@aws-sdk/client-cloudwatch-logs 3.845.0 → 3.847.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (82) hide show
  1. package/README.md +2 -2
  2. package/dist-cjs/index.js +8 -1
  3. package/dist-es/models/models_0.js +5 -0
  4. package/dist-types/CloudWatchLogs.d.ts +2 -2
  5. package/dist-types/CloudWatchLogsClient.d.ts +2 -2
  6. package/dist-types/commands/AssociateKmsKeyCommand.d.ts +30 -29
  7. package/dist-types/commands/CreateDeliveryCommand.d.ts +22 -25
  8. package/dist-types/commands/CreateExportTaskCommand.d.ts +10 -9
  9. package/dist-types/commands/CreateLogAnomalyDetectorCommand.d.ts +19 -25
  10. package/dist-types/commands/CreateLogGroupCommand.d.ts +5 -3
  11. package/dist-types/commands/CreateLogStreamCommand.d.ts +6 -5
  12. package/dist-types/commands/DeleteAccountPolicyCommand.d.ts +17 -12
  13. package/dist-types/commands/DeleteDeliveryCommand.d.ts +5 -3
  14. package/dist-types/commands/DeleteDeliveryDestinationCommand.d.ts +6 -4
  15. package/dist-types/commands/DeleteDeliveryDestinationPolicyCommand.d.ts +2 -2
  16. package/dist-types/commands/DeleteDeliverySourceCommand.d.ts +6 -4
  17. package/dist-types/commands/DeleteDestinationCommand.d.ts +3 -3
  18. package/dist-types/commands/DeleteIndexPolicyCommand.d.ts +7 -6
  19. package/dist-types/commands/DeleteIntegrationCommand.d.ts +6 -5
  20. package/dist-types/commands/DeleteLogGroupCommand.d.ts +2 -2
  21. package/dist-types/commands/DeleteLogStreamCommand.d.ts +2 -2
  22. package/dist-types/commands/DeleteQueryDefinitionCommand.d.ts +2 -2
  23. package/dist-types/commands/DeleteResourcePolicyCommand.d.ts +7 -2
  24. package/dist-types/commands/DeleteRetentionPolicyCommand.d.ts +2 -1
  25. package/dist-types/commands/DeleteTransformerCommand.d.ts +6 -6
  26. package/dist-types/commands/DescribeAccountPoliciesCommand.d.ts +12 -8
  27. package/dist-types/commands/DescribeConfigurationTemplatesCommand.d.ts +5 -4
  28. package/dist-types/commands/DescribeDeliveriesCommand.d.ts +9 -11
  29. package/dist-types/commands/DescribeDeliveryDestinationsCommand.d.ts +3 -2
  30. package/dist-types/commands/DescribeDestinationsCommand.d.ts +2 -1
  31. package/dist-types/commands/DescribeExportTasksCommand.d.ts +2 -2
  32. package/dist-types/commands/DescribeFieldIndexesCommand.d.ts +2 -3
  33. package/dist-types/commands/DescribeIndexPoliciesCommand.d.ts +6 -6
  34. package/dist-types/commands/DescribeLogGroupsCommand.d.ts +13 -11
  35. package/dist-types/commands/DescribeLogStreamsCommand.d.ts +10 -10
  36. package/dist-types/commands/DescribeQueryDefinitionsCommand.d.ts +5 -4
  37. package/dist-types/commands/DescribeResourcePoliciesCommand.d.ts +5 -0
  38. package/dist-types/commands/DescribeSubscriptionFiltersCommand.d.ts +3 -2
  39. package/dist-types/commands/DisassociateKmsKeyCommand.d.ts +13 -13
  40. package/dist-types/commands/FilterLogEventsCommand.d.ts +31 -20
  41. package/dist-types/commands/GetDeliveryCommand.d.ts +12 -13
  42. package/dist-types/commands/GetDeliveryDestinationCommand.d.ts +1 -1
  43. package/dist-types/commands/GetDeliveryDestinationPolicyCommand.d.ts +2 -3
  44. package/dist-types/commands/GetLogEventsCommand.d.ts +25 -17
  45. package/dist-types/commands/GetLogGroupFieldsCommand.d.ts +8 -8
  46. package/dist-types/commands/GetQueryResultsCommand.d.ts +13 -11
  47. package/dist-types/commands/GetTransformerCommand.d.ts +2 -2
  48. package/dist-types/commands/ListAnomaliesCommand.d.ts +3 -2
  49. package/dist-types/commands/ListIntegrationsCommand.d.ts +3 -2
  50. package/dist-types/commands/ListLogGroupsCommand.d.ts +8 -7
  51. package/dist-types/commands/ListLogGroupsForQueryCommand.d.ts +6 -5
  52. package/dist-types/commands/ListTagsForResourceCommand.d.ts +2 -2
  53. package/dist-types/commands/ListTagsLogGroupCommand.d.ts +1 -1
  54. package/dist-types/commands/PutAccountPolicyCommand.d.ts +113 -98
  55. package/dist-types/commands/PutDataProtectionPolicyCommand.d.ts +20 -19
  56. package/dist-types/commands/PutDeliveryDestinationCommand.d.ts +28 -28
  57. package/dist-types/commands/PutDeliveryDestinationPolicyCommand.d.ts +18 -20
  58. package/dist-types/commands/PutDeliverySourceCommand.d.ts +23 -25
  59. package/dist-types/commands/PutDestinationCommand.d.ts +7 -6
  60. package/dist-types/commands/PutDestinationPolicyCommand.d.ts +4 -3
  61. package/dist-types/commands/PutIndexPolicyCommand.d.ts +24 -23
  62. package/dist-types/commands/PutIntegrationCommand.d.ts +8 -6
  63. package/dist-types/commands/PutLogEventsCommand.d.ts +27 -24
  64. package/dist-types/commands/PutMetricFilterCommand.d.ts +14 -18
