aws-sdk-managedgrafana 1.12.0 → 1.14.0

Sign up to get free protection for your applications and to get access to all the features.
checksums.yaml CHANGED
@@ -1,7 +1,7 @@
1
1
  ---
2
2
  SHA256:
3
- metadata.gz: dbed3c483cb41a8ed9c42655e36beb415da0a7c1a45e21ad77554152ebd627fd
4
- data.tar.gz: cfa5fb3b3859d7c141652054436061144dea64c925d9f629b4db914cc0c5e89c
3
+ metadata.gz: 64fd17dfe59278849a5070da3ecc05ad0e7fc4eb1593e38424cfb0deeb41d369
4
+ data.tar.gz: 5bcc93392daf4a898059c7d12056a509a7426ef691a34c5605ef696903069085
5
5
  SHA512:
6
- metadata.gz: 026314fed6e3710f307837edf8daf8b965133b2b3289f7b95befe1503bf0c4b6e79df1f6ada184ef77c59a0b7ee27faa58212f6bb73247be025fe88d7e199472
7
- data.tar.gz: bef0e55956c9c8b6d9ad29a882e0b35018f59c68aebc0ad31ce3bacf0e04807f80af4d65ae2ec6e276b5086705d6a6e334a07b20a3e5c40b4293fca37f2d331b
6
+ metadata.gz: 8fc40a3b41fb948a0f4e2b64d98032dc20e93024cefa30c9f0ae14cdf7570d79f44491f5a02e0cc96340b37648483ff5b5ce00e22865cb1c6de9857eea778f23
7
+ data.tar.gz: cd336b5dae1541911011d161d6b476844125956f8b1e0fe4e5f426f8ce88dc603f3770e709d859636b5e66ef066c85fc2ec32f0100788ab569b9f040d1edfeb5
data/CHANGELOG.md CHANGED
@@ -1,6 +1,16 @@
1
1
  Unreleased Changes
2
2
  ------------------
3
3
 
4
+ 1.14.0 (2023-04-28)
5
+ ------------------
6
+
7
+ * Feature - This release adds support for the grafanaVersion parameter in CreateWorkspace.
8
+
9
+ 1.13.0 (2023-02-23)
10
+ ------------------
11
+
12
+ * Feature - Doc-only update. Updated information on attached role policies for customer provided roles
13
+
4
14
  1.12.0 (2023-02-16)
5
15
  ------------------
6
16
 
data/VERSION CHANGED
@@ -1 +1 @@
1
- 1.12.0
1
+ 1.14.0
@@ -491,6 +491,11 @@ module Aws::ManagedGrafana
491
491
  #
492
492
  # [1]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-configure-workspace.html
493
493
  #
494
+ # @option params [String] :grafana_version
495
+ # Specifies the version of Grafana to support in the new workspace.
496
+ #
497
+ # Supported values are `8.4` and `9.4`.
498
+ #
494
499
  # @option params [Types::NetworkAccessConfiguration] :network_access_control
495
500
  # Configuration for network access to your workspace.
496
501
  #
@@ -508,22 +513,23 @@ module Aws::ManagedGrafana
508
513
  # in other accounts in an organization.
509
514
  #
510
515
  # @option params [required, String] :permission_type
511
- # If you specify `SERVICE_MANAGED` on AWS Grafana console, Amazon
512
- # Managed Grafana automatically creates the IAM roles and provisions the
513
- # permissions that the workspace needs to use Amazon Web Services data
514
- # sources and notification channels. In the CLI mode, the permissionType
515
- # `SERVICE_MANAGED` will not create the IAM role for you. The ability
516
- # for the Amazon Managed Grafana to create the IAM role on behalf of the
517
- # user is supported only in the Amazon Managed Grafana AWS console. Use
518
- # only the `CUSTOMER_MANAGED` permission type when creating a workspace
519
- # in the CLI.
