@aws-sdk/client-aiops 3.858.0 → 3.859.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
@@ -202,12 +202,12 @@ const de_GetInvestigationGroupCommand = async (output, context) => {
202
202
  const doc = (0, smithy_client_1.take)(data, {
203
203
  arn: smithy_client_1.expectString,
204
204
  chatbotNotificationChannel: smithy_client_1._json,
205
- createdAt: (_) => (0, smithy_client_1.expectNonNull)((0, smithy_client_1.parseEpochTimestamp)((0, smithy_client_1.expectNumber)(_))),
205
+ createdAt: smithy_client_1.expectLong,
206
206
  createdBy: smithy_client_1.expectString,
207
207
  crossAccountConfigurations: smithy_client_1._json,
208
208
  encryptionConfiguration: smithy_client_1._json,
209
209
  isCloudTrailEventHistoryEnabled: smithy_client_1.expectBoolean,
210
- lastModifiedAt: (_) => (0, smithy_client_1.expectNonNull)((0, smithy_client_1.parseEpochTimestamp)((0, smithy_client_1.expectNumber)(_))),
210
+ lastModifiedAt: smithy_client_1.expectLong,
211
211
  lastModifiedBy: smithy_client_1.expectString,
212
212
  name: smithy_client_1.expectString,
213
213
  retentionInDays: smithy_client_1.expectLong,
@@ -1,6 +1,6 @@
1
1
  import { loadRestJsonErrorCode, parseJsonBody as parseBody, parseJsonErrorBody as parseErrorBody } from "@aws-sdk/core";
2
2
  import { requestBuilder as rb } from "@smithy/core";
3
- import { _json, collectBody, decorateServiceException as __decorateServiceException, expectBoolean as __expectBoolean, expectLong as __expectLong, expectNonNull as __expectNonNull, expectNumber as __expectNumber, expectObject as __expectObject, expectString as __expectString, map, parseEpochTimestamp as __parseEpochTimestamp, take, withBaseException, } from "@smithy/smithy-client";
3
+ import { _json, collectBody, decorateServiceException as __decorateServiceException, expectBoolean as __expectBoolean, expectLong as __expectLong, expectNonNull as __expectNonNull, expectObject as __expectObject, expectString as __expectString, map, take, withBaseException, } from "@smithy/smithy-client";
4
4
  import { AIOpsServiceException as __BaseException } from "../models/AIOpsServiceException";
5
5
  import { AccessDeniedException, ConflictException, ForbiddenException, InternalServerException, ResourceNotFoundException, ServiceQuotaExceededException, ThrottlingException, ValidationException, } from "../models/models_0";
6
6
  export const se_CreateInvestigationGroupCommand = async (input, context) => {
@@ -185,12 +185,12 @@ export const de_GetInvestigationGroupCommand = async (output, context) => {
185
185
  const doc = take(data, {
186
186
  arn: __expectString,
187
187
  chatbotNotificationChannel: _json,
188
- createdAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
188
+ createdAt: __expectLong,
189
189
  createdBy: __expectString,
190
190
  crossAccountConfigurations: _json,
191
191
  encryptionConfiguration: _json,
192
192
  isCloudTrailEventHistoryEnabled: __expectBoolean,
193
- lastModifiedAt: (_) => __expectNonNull(__parseEpochTimestamp(__expectNumber(_))),
193
+ lastModifiedAt: __expectLong,
194
194
  lastModifiedBy: __expectString,
195
195
  name: __expectString,
196
196
  retentionInDays: __expectLong,
@@ -27,7 +27,7 @@ declare const CreateInvestigationGroupCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has the either the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM policy attached, or to an account that has similar permissions.</p> <important> <p>You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable alarms to do this, you must use <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html">PutInvestigationGroupPolicy</a> to create a resource policy that grants this permission to CloudWatch alarms. </p> <p>For more information about configuring CloudWatch alarms to work with CloudWatch investigations, see </p> </important>
30
