|
972
|
+
# An IAM policy document that governs which Amazon Web Services
|
973
|
+
# accounts can create subscription filters against this destination.
|
964
974
|
# @return [String]
|
965
975
|
#
|
966
976
|
# @!attribute [rw] arn
|
@@ -1304,9 +1314,6 @@ module Aws::CloudWatchLogs
|
|
1304
1314
|
# @!attribute [rw] next_token
|
1305
1315
|
# The token for the next set of items to return. (You received this
|
1306
1316
|
# token from a previous call.)
|
1307
|
-
#
|
1308
|
-
# Using this token works only when you specify `true` for
|
1309
|
-
# `startFromHead`.
|
1310
1317
|
# @return [String]
|
1311
1318
|
#
|
1312
1319
|
# @!attribute [rw] limit
|
@@ -1320,8 +1327,9 @@ module Aws::CloudWatchLogs
|
|
1320
1327
|
# the value is false, the latest log events are returned first. The
|
1321
1328
|
# default value is false.
|
1322
1329
|
#
|
1323
|
-
# If you are using `
|
1324
|
-
# `true` for
|
1330
|
+
# If you are using a previous `nextForwardToken` value as the
|
1331
|
+
# `nextToken` in this operation, you must specify `true` for
|
1332
|
+
# `startFromHead`.
|
1325
1333
|
# @return [Boolean]
|
1326
1334
|
#
|
1327
1335
|
# @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/GetLogEventsRequest AWS API Documentation
|
@@ -1608,8 +1616,12 @@ module Aws::CloudWatchLogs
|
|
1608
1616
|
# group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150,
|
1609
1617
|
# 180, 365, 400, 545, 731, 1827, and 3653.
|
1610
1618
|
#
|
1611
|
-
#
|
1612
|
-
#
|
1619
|
+
# To set a log group to never have log events expire, use
|
1620
|
+
# [DeleteRetentionPolicy][1].
|
1621
|
+
#
|
1622
|
+
#
|
1623
|
+
#
|
1624
|
+
# [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DeleteRetentionPolicy.html
|
1613
1625
|
# @return [Integer]
|
1614
1626
|
#
|
1615
1627
|
# @!attribute [rw] metric_filter_count
|
@@ -1873,7 +1885,7 @@ module Aws::CloudWatchLogs
|
|
1873
1885
|
# You can also set up a billing alarm to alert you if your charges
|
1874
1886
|
# are
|
1875
1887
|
# higher than expected. For more information, see [ Creating a Billing
|
1876
|
-
# Alarm to Monitor Your Estimated
|
1888
|
+
# Alarm to Monitor Your Estimated Amazon Web Services Charges][1].
|
1877
1889
|
#
|
1878
1890
|
#
|
1879
1891
|
#
|
@@ -2221,10 +2233,28 @@ module Aws::CloudWatchLogs
|
|
2221
2233
|
# Replace `"logArn"` with the ARN of your CloudWatch Logs resource,
|
2222
2234
|
# such as a log group or log stream.
|
2223
2235
|
#
|
2236
|
+
# CloudWatch Logs also supports [aws:SourceArn][1] and
|
2237
|
+
# [aws:SourceAccount][2] condition context keys.
|
2238
|
+
#
|
2239
|
+
# In the example resource policy, you would replace the value of
|
2240
|
+
# `SourceArn` with the resource making the call from Route 53 to
|
2241
|
+
# CloudWatch Logs and replace the value of `SourceAccount` with the
|
2242
|
+
# Amazon Web Services account ID making that call.
|
2243
|
+
#
|
2244
|
+
#
|
2245
|
+
#
|
2224
2246
|
# `\{ "Version": "2012-10-17", "Statement": [ \{ "Sid":
|
2225
2247
|
# "Route53LogsToCloudWatchLogs", "Effect": "Allow", "Principal": \{
|
2226
|
-
# "Service": [ "route53.amazonaws.com" ] \},
|
2227
|
-
# "
|
2248
|
+
# "Service": [ "route53.amazonaws.com" ] \}, "Action":
|
2249
|
+
# "logs:PutLogEvents", "Resource": "logArn", "Condition": \{
|
2250
|
+
# "ArnLike": \{ "aws:SourceArn": "myRoute53ResourceArn" \},
|
2251
|
+
# "StringEquals": \{ "aws:SourceAccount": "myAwsAccountId" \} \} \} ]
|
2252
|
+
# \}`
|
2253
|
+
#
|
2254
|
+
#
|
2255
|
+
#
|
2256
|
+
# [1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourcearn
|
2257
|
+
# [2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceaccount
|
2228
2258
|
# @return [String]
|
2229
2259
|
#
|
2230
2260
|
# @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/PutResourcePolicyRequest AWS API Documentation
|
@@ -2265,8 +2295,12 @@ module Aws::CloudWatchLogs
|
|
2265
2295
|
# group. Possible values are: 1, 3, 5, 7, 14, 30, 60, 90, 120, 150,
|
2266
2296
|
# 180, 365, 400, 545, 731, 1827, and 3653.
|
2267
2297
|
#
|
2268
|
-
#
|
2269
|
-
#
|
2298
|
+
# To set a log group to never have log events expire, use
|
2299
|
+
# [DeleteRetentionPolicy][1].
|
2300
|
+
#
|
2301
|
+
#
|
2302
|
+
#
|
2303
|
+
# [1]: https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DeleteRetentionPolicy.html
|
2270
2304
|
# @return [Integer]
|
2271
2305
|
#
|
2272
2306
|
# @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/PutRetentionPolicyRequest AWS API Documentation
|
@@ -2327,7 +2361,7 @@ module Aws::CloudWatchLogs
|
|
2327
2361
|
# * An Amazon Kinesis Firehose delivery stream belonging to the same
|
2328
2362
|
# account as the subscription filter, for same-account delivery.
|
2329
2363
|
#
|
2330
|
-
# *
|
2364
|
+
# * A Lambda function belonging to the same account as the
|
2331
2365
|
# subscription filter, for same-account delivery.
|
2332
2366
|
#
|
2333
2367
|
#
|
@@ -2845,7 +2879,8 @@ module Aws::CloudWatchLogs
|
|
2845
2879
|
include Aws::Structure
|
2846
2880
|
end
|
2847
2881
|
|
2848
|
-
# The most likely cause is an invalid
|
2882
|
+
# The most likely cause is an invalid Amazon Web Services access key ID
|
2883
|
+
# or secret key.
|
2849
2884
|
#
|
2850
2885
|
# @see http://docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/UnrecognizedClientException AWS API Documentation
|
2851
2886
|
#
|
metadata
CHANGED
@@ -1,14 +1,14 @@
|
|
1
1
|
--- !ruby/object:Gem::Specification
|
2
2
|
name: aws-sdk-cloudwatchlogs
|
3
3
|
version: !ruby/object:Gem::Version
|
4
|
-
version: 1.
|
4
|
+
version: 1.44.0
|
5
5
|
platform: ruby
|
6
6
|
authors:
|
7
7
|
- Amazon Web Services
|
8
8
|
autorequire:
|
9
9
|
bindir: bin
|
10
10
|
cert_chain: []
|
11
|
-
date: 2021-
|
11
|
+
date: 2021-08-17 00:00:00.000000000 Z
|
12
12
|
dependencies:
|
13
13
|
- !ruby/object:Gem::Dependency
|
14
14
|
name: aws-sdk-core
|