520
- #
521
- # If you specify `CUSTOMER_MANAGED`, you will manage those roles and
522
- # permissions yourself. If you are creating this workspace in a member
523
- # account of an organization that is not a delegated administrator
524
- # account, and you want the workspace to access data sources in other
525
- # Amazon Web Services accounts in the organization, you must choose
526
- # `CUSTOMER_MANAGED`.
516
+ # When creating a workspace through the Amazon Web Services API, CLI or
517
+ # Amazon Web Services CloudFormation, you must manage IAM roles and
518
+ # provision the permissions that the workspace needs to use Amazon Web
519
+ # Services data sources and notification channels.
520
+ #
521
+ # You must also specify a `workspaceRoleArn` for a role that you will
522
+ # manage for the workspace to use when accessing those datasources and
523
+ # notification channels.
524
+ #
525
+ # The ability for Amazon Managed Grafana to create and update IAM roles
526
+ # on behalf of the user is supported only in the Amazon Managed Grafana
527
+ # console, where this value may be set to `SERVICE_MANAGED`.
528
+ #
529
+ # <note markdown="1"> Use only the `CUSTOMER_MANAGED` permission type when creating a
530
+ # workspace with the API, CLI or Amazon Web Services CloudFormation.
531
+ #
532
+ # </note>
527
533
  #
528
534
  # For more information, see [Amazon Managed Grafana permissions and
529
535
  # policies for Amazon Web Services data sources and notification
@@ -545,15 +551,7 @@ module Aws::ManagedGrafana
545
551
  # sources for your Grafana workspace to connect to.
546
552
  #
547
553
  # @option params [Array<String>] :workspace_data_sources
548
- # Specify the Amazon Web Services data sources that you want to be
549
- # queried in this workspace. Specifying these data sources here enables
550
- # Amazon Managed Grafana to create IAM roles and permissions that allow
551
- # Amazon Managed Grafana to read data from these sources. You must still
552
- # add them as data sources in the Grafana console in the workspace.
553
- #
554
- # If you don't specify a data source here, you can still add it as a
555
- # data source in the workspace console later. However, you will then
556
- # have to manually configure permissions for it.
554
+ # This parameter is for internal use only, and should not be used.
557
555
  #
558
556
  # @option params [String] :workspace_description
559
557
  # A description for the workspace. This is used only to help you
@@ -576,10 +574,11 @@ module Aws::ManagedGrafana
576
574
  # of an organization.
577
575
  #
578
576
  # @option params [String] :workspace_role_arn
579
- # The workspace needs an IAM role that grants permissions to the Amazon
580
- # Web Services resources that the workspace will view data from. If you
581
- # already have a role that you want to use, specify it here. The
582
- # permission type should be set to `CUSTOMER_MANAGED`.
577
+ # Specified the IAM role that grants permissions to the Amazon Web
578
+ # Services resources that the workspace will view data from, including
579
+ # both data sources and notification channels. You are responsible for
580
+ # managing the permissions for this role as new data sources or
581
+ # notification channels are added.
583
582
  #
584
583
  # @return [Types::CreateWorkspaceResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
585
584
  #
@@ -592,6 +591,7 @@ module Aws::ManagedGrafana
592
591
  # authentication_providers: ["AWS_SSO"], # required, accepts AWS_SSO, SAML
593
592
  # client_token: "ClientToken",
594
593
  # configuration: "OverridableConfigurationJson",
594
+ # grafana_version: "GrafanaVersion",
595
595
  # network_access_control: {
596
596
  # prefix_list_ids: ["PrefixListId"], # required
597
597
  # vpce_ids: ["VpceId"], # required
@@ -1325,28 +1325,41 @@ module Aws::ManagedGrafana
1325
1325
  #
1326
1326
  # @option params [String] :organization_role_name
1327
1327
  # The name of an IAM role that already exists to use to access resources
1328
- # through Organizations.
1328
+ # through Organizations. This can only be used with a workspace that has
1329
+ # the `permissionType` set to `CUSTOMER_MANAGED`.
