@aws-sdk/client-cloudwatch-logs 3.948.0 → 3.952.0

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (50) hide show
  1. package/README.md +32 -0
  2. package/dist-cjs/index.js +218 -32
  3. package/dist-es/CloudWatchLogs.js +8 -0
  4. package/dist-es/commands/CancelImportTaskCommand.js +16 -0
  5. package/dist-es/commands/CreateImportTaskCommand.js +16 -0
  6. package/dist-es/commands/DescribeImportTaskBatchesCommand.js +16 -0
  7. package/dist-es/commands/DescribeImportTasksCommand.js +16 -0
  8. package/dist-es/commands/index.js +4 -0
  9. package/dist-es/models/enums.js +6 -0
  10. package/dist-es/pagination/ListAggregateLogGroupSummariesPaginator.js +4 -0
  11. package/dist-es/pagination/index.js +1 -0
  12. package/dist-es/schemas/schemas_0.js +153 -32
  13. package/dist-types/CloudWatchLogs.d.ts +29 -0
  14. package/dist-types/CloudWatchLogsClient.d.ts +6 -2
  15. package/dist-types/commands/CancelImportTaskCommand.d.ts +95 -0
  16. package/dist-types/commands/CreateImportTaskCommand.d.ts +152 -0
  17. package/dist-types/commands/CreateScheduledQueryCommand.d.ts +4 -1
  18. package/dist-types/commands/DeleteAccountPolicyCommand.d.ts +8 -8
  19. package/dist-types/commands/DeleteIndexPolicyCommand.d.ts +6 -6
  20. package/dist-types/commands/DeleteScheduledQueryCommand.d.ts +2 -1
  21. package/dist-types/commands/DescribeImportTaskBatchesCommand.d.ts +104 -0
  22. package/dist-types/commands/DescribeImportTasksCommand.d.ts +111 -0
  23. package/dist-types/commands/DescribeQueriesCommand.d.ts +2 -2
  24. package/dist-types/commands/GetQueryResultsCommand.d.ts +2 -1
  25. package/dist-types/commands/GetScheduledQueryCommand.d.ts +2 -1
  26. package/dist-types/commands/GetScheduledQueryHistoryCommand.d.ts +2 -1
  27. package/dist-types/commands/ListScheduledQueriesCommand.d.ts +2 -1
  28. package/dist-types/commands/PutAccountPolicyCommand.d.ts +196 -47
  29. package/dist-types/commands/PutIndexPolicyCommand.d.ts +4 -4
  30. package/dist-types/commands/PutLogGroupDeletionProtectionCommand.d.ts +3 -2
  31. package/dist-types/commands/UpdateScheduledQueryCommand.d.ts +2 -1
  32. package/dist-types/commands/index.d.ts +4 -0
  33. package/dist-types/models/enums.d.ts +14 -0
  34. package/dist-types/models/models_0.d.ts +391 -44
  35. package/dist-types/pagination/ListAggregateLogGroupSummariesPaginator.d.ts +7 -0
  36. package/dist-types/pagination/index.d.ts +1 -0
  37. package/dist-types/schemas/schemas_0.d.ts +19 -0
  38. package/dist-types/ts3.4/CloudWatchLogs.d.ts +69 -0
  39. package/dist-types/ts3.4/CloudWatchLogsClient.d.ts +24 -0
  40. package/dist-types/ts3.4/commands/CancelImportTaskCommand.d.ts +50 -0
  41. package/dist-types/ts3.4/commands/CreateImportTaskCommand.d.ts +50 -0
  42. package/dist-types/ts3.4/commands/DescribeImportTaskBatchesCommand.d.ts +51 -0
  43. package/dist-types/ts3.4/commands/DescribeImportTasksCommand.d.ts +51 -0
  44. package/dist-types/ts3.4/commands/index.d.ts +4 -0
  45. package/dist-types/ts3.4/models/enums.d.ts +7 -0
  46. package/dist-types/ts3.4/models/models_0.d.ts +67 -0
  47. package/dist-types/ts3.4/pagination/ListAggregateLogGroupSummariesPaginator.d.ts +11 -0
  48. package/dist-types/ts3.4/pagination/index.d.ts +1 -0
  49. package/dist-types/ts3.4/schemas/schemas_0.d.ts +19 -0
  50. package/package.json +2 -2
@@ -27,7 +27,8 @@ declare const GetScheduledQueryHistoryCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Retrieves the execution history of a scheduled query within a specified time range, including query results and destination processing status.</p>
30
+ * <p>Retrieves the execution history of a scheduled query within a specified time range,
31
+ * including query results and destination processing status.</p>
31
32
  * @example
32
33
  * Use a bare-bones client and the command you need to make an API call.