  65. package/dist-types/commands/PutQueryDefinitionCommand.d.ts +3 -3
  66. package/dist-types/commands/PutResourcePolicyCommand.d.ts +15 -3
  67. package/dist-types/commands/PutRetentionPolicyCommand.d.ts +4 -3
  68. package/dist-types/commands/PutSubscriptionFilterCommand.d.ts +11 -12
  69. package/dist-types/commands/PutTransformerCommand.d.ts +24 -19
  70. package/dist-types/commands/StartLiveTailCommand.d.ts +27 -28
  71. package/dist-types/commands/StartQueryCommand.d.ts +28 -30
  72. package/dist-types/commands/StopQueryCommand.d.ts +3 -2
  73. package/dist-types/commands/TagLogGroupCommand.d.ts +10 -10
  74. package/dist-types/commands/TagResourceCommand.d.ts +11 -10
  75. package/dist-types/commands/TestTransformerCommand.d.ts +3 -2
  76. package/dist-types/commands/UntagLogGroupCommand.d.ts +6 -7
  77. package/dist-types/commands/UpdateAnomalyCommand.d.ts +10 -9
  78. package/dist-types/commands/UpdateDeliveryConfigurationCommand.d.ts +3 -3
  79. package/dist-types/index.d.ts +2 -2
  80. package/dist-types/models/models_0.d.ts +1441 -1201
  81. package/dist-types/ts3.4/models/models_0.d.ts +18 -1
  82. package/package.json +5 -5
@@ -30,26 +30,34 @@ declare const GetLogEventsCommand_base: {
30
30
  * <p>Lists log events from the specified log stream. You can list all of the log events or
31
31
  * filter using a time range.</p>
32
32
  * <p>
33
- * <code>GetLogEvents</code> is a paginated operation. Each page returned can contain up to 1 MB of log events or up to 10,000 log events. A returned page might only be partially full, or even empty.
34
- * For example, if the result of a query would return 15,000 log events, the first page isn't guaranteed to have 10,000 log events even if they all fit into 1 MB.</p>
35
- * <p>Partially full or empty pages
36
- * don't necessarily mean that pagination is finished. As long as the <code>nextBackwardToken</code> or <code>nextForwardToken</code> returned is NOT equal to the <code>nextToken</code>
37
- * that you passed into the API call, there might be more
38
- * log events available. The token that you use depends on the direction you want to move in along the log stream. The returned tokens are never null.</p>
33
+ * <code>GetLogEvents</code> is a paginated operation. Each page returned can contain up to 1
34
+ * MB of log events or up to 10,000 log events. A returned page might only be partially full, or
35
+ * even empty. For example, if the result of a query would return 15,000 log events, the first
36
+ * page isn't guaranteed to have 10,000 log events even if they all fit into 1 MB.</p>
37
+ * <p>Partially full or empty pages don't necessarily mean that pagination is finished. As long
38
+ * as the <code>nextBackwardToken</code> or <code>nextForwardToken</code> returned is NOT equal
39
+ * to the <code>nextToken</code> that you passed into the API call, there might be more log
40
+ * events available. The token that you use depends on the direction you want to move in along
41
+ * the log stream. The returned tokens are never null.</p>
39
42
  * <note>
40
- * <p>If you set <code>startFromHead</code> to <code>true</code> and you don’t include <code>endTime</code> in your request, you can end up in a situation where the pagination doesn't terminate.
41
- * This can happen when the new log events are being added to the target log streams
42
- * faster than they are being read. This situation is a good use case for the CloudWatch Logs <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs_LiveTail.html">Live Tail</a> feature.</p>
43
+ * <p>If you set <code>startFromHead</code> to <code>true</code> and you don’t include
44
+ * <code>endTime</code> in your request, you can end up in a situation where the pagination
45
+ * doesn't terminate. This can happen when the new log events are being added to the target log
46
+ * streams faster than they are being read. This situation is a good use case for the CloudWatch Logs
47
+ * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs_LiveTail.html">Live Tail</a> feature.</p>
43
48
  * </note>
44
- * <p>If you are using CloudWatch cross-account observability, you can use this operation in a monitoring account and
45
- * view data from the linked source accounts. For more information, see
46
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">CloudWatch cross-account observability</a>.</p>
47
- * <p>You can specify the log group to search by using either <code>logGroupIdentifier</code> or <code>logGroupName</code>.
48
- * You must include one of these two parameters, but you can't include both.