1329
1330
  #
1330
1331
  # @option params [String] :permission_type
1331
- # If you specify `SERVICE_MANAGED`, Amazon Managed Grafana automatically
1332
- # creates the IAM roles and provisions the permissions that the
1333
- # workspace needs to use Amazon Web Services data sources and
1334
- # notification channels.
1332
+ # Use this parameter if you want to change a workspace from
1333
+ # `SERVICE_MANAGED` to `CUSTOMER_MANAGED`. This allows you to manage the
1334
+ # permissions that the workspace uses to access datasources and
1335
+ # notification channels. If the workspace is in a member Amazon Web
1336
+ # Services account of an organization, and that account is not a
1337
+ # delegated administrator account, and you want the workspace to access
1338
+ # data sources in other Amazon Web Services accounts in the
1339
+ # organization, you must choose `CUSTOMER_MANAGED`.
1335
1340
  #
1336
- # If you specify `CUSTOMER_MANAGED`, you will manage those roles and
1337
- # permissions yourself. If you are creating this workspace in a member
1338
- # account of an organization and that account is not a delegated
1339
- # administrator account, and you want the workspace to access data
1340
- # sources in other Amazon Web Services accounts in the organization, you
1341
- # must choose `CUSTOMER_MANAGED`.
1341
+ # If you specify this as `CUSTOMER_MANAGED`, you must also specify a
1342
+ # `workspaceRoleArn` that the workspace will use for accessing Amazon
1343
+ # Web Services resources.
1342
1344
  #
1343
- # For more information, see [Amazon Managed Grafana permissions and
1344
- # policies for Amazon Web Services data sources and notification
1345
- # channels][1]
1345
+ # For more information on the role and permissions needed, see [Amazon
1346
+ # Managed Grafana permissions and policies for Amazon Web Services data
1347
+ # sources and notification channels][1]
1348
+ #
1349
+ # <note markdown="1"> Do not use this to convert a `CUSTOMER_MANAGED` workspace to
1350
+ # `SERVICE_MANAGED`. Do not include this parameter if you want to leave
1351
+ # the workspace as `SERVICE_MANAGED`.
1352
+ #
1353
+ # You can convert a `CUSTOMER_MANAGED` workspace to `SERVICE_MANAGED`
1354
+ # using the Amazon Managed Grafana console. For more information, see
1355
+ # [Managing permissions for data sources and notification channels][2].
1356
+ #
1357
+ # </note>
1346
1358
  #
1347
1359
  #
1348
1360
  #
1349
1361
  # [1]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html
1362
+ # [2]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html
1350
1363
  #
1351
1364
  # @option params [Boolean] :remove_network_access_configuration
1352
1365
  # Whether to remove the network access configuration from the workspace.
@@ -1373,15 +1386,7 @@ module Aws::ManagedGrafana
1373
1386
  # sources for your Grafana workspace to connect to.
1374
1387
  #
1375
1388
  # @option params [Array<String>] :workspace_data_sources
1376
- # Specify the Amazon Web Services data sources that you want to be
1377
- # queried in this workspace. Specifying these data sources here enables
1378
- # Amazon Managed Grafana to create IAM roles and permissions that allow
1379
- # Amazon Managed Grafana to read data from these sources. You must still
1380
- # add them as data sources in the Grafana console in the workspace.
1381
- #
1382
- # If you don't specify a data source here, you can still add it as a
1383
- # data source later in the workspace console. However, you will then
1384
- # have to manually configure permissions for it.
1389
+ # This parameter is for internal use only, and should not be used.
1385
1390
  #
1386
1391
  # @option params [String] :workspace_description
1387
1392
  # A description for the workspace. This is used only to help you
@@ -1405,12 +1410,10 @@ module Aws::ManagedGrafana
1405
1410
  # of an organization.
1406
1411
  #
1407
1412
  # @option params [String] :workspace_role_arn
1408
- # The workspace needs an IAM role that grants permissions to the Amazon
1409
- # Web Services resources that the workspace will view data from. If you
1410
- # already have a role that you want to use, specify it here. If you omit
1411
- # this field and you specify some Amazon Web Services resources in
1412
- # `workspaceDataSources` or `workspaceNotificationDestinations`, a new
1413
- # IAM role with the necessary permissions is automatically created.