33
34
  * ```javascript
@@ -27,7 +27,8 @@ declare const ListScheduledQueriesCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Lists all scheduled queries in your account and region. You can filter results by state to show only enabled or disabled queries.</p>
30
+ * <p>Lists all scheduled queries in your account and region. You can filter results by state to
31
+ * show only enabled or disabled queries.</p>
31
32
  * @example
32
33
  * Use a bare-bones client and the command you need to make an API call.
33
34
  * ```javascript
@@ -28,12 +28,12 @@ declare const PutAccountPolicyCommand_base: {
28
28
  };
29
29
  /**
30
30
  * <p>Creates an account-level data protection policy, subscription filter policy, field index
31
- * policy, transformer policy, or metric extraction policy that applies to all log groups or a
32
- * subset of log groups in the account.</p>
33
- * <p>For field index policies, you can configure indexed fields as
34
- * <i>facets</i> to enable interactive exploration of your logs. Facets provide
35
- * value distributions and counts for indexed fields in the CloudWatch Logs Insights console
36
- * without requiring query execution. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Facets.html">Use facets to group and
31
+ * policy, transformer policy, or metric extraction policy that applies to all log groups, a
32
+ * subset of log groups, or a data source name and type combination in the account.</p>
33
+ * <p>For field index policies, you can configure indexed fields as <i>facets</i>
34
+ * to enable interactive exploration of your logs. Facets provide value distributions and counts
35
+ * for indexed fields in the CloudWatch Logs Insights console without requiring query
36
+ * execution. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Facets.html">Use facets to group and
37
37
  * explore logs</a>.</p>
38
38
  * <p>To use this operation, you must be signed on with the correct permissions depending on the
39
39
  * type of policy that you are creating.</p>
@@ -157,8 +157,51 @@ declare const PutAccountPolicyCommand_base: {
157
157
  * scoped to a subset of log groups with the <code>selectionCriteria</code> parameter. If you
158
158
  * have multiple account-level transformer policies with selection criteria, no two of them can
159
159
  * use the same or overlapping log group name prefixes. For example, if you have one policy
160
- * filtered to log groups that start with <code>my-log</code>, you can't have another field index
160
+ * filtered to log groups that start with <code>my-log</code>, you can't have another transformer
161
161
  * policy filtered to <code>my-logpprod</code> or <code>my-logging</code>.</p>
162
+ * <p>You can also set up a transformer at the log-group level. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutTransformer.html">PutTransformer</a>. If there is both a log-group level transformer created with
163
+ * <code>PutTransformer</code> and an account-level transformer that could apply to the same
164
+ * log group, the log group uses only the log-group level transformer. It ignores the
165
+ * account-level transformer.</p>
166
+ * <p>
167
+ * <b>Field index policy</b>
168
+ * </p>
169
+ * <p>You can use field index policies to create indexes on fields found in log events for a log
170
+ * group or data source name and type combination. Creating field indexes can help lower the scan
171
+ * volume for CloudWatch Logs Insights queries that reference those fields, because these
172
+ * queries attempt to skip the processing of log events that are known to not match the indexed
173
+ * field. Good fields to index are fields that you often need to query for and fields or values
174
+ * that match only a small fraction of the total log events. Common examples of indexes include
175
+ * request ID, session ID, user IDs, or instance IDs. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes to improve query performance and reduce costs</a>
176
+ * </p>
177
+ * <p>To find the fields that are in your log group events, use the <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogGroupFields.html">GetLogGroupFields</a> operation. To find the fields for a data source use the <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogFields.html">GetLogFields</a> operation.</p>
178
+ * <p>For example, suppose you have created a field index for <code>requestId</code>. Then, any
179
+ * CloudWatch Logs Insights query on that log group that includes <code>requestId =
180
+ * <i>value</i>
181
+ * </code> or <code>requestId in [<i>value</i>,
182
+ * <i>value</i>, ...]</code> will attempt to process only the log events where
183
+ * the indexed field matches the specified value.</p>
184
+ * <p>Matches of log events to the names of indexed fields are case-sensitive. For example, an
185
+ * indexed field of <code>RequestId</code> won't match a log event containing
186
+ * <code>requestId</code>.</p>
187
+ * <p>You can have one account-level field index policy that applies to all log groups in the
188
+ * account. Or you can create as many as 20 account-level field index policies that are each
189
+ * scoped to a subset of log groups using <code>LogGroupNamePrefix</code> with the
190
+ * <code>selectionCriteria</code> parameter. You can have another 20 account-level field index
191
+ * policies using <code>DataSourceName</code> and <code>DataSourceType</code> for the
192
+ * <code>selectionCriteria</code> parameter. If you have multiple account-level index policies
193
+ * with <code>LogGroupNamePrefix</code> selection criteria, no two of them can use the same or