49
- * </p>
49
+ * <p>If you are using CloudWatch cross-account observability, you can use this operation
50
+ * in a monitoring account and view data from the linked source accounts. For more information,
51
+ * see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">CloudWatch cross-account observability</a>.</p>
52
+ * <p>You can specify the log group to search by using either <code>logGroupIdentifier</code> or
53
+ * <code>logGroupName</code>. You must include one of these two parameters, but you can't
54
+ * include both. </p>
50
55
  * <note>
51
- * <p>If you are using <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch-Logs-Transformation.html">log transformation</a>, the <code>GetLogEvents</code> operation returns only the original versions of log events, before they
52
- * were transformed. To view the transformed versions, you must use a <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AnalyzingLogData.html">CloudWatch Logs query.</a>
56
+ * <p>If you are using <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch-Logs-Transformation.html">log
57
+ * transformation</a>, the <code>GetLogEvents</code> operation returns only the original
58
+ * versions of log events, before they were transformed. To view the transformed versions, you
59
+ * must use a <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/AnalyzingLogData.html">CloudWatch Logs
60
+ * query.</a>
53
61
  * </p>
54
62
  * </note>
55
63
  * @example
@@ -30,18 +30,18 @@ declare const GetLogGroupFieldsCommand_base: {
30
30
  * <p>Returns a list of the fields that are included in log events in the specified log group.
31
31
  * Includes the percentage of log events that contain each field. The search is limited to a time
32
32
  * period that you specify.</p>
33
- * <p>You can specify the log group to search by using either <code>logGroupIdentifier</code> or <code>logGroupName</code>.
34
- * You must specify one of these parameters, but you can't specify both.
35
- * </p>
33
+ * <p>You can specify the log group to search by using either <code>logGroupIdentifier</code> or
34
+ * <code>logGroupName</code>. You must specify one of these parameters, but you can't specify
35
+ * both. </p>
36
36
  * <p>In the results, fields that start with <code>@</code> are fields generated by CloudWatch
37
37
  * Logs. For example, <code>@timestamp</code> is the timestamp of each log event. For more
38
38
  * information about the fields that are generated by CloudWatch logs, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CWL_AnalyzeLogData-discoverable-fields.html">Supported
39
39
  * Logs and Discovered Fields</a>.</p>
40
- * <p>The response results are sorted by the frequency percentage, starting
41
- * with the highest percentage.</p>
42
- * <p>If you are using CloudWatch cross-account observability, you can use this operation in a monitoring account and
43
- * view data from the linked source accounts. For more information, see
44
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">CloudWatch cross-account observability</a>.</p>
40
+ * <p>The response results are sorted by the frequency percentage, starting with the highest
41
+ * percentage.</p>
42
+ * <p>If you are using CloudWatch cross-account observability, you can use this operation
43
+ * in a monitoring account and view data from the linked source accounts. For more information,
44
+ * see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">CloudWatch cross-account observability</a>.</p>
45
45
  * @example
46
46
  * Use a bare-bones client and the command you need to make an API call.
47
47
  * ```javascript
@@ -28,19 +28,21 @@ declare const GetQueryResultsCommand_base: {
28
28
  };
29
29
  /**
30
30
  * <p>Returns the results from the specified query.</p>
31
- * <p>Only the fields requested in the query are returned, along with a <code>@ptr</code>
32
- * field, which is the identifier for the log record. You can use the value of <code>@ptr</code>
33
- * in a <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogRecord.html">GetLogRecord</a>
31
+ * <p>Only the fields requested in the query are returned, along with a <code>@ptr</code> field,
32
+ * which is the identifier for the log record. You can use the value of <code>@ptr</code> in a
33
+ * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogRecord.html">GetLogRecord</a>
34
34
  * operation to get the full log record.</p>
35
35
  * <p>
36
- * <code>GetQueryResults</code> does not start running a query. To run a query, use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_StartQuery.html">StartQuery</a>. For more information about how long results of previous queries
37
- * are available, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/cloudwatch_limits_cwl.html">CloudWatch Logs quotas</a>.</p>
38
- * <p>If the value of the <code>Status</code> field in the output is <code>Running</code>, this operation
39
- * returns only partial results. If you see a value of <code>Scheduled</code> or <code>Running</code> for the status,
40
- * you can retry the operation later to see the final results. </p>
41
- * <p>If you are using CloudWatch cross-account observability, you can use this operation in a monitoring account to start
42
- * queries in linked source accounts. For more information, see
43
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">CloudWatch cross-account observability</a>.</p>
36
+ * <code>GetQueryResults</code> does not start running a query. To run a query, use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_StartQuery.html">StartQuery</a>. For more information about how long results of previous queries are
37
+ * available, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/cloudwatch_limits_cwl.html">CloudWatch Logs
38
+ * quotas</a>.</p>
39
+ * <p>If the value of the <code>Status</code> field in the output is <code>Running</code>, this
40
+ * operation returns only partial results. If you see a value of <code>Scheduled</code> or
41
+ * <code>Running</code> for the status, you can retry the operation later to see the final
42
+ * results. </p>
43
+ * <p>If you are using CloudWatch cross-account observability, you can use this operation
44
+ * in a monitoring account to start queries in linked source accounts. For more information, see
45
+ * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">CloudWatch cross-account observability</a>.</p>
44
46
  * @example
45
47
  * Use a bare-bones client and the command you need to make an API call.
46
48
  * ```javascript
@@ -28,8 +28,8 @@ declare const GetTransformerCommand_base: {
28
28
  };
29
29
  /**
30
30
  * <p>Returns the information about the log transformer associated with this log group.</p>
31
- * <p>This operation returns data only for transformers created at the log group level. To get information
32
- * for an account-level transformer, use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DescribeAccountPolicies.html">DescribeAccountPolicies</a>.</p>
31
+ * <p>This operation returns data only for transformers created at the log group level. To get
32
+ * information for an account-level transformer, use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DescribeAccountPolicies.html">DescribeAccountPolicies</a>.</p>
33
33
  * @example
34
34
  * Use a bare-bones client and the command you need to make an API call.
35
35
  * ```javascript
@@ -27,8 +27,9 @@ declare const ListAnomaliesCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of anomalies that log anomaly detectors have found. For details about the structure format of
31
- * each anomaly object that is returned, see the example in this section.</p>
30
+ * <p>Returns a list of anomalies that log anomaly detectors have found. For details about the
31
+ * structure format of each anomaly object that is returned, see the example in this
32
+ * section.</p>
32
33
  * @example
33
34
  * Use a bare-bones client and the command you need to make an API call.
34
35
  * ```javascript
@@ -27,8 +27,9 @@ declare const ListIntegrationsCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of integrations between CloudWatch Logs and other services in this account. Currently, only one
31
- * integration can be created in an account, and this integration must be with OpenSearch Service.</p>
30
+ * <p>Returns a list of integrations between CloudWatch Logs and other services in this
31
+ * account. Currently, only one integration can be created in an account, and this integration
32
+ * must be with OpenSearch Service.</p>
32
33
  * @example
33
34
  * Use a bare-bones client and the command you need to make an API call.
34
35
  * ```javascript
@@ -27,14 +27,15 @@ declare const ListLogGroupsCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of log groups in the Region in your account. If you are performing this action in a monitoring account, you can
31
- * choose to also return log groups from source accounts that are linked to the monitoring account. For more information about using cross-account
32
- * observability to set up monitoring accounts and source accounts, see
33
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">
30
+ * <p>Returns a list of log groups in the Region in your account. If you are performing this
31
+ * action in a monitoring account, you can choose to also return log groups from source accounts
32
+ * that are linked to the monitoring account. For more information about using cross-account
33
+ * observability to set up monitoring accounts and source accounts, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html">
34
34
  * CloudWatch cross-account observability</a>.</p>
35
- * <p>You can optionally filter the list by log group class and by using regular expressions in your request to match strings in the log group names.</p>
36
- * <p>This operation is paginated. By default, your first use of this operation returns 50 results, and includes a token to use in a subsequent operation to return
37
- * more results.</p>
35
+ * <p>You can optionally filter the list by log group class and by using regular expressions in
36
+ * your request to match strings in the log group names.</p>
37
+ * <p>This operation is paginated. By default, your first use of this operation returns 50
38
+ * results, and includes a token to use in a subsequent operation to return more results.</p>
38
39
  * @example
39
40
  * Use a bare-bones client and the command you need to make an API call.
40
41
  * ```javascript
@@ -27,11 +27,12 @@ declare const ListLogGroupsForQueryCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Returns a list of the log groups that were analyzed during a single CloudWatch Logs Insights query. This can be useful for queries
31
- * that use
32
- * log group name prefixes or the <code>filterIndex</code> command, because the log groups are dynamically selected in these cases.</p>
33
- * <p>For more information about field indexes, see
34
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes to improve query performance and reduce costs</a>.</p>
30
+ * <p>Returns a list of the log groups that were analyzed during a single CloudWatch Logs
31
+ * Insights query. This can be useful for queries that use log group name prefixes or the
32
+ * <code>filterIndex</code> command, because the log groups are dynamically selected in these
33
+ * cases.</p>
34
+ * <p>For more information about field indexes, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes
35
+ * to improve query performance and reduce costs</a>.</p>
35
36
  * @example
36
37
  * Use a bare-bones client and the command you need to make an API call.
37
38
  * ```javascript
@@ -27,8 +27,8 @@ declare const ListTagsForResourceCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Displays the tags associated with a CloudWatch Logs resource. Currently, log groups
31
- * and destinations support tagging.</p>
30
+ * <p>Displays the tags associated with a CloudWatch Logs resource. Currently, log groups and
31
+ * destinations support tagging.</p>
32
32
  * @example
33
33
  * Use a bare-bones client and the command you need to make an API call.
34
34
  * ```javascript
@@ -29,7 +29,7 @@ declare const ListTagsLogGroupCommand_base: {
29
29
  /**
30
30
  * <important>
31
31
  * <p>The ListTagsLogGroup operation is on the path to deprecation. We recommend that you use
32
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_ListTagsForResource.html">ListTagsForResource</a> instead.</p>
32
+ * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_ListTagsForResource.html">ListTagsForResource</a> instead.</p>
33
33
  * </important>
34
34
  * <p>Lists the tags for the specified log group.</p>
35
35
  *
@@ -27,146 +27,161 @@ declare const PutAccountPolicyCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates an account-level data protection policy, subscription filter policy, or field index policy
31
- * that applies to all log groups
32
- * or a subset of log groups in the account.</p>
33
- * <p>To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are creating.</p>
30
+ * <p>Creates an account-level data protection policy, subscription filter policy, or field
31
+ * index policy that applies to all log groups or a subset of log groups in the account.</p>
32
+ * <p>To use this operation, you must be signed on with the correct permissions depending on the
33
+ * type of policy that you are creating.</p>
34
34
  * <ul>
35
35
  * <li>
36
- * <p>To create a data protection policy, you must have the <code>logs:PutDataProtectionPolicy</code> and
37
- * <code>logs:PutAccountPolicy</code> permissions.</p>
36
+ * <p>To create a data protection policy, you must have the
37
+ * <code>logs:PutDataProtectionPolicy</code> and <code>logs:PutAccountPolicy</code>
38
+ * permissions.</p>
38
39
  * </li>
39
40
  * <li>
40
- * <p>To create a subscription filter policy, you must have the <code>logs:PutSubscriptionFilter</code> and
41
- * <code>logs:PutccountPolicy</code> permissions.</p>
41
+ * <p>To create a subscription filter policy, you must have the
42
+ * <code>logs:PutSubscriptionFilter</code> and <code>logs:PutAccountPolicy</code>
43
+ * permissions.</p>
42
44
  * </li>
43
45
  * <li>
44
- * <p>To create a transformer policy, you must have the <code>logs:PutTransformer</code> and <code>logs:PutAccountPolicy</code> permissions.</p>
46
+ * <p>To create a transformer policy, you must have the <code>logs:PutTransformer</code> and
47
+ * <code>logs:PutAccountPolicy</code> permissions.</p>
45
48
  * </li>
46
49
  * <li>
47
50
  * <p>To create a field index policy, you must have the <code>logs:PutIndexPolicy</code> and
48
- * <code>logs:PutAccountPolicy</code> permissions.</p>
51
+ * <code>logs:PutAccountPolicy</code> permissions.</p>
49
52
  * </li>
50
53
  * </ul>
51
54
  * <p>
52
55
  * <b>Data protection policy</b>
53
56
  * </p>
54
- * <p>A data protection policy can help safeguard sensitive
55
- * data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only
56
- * one account-level data protection policy.</p>
57
+ * <p>A data protection policy can help safeguard sensitive data that's ingested by your log
58
+ * groups by auditing and masking the sensitive log data. Each account can have only one
59
+ * account-level data protection policy.</p>
57
60
  * <important>
58
- * <p>Sensitive data is detected and masked when it is ingested into a log group. When you set a
59
- * data protection policy, log events ingested into the log groups before that time are not masked.</p>
61
+ * <p>Sensitive data is detected and masked when it is ingested into a log group. When you set
62
+ * a data protection policy, log events ingested into the log groups before that time are not
63
+ * masked.</p>
60
64
  * </important>
61
- * <p>If you use <code>PutAccountPolicy</code> to create a data protection policy for your whole account, it applies to both existing log groups
62
- * and all log groups that are created later in this account. The account-level policy is applied to existing log groups
63
- * with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked.</p>
64
- * <p>By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks.
65
- * A user who has the <code>logs:Unmask</code> permission can use a
66
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogEvents.html">GetLogEvents</a> or
67
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_FilterLogEvents.html">FilterLogEvents</a>
68
- * operation with the <code>unmask</code> parameter set to <code>true</code> to view the unmasked
69
- * log events. Users with the <code>logs:Unmask</code> can also view unmasked data in the CloudWatch Logs
70
- * console by running a CloudWatch Logs Insights query with the <code>unmask</code> query command.</p>
71
- * <p>For more information, including a list of types of data that can be audited and masked, see
72
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/mask-sensitive-log-data.html">Protect sensitive log data with masking</a>.</p>
73
- * <p>To use the <code>PutAccountPolicy</code> operation for a data protection policy, you must be signed on with
74
- * the <code>logs:PutDataProtectionPolicy</code>
75
- * and <code>logs:PutAccountPolicy</code> permissions.</p>
76
- * <p>The <code>PutAccountPolicy</code> operation applies to all log groups in the account. You can use
77
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutDataProtectionPolicy.html">PutDataProtectionPolicy</a>
78
- * to create a data protection policy that applies to just one log group.
79
- * If a log group has its own data protection policy and
80
- * the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term
65
+ * <p>If you use <code>PutAccountPolicy</code> to create a data protection policy for your whole
66
+ * account, it applies to both existing log groups and all log groups that are created later in
67
+ * this account. The account-level policy is applied to existing log groups with eventual
68
+ * consistency. It might take up to 5 minutes before sensitive data in existing log groups begins
69
+ * to be masked.</p>
70
+ * <p>By default, when a user views a log event that includes masked data, the sensitive data is
71
+ * replaced by asterisks. A user who has the <code>logs:Unmask</code> permission can use a <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogEvents.html">GetLogEvents</a> or <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_FilterLogEvents.html">FilterLogEvents</a> operation with the <code>unmask</code> parameter set to
72
+ * <code>true</code> to view the unmasked log events. Users with the <code>logs:Unmask</code>
73
+ * can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs
74
+ * Insights query with the <code>unmask</code> query command.</p>
75
+ * <p>For more information, including a list of types of data that can be audited and masked,
76
+ * see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/mask-sensitive-log-data.html">Protect sensitive log data
77
+ * with masking</a>.</p>
78
+ * <p>To use the <code>PutAccountPolicy</code> operation for a data protection policy, you must
79
+ * be signed on with the <code>logs:PutDataProtectionPolicy</code> and
80
+ * <code>logs:PutAccountPolicy</code> permissions.</p>
81
+ * <p>The <code>PutAccountPolicy</code> operation applies to all log groups in the account. You
82
+ * can use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutDataProtectionPolicy.html">PutDataProtectionPolicy</a> to create a data protection policy that applies to just one
83
+ * log group. If a log group has its own data protection policy and the account also has an
84
+ * account-level data protection policy, then the two policies are cumulative. Any sensitive term
81
85
  * specified in either policy is masked.</p>
82
86
  * <p>
83
87
  * <b>Subscription filter policy</b>
84
88
  * </p>
85
- * <p>A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services.
86
- * Account-level subscription filter policies apply to both existing log groups and log groups that are created later in
87
- * this account. Supported destinations are Kinesis Data Streams, Firehose, and
88
- * Lambda. When log events are sent to the receiving service, they are Base64 encoded and
89
- * compressed with the GZIP format.</p>
89
+ * <p>A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to
90
+ * both existing log groups and log groups that are created later in this account. Supported
91
+ * destinations are Kinesis Data Streams, Firehose, and Lambda. When log
92
+ * events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP
93
+ * format.</p>
90
94
  * <p>The following destinations are supported for subscription filters:</p>
91
95
  * <ul>
92
96
  * <li>
93
- * <p>An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery.</p>
97
+ * <p>An Kinesis Data Streams data stream in the same account as the subscription policy, for
98
+ * same-account delivery.</p>
94
99
  * </li>
95
100
  * <li>
96
- * <p>An Firehose data stream in the same account as the subscription policy, for same-account delivery.</p>
101
+ * <p>An Firehose data stream in the same account as the subscription policy, for
102
+ * same-account delivery.</p>
97
103
  * </li>
98
104
  * <li>
99
- * <p>A Lambda function in the same account as the subscription policy, for same-account delivery.</p>
105
+ * <p>A Lambda function in the same account as the subscription policy, for
106
+ * same-account delivery.</p>
100
107
  * </li>
101
108
  * <li>
102
- * <p>A logical destination in a different account created with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutDestination.html">PutDestination</a>, for cross-account
103
- * delivery. Kinesis Data Streams and Firehose are supported as logical destinations.</p>
109
+ * <p>A logical destination in a different account created with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutDestination.html">PutDestination</a>, for cross-account delivery. Kinesis Data Streams and Firehose are supported as logical destinations.</p>
104
110
  * </li>
105
111
  * </ul>
106
- * <p>Each account can have one account-level subscription filter policy per Region.
107
- * If you are updating an existing filter, you must specify the correct name in <code>PolicyName</code>.
108
- * To perform a <code>PutAccountPolicy</code> subscription filter operation for any destination except a Lambda
109
- * function, you must also have the <code>iam:PassRole</code> permission.</p>
112
+ * <p>Each account can have one account-level subscription filter policy per Region. If you are
113
+ * updating an existing filter, you must specify the correct name in <code>PolicyName</code>. To
114
+ * perform a <code>PutAccountPolicy</code> subscription filter operation for any destination
115
+ * except a Lambda function, you must also have the <code>iam:PassRole</code>
116
+ * permission.</p>
110
117
  * <p>
111
118
  * <b>Transformer policy</b>
112
119
  * </p>
113
- * <p>Creates or updates a <i>log transformer policy</i> for your account. You use log transformers to transform log events into
114
- * a different format, making them easier for you to process and analyze. You can also transform logs from different sources into standardized formats that
115
- * contain
116
- * relevant, source-specific information. After you have created a transformer,
117
- * CloudWatch Logs performs this transformation at the time of log ingestion. You can then refer to the transformed versions of the logs during
118
- * operations such as querying with CloudWatch Logs Insights or creating metric filters or subscription filters.</p>
119
- * <p>You can also use a transformer to copy metadata from metadata keys into the log events themselves. This metadata can include log group name,
120
- * log stream name, account ID and Region.</p>
121
- * <p>A transformer for a log group is a series of processors, where each processor applies one type of transformation to the log events
122
- * ingested into this log group. For more information about the available processors to use in a transformer, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch-Logs-Transformation.html#CloudWatch-Logs-Transformation-Processors">
123
- * Processors that you can use</a>.</p>
124
- * <p>Having log events in standardized format enables visibility across your applications for your log analysis, reporting, and alarming needs.