+ * <p>Creates an <i>investigation group</i> in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.</p> <p>Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:</p> <ul> <li> <p>Who can access the investigations</p> </li> <li> <p>Whether investigation data is encrypted with a customer managed Key Management Service key.</p> </li> <li> <p>How long investigations and their data are retained by default.</p> </li> </ul> <p>Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region</p> <p>To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has either the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code> IAM policy attached, or to an account that has similar permissions.</p> <important> <p>You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable alarms to do this, you must use <code>PutInvestigationGroupPolicy</code> to create a resource policy that grants this permission to CloudWatch alarms. </p> <p>For more information about configuring CloudWatch alarms, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/AlarmThatSendsEmail.html">Using Amazon CloudWatch alarms</a> </p> </important>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -41,9 +41,9 @@ declare const GetInvestigationGroupCommand_base: {
41
41
  * const response = await client.send(command);
42
42
  * // { // GetInvestigationGroupResponse
43
43
  * // createdBy: "STRING_VALUE",
44
- * // createdAt: new Date("TIMESTAMP"),
44
+ * // createdAt: Number("long"),
45
45
  * // lastModifiedBy: "STRING_VALUE",
46
- * // lastModifiedAt: new Date("TIMESTAMP"),
46
+ * // lastModifiedAt: Number("long"),
47
47
  * // name: "STRING_VALUE",
48
48
  * // arn: "STRING_VALUE",
49
49
  * // roleArn: "STRING_VALUE",
@@ -27,7 +27,7 @@ declare const GetInvestigationGroupPolicyCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns the IAM resource policy that is associated with the specified investigation group.</p>
30
+ * <p>Returns the JSON of the IAM resource policy associated with the specified investigation group in a string. For example, <code>\{\"Version\":\"2012-10-17\",\"Statement\":[\{\"Effect\":\"Allow\",\"Principal\":\{\"Service\":\"aiops.alarms.cloudwatch.amazonaws.com\"\},\"Action\":[\"aiops:CreateInvestigation\",\"aiops:CreateInvestigationEvent\"],\"Resource\":\"*\",\"Condition\":\{\"StringEquals\":\{\"aws:SourceAccount\":\"111122223333\"\},\"ArnLike\":\{\"aws:SourceArn\":\"arn:aws:cloudwatch:us-east-1:111122223333:alarm:*\"\}\}\}]\}</code>.</p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -27,7 +27,7 @@ declare const PutInvestigationGroupPolicyCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates an IAM resource policy and assigns it to the specified investigation group.</p> <p>If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable CloudWatch alarms to create investigations and add events to investigations, you must use this operation to create a policy similar to this example.</p> <p> <code>\{ "Version": "2008-10-17", "Statement": [\{ "Effect": "Allow", "Principal": \{ "Service": "aiops.alarms.cloudwatch.amazonaws.com" \}, "Action": ["aiops:CreateInvestigation", "aiops:CreateInvestigationEvent"], "Resource": "*", "Condition": \{ "StringEquals": \{ "aws:SourceAccount": "<i>account-id</i>" \}, "ArnLike": \{ "aws:SourceArn": "arn:aws:cloudwatch:<i>region</i>:<i>account-id</i>:alarm:*" \} \} \}] \}</code> </p>
30
+ * <p>Creates an IAM resource policy and assigns it to the specified investigation group.</p> <p>If you create your investigation group with <code>CreateInvestigationGroup</code> and you want to enable CloudWatch alarms to create investigations and add events to investigations, you must use this operation to create a policy similar to this example.</p> <p> <code> \{ "Version": "2008-10-17", "Statement": [ \{ "Effect": "Allow", "Principal": \{ "Service": "aiops.alarms.cloudwatch.amazonaws.com" \}, "Action": [ "aiops:CreateInvestigation", "aiops:CreateInvestigationEvent" ], "Resource": "*", "Condition": \{ "StringEquals": \{ "aws:SourceAccount": "account-id" \}, "ArnLike": \{ "aws:SourceArn": "arn:aws:cloudwatch:region:account-id:alarm:*" \} \} \} ] \} </code> </p>
31
31
  * @example
32
32
  * Use a bare-bones client and the command you need to make an API call.