194
+ * overlapping log group name prefixes. For example, if you have one policy filtered to log
195
+ * groups that start with <i>my-log</i>, you can't have another field index policy
196
+ * filtered to <i>my-logpprod</i> or <i>my-logging</i>. Similarly, if
197
+ * you have multiple account-level index policies with <code>DataSourceName</code> and
198
+ * <code>DataSourceType</code> selection criteria, no two of them can use the same data source
199
+ * name and type combination. For example, if you have one policy filtered to the data source
200
+ * name <code>amazon_vpc</code> and data source type <code>flow</code> you cannot create another
201
+ * policy with this combination.</p>
202
+ * <p>If you create an account-level field index policy in a monitoring account in cross-account
203
+ * observability, the policy is applied only to the monitoring account and not to any source
204
+ * accounts.</p>
162
205
  * <p>CloudWatch Logs provides default field indexes for all log groups in the Standard log
163
206
  * class. Default field indexes are automatically available for the following fields: </p>
164
207
  * <ul>
@@ -184,54 +227,160 @@ declare const PutAccountPolicyCommand_base: {
184
227
  * </li>
185
228
  * <li>
186
229
  * <p>
230
+ * <code>@data_source_name</code>
231
+ * </p>
232
+ * </li>
233
+ * <li>
234
+ * <p>
235
+ * <code>@data_source_type</code>
236
+ * </p>
237
+ * </li>
238
+ * <li>
239
+ * <p>
240
+ * <code>@data_format</code>
241
+ * </p>
242
+ * </li>
243
+ * <li>
244
+ * <p>
187
245
  * <code>traceId</code>
188
246
  * </p>
189
247
  * </li>
248
+ * <li>
249
+ * <p>
250
+ * <code>severityText</code>
251
+ * </p>
252
+ * </li>
253
+ * <li>
254
+ * <p>
255
+ * <code>attributes.session.id</code>
256
+ * </p>
257
+ * </li>
190
258
  * </ul>
191
- * <p>Default field indexes are in addition to any custom field indexes you define within your
192
- * policy. Default field indexes are not counted towards your field index quota. </p>
193
- * <p>You can also set up a transformer at the log-group level. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutTransformer.html">PutTransformer</a>. If there is both a log-group level transformer created with
194
- * <code>PutTransformer</code> and an account-level transformer that could apply to the same
195
- * log group, the log group uses only the log-group level transformer. It ignores the
196
- * account-level transformer.</p>
259
+ * <p>CloudWatch Logs provides default field indexes for certain data source name and type
260
+ * combinations as well. Default field indexes are automatically available for the following data
261
+ * source name and type combinations as identified in the following list:</p>
197
262
  * <p>
198
- * <b>Field index policy</b>
263
+ * <code>amazon_vpc.flow</code>
199
264
  * </p>
200
- * <p>You can use field index policies to create indexes on fields found in log events in the
201
- * log group. Creating field indexes can help lower the scan volume for CloudWatch Logs
202
- * Insights queries that reference those fields, because these queries attempt to skip the
203
- * processing of log events that are known to not match the indexed field. Good fields to index
204
- * are fields that you often need to query for and fields or values that match only a small
205
- * fraction of the total log events. Common examples of indexes include request ID, session ID,
206
- * user IDs, or instance IDs. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes
207
- * to improve query performance and reduce costs</a>
265
+ * <ul>
266
+ * <li>
267
+ * <p>
268
+ * <code>action</code>
269
+ * </p>
270
+ * </li>
271
+ * <li>
272
+ * <p>
273
+ * <code>logStatus</code>
274
+ * </p>
275
+ * </li>
276
+ * <li>
277
+ * <p>
278
+ * <code>region</code>
279
+ * </p>
280
+ * </li>
281
+ * <li>
282
+ * <p>
283
+ * <code>flowDirection</code>
284
+ * </p>
285
+ * </li>
286
+ * <li>
287
+ * <p>
288
+ * <code>type</code>
289
+ * </p>
290
+ * </li>
291
+ * </ul>
292
+ * <p>
293
+ * <code>amazon_route53.resolver_query</code>
208
294
  * </p>
209
- * <p>To find the fields that are in your log group events, use the <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_GetLogGroupFields.html">GetLogGroupFields</a> operation.</p>
210
- * <p>For example, suppose you have created a field index for <code>requestId</code>. Then, any
211
- * CloudWatch Logs Insights query on that log group that includes <code>requestId =
212
- * <i>value</i>
213
- * </code> or <code>requestId in [<i>value</i>,
214
- * <i>value</i>, ...]</code> will attempt to process only the log events where
215
- * the indexed field matches the specified value.</p>
216
- * <p>Matches of log events to the names of indexed fields are case-sensitive. For example, an
217
- * indexed field of <code>RequestId</code> won't match a log event containing
218
- * <code>requestId</code>.</p>
219
- * <p>You can have one account-level field index policy that applies to all log groups in the
220
- * account. Or you can create as many as 40 account-level field index policies (20 for log group
221
- * prefix selection, 20 for data source selection) that are each scoped to a subset of log groups
222
- * or data sources with the <code>selectionCriteria</code> parameter. Field index policies can
223
- * now be created for specific data source name and type combinations using DataSourceName and
224
- * DataSourceType selection criteria. If you have multiple account-level index policies with
225
- * selection criteria, no two of them can use the same or overlapping log group name prefixes.