125
- * CloudWatch Logs provides transformation for common log types with out-of-the-box transformation templates for major Amazon Web Services log sources such
126
- * as VPC flow logs, Lambda, and Amazon RDS. You can use pre-built transformation templates or create custom transformation policies.</p>
120
+ * <p>Creates or updates a <i>log transformer policy</i> for your account. You use
121
+ * log transformers to transform log events into a different format, making them easier for you
122
+ * to process and analyze. You can also transform logs from different sources into standardized
123
+ * formats that contain relevant, source-specific information. After you have created a
124
+ * transformer, CloudWatch Logs performs this transformation at the time of log ingestion. You
125
+ * can then refer to the transformed versions of the logs during operations such as querying with
126
+ * CloudWatch Logs Insights or creating metric filters or subscription filters.</p>
127
+ * <p>You can also use a transformer to copy metadata from metadata keys into the log events
128
+ * themselves. This metadata can include log group name, log stream name, account ID and
129
+ * Region.</p>
130
+ * <p>A transformer for a log group is a series of processors, where each processor applies one
131
+ * type of transformation to the log events ingested into this log group. For more information
132
+ * about the available processors to use in a transformer, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatch-Logs-Transformation.html#CloudWatch-Logs-Transformation-Processors"> Processors that you can use</a>.</p>
133
+ * <p>Having log events in standardized format enables visibility across your applications for
134
+ * your log analysis, reporting, and alarming needs. CloudWatch Logs provides transformation
135
+ * for common log types with out-of-the-box transformation templates for major Amazon Web Services
136
+ * log sources such as VPC flow logs, Lambda, and Amazon RDS. You can use
137
+ * pre-built transformation templates or create custom transformation policies.</p>
127
138
  * <p>You can create transformers only for the log groups in the Standard log class.</p>
128
- * <p>You can have one account-level transformer policy that applies to all log groups in the account.
129
- * Or you can create as many as 20 account-level transformer policies that are each scoped to a subset of log groups with
130
- * the <code>selectionCriteria</code> parameter. If you have multiple
131
- * account-level transformer policies with selection criteria, no two of them can use the same or overlapping log group name prefixes.
132
- * For example, if you have one policy filtered to log groups that start with <code>my-log</code>, you can't have another field index
139
+ * <p>You can have one account-level transformer policy that applies to all log groups in the
140
+ * account. Or you can create as many as 20 account-level transformer policies that are each
141
+ * scoped to a subset of log groups with the <code>selectionCriteria</code> parameter. If you
142
+ * have multiple account-level transformer policies with selection criteria, no two of them can
143
+ * use the same or overlapping log group name prefixes. For example, if you have one policy
144
+ * filtered to log groups that start with <code>my-log</code>, you can't have another field index
133
145
  * policy filtered to <code>my-logpprod</code> or <code>my-logging</code>.</p>
134
- * <p>You can also set up a transformer at the log-group level. For more information, see
135
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutTransformer.html">PutTransformer</a>. If there is both a
136
- * log-group level transformer created with <code>PutTransformer</code> and an account-level transformer that could apply to the same log
137
- * group, the log group uses only the log-group level transformer. It ignores the account-level transformer.</p>
146
+ * <p>You can also set up a transformer at the log-group level. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutTransformer.html">PutTransformer</a>. If there is both a log-group level transformer created with
147
+ * <code>PutTransformer</code> and an account-level transformer that could apply to the same
148
+ * log group, the log group uses only the log-group level transformer. It ignores the
149
+ * account-level transformer.</p>
138
150
  * <p>
139
151
  * <b>Field index policy</b>
140
152
  * </p>
141
- * <p>You can use field index policies to create indexes on fields found in
142
- * log events in the log group. Creating field indexes can help lower the scan volume for CloudWatch Logs Insights queries that reference
143
- * those fields, because these queries attempt to skip the processing of log events that are known to not match the indexed field.
144
- * Good fields to index are fields that you often need to query for and fields or values that match only a small fraction of the total log events.
145
- * Common examples of indexes
146
- * include request ID, session ID, user IDs, or instance IDs. For more information, see
147
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes to improve query performance and reduce costs</a>
153
+ * <p>You can use field index policies to create indexes on fields found in log events in the
154
+ * log group. Creating field indexes can help lower the scan volume for CloudWatch Logs
155
+ * Insights queries that reference those fields, because these queries attempt to skip the
156
+ * processing of log events that are known to not match the indexed field. Good fields to index
157
+ * are fields that you often need to query for and fields or values that match only a small
158
+ * fraction of the total log events. Common examples of indexes include request ID, session ID,
159
+ * user IDs, or instance IDs. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes
160
+ * to improve query performance and reduce costs</a>
148
161
  * </p>
149
- * <p>To find the fields that are in your log group events, use the
150
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogGroupFields.html">GetLogGroupFields</a>
151
- * operation.</p>
162
+ * <p>To find the fields that are in your log group events, use the <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogGroupFields.html">GetLogGroupFields</a> operation.</p>
152
163
  * <p>For example, suppose you have created a field index for <code>requestId</code>. Then, any
153
- * CloudWatch Logs Insights query on that log group that includes <code>requestId = <i>value</i>
154
- * </code>
155
- * or <code>requestId in [<i>value</i>, <i>value</i>, ...]</code> will attempt to process only the log events where
164
+ * CloudWatch Logs Insights query on that log group that includes <code>requestId =
165
+ * <i>value</i>
166
+ * </code> or <code>requestId in [<i>value</i>,
167
+ * <i>value</i>, ...]</code> will attempt to process only the log events where
156
168
  * the indexed field matches the specified value.</p>
157
- * <p>Matches of log events to the names of indexed fields are case-sensitive. For example, an indexed field
158
- * of <code>RequestId</code> won't match a log event containing <code>requestId</code>.</p>
159
- * <p>You can have one account-level field index policy that applies to all log groups in the account.
160
- * Or you can create as many as 20 account-level field index policies that are each scoped to a subset of log groups with
161
- * the <code>selectionCriteria</code> parameter. If you have multiple
162
- * account-level index policies with selection criteria, no two of them can use the same or overlapping log group name prefixes.
163
- * For example, if you have one policy filtered to log groups that start with <code>my-log</code>, you can't have another field index
164
- * policy filtered to <code>my-logpprod</code> or <code>my-logging</code>.</p>
165
- * <p>If you create an account-level field index policy in a monitoring account in cross-account observability, the policy is applied only
166
- * to the monitoring account and not to any source accounts.</p>
167
- * <p>If you want to create a field index policy for a single log group, you can use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutIndexPolicy.html">PutIndexPolicy</a> instead of
168
- * <code>PutAccountPolicy</code>. If you do so, that log group will use only that log-group level policy, and will ignore the account-level policy
169
- * that you create with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a>.</p>
169
+ * <p>Matches of log events to the names of indexed fields are case-sensitive. For example, an
170
+ * indexed field of <code>RequestId</code> won't match a log event containing
171
+ * <code>requestId</code>.</p>
172
+ * <p>You can have one account-level field index policy that applies to all log groups in the
173
+ * account. Or you can create as many as 20 account-level field index policies that are each
174
+ * scoped to a subset of log groups with the <code>selectionCriteria</code> parameter. If you
175
+ * have multiple account-level index policies with selection criteria, no two of them can use the
176
+ * same or overlapping log group name prefixes. For example, if you have one policy filtered to
177
+ * log groups that start with <code>my-log</code>, you can't have another field index policy
178
+ * filtered to <code>my-logpprod</code> or <code>my-logging</code>.</p>
179
+ * <p>If you create an account-level field index policy in a monitoring account in cross-account
180
+ * observability, the policy is applied only to the monitoring account and not to any source
181
+ * accounts.</p>
182
+ * <p>If you want to create a field index policy for a single log group, you can use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutIndexPolicy.html">PutIndexPolicy</a> instead of <code>PutAccountPolicy</code>. If you do so, that log
183
+ * group will use only that log-group level policy, and will ignore the account-level policy that
184
+ * you create with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a>.</p>
170
185
  * @example
171
186
  * Use a bare-bones client and the command you need to make an API call.
172
187
  * ```javascript
@@ -27,27 +27,28 @@ declare const PutDataProtectionPolicyCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Creates a data protection policy for the specified log group. A data protection policy can help safeguard sensitive
31
- * data that's ingested by the log group by auditing and masking the sensitive log data.</p>
30
+ * <p>Creates a data protection policy for the specified log group. A data protection policy can
31
+ * help safeguard sensitive data that's ingested by the log group by auditing and masking the
32
+ * sensitive log data.</p>
32
33
  * <important>
33
- * <p>Sensitive data is detected and masked when it is ingested into the log group. When you set a
34
- * data protection policy, log events ingested into the log group before that time are not masked.</p>
34
+ * <p>Sensitive data is detected and masked when it is ingested into the log group. When you
35
+ * set a data protection policy, log events ingested into the log group before that time are
36
+ * not masked.</p>
35
37
  * </important>
36
- * <p>By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks.
37
- * A user who has the <code>logs:Unmask</code> permission can use a
38
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogEvents.html">GetLogEvents</a> or
39
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_FilterLogEvents.html">FilterLogEvents</a>
40
- * operation with the <code>unmask</code> parameter set to <code>true</code> to view the unmasked
41
- * log events. Users with the <code>logs:Unmask</code> can also view unmasked data in the CloudWatch Logs
42
- * console by running a CloudWatch Logs Insights query with the <code>unmask</code> query command.</p>
43
- * <p>For more information, including a list of types of data that can be audited and masked, see
44
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/mask-sensitive-log-data.html">Protect sensitive log data with masking</a>.</p>
45
- * <p>The <code>PutDataProtectionPolicy</code> operation applies to only the specified log group. You can also use
46
- * <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a>
47
- * to create an account-level data protection policy that applies to all log groups in the account,
48
- * including both existing log groups and log groups that are created level. If a log group has its own data protection policy and
49
- * the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term
50
- * specified in either policy is masked.</p>
38
+ * <p>By default, when a user views a log event that includes masked data, the sensitive data is
39
+ * replaced by asterisks. A user who has the <code>logs:Unmask</code> permission can use a <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogEvents.html">GetLogEvents</a> or <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_FilterLogEvents.html">FilterLogEvents</a> operation with the <code>unmask</code> parameter set to
40
+ * <code>true</code> to view the unmasked log events. Users with the <code>logs:Unmask</code>
41
+ * can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs
42
+ * Insights query with the <code>unmask</code> query command.</p>
43
+ * <p>For more information, including a list of types of data that can be audited and masked,
44
+ * see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/mask-sensitive-log-data.html">Protect sensitive log data
45
+ * with masking</a>.</p>
46
+ * <p>The <code>PutDataProtectionPolicy</code> operation applies to only the specified log
47
+ * group. You can also use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a> to create an account-level data protection policy that applies to
48
+ * all log groups in the account, including both existing log groups and log groups that are
49
+ * created level. If a log group has its own data protection policy and the account also has an
50
+ * account-level data protection policy, then the two policies are cumulative. Any sensitive term
51
+ * specified in either policy is masked.</p>
51
52
  * @example
52
53
  * Use a bare-bones client and the command you need to make an API call.
53
54
  * ```javascript