33
33
  * ```javascript
@@ -77,7 +77,7 @@ export type EncryptionConfigurationType = (typeof EncryptionConfigurationType)[k
77
77
  */
78
78
  export interface EncryptionConfiguration {
79
79
  /**
80
- * <p>Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned kay.</p>
80
+ * <p>Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned key.</p>
81
81
  * @public
82
82
  */
83
83
  type?: EncryptionConfigurationType | undefined;
@@ -97,7 +97,7 @@ export interface CreateInvestigationGroupInput {
97
97
  */
98
98
  name: string | undefined;
99
99
  /**
100
- * <p>Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data Amazon Q has access to during investigations</a>.</p>
100
+ * <p>Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data CloudWatch investigations has access to during investigations</a>.</p>
101
101
  * @public
102
102
  */
103
103
  roleArn: string | undefined;
@@ -117,12 +117,12 @@ export interface CreateInvestigationGroupInput {
117
117
  */
118
118
  tags?: Record<string, string> | undefined;
119
119
  /**
120
- * <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because Amazon Q can automatically detect those tags.</p>
120
+ * <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags.</p>
121
121
  * @public
122
122
  */
123
123
  tagKeyBoundaries?: string[] | undefined;
124
124
  /**
125
- * <p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
125
+ * <p>Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
126
126
  * @public
127
127
  */
128
128
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
@@ -132,7 +132,7 @@ export interface CreateInvestigationGroupInput {
132
132
  */
133
133
  isCloudTrailEventHistoryEnabled?: boolean | undefined;
134
134
  /**
135
- * <p>Number of <code>sourceAccountId</code> values that have been configured for cross-account access.</p>
135
+ * <p>List of <code>sourceRoleArn</code> values that have been configured for cross-account access.</p>
136
136
  * @public
137
137
  */
138
138
  crossAccountConfigurations?: CrossAccountConfiguration[] | undefined;
@@ -230,7 +230,7 @@ export interface DeleteInvestigationGroupRequest {
230
230
  */
231
231
  export interface GetInvestigationGroupRequest {
232
232
  /**
233
- * <p>Specify either the name or the ARN of the investigation group that you want to view.</p>
233
+ * <p>Specify either the name or the ARN of the investigation group that you want to view. This is used to set the name of the investigation group.</p>
234
234
  * @public
235
235
  */
236
236
  identifier: string | undefined;
@@ -248,7 +248,7 @@ export interface GetInvestigationGroupResponse {
248
248
  * <p>The date and time that the investigation group was created.</p>
249
249
  * @public
250
250
  */
251
- createdAt?: Date | undefined;
251
+ createdAt?: number | undefined;
252
252
  /**
253
253
  * <p>The name of the user who created the investigation group.</p>
254
254
  * @public
@@ -258,7 +258,7 @@ export interface GetInvestigationGroupResponse {
258
258
  * <p>The date and time that the investigation group was most recently modified.</p>
259
259
  * @public
260
260
  */
261
- lastModifiedAt?: Date | undefined;
261
+ lastModifiedAt?: number | undefined;
262
262
  /**
263
263
  * <p>The name of the investigation group.</p>
264
264
  * @public
@@ -285,12 +285,12 @@ export interface GetInvestigationGroupResponse {
285
285
  */
286
286
  retentionInDays?: number | undefined;
287
287
  /**
288
- * <p>This structure is a string array. The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of Amazon Q in chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
288
+ * <p>This structure is a string array. The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
289
289
  * @public
290
290
  */
291
291
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
292
292
  /**
293
- * <p>Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. </p>
293
+ * <p>Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. </p>
294
294
  * @public
295
295
  */
296
296
  tagKeyBoundaries?: string[] | undefined;
@@ -366,7 +366,7 @@ export interface UpdateInvestigationGroupRequest {
366
366
  */
367
367
  identifier: string | undefined;
368
368
  /**
369
- * <p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">EHow to control what data Amazon Q has access to during investigations</a>.</p>
369
+ * <p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How to control what data CloudWatch investigations has access to during investigations</a>.</p>
370
370
  * @public
371
371
  */
372
372
  roleArn?: string | undefined;
@@ -376,12 +376,12 @@ export interface UpdateInvestigationGroupRequest {
376
376
  */
377
377
  encryptionConfiguration?: EncryptionConfiguration | undefined;
378
378
  /**
379
- * <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because Amazon Q can automatically detect those tags.</p>
379
+ * <p>Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags.</p>
380
380
  * @public
381
381
  */
382
382
  tagKeyBoundaries?: string[] | undefined;
383
383
  /**
384
- * <p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
384
+ * <p>Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p>
385
385
  * @public
386
386
  */
387
387
  chatbotNotificationChannel?: Record<string, string[]> | undefined;
@@ -476,7 +476,7 @@ export interface ListTagsForResourceOutput {
476
476
  */
477
477
  export interface ListTagsForResourceRequest {
478
478
  /**
479
- * <p>The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a> operation to find the ARNs of investigation groups.</p> <p>The ARN format for an investigation group is <code>arn:aws:aiops:<i>Region</i>:<i>account-id</i>:investigation-group:<i>investigation-group-id</i> </code>.</p>
479
+ * <p>The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the <code>ListInvestigationGroups</code> operation to find the ARNs of investigation groups.</p> <p>The ARN format for an investigation group is <code>arn:aws:aiops:<i>Region</i>:<i>account-id</i>:investigation-group:<i>investigation-group-id</i> </code>.</p>
480
480
  * @public
481
481
  */
482
482
  resourceArn: string | undefined;
@@ -486,7 +486,7 @@ export interface ListTagsForResourceRequest {
486
486
  */
487
487
  export interface TagResourceRequest {
488
488
  /**
489
- * <p>The Amazon Resource Name (ARN) of the resource that you want to apply the tags to. You can use the <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a> operation to find the ARNs of investigation groups.</p>
489
+ * <p>The Amazon Resource Name (ARN) of the resource that you want to apply the tags to. You can use the <code>ListInvestigationGroups</code> operation to find the ARNs of investigation groups.</p>
490
490
  * @public
491
491
  */
492
492
  resourceArn: string | undefined;
@@ -506,7 +506,7 @@ export interface TagResourceResponse {
506
506
  */
507
507
  export interface UntagResourceRequest {
508
508
  /**
509
- * <p>The Amazon Resource Name (ARN) of the resource that you want to remove the tags from. You can use the <a href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a> operation to find the ARNs of investigation groups.</p>
509
+ * <p>The Amazon Resource Name (ARN) of the resource that you want to remove the tags from. You can use the<code>ListInvestigationGroups</code> operation to find the ARNs of investigation groups.</p>
510
510
  * @public
511
511
  */
512
512
  resourceArn: string | undefined;
@@ -91,9 +91,9 @@ export interface GetInvestigationGroupRequest {
91
91
  }
92
92
  export interface GetInvestigationGroupResponse {
93
93
  createdBy?: string | undefined;
94
- createdAt?: Date | undefined;
94
+ createdAt?: number | undefined;
95
95
  lastModifiedBy?: string | undefined;
96
- lastModifiedAt?: Date | undefined;
96
+ lastModifiedAt?: number | undefined;
97
97
  name?: string | undefined;
98
98
  arn?: string | undefined;
99
99
  roleArn?: string | undefined;
package/package.json CHANGED
@@ -1,7 +1,7 @@
1
1
  {
2
2
  "name": "@aws-sdk/client-aiops",
3
3
  "description": "AWS SDK for JavaScript Aiops Client for Node.js, Browser and React Native",
4
- "version": "3.858.0",
4
+ "version": "3.859.0",
5
5
  "scripts": {
6
6
  "build": "concurrently 'yarn:build:cjs' 'yarn:build:es' 'yarn:build:types'",
7
7
  "build:cjs": "tsc -p tsconfig.cjs.json",
@@ -21,7 +21,7 @@
21
21
  "@aws-crypto/sha256-browser": "5.2.0",
22
22
  "@aws-crypto/sha256-js": "5.2.0",
23
23
  "@aws-sdk/core": "3.858.0",
24
- "@aws-sdk/credential-provider-node": "3.858.0",
24
+ "@aws-sdk/credential-provider-node": "3.859.0",
25
25
  "@aws-sdk/middleware-host-header": "3.840.0",
26
26
  "@aws-sdk/middleware-logger": "3.840.0",
27
27
  "@aws-sdk/middleware-recursion-detection": "3.840.0",