1413
+ # Specifies an IAM role that grants permissions to Amazon Web Services
1414
+ # resources that the workspace accesses, such as data sources and
1415
+ # notification channels. If this workspace has `permissionType`
1416
+ # `CUSTOMER_MANAGED`, then this role is required.
1414
1417
  #
1415
1418
  # @return [Types::UpdateWorkspaceResponse] Returns a {Seahorse::Client::Response response} object which responds to the following methods:
1416
1419
  #
@@ -1496,6 +1499,11 @@ module Aws::ManagedGrafana
1496
1499
  # groups in the assertion attribute are to have the `Admin` and `Editor`
1497
1500
  # roles in the workspace.
1498
1501
  #
1502
+ # <note markdown="1"> Changes to the authentication method for a workspace may take a few
1503
+ # minutes to take effect.
1504
+ #
1505
+ # </note>
1506
+ #
1499
1507
  # @option params [required, Array<String>] :authentication_providers
1500
1508
  # Specifies whether this workspace uses SAML 2.0, IAM Identity Center
1501
1509
  # (successor to Single Sign-On), or both to authenticate users for using
@@ -1626,7 +1634,7 @@ module Aws::ManagedGrafana
1626
1634
  params: params,
1627
1635
  config: config)
1628
1636
  context[:gem_name] = 'aws-sdk-managedgrafana'
1629
- context[:gem_version] = '1.12.0'
1637
+ context[:gem_version] = '1.14.0'
1630
1638
  Seahorse::Client::Request.new(handlers, context)
1631
1639
  end
1632
1640
 
@@ -193,6 +193,7 @@ module Aws::ManagedGrafana
193
193
  CreateWorkspaceRequest.add_member(:authentication_providers, Shapes::ShapeRef.new(shape: AuthenticationProviders, required: true, location_name: "authenticationProviders"))
194
194
  CreateWorkspaceRequest.add_member(:client_token, Shapes::ShapeRef.new(shape: ClientToken, location_name: "clientToken", metadata: {"idempotencyToken"=>true}))
195
195
  CreateWorkspaceRequest.add_member(:configuration, Shapes::ShapeRef.new(shape: OverridableConfigurationJson, location_name: "configuration", metadata: {"jsonvalue"=>true}))
196
+ CreateWorkspaceRequest.add_member(:grafana_version, Shapes::ShapeRef.new(shape: GrafanaVersion, location_name: "grafanaVersion"))
196
197
  CreateWorkspaceRequest.add_member(:network_access_control, Shapes::ShapeRef.new(shape: NetworkAccessConfiguration, location_name: "networkAccessControl"))
197
198
  CreateWorkspaceRequest.add_member(:organization_role_name, Shapes::ShapeRef.new(shape: OrganizationRoleName, location_name: "organizationRoleName"))
198
199
  CreateWorkspaceRequest.add_member(:permission_type, Shapes::ShapeRef.new(shape: PermissionType, required: true, location_name: "permissionType"))
@@ -43,36 +43,6 @@ module Aws::ManagedGrafana
43
43
  end
44
44
  raise ArgumentError, "DualStack is enabled but this partition does not support DualStack"
45
45
  end
46
- if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-1")
47
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.ap-northeast-1.amazonaws.com", headers: {}, properties: {})
48
- end
49
- if Aws::Endpoints::Matchers.string_equals?(region, "ap-northeast-2")
50
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.ap-northeast-2.amazonaws.com", headers: {}, properties: {})
51
- end
52
- if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-1")
53
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.ap-southeast-1.amazonaws.com", headers: {}, properties: {})
54
- end
55
- if Aws::Endpoints::Matchers.string_equals?(region, "ap-southeast-2")
56
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.ap-southeast-2.amazonaws.com", headers: {}, properties: {})
57
- end
58
- if Aws::Endpoints::Matchers.string_equals?(region, "eu-central-1")
59
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.eu-central-1.amazonaws.com", headers: {}, properties: {})
60
- end
61
- if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-1")
62
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.eu-west-1.amazonaws.com", headers: {}, properties: {})
63
- end
64
- if Aws::Endpoints::Matchers.string_equals?(region, "eu-west-2")
65
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.eu-west-2.amazonaws.com", headers: {}, properties: {})
66
- end
67
- if Aws::Endpoints::Matchers.string_equals?(region, "us-east-1")
68
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.us-east-1.amazonaws.com", headers: {}, properties: {})
69
- end
70
- if Aws::Endpoints::Matchers.string_equals?(region, "us-east-2")
71
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.us-east-2.amazonaws.com", headers: {}, properties: {})
72
- end
73
- if Aws::Endpoints::Matchers.string_equals?(region, "us-west-2")
74
- return Aws::Endpoints::Endpoint.new(url: "https://grafana.us-west-2.amazonaws.com", headers: {}, properties: {})
75
- end
76
46
  return Aws::Endpoints::Endpoint.new(url: "https://grafana.#{region}.#{partition_result['dnsSuffix']}", headers: {}, properties: {})
77
47
  end
78
48
  end
@@ -285,6 +285,12 @@ module Aws::ManagedGrafana
285
285
  # [1]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-configure-workspace.html
286
286
  # @return [String]
287
287
  #
288
+ # @!attribute [rw] grafana_version
289
+ # Specifies the version of Grafana to support in the new workspace.
290
+ #
291
+ # Supported values are `8.4` and `9.4`.
292
+ # @return [String]
293
+ #
288
294
  # @!attribute [rw] network_access_control
289
295
  # Configuration for network access to your workspace.
290
296
  #
@@ -304,22 +310,23 @@ module Aws::ManagedGrafana
304
310
  # @return [String]
305
311
  #
306
312
  # @!attribute [rw] permission_type
307
- # If you specify `SERVICE_MANAGED` on AWS Grafana console, Amazon
308
- # Managed Grafana automatically creates the IAM roles and provisions
309
- # the permissions that the workspace needs to use Amazon Web Services
310
- # data sources and notification channels. In the CLI mode, the
311
- # permissionType `SERVICE_MANAGED` will not create the IAM role for
312
- # you. The ability for the Amazon Managed Grafana to create the IAM
313
- # role on behalf of the user is supported only in the Amazon Managed
314
- # Grafana AWS console. Use only the `CUSTOMER_MANAGED` permission type
315
- # when creating a workspace in the CLI.
316
- #
317
- # If you specify `CUSTOMER_MANAGED`, you will manage those roles and
318
- # permissions yourself. If you are creating this workspace in a member
319
- # account of an organization that is not a delegated administrator
320
- # account, and you want the workspace to access data sources in other
321
- # Amazon Web Services accounts in the organization, you must choose
322
- # `CUSTOMER_MANAGED`.
313
+ # When creating a workspace through the Amazon Web Services API, CLI
314
+ # or Amazon Web Services CloudFormation, you must manage IAM roles and
315
+ # provision the permissions that the workspace needs to use Amazon Web
316
+ # Services data sources and notification channels.
317
+ #
318
+ # You must also specify a `workspaceRoleArn` for a role that you will
319
+ # manage for the workspace to use when accessing those datasources and
320
+ # notification channels.
321
+ #
322
+ # The ability for Amazon Managed Grafana to create and update IAM
323
+ # roles on behalf of the user is supported only in the Amazon Managed
324
+ # Grafana console, where this value may be set to `SERVICE_MANAGED`.
325
+ #
326
+ # <note markdown="1"> Use only the `CUSTOMER_MANAGED` permission type when creating a
327
+ # workspace with the API, CLI or Amazon Web Services CloudFormation.
328
+ #
329
+ # </note>
323
330
  #
324
331
  # For more information, see [Amazon Managed Grafana permissions and
325
332
  # policies for Amazon Web Services data sources and notification
@@ -345,16 +352,7 @@ module Aws::ManagedGrafana
345
352
  # @return [Types::VpcConfiguration]
346
353
  #
347
354
  # @!attribute [rw] workspace_data_sources
348
- # Specify the Amazon Web Services data sources that you want to be
349
- # queried in this workspace. Specifying these data sources here
350
- # enables Amazon Managed Grafana to create IAM roles and permissions
351
- # that allow Amazon Managed Grafana to read data from these sources.
352
- # You must still add them as data sources in the Grafana console in
353
- # the workspace.
354
- #
355
- # If you don't specify a data source here, you can still add it as a
356
- # data source in the workspace console later. However, you will then
357
- # have to manually configure permissions for it.
355
+ # This parameter is for internal use only, and should not be used.
358
356
  # @return [Array<String>]
359
357
  #
360
358
  # @!attribute [rw] workspace_description
@@ -382,10 +380,11 @@ module Aws::ManagedGrafana
382
380
  # @return [Array<String>]
383
381
  #
384
382
  # @!attribute [rw] workspace_role_arn
385
- # The workspace needs an IAM role that grants permissions to the
386
- # Amazon Web Services resources that the workspace will view data
387
- # from. If you already have a role that you want to use, specify it
388
- # here. The permission type should be set to `CUSTOMER_MANAGED`.
383
+ # Specified the IAM role that grants permissions to the Amazon Web
384
+ # Services resources that the workspace will view data from, including
385
+ # both data sources and notification channels. You are responsible for
386
+ # managing the permissions for this role as new data sources or
387
+ # notification channels are added.
389
388
  # @return [String]
390
389
  #
391
390
  # @see http://docs.aws.amazon.com/goto/WebAPI/grafana-2020-08-18/CreateWorkspaceRequest AWS API Documentation
@@ -395,6 +394,7 @@ module Aws::ManagedGrafana
395
394
  :authentication_providers,
396
395
  :client_token,
397
396
  :configuration,
397
+ :grafana_version,
398
398
  :network_access_control,
399
399
  :organization_role_name,
400
400
  :permission_type,
@@ -1252,29 +1252,43 @@ module Aws::ManagedGrafana
1252
1252
  #
1253
1253
  # @!attribute [rw] organization_role_name
1254
1254
  # The name of an IAM role that already exists to use to access
1255
- # resources through Organizations.
1255
+ # resources through Organizations. This can only be used with a
1256
+ # workspace that has the `permissionType` set to `CUSTOMER_MANAGED`.
1256
1257
  # @return [String]
1257
1258
  #
1258
1259
  # @!attribute [rw] permission_type
1259
- # If you specify `SERVICE_MANAGED`, Amazon Managed Grafana
1260
- # automatically creates the IAM roles and provisions the permissions
1261
- # that the workspace needs to use Amazon Web Services data sources and
1262
- # notification channels.
1263
- #
1264
- # If you specify `CUSTOMER_MANAGED`, you will manage those roles and
1265
- # permissions yourself. If you are creating this workspace in a member
1266
- # account of an organization and that account is not a delegated
1267
- # administrator account, and you want the workspace to access data
1268
- # sources in other Amazon Web Services accounts in the organization,
1269
- # you must choose `CUSTOMER_MANAGED`.
1260
+ # Use this parameter if you want to change a workspace from
1261
+ # `SERVICE_MANAGED` to `CUSTOMER_MANAGED`. This allows you to manage
1262
+ # the permissions that the workspace uses to access datasources and
1263
+ # notification channels. If the workspace is in a member Amazon Web
1264
+ # Services account of an organization, and that account is not a
1265
+ # delegated administrator account, and you want the workspace to
1266
+ # access data sources in other Amazon Web Services accounts in the
1267
+ # organization, you must choose `CUSTOMER_MANAGED`.
1268
+ #
1269
+ # If you specify this as `CUSTOMER_MANAGED`, you must also specify a
1270
+ # `workspaceRoleArn` that the workspace will use for accessing Amazon
1271
+ # Web Services resources.
1272
+ #
1273
+ # For more information on the role and permissions needed, see [Amazon
1274
+ # Managed Grafana permissions and policies for Amazon Web Services
1275
+ # data sources and notification channels][1]
1276
+ #
1277
+ # <note markdown="1"> Do not use this to convert a `CUSTOMER_MANAGED` workspace to
1278
+ # `SERVICE_MANAGED`. Do not include this parameter if you want to
1279
+ # leave the workspace as `SERVICE_MANAGED`.
1280
+ #
1281
+ # You can convert a `CUSTOMER_MANAGED` workspace to `SERVICE_MANAGED`
1282
+ # using the Amazon Managed Grafana console. For more information, see
1283
+ # [Managing permissions for data sources and notification
1284
+ # channels][2].
1270
1285
  #
1271
- # For more information, see [Amazon Managed Grafana permissions and
1272
- # policies for Amazon Web Services data sources and notification
1273
- # channels][1]
1286
+ # </note>
1274
1287
  #
1275
1288
  #
1276
1289
  #
1277
1290
  # [1]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html
1291
+ # [2]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html
1278
1292
  # @return [String]
1279
1293
  #
1280
1294
  # @!attribute [rw] remove_network_access_configuration
@@ -1307,16 +1321,7 @@ module Aws::ManagedGrafana
1307
1321
  # @return [Types::VpcConfiguration]
1308
1322
  #
1309
1323
  # @!attribute [rw] workspace_data_sources
1310
- # Specify the Amazon Web Services data sources that you want to be
1311
- # queried in this workspace. Specifying these data sources here
1312
- # enables Amazon Managed Grafana to create IAM roles and permissions
1313
- # that allow Amazon Managed Grafana to read data from these sources.
1314
- # You must still add them as data sources in the Grafana console in
1315
- # the workspace.
1316
- #
1317
- # If you don't specify a data source here, you can still add it as a
1318
- # data source later in the workspace console. However, you will then
1319
- # have to manually configure permissions for it.
1324
+ # This parameter is for internal use only, and should not be used.
1320
1325
  # @return [Array<String>]
1321
1326
  #
1322
1327
  # @!attribute [rw] workspace_description
@@ -1346,13 +1351,10 @@ module Aws::ManagedGrafana
1346
1351
  # @return [Array<String>]
1347
1352
  #
1348
1353
  # @!attribute [rw] workspace_role_arn
1349
- # The workspace needs an IAM role that grants permissions to the
1350
- # Amazon Web Services resources that the workspace will view data
1351
- # from. If you already have a role that you want to use, specify it
1352
- # here. If you omit this field and you specify some Amazon Web
1353
- # Services resources in `workspaceDataSources` or
1354
- # `workspaceNotificationDestinations`, a new IAM role with the
1355
- # necessary permissions is automatically created.
1354
+ # Specifies an IAM role that grants permissions to Amazon Web Services
1355
+ # resources that the workspace accesses, such as data sources and
1356
+ # notification channels. If this workspace has `permissionType`
1357
+ # `CUSTOMER_MANAGED`, then this role is required.
1356
1358
  # @return [String]
1357
1359
  #
1358
1360
  # @see http://docs.aws.amazon.com/goto/WebAPI/grafana-2020-08-18/UpdateWorkspaceRequest AWS API Documentation
@@ -1507,6 +1509,10 @@ module Aws::ManagedGrafana
1507
1509
  # Specifies the Amazon Web Services data sources that have been
1508
1510
  # configured to have IAM roles and permissions created to allow Amazon
1509
1511
  # Managed Grafana to read data from these sources.
1512
+ #
1513
+ # This list is only used when the workspace was created through the
1514
+ # Amazon Web Services console, and the `permissionType` is
1515
+ # `SERVICE_MANAGED`.
1510
1516
  # @return [Array<String>]
1511
1517
  #
1512
1518
  # @!attribute [rw] description
@@ -1576,25 +1582,32 @@ module Aws::ManagedGrafana
1576
1582
  # @return [Array<String>]
1577
1583
  #
1578
1584
  # @!attribute [rw] permission_type
1579
- # If this is `SERVICE_MANAGED`, Amazon Managed Grafana automatically
1580
- # creates the IAM roles and provisions the permissions that the
1581
- # workspace needs to use Amazon Web Services data sources and
1585
+ # If this is `SERVICE_MANAGED`, and the workplace was created through
1586
+ # the Amazon Managed Grafana console, then Amazon Managed Grafana
1587
+ # automatically creates the IAM roles and provisions the permissions
1588
+ # that the workspace needs to use Amazon Web Services data sources and
1582
1589
  # notification channels.
1583
1590
  #
1584
- # If this is `CUSTOMER_MANAGED`, you manage those roles and
1585
- # permissions yourself. If you are creating this workspace in a member
1586
- # account of an organization and that account is not a delegated
1587
- # administrator account, and you want the workspace to access data
1588
- # sources in other Amazon Web Services accounts in the organization,
1589
- # you must choose `CUSTOMER_MANAGED`.
1591
+ # If this is `CUSTOMER_MANAGED`, you must manage those roles and
1592
+ # permissions yourself.
1590
1593
  #
1591
- # For more information, see [Amazon Managed Grafana permissions and
1592
- # policies for Amazon Web Services data sources and notification
1593
- # channels][1]
1594
+ # If you are working with a workspace in a member account of an
1595
+ # organization and that account is not a delegated administrator
1596
+ # account, and you want the workspace to access data sources in other
1597
+ # Amazon Web Services accounts in the organization, this parameter
1598
+ # must be set to `CUSTOMER_MANAGED`.
1594
1599
  #
1600
+ # For more information about converting between customer and service
1601
+ # managed, see [Managing permissions for data sources and notification
1602
+ # channels][1]. For more information about the roles and permissions
1603
+ # that must be managed for customer managed workspaces, see [Amazon
1604
+ # Managed Grafana permissions and policies for Amazon Web Services
1605
+ # data sources and notification channels][2]
1595
1606
  #
1596
1607
  #
1597
- # [1]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html
1608
+ #
1609
+ # [1]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-datasource-and-notification.html
1610
+ # [2]: https://docs.aws.amazon.com/grafana/latest/userguide/AMG-manage-permissions.html
1598
1611
  # @return [String]
1599
1612
  #
1600
1613
  # @!attribute [rw] stack_set_name
@@ -52,6 +52,6 @@ require_relative 'aws-sdk-managedgrafana/customizations'
52
52
  # @!group service
53
53
  module Aws::ManagedGrafana
54
54
 
55
- GEM_VERSION = '1.12.0'
55
+ GEM_VERSION = '1.14.0'
56
56
 
57
57
  end
metadata CHANGED
@@ -1,14 +1,14 @@
1
1
  --- !ruby/object:Gem::Specification
2
2
  name: aws-sdk-managedgrafana
3
3
  version: !ruby/object:Gem::Version
4
- version: 1.12.0
4
+ version: 1.14.0
5
5
  platform: ruby
6
6
  authors:
7
7
  - Amazon Web Services
8
8
  autorequire:
9
9
  bindir: bin
10
10
  cert_chain: []
11
- date: 2023-02-16 00:00:00.000000000 Z
11
+ date: 2023-04-28 00:00:00.000000000 Z
12
12
  dependencies:
13
13
  - !ruby/object:Gem::Dependency
14
14
  name: aws-sdk-core