@aws-sdk/client-aiops 3.832.0 → 3.836.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/dist-cjs/protocols/Aws_restJson1.js +3 -0
- package/dist-es/protocols/Aws_restJson1.js +3 -0
- package/dist-types/AIOps.d.ts +1 -1
- package/dist-types/AIOpsClient.d.ts +1 -1
- package/dist-types/commands/CreateInvestigationGroupCommand.d.ts +6 -1
- package/dist-types/commands/GetInvestigationGroupCommand.d.ts +5 -0
- package/dist-types/commands/ListTagsForResourceCommand.d.ts +1 -1
- package/dist-types/commands/UpdateInvestigationGroupCommand.d.ts +5 -0
- package/dist-types/endpoint/EndpointParameters.d.ts +1 -1
- package/dist-types/index.d.ts +1 -1
- package/dist-types/models/models_0.d.ts +37 -11
- package/dist-types/ts3.4/endpoint/EndpointParameters.d.ts +4 -1
- package/dist-types/ts3.4/models/models_0.d.ts +6 -0
- package/package.json +11 -11
package/README.md
CHANGED
|
@@ -6,7 +6,7 @@
|
|
|
6
6
|
|
|
7
7
|
AWS SDK for JavaScript AIOps Client for Node.js, Browser and React Native.
|
|
8
8
|
|
|
9
|
-
<p>The
|
|
9
|
+
<p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
|
|
10
10
|
|
|
11
11
|
## Installing
|
|
12
12
|
|
|
@@ -15,6 +15,7 @@ const se_CreateInvestigationGroupCommand = async (input, context) => {
|
|
|
15
15
|
let body;
|
|
16
16
|
body = JSON.stringify((0, smithy_client_1.take)(input, {
|
|
17
17
|
chatbotNotificationChannel: (_) => (0, smithy_client_1._json)(_),
|
|
18
|
+
crossAccountConfigurations: (_) => (0, smithy_client_1._json)(_),
|
|
18
19
|
encryptionConfiguration: (_) => (0, smithy_client_1._json)(_),
|
|
19
20
|
isCloudTrailEventHistoryEnabled: [],
|
|
20
21
|
name: [],
|
|
@@ -143,6 +144,7 @@ const se_UpdateInvestigationGroupCommand = async (input, context) => {
|
|
|
143
144
|
let body;
|
|
144
145
|
body = JSON.stringify((0, smithy_client_1.take)(input, {
|
|
145
146
|
chatbotNotificationChannel: (_) => (0, smithy_client_1._json)(_),
|
|
147
|
+
crossAccountConfigurations: (_) => (0, smithy_client_1._json)(_),
|
|
146
148
|
encryptionConfiguration: (_) => (0, smithy_client_1._json)(_),
|
|
147
149
|
isCloudTrailEventHistoryEnabled: [],
|
|
148
150
|
roleArn: [],
|
|
@@ -202,6 +204,7 @@ const de_GetInvestigationGroupCommand = async (output, context) => {
|
|
|
202
204
|
chatbotNotificationChannel: smithy_client_1._json,
|
|
203
205
|
createdAt: (_) => (0, smithy_client_1.expectNonNull)((0, smithy_client_1.parseEpochTimestamp)((0, smithy_client_1.expectNumber)(_))),
|
|
204
206
|
createdBy: smithy_client_1.expectString,
|
|
207
|
+
crossAccountConfigurations: smithy_client_1._json,
|
|
205
208
|
encryptionConfiguration: smithy_client_1._json,
|
|
206
209
|
isCloudTrailEventHistoryEnabled: smithy_client_1.expectBoolean,
|
|
207
210
|
lastModifiedAt: (_) => (0, smithy_client_1.expectNonNull)((0, smithy_client_1.parseEpochTimestamp)((0, smithy_client_1.expectNumber)(_))),
|
|
@@ -12,6 +12,7 @@ export const se_CreateInvestigationGroupCommand = async (input, context) => {
|
|
|
12
12
|
let body;
|
|
13
13
|
body = JSON.stringify(take(input, {
|
|
14
14
|
chatbotNotificationChannel: (_) => _json(_),
|
|
15
|
+
crossAccountConfigurations: (_) => _json(_),
|
|
15
16
|
encryptionConfiguration: (_) => _json(_),
|
|
16
17
|
isCloudTrailEventHistoryEnabled: [],
|
|
17
18
|
name: [],
|
|
@@ -130,6 +131,7 @@ export const se_UpdateInvestigationGroupCommand = async (input, context) => {
|
|
|
130
131
|
let body;
|
|
131
132
|
body = JSON.stringify(take(input, {
|
|
132
133
|
chatbotNotificationChannel: (_) => _json(_),
|
|
134
|
+
crossAccountConfigurations: (_) => _json(_),
|
|
133
135
|
encryptionConfiguration: (_) => _json(_),
|
|
134
136
|
isCloudTrailEventHistoryEnabled: [],
|
|
135
137
|
roleArn: [],
|
|
@@ -185,6 +187,7 @@ export const de_GetInvestigationGroupCommand = async (output, context) => {
|
|
|
185
187
|
chatbotNotificationChannel: _json,
|
|
186
188
|
createdAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
|
|
187
189
|
createdBy: __expectString,
|
|
190
|
+
crossAccountConfigurations: _json,
|
|
188
191
|
encryptionConfiguration: _json,
|
|
189
192
|
isCloudTrailEventHistoryEnabled: __expectBoolean,
|
|
190
193
|
lastModifiedAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
|
package/dist-types/AIOps.d.ts
CHANGED
|
@@ -81,7 +81,7 @@ export interface AIOps {
|
|
|
81
81
|
updateInvestigationGroup(args: UpdateInvestigationGroupCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateInvestigationGroupCommandOutput) => void): void;
|
|
82
82
|
}
|
|
83
83
|
/**
|
|
84
|
-
* <p>The
|
|
84
|
+
* <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
|
|
85
85
|
* @public
|
|
86
86
|
*/
|
|
87
87
|
export declare class AIOps extends AIOpsClient implements AIOps {
|
|
@@ -180,7 +180,7 @@ export type AIOpsClientResolvedConfigType = __SmithyResolvedConfiguration<__Http
|
|
|
180
180
|
export interface AIOpsClientResolvedConfig extends AIOpsClientResolvedConfigType {
|
|
181
181
|
}
|
|
182
182
|
/**
|
|
183
|
-
* <p>The
|
|
183
|
+
* <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
|
|
184
184
|
* @public
|
|
185
185
|
*/
|
|
186
186
|
export declare class AIOpsClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, AIOpsClientResolvedConfig> {
|
|
@@ -27,7 +27,7 @@ declare const CreateInvestigationGroupCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up
|
|
30
|
+
* <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has the either the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM policy attached, or to an account that has similar permissions.</p> <important> <p>You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable alarms to do this, you must use <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html">PutInvestigationGroupPolicy</a> to create a resource policy that grants this permission to CloudWatch alarms. </p> <p>For more information about configuring CloudWatch alarms to work with CloudWatch investigations, see </p> </important>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -54,6 +54,11 @@ declare const CreateInvestigationGroupCommand_base: {
|
|
|
54
54
|
* ],
|
|
55
55
|
* },
|
|
56
56
|
* isCloudTrailEventHistoryEnabled: true || false,
|
|
57
|
+
* crossAccountConfigurations: [ // CrossAccountConfigurations
|
|
58
|
+
* { // CrossAccountConfiguration
|
|
59
|
+
* sourceRoleArn: "STRING_VALUE",
|
|
60
|
+
* },
|
|
61
|
+
* ],
|
|
57
62
|
* };
|
|
58
63
|
* const command = new CreateInvestigationGroupCommand(input);
|
|
59
64
|
* const response = await client.send(command);
|
|
@@ -61,6 +61,11 @@ declare const GetInvestigationGroupCommand_base: {
|
|
|
61
61
|
* // "STRING_VALUE",
|
|
62
62
|
* // ],
|
|
63
63
|
* // isCloudTrailEventHistoryEnabled: true || false,
|
|
64
|
+
* // crossAccountConfigurations: [ // CrossAccountConfigurations
|
|
65
|
+
* // { // CrossAccountConfiguration
|
|
66
|
+
* // sourceRoleArn: "STRING_VALUE",
|
|
67
|
+
* // },
|
|
68
|
+
* // ],
|
|
64
69
|
* // };
|
|
65
70
|
*
|
|
66
71
|
* ```
|
|
@@ -27,7 +27,7 @@ declare const ListTagsForResourceCommand_base: {
|
|
|
27
27
|
getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
|
|
28
28
|
};
|
|
29
29
|
/**
|
|
30
|
-
* <p>Displays the tags associated with a
|
|
30
|
+
* <p>Displays the tags associated with a CloudWatch investigations resource. Currently, investigation groups support tagging.</p>
|
|
31
31
|
* @example
|
|
32
32
|
* Use a bare-bones client and the command you need to make an API call.
|
|
33
33
|
* ```javascript
|
|
@@ -50,6 +50,11 @@ declare const UpdateInvestigationGroupCommand_base: {
|
|
|
50
50
|
* ],
|
|
51
51
|
* },
|
|
52
52
|
* isCloudTrailEventHistoryEnabled: true || false,
|
|
53
|
+
* crossAccountConfigurations: [ // CrossAccountConfigurations
|
|
54
|
+
* { // CrossAccountConfiguration
|
|
55
|
+
* sourceRoleArn: "STRING_VALUE",
|
|
56
|
+
* },
|
|
57
|
+
* ],
|
|
53
58
|
* };
|
|
54
59
|
* const command = new UpdateInvestigationGroupCommand(input);
|
|
55
60
|
* const response = await client.send(command);
|
|
@@ -8,7 +8,7 @@ export interface ClientInputEndpointParameters {
|
|
|
8
8
|
useFipsEndpoint?: boolean | undefined | Provider<boolean | undefined>;
|
|
9
9
|
endpoint?: string | Provider<string> | Endpoint | Provider<Endpoint> | EndpointV2 | Provider<EndpointV2>;
|
|
10
10
|
}
|
|
11
|
-
export type ClientResolvedEndpointParameters = ClientInputEndpointParameters & {
|
|
11
|
+
export type ClientResolvedEndpointParameters = Omit<ClientInputEndpointParameters, "endpoint"> & {
|
|
12
12
|
defaultSigningName: string;
|
|
13
13
|
};
|
|
14
14
|
export declare const resolveClientEndpointParameters: <T>(options: T & ClientInputEndpointParameters) => T & ClientResolvedEndpointParameters;
|
package/dist-types/index.d.ts
CHANGED
|
@@ -1,5 +1,5 @@
|
|
|
1
1
|
/**
|
|
2
|
-
* <p>The
|
|
2
|
+
* <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
|
|
3
3
|
*
|
|
4
4
|
* @packageDocumentation
|
|
5
5
|
*/
|
|
@@ -48,6 +48,17 @@ export declare class InternalServerException extends __BaseException {
|
|
|
48
48
|
*/
|
|
49
49
|
constructor(opts: __ExceptionOptionType<InternalServerException, __BaseException>);
|
|
50
50
|
}
|
|
51
|
+
/**
|
|
52
|
+
* <p>This structure contains information about the cross-account configuration in the account. </p>
|
|
53
|
+
* @public
|
|
54
|
+
*/
|
|
55
|
+
export interface CrossAccountConfiguration {
|
|
56
|
+
/**
|
|
57
|
+
* <p>The ARN of an existing role which will be used to do investigations on your behalf. </p>
|
|
58
|
+
* @public
|
|
59
|
+
*/
|
|
60
|
+
sourceRoleArn?: string | undefined;
|
|
61
|
+
}
|
|
51
62
|
/**
|
|
52
63
|
* @public
|
|
53
64
|
* @enum
|
|
@@ -81,17 +92,17 @@ export interface EncryptionConfiguration {
|
|
|
81
92
|
*/
|
|
82
93
|
export interface CreateInvestigationGroupInput {
|
|
83
94
|
/**
|
|
84
|
-
* <p>
|
|
95
|
+
* <p>Provides a name for the investigation group.</p>
|
|
85
96
|
* @public
|
|
86
97
|
*/
|
|
87
98
|
name: string | undefined;
|
|
88
99
|
/**
|
|
89
|
-
* <p>Specify the ARN of the IAM role that
|
|
100
|
+
* <p>Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data Amazon Q has access to during investigations</a>.</p>
|
|
90
101
|
* @public
|
|
91
102
|
*/
|
|
92
103
|
roleArn: string | undefined;
|
|
93
104
|
/**
|
|
94
|
-
* <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter,
|
|
105
|
+
* <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p>
|
|
95
106
|
* @public
|
|
96
107
|
*/
|
|
97
108
|
encryptionConfiguration?: EncryptionConfiguration | undefined;
|
|
@@ -111,15 +122,20 @@ export interface CreateInvestigationGroupInput {
|
|
|
111
122
|
*/
|
|
112
123
|
tagKeyBoundaries?: string[] | undefined;
|
|
113
124
|
/**
|
|
114
|
-
* <p>Use this structure to integrate
|
|
125
|
+
* <p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
|
|
115
126
|
* @public
|
|
116
127
|
*/
|
|
117
128
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
118
129
|
/**
|
|
119
|
-
* <p>Specify <code>true</code> to enable
|
|
130
|
+
* <p>Specify <code>true</code> to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p>
|
|
120
131
|
* @public
|
|
121
132
|
*/
|
|
122
133
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
134
|
+
/**
|
|
135
|
+
* <p>Number of <code>sourceAccountId</code> values that have been configured for cross-account access.</p>
|
|
136
|
+
* @public
|
|
137
|
+
*/
|
|
138
|
+
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
123
139
|
}
|
|
124
140
|
/**
|
|
125
141
|
* @public
|
|
@@ -279,10 +295,15 @@ export interface GetInvestigationGroupResponse {
|
|
|
279
295
|
*/
|
|
280
296
|
tagKeyBoundaries?: string[] | undefined;
|
|
281
297
|
/**
|
|
282
|
-
* <p>Specifies whether
|
|
298
|
+
* <p>Specifies whether CloudWatch investigationshas access to change events that are recorded by CloudTrail.</p>
|
|
283
299
|
* @public
|
|
284
300
|
*/
|
|
285
301
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
302
|
+
/**
|
|
303
|
+
* <p>Lists the <code>AWSAccountId</code> of the accounts configured for cross-account access and the results of the last scan performed on each account.</p>
|
|
304
|
+
* @public
|
|
305
|
+
*/
|
|
306
|
+
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
286
307
|
}
|
|
287
308
|
/**
|
|
288
309
|
* @public
|
|
@@ -345,12 +366,12 @@ export interface UpdateInvestigationGroupRequest {
|
|
|
345
366
|
*/
|
|
346
367
|
identifier: string | undefined;
|
|
347
368
|
/**
|
|
348
|
-
* <p>Specify this field if you want to change the IAM role that
|
|
369
|
+
* <p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">EHow to control what data Amazon Q has access to during investigations</a>.</p>
|
|
349
370
|
* @public
|
|
350
371
|
*/
|
|
351
372
|
roleArn?: string | undefined;
|
|
352
373
|
/**
|
|
353
|
-
* <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter,
|
|
374
|
+
* <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p>
|
|
354
375
|
* @public
|
|
355
376
|
*/
|
|
356
377
|
encryptionConfiguration?: EncryptionConfiguration | undefined;
|
|
@@ -360,15 +381,20 @@ export interface UpdateInvestigationGroupRequest {
|
|
|
360
381
|
*/
|
|
361
382
|
tagKeyBoundaries?: string[] | undefined;
|
|
362
383
|
/**
|
|
363
|
-
* <p>Use this structure to integrate
|
|
384
|
+
* <p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
|
|
364
385
|
* @public
|
|
365
386
|
*/
|
|
366
387
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
367
388
|
/**
|
|
368
|
-
* <p>Specify <code>true</code> to enable
|
|
389
|
+
* <p>Specify <code>true</code> to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p>
|
|
369
390
|
* @public
|
|
370
391
|
*/
|
|
371
392
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
393
|
+
/**
|
|
394
|
+
* <p>Used to configure cross-account access for an investigation group. It allows the investigation group to access resources in other accounts. </p>
|
|
395
|
+
* @public
|
|
396
|
+
*/
|
|
397
|
+
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
372
398
|
}
|
|
373
399
|
/**
|
|
374
400
|
* @public
|
|
@@ -450,7 +476,7 @@ export interface ListTagsForResourceOutput {
|
|
|
450
476
|
*/
|
|
451
477
|
export interface ListTagsForResourceRequest {
|
|
452
478
|
/**
|
|
453
|
-
* <p>The ARN of the
|
|
479
|
+
* <p>The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a> operation to find the ARNs of investigation groups.</p> <p>The ARN format for an investigation group is <code>arn:aws:aiops:<i>Region</i>:<i>account-id</i>:investigation-group:<i>investigation-group-id</i> </code>.</p>
|
|
454
480
|
* @public
|
|
455
481
|
*/
|
|
456
482
|
resourceArn: string | undefined;
|
|
@@ -16,7 +16,10 @@ export interface ClientInputEndpointParameters {
|
|
|
16
16
|
| EndpointV2
|
|
17
17
|
| Provider<EndpointV2>;
|
|
18
18
|
}
|
|
19
|
-
export type ClientResolvedEndpointParameters =
|
|
19
|
+
export type ClientResolvedEndpointParameters = Pick<
|
|
20
|
+
ClientInputEndpointParameters,
|
|
21
|
+
Exclude<keyof ClientInputEndpointParameters, "endpoint">
|
|
22
|
+
> & {
|
|
20
23
|
defaultSigningName: string;
|
|
21
24
|
};
|
|
22
25
|
export declare const resolveClientEndpointParameters: <T>(
|
|
@@ -24,6 +24,9 @@ export declare class InternalServerException extends __BaseException {
|
|
|
24
24
|
opts: __ExceptionOptionType<InternalServerException, __BaseException>
|
|
25
25
|
);
|
|
26
26
|
}
|
|
27
|
+
export interface CrossAccountConfiguration {
|
|
28
|
+
sourceRoleArn?: string | undefined;
|
|
29
|
+
}
|
|
27
30
|
export declare const EncryptionConfigurationType: {
|
|
28
31
|
readonly AWS_OWNED_KEY: "AWS_OWNED_KEY";
|
|
29
32
|
readonly CUSTOMER_MANAGED_KMS_KEY: "CUSTOMER_MANAGED_KMS_KEY";
|
|
@@ -43,6 +46,7 @@ export interface CreateInvestigationGroupInput {
|
|
|
43
46
|
tagKeyBoundaries?: string[] | undefined;
|
|
44
47
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
45
48
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
49
|
+
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
46
50
|
}
|
|
47
51
|
export interface CreateInvestigationGroupOutput {
|
|
48
52
|
arn?: string | undefined;
|
|
@@ -98,6 +102,7 @@ export interface GetInvestigationGroupResponse {
|
|
|
98
102
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
99
103
|
tagKeyBoundaries?: string[] | undefined;
|
|
100
104
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
105
|
+
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
101
106
|
}
|
|
102
107
|
export interface ListInvestigationGroupsInput {
|
|
103
108
|
nextToken?: string | undefined;
|
|
@@ -119,6 +124,7 @@ export interface UpdateInvestigationGroupRequest {
|
|
|
119
124
|
tagKeyBoundaries?: string[] | undefined;
|
|
120
125
|
chatbotNotificationChannel?: Record<string, string[]> | undefined;
|
|
121
126
|
isCloudTrailEventHistoryEnabled?: boolean | undefined;
|
|
127
|
+
crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
|
|
122
128
|
}
|
|
123
129
|
export interface DeleteInvestigationGroupPolicyOutput {}
|
|
124
130
|
export interface DeleteInvestigationGroupPolicyRequest {
|
package/package.json
CHANGED
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
{
|
|
2
2
|
"name": "@aws-sdk/client-aiops",
|
|
3
3
|
"description": "AWS SDK for JavaScript Aiops Client for Node.js, Browser and React Native",
|
|
4
|
-
"version": "3.
|
|
4
|
+
"version": "3.836.0",
|
|
5
5
|
"scripts": {
|
|
6
6
|
"build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
|
|
7
7
|
"build:cjs": "tsc -p tsconfig.cjs.json",
|
|
@@ -20,41 +20,41 @@
|
|
|
20
20
|
"dependencies": {
|
|
21
21
|
"@aws-crypto/sha256-browser": "5.2.0",
|
|
22
22
|
"@aws-crypto/sha256-js": "5.2.0",
|
|
23
|
-
"@aws-sdk/core": "3.
|
|
24
|
-
"@aws-sdk/credential-provider-node": "3.
|
|
23
|
+
"@aws-sdk/core": "3.835.0",
|
|
24
|
+
"@aws-sdk/credential-provider-node": "3.835.0",
|
|
25
25
|
"@aws-sdk/middleware-host-header": "3.821.0",
|
|
26
26
|
"@aws-sdk/middleware-logger": "3.821.0",
|
|
27
27
|
"@aws-sdk/middleware-recursion-detection": "3.821.0",
|
|
28
|
-
"@aws-sdk/middleware-user-agent": "3.
|
|
28
|
+
"@aws-sdk/middleware-user-agent": "3.835.0",
|
|
29
29
|
"@aws-sdk/region-config-resolver": "3.821.0",
|
|
30
30
|
"@aws-sdk/types": "3.821.0",
|
|
31
31
|
"@aws-sdk/util-endpoints": "3.828.0",
|
|
32
32
|
"@aws-sdk/util-user-agent-browser": "3.821.0",
|
|
33
|
-
"@aws-sdk/util-user-agent-node": "3.
|
|
33
|
+
"@aws-sdk/util-user-agent-node": "3.835.0",
|
|
34
34
|
"@smithy/config-resolver": "^4.1.4",
|
|
35
35
|
"@smithy/core": "^3.5.3",
|
|
36
36
|
"@smithy/fetch-http-handler": "^5.0.4",
|
|
37
37
|
"@smithy/hash-node": "^4.0.4",
|
|
38
38
|
"@smithy/invalid-dependency": "^4.0.4",
|
|
39
39
|
"@smithy/middleware-content-length": "^4.0.4",
|
|
40
|
-
"@smithy/middleware-endpoint": "^4.1.
|
|
41
|
-
"@smithy/middleware-retry": "^4.1.
|
|
40
|
+
"@smithy/middleware-endpoint": "^4.1.12",
|
|
41
|
+
"@smithy/middleware-retry": "^4.1.13",
|
|
42
42
|
"@smithy/middleware-serde": "^4.0.8",
|
|
43
43
|
"@smithy/middleware-stack": "^4.0.4",
|
|
44
44
|
"@smithy/node-config-provider": "^4.1.3",
|
|
45
45
|
"@smithy/node-http-handler": "^4.0.6",
|
|
46
46
|
"@smithy/protocol-http": "^5.1.2",
|
|
47
|
-
"@smithy/smithy-client": "^4.4.
|
|
47
|
+
"@smithy/smithy-client": "^4.4.4",
|
|
48
48
|
"@smithy/types": "^4.3.1",
|
|
49
49
|
"@smithy/url-parser": "^4.0.4",
|
|
50
50
|
"@smithy/util-base64": "^4.0.0",
|
|
51
51
|
"@smithy/util-body-length-browser": "^4.0.0",
|
|
52
52
|
"@smithy/util-body-length-node": "^4.0.0",
|
|
53
|
-
"@smithy/util-defaults-mode-browser": "^4.0.
|
|
54
|
-
"@smithy/util-defaults-mode-node": "^4.0.
|
|
53
|
+
"@smithy/util-defaults-mode-browser": "^4.0.20",
|
|
54
|
+
"@smithy/util-defaults-mode-node": "^4.0.20",
|
|
55
55
|
"@smithy/util-endpoints": "^3.0.6",
|
|
56
56
|
"@smithy/util-middleware": "^4.0.4",
|
|
57
|
-
"@smithy/util-retry": "^4.0.
|
|
57
|
+
"@smithy/util-retry": "^4.0.6",
|
|
58
58
|
"@smithy/util-utf8": "^4.0.0",
|
|
59
59
|
"tslib": "^2.6.2"
|
|
60
60
|
},
|