226
- * For example, if you have one policy filtered to log groups that start with
227
- * <code>my-log</code>, you can't have another field index policy filtered to
228
- * <code>my-logpprod</code> or <code>my-logging</code>.</p>
229
- * <p>If you create an account-level field index policy in a monitoring account in cross-account
230
- * observability, the policy is applied only to the monitoring account and not to any source
231
- * accounts.</p>
295
+ * <ul>
296
+ * <li>
297
+ * <p>
298
+ * <code>transport</code>
299
+ * </p>
300
+ * </li>
301
+ * <li>
302
+ * <p>
303
+ * <code>rcode</code>
304
+ * </p>
305
+ * </li>
306
+ * </ul>
307
+ * <p>
308
+ * <code>aws_waf.access</code>
309
+ * </p>
310
+ * <ul>
311
+ * <li>
312
+ * <p>
313
+ * <code>action</code>
314
+ * </p>
315
+ * </li>
316
+ * <li>
317
+ * <p>
318
+ * <code>httpRequest.country</code>
319
+ * </p>
320
+ * </li>
321
+ * </ul>
322
+ * <p>
323
+ * <code>aws_cloudtrail.data</code>, <code>aws_cloudtrail.management</code>
324
+ * </p>
325
+ * <ul>
326
+ * <li>
327
+ * <p>
328
+ * <code>eventSource</code>
329
+ * </p>
330
+ * </li>
331
+ * <li>
332
+ * <p>
333
+ * <code>eventName</code>
334
+ * </p>
335
+ * </li>
336
+ * <li>
337
+ * <p>
338
+ * <code>awsRegion</code>
339
+ * </p>
340
+ * </li>
341
+ * <li>
342
+ * <p>
343
+ * <code>userAgent</code>
344
+ * </p>
345
+ * </li>
346
+ * <li>
347
+ * <p>
348
+ * <code>errorCode</code>
349
+ * </p>
350
+ * </li>
351
+ * <li>
352
+ * <p>
353
+ * <code>eventType</code>
354
+ * </p>
355
+ * </li>
356
+ * <li>
357
+ * <p>
358
+ * <code>managementEvent</code>
359
+ * </p>
360
+ * </li>
361
+ * <li>
362
+ * <p>
363
+ * <code>readOnly</code>
364
+ * </p>
365
+ * </li>
366
+ * <li>
367
+ * <p>
368
+ * <code>eventCategory</code>
369
+ * </p>
370
+ * </li>
371
+ * <li>
372
+ * <p>
373
+ * <code>requestId</code>
374
+ * </p>
375
+ * </li>
376
+ * </ul>
377
+ * <p>Default field indexes are in addition to any custom field indexes you define within your
378
+ * policy. Default field indexes are not counted towards your <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing-Syntax">field index
379
+ * quota</a>. </p>
232
380
  * <p>If you want to create a field index policy for a single log group, you can use <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutIndexPolicy.html">PutIndexPolicy</a> instead of <code>PutAccountPolicy</code>. If you do so, that log
233
- * group will use only that log-group level policy, and will ignore the account-level policy that
234
- * you create with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a>.</p>
381
+ * group will use that log-group level policy and any account-level policies that match at the
382
+ * data source level; any account-level policy that matches at the log group level (for example,
383
+ * no selection criteria or log group name prefix selection criteria) will be ignored.</p>
235
384
  * <p>
236
385
  * <b>Metric extraction policy</b>
237
386
  * </p>
@@ -38,8 +38,8 @@ declare const PutIndexPolicyCommand_base: {
38
38
  * field. Good fields to index are fields that you often need to query for and fields or values
39
39
  * that match only a small fraction of the total log events. Common examples of indexes include
40
40
  * request ID, session ID, userID, and instance IDs. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Field-Indexing.html">Create field indexes to improve query performance and reduce costs</a>.</p>
41
- * <p>You can configure indexed fields as <i>facets</i> to enable
42
- * interactive exploration and filtering of your logs in the CloudWatch Logs Insights console. Facets
41
+ * <p>You can configure indexed fields as <i>facets</i> to enable interactive
42
+ * exploration and filtering of your logs in the CloudWatch Logs Insights console. Facets
43
43
  * allow you to view value distributions and counts for indexed fields without running queries.
44
44
  * When you create a field index, you can optionally set it as a facet to enable this interactive
45
45
  * analysis capability. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-Facets.html">Use facets to group and
@@ -94,8 +94,8 @@ declare const PutIndexPolicyCommand_base: {
94
94
  * <p>Matches of log events to the names of indexed fields are case-sensitive. For example, a
95
95
  * field index of <code>RequestId</code> won't match a log event containing
96
96
  * <code>requestId</code>.</p>
97
- * <p>Log group-level field index policies created with
98
- * <code>PutIndexPolicy</code> override account-level field index policies created with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a> that apply to log groups. If you use <code>PutIndexPolicy</code>
97
+ * <p>Log group-level field index policies created with <code>PutIndexPolicy</code> override
98
+ * account-level field index policies created with <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutAccountPolicy.html">PutAccountPolicy</a> that apply to log groups. If you use <code>PutIndexPolicy</code>
99
99
  * to create a field index policy for a log group, that log group uses only that policy for log
100
100
  * group-level indexing, including any facet configurations. The log group ignores any
101
101
  * account-wide field index policy that applies to log groups, but data source-based account
@@ -27,8 +27,9 @@ declare const PutLogGroupDeletionProtectionCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Enables or disables deletion protection for the specified log group. When enabled on a log group, deletion protection blocks all
31
- * deletion operations until it is explicitly disabled.</p>
30
+ * <p>Enables or disables deletion protection for the specified log group. When enabled on a
31
+ * log group, deletion protection blocks all deletion operations until it is explicitly
32
+ * disabled.</p>
32
33
  * <p>For information about the parameters that are common to all actions, see <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/CommonParameters.html">Common Parameters</a>.</p>
33
34
  * @example
34
35
  * Use a bare-bones client and the command you need to make an API call.
@@ -27,7 +27,8 @@ declare const UpdateScheduledQueryCommand_base: {
27
27
  getEndpointParameterInstructions(): import("@smithy/middleware-endpoint").EndpointParameterInstructions;
28
28
  };
29
29
  /**
30
- * <p>Updates an existing scheduled query with new configuration. This operation uses PUT semantics, allowing modification of query parameters, schedule, and destinations.</p>
30
+ * <p>Updates an existing scheduled query with new configuration. This operation uses PUT
31
+ * semantics, allowing modification of query parameters, schedule, and destinations.</p>
31
32
  * @example
32
33
  * Use a bare-bones client and the command you need to make an API call.
33
34
  * ```javascript
@@ -1,8 +1,10 @@
1
1
  export * from "./AssociateKmsKeyCommand";
2
2
  export * from "./AssociateSourceToS3TableIntegrationCommand";
3
3
  export * from "./CancelExportTaskCommand";
4
+ export * from "./CancelImportTaskCommand";
4
5
  export * from "./CreateDeliveryCommand";
5
6
  export * from "./CreateExportTaskCommand";
7
+ export * from "./CreateImportTaskCommand";
6
8
  export * from "./CreateLogAnomalyDetectorCommand";
7
9
  export * from "./CreateLogGroupCommand";
8
10
  export * from "./CreateLogStreamCommand";
@@ -34,6 +36,8 @@ export * from "./DescribeDeliverySourcesCommand";
34
36
  export * from "./DescribeDestinationsCommand";
35
37
  export * from "./DescribeExportTasksCommand";
36
38
  export * from "./DescribeFieldIndexesCommand";
39
+ export * from "./DescribