@aws-sdk/client-aiops 3.832.0 → 3.836.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
package/README.md CHANGED
@@ -6,7 +6,7 @@
6
6
 
7
7
  AWS SDK for JavaScript AIOps Client for Node.js, Browser and React Native.
8
8
 
9
- <p>The Amazon Q Developer operational investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
9
+ <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
10
10
 
11
11
  ## Installing
12
12
 
@@ -15,6 +15,7 @@ const se_CreateInvestigationGroupCommand = async (input, context) => {
15
15
  let body;
16
16
  body = JSON.stringify((0, smithy_client_1.take)(input, {
17
17
  chatbotNotificationChannel: (_) => (0, smithy_client_1._json)(_),
18
+ crossAccountConfigurations: (_) => (0, smithy_client_1._json)(_),
18
19
  encryptionConfiguration: (_) => (0, smithy_client_1._json)(_),
19
20
  isCloudTrailEventHistoryEnabled: [],
20
21
  name: [],
@@ -143,6 +144,7 @@ const se_UpdateInvestigationGroupCommand = async (input, context) => {
143
144
  let body;
144
145
  body = JSON.stringify((0, smithy_client_1.take)(input, {
145
146
  chatbotNotificationChannel: (_) => (0, smithy_client_1._json)(_),
147
+ crossAccountConfigurations: (_) => (0, smithy_client_1._json)(_),
146
148
  encryptionConfiguration: (_) => (0, smithy_client_1._json)(_),
147
149
  isCloudTrailEventHistoryEnabled: [],
148
150
  roleArn: [],
@@ -202,6 +204,7 @@ const de_GetInvestigationGroupCommand = async (output, context) => {
202
204
  chatbotNotificationChannel: smithy_client_1._json,
203
205
  createdAt: (_) => (0, smithy_client_1.expectNonNull)((0, smithy_client_1.parseEpochTimestamp)((0, smithy_client_1.expectNumber)(_))),
204
206
  createdBy: smithy_client_1.expectString,
207
+ crossAccountConfigurations: smithy_client_1._json,
205
208
  encryptionConfiguration: smithy_client_1._json,
206
209
  isCloudTrailEventHistoryEnabled: smithy_client_1.expectBoolean,
207
210
  lastModifiedAt: (_) => (0, smithy_client_1.expectNonNull)((0, smithy_client_1.parseEpochTimestamp)((0, smithy_client_1.expectNumber)(_))),
@@ -12,6 +12,7 @@ export const se_CreateInvestigationGroupCommand = async (input, context) => {
12
12
  let body;
13
13
  body = JSON.stringify(take(input, {
14
14
  chatbotNotificationChannel: (_) => _json(_),
15
+ crossAccountConfigurations: (_) => _json(_),
15
16
  encryptionConfiguration: (_) => _json(_),
16
17
  isCloudTrailEventHistoryEnabled: [],
17
18
  name: [],
@@ -130,6 +131,7 @@ export const se_UpdateInvestigationGroupCommand = async (input, context) => {
130
131
  let body;
131
132
  body = JSON.stringify(take(input, {
132
133
  chatbotNotificationChannel: (_) => _json(_),
134
+ crossAccountConfigurations: (_) => _json(_),
133
135
  encryptionConfiguration: (_) => _json(_),
134
136
  isCloudTrailEventHistoryEnabled: [],
135
137
  roleArn: [],
@@ -185,6 +187,7 @@ export const de_GetInvestigationGroupCommand = async (output, context) => {
185
187
  chatbotNotificationChannel: _json,
186
188
  createdAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
187
189
  createdBy: __expectString,
190
+ crossAccountConfigurations: _json,
188
191
  encryptionConfiguration: _json,
189
192
  isCloudTrailEventHistoryEnabled: __expectBoolean,
190
193
  lastModifiedAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
@@ -81,7 +81,7 @@ export interface AIOps {
81
81
  updateInvestigationGroup(args: UpdateInvestigationGroupCommandInput, options: __HttpHandlerOptions, cb: (err: any, data?: UpdateInvestigationGroupCommandOutput) => void): void;
82
82
  }
83
83
  /**
84
- * <p>The Amazon Q Developer operational investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
84
+ * <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
85
85
  * @public
86
86
  */
87
87
  export declare class AIOps extends AIOpsClient implements AIOps {
@@ -180,7 +180,7 @@ export type AIOpsClientResolvedConfigType = __SmithyResolvedConfiguration<__Http
180
180
  export interface AIOpsClientResolvedConfig extends AIOpsClientResolvedConfigType {
181
181
  }
182
182
  /**
183
- * <p>The Amazon Q Developer operational investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
183
+ * <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
184
184
  * @public
185
185
  */
186
186
  export declare class AIOpsClient extends __Client<__HttpHandlerOptions, ServiceInputTypes, ServiceOutputTypes, AIOpsClientResolvedConfig> {
@@ -27,7 +27,7 @@ declare const CreateInvestigationGroupCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM policy attached, or to an account that has similar permissions.</p> <important> <p>You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable alarms to do this, you must use <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html">PutInvestigationGroupPolicy</a> to create a resource policy that grants this permission to CloudWatch alarms. </p> <p>For more information about configuring CloudWatch alarms to work with Amazon Q Developer operational investigations, see </p> </important>
30
+ * <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has the either the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM policy attached, or to an account that has similar permissions.</p> <important> <p>You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable alarms to do this, you must use <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html">PutInvestigationGroupPolicy</a> to create a resource policy that grants this permission to CloudWatch alarms. </p> <p>For more information about configuring CloudWatch alarms to work with CloudWatch investigations, see </p> </important>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -54,6 +54,11 @@ declare const CreateInvestigationGroupCommand_base: {
54
54
  * ],
55
55
  * },
56
56
  * isCloudTrailEventHistoryEnabled: true || false,
57
+ * crossAccountConfigurations: [ // CrossAccountConfigurations
58
+ * { // CrossAccountConfiguration
59
+ * sourceRoleArn: "STRING_VALUE",
60
+ * },
61
+ * ],
57
62
  * };
58
63
  * const command = new CreateInvestigationGroupCommand(input);
59
64
  * const response = await client.send(command);
@@ -61,6 +61,11 @@ declare const GetInvestigationGroupCommand_base: {
61
61
  * // "STRING_VALUE",
62
62
  * // ],
63
63
  * // isCloudTrailEventHistoryEnabled: true || false,
64
+ * // crossAccountConfigurations: [ // CrossAccountConfigurations
65
+ * // { // CrossAccountConfiguration
66
+ * // sourceRoleArn: "STRING_VALUE",
67
+ * // },
68
+ * // ],
64
69
  * // };
65
70
  *
66
71
  * ```
@@ -27,7 +27,7 @@ declare const ListTagsForResourceCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Displays the tags associated with a Amazon Q Developer operational investigations resource. Currently, investigation groups support tagging.</p>
30
+ * <p>Displays the tags associated with a CloudWatch investigations resource. Currently, investigation groups support tagging.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -50,6 +50,11 @@ declare const UpdateInvestigationGroupCommand_base: {
50
50
  * ],
51
51
  * },
52
52
  * isCloudTrailEventHistoryEnabled: true || false,
53
+ * crossAccountConfigurations: [ // CrossAccountConfigurations
54
+ * { // CrossAccountConfiguration
55
+ * sourceRoleArn: "STRING_VALUE",
56
+ * },
57
+ * ],
53
58
  * };
54
59
  * const command = new UpdateInvestigationGroupCommand(input);
55
60
  * const response = await client.send(command);
@@ -8,7 +8,7 @@ export interface ClientInputEndpointParameters {
8
8
  useFipsEndpoint?: boolean | undefined | Provider<boolean | undefined>;
9
9
  endpoint?: string | Provider<string> | Endpoint | Provider<Endpoint> | EndpointV2 | Provider<EndpointV2>;
10
10
  }
11
- export type ClientResolvedEndpointParameters = ClientInputEndpointParameters & {
11
+ export type ClientResolvedEndpointParameters = Omit<ClientInputEndpointParameters, "endpoint"> & {
12
12
  defaultSigningName: string;
13
13
  };
14
14
  export declare const resolveClientEndpointParameters: <T>(options: T & ClientInputEndpointParameters) => T & ClientResolvedEndpointParameters;
@@ -1,5 +1,5 @@
1
1
  /**
2
- * <p>The Amazon Q Developer operational investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
2
+ * <p>The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console.</p>
3
3
  *
4
4
  * @packageDocumentation
5
5
  */
@@ -48,6 +48,17 @@ export declare class InternalServerException extends __BaseException {
48
48
  */
49
49
  constructor(opts: __ExceptionOptionType<InternalServerException, __BaseException>);
50
50
  }
51
+ /**
52
+ * <p>This structure contains information about the cross-account configuration in the account. </p>
53
+ * @public
54
+ */
55
+ export interface CrossAccountConfiguration {
56
+ /**
57
+ * <p>The ARN of an existing role which will be used to do investigations on your behalf. </p>
58
+ * @public
59
+ */
60
+ sourceRoleArn?: string | undefined;
61
+ }
51
62
  /**
52
63
  * @public
53
64
  * @enum
@@ -81,17 +92,17 @@ export interface EncryptionConfiguration {
81
92
  */
82
93
  export interface CreateInvestigationGroupInput {
83
94
  /**
84
- * <p>A name for the investigation group.</p>
95
+ * <p>Provides a name for the investigation group.</p>
85
96
  * @public
86
97
  */
87
98
  name: string | undefined;
88
99
  /**
89
- * <p>Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data Amazon Q has access to during investigations</a>.</p>
100
+ * <p>Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data Amazon Q has access to during investigations</a>.</p>
90
101
  * @public
91
102
  */
92
103
  roleArn: string | undefined;
93
104
  /**
94
- * <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, Amazon Q Developer operational investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p>
105
+ * <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p>
95
106
  * @public
96
107
  */
97
108
  encryptionConfiguration?: EncryptionConfiguration | undefined;
@@ -111,15 +122,20 @@ export interface CreateInvestigationGroupInput {
111
122
  */
112
123
  tagKeyBoundaries?: string[] | undefined;
113
124
  /**
114
- * <p>Use this structure to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
125
+ * <p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
115
126
  * @public
116
127
  */
117
128
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
118
129
  /**
119
- * <p>Specify <code>true</code> to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p>
130
+ * <p>Specify <code>true</code> to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p>
120
131
  * @public
121
132
  */
122
133
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
134
+ /**
135
+ * <p>Number of <code>sourceAccountId</code> values that have been configured for cross-account access.</p>
136
+ * @public
137
+ */
138
+ crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
123
139
  }
124
140
  /**
125
141
  * @public
@@ -279,10 +295,15 @@ export interface GetInvestigationGroupResponse {
279
295
  */
280
296
  tagKeyBoundaries?: string[] | undefined;
281
297
  /**
282
- * <p>Specifies whether Amazon Q Developer operational investigationshas access to change events that are recorded by CloudTrail.</p>
298
+ * <p>Specifies whether CloudWatch investigationshas access to change events that are recorded by CloudTrail.</p>
283
299
  * @public
284
300
  */
285
301
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
302
+ /**
303
+ * <p>Lists the <code>AWSAccountId</code> of the accounts configured for cross-account access and the results of the last scan performed on each account.</p>
304
+ * @public
305
+ */
306
+ crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
286
307
  }
287
308
  /**
288
309
  * @public
@@ -345,12 +366,12 @@ export interface UpdateInvestigationGroupRequest {
345
366
  */
346
367
  identifier: string | undefined;
347
368
  /**
348
- * <p>Specify this field if you want to change the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">EHow to control what data Amazon Q has access to during investigations</a>.</p>
369
+ * <p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">EHow to control what data Amazon Q has access to during investigations</a>.</p>
349
370
  * @public
350
371
  */
351
372
  roleArn?: string | undefined;
352
373
  /**
353
- * <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, Amazon Q Developer operational investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p>
374
+ * <p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p>
354
375
  * @public
355
376
  */
356
377
  encryptionConfiguration?: EncryptionConfiguration | undefined;
@@ -360,15 +381,20 @@ export interface UpdateInvestigationGroupRequest {
360
381
  */
361
382
  tagKeyBoundaries?: string[] | undefined;
362
383
  /**
363
- * <p>Use this structure to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
384
+ * <p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
364
385
  * @public
365
386
  */
366
387
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
367
388
  /**
368
- * <p>Specify <code>true</code> to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p>
389
+ * <p>Specify <code>true</code> to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p>
369
390
  * @public
370
391
  */
371
392
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
393
+ /**
394
+ * <p>Used to configure cross-account access for an investigation group. It allows the investigation group to access resources in other accounts. </p>
395
+ * @public
396
+ */
397
+ crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
372
398
  }
373
399
  /**
374
400
  * @public
@@ -450,7 +476,7 @@ export interface ListTagsForResourceOutput {
450
476
  */
451
477
  export interface ListTagsForResourceRequest {
452
478
  /**
453
- * <p>The ARN of the Amazon Q Developer operational investigations resource that you want to view tags for. You can use the <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a> operation to find the ARNs of investigation groups.</p> <p>The ARN format for an investigation group is <code>arn:aws:aiops:<i>Region</i>:<i>account-id</i>:investigation-group:<i>investigation-group-id</i> </code>.</p>
479
+ * <p>The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a> operation to find the ARNs of investigation groups.</p> <p>The ARN format for an investigation group is <code>arn:aws:aiops:<i>Region</i>:<i>account-id</i>:investigation-group:<i>investigation-group-id</i> </code>.</p>
454
480
  * @public
455
481
  */
456
482
  resourceArn: string | undefined;
@@ -16,7 +16,10 @@ export interface ClientInputEndpointParameters {
16
16
  | EndpointV2
17
17
  | Provider<EndpointV2>;
18
18
  }
19
- export type ClientResolvedEndpointParameters = ClientInputEndpointParameters & {
19
+ export type ClientResolvedEndpointParameters = Pick<
20
+ ClientInputEndpointParameters,
21
+ Exclude<keyof ClientInputEndpointParameters, "endpoint">
22
+ > & {
20
23
  defaultSigningName: string;
21
24
  };
22
25
  export declare const resolveClientEndpointParameters: <T>(
@@ -24,6 +24,9 @@ export declare class InternalServerException extends __BaseException {
24
24
  opts: __ExceptionOptionType<InternalServerException, __BaseException>
25
25
  );
26
26
  }
27
+ export interface CrossAccountConfiguration {
28
+ sourceRoleArn?: string | undefined;
29
+ }
27
30
  export declare const EncryptionConfigurationType: {
28
31
  readonly AWS_OWNED_KEY: "AWS_OWNED_KEY";
29
32
  readonly CUSTOMER_MANAGED_KMS_KEY: "CUSTOMER_MANAGED_KMS_KEY";
@@ -43,6 +46,7 @@ export interface CreateInvestigationGroupInput {
43
46
  tagKeyBoundaries?: string[] | undefined;
44
47
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
45
48
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
49
+ crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
46
50
  }
47
51
  export interface CreateInvestigationGroupOutput {
48
52
  arn?: string | undefined;
@@ -98,6 +102,7 @@ export interface GetInvestigationGroupResponse {
98
102
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
99
103
  tagKeyBoundaries?: string[] | undefined;
100
104
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
105
+ crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
101
106
  }
102
107
  export interface ListInvestigationGroupsInput {
103
108
  nextToken?: string | undefined;
@@ -119,6 +124,7 @@ export interface UpdateInvestigationGroupRequest {
119
124
  tagKeyBoundaries?: string[] | undefined;
120
125
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
121
126
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
127
+ crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
122
128
  }
123
129
  export interface DeleteInvestigationGroupPolicyOutput {}
124
130
  export interface DeleteInvestigationGroupPolicyRequest {
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-aiops",
3
3
  "description": "AWS SDK for JavaScript Aiops Client for Node.js, Browser and React Native",
4
- "version": "3.832.0",
4
+ "version": "3.836.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -20,41 +20,41 @@
20
20
  "dependencies": {
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
- "@aws-sdk/core": "3.826.0",
24
- "@aws-sdk/credential-provider-node": "3.830.0",
23
+ "@aws-sdk/core": "3.835.0",
24
+ "@aws-sdk/credential-provider-node": "3.835.0",
25
25
  "@aws-sdk/middleware-host-header": "3.821.0",
26
26
  "@aws-sdk/middleware-logger": "3.821.0",
27
27
  "@aws-sdk/middleware-recursion-detection": "3.821.0",
28
- "@aws-sdk/middleware-user-agent": "3.828.0",
28
+ "@aws-sdk/middleware-user-agent": "3.835.0",
29
29
  "@aws-sdk/region-config-resolver": "3.821.0",
30
30
  "@aws-sdk/types": "3.821.0",
31
31
  "@aws-sdk/util-endpoints": "3.828.0",
32
32
  "@aws-sdk/util-user-agent-browser": "3.821.0",
33
- "@aws-sdk/util-user-agent-node": "3.828.0",
33
+ "@aws-sdk/util-user-agent-node": "3.835.0",
34
34
  "@smithy/config-resolver": "^4.1.4",
35
35
  "@smithy/core": "^3.5.3",
36
36
  "@smithy/fetch-http-handler": "^5.0.4",
37
37
  "@smithy/hash-node": "^4.0.4",
38
38
  "@smithy/invalid-dependency": "^4.0.4",
39
39
  "@smithy/middleware-content-length": "^4.0.4",
40
- "@smithy/middleware-endpoint": "^4.1.11",
41
- "@smithy/middleware-retry": "^4.1.12",
40
+ "@smithy/middleware-endpoint": "^4.1.12",
41
+ "@smithy/middleware-retry": "^4.1.13",
42
42
  "@smithy/middleware-serde": "^4.0.8",
43
43
  "@smithy/middleware-stack": "^4.0.4",
44
44
  "@smithy/node-config-provider": "^4.1.3",
45
45
  "@smithy/node-http-handler": "^4.0.6",
46
46
  "@smithy/protocol-http": "^5.1.2",
47
- "@smithy/smithy-client": "^4.4.3",
47
+ "@smithy/smithy-client": "^4.4.4",
48
48
  "@smithy/types": "^4.3.1",
49
49
  "@smithy/url-parser": "^4.0.4",
50
50
  "@smithy/util-base64": "^4.0.0",
51
51
  "@smithy/util-body-length-browser": "^4.0.0",
52
52
  "@smithy/util-body-length-node": "^4.0.0",
53
- "@smithy/util-defaults-mode-browser": "^4.0.19",
54
- "@smithy/util-defaults-mode-node": "^4.0.19",
53
+ "@smithy/util-defaults-mode-browser": "^4.0.20",
54
+ "@smithy/util-defaults-mode-node": "^4.0.20",
55
55
  "@smithy/util-endpoints": "^3.0.6",
56
56
  "@smithy/util-middleware": "^4.0.4",
57
- "@smithy/util-retry": "^4.0.5",
57
+ "@smithy/util-retry": "^4.0.6",
58
58
  "@smithy/util-utf8": "^4.0.0",
59
59
  "tslib": "^2.6.2"
60
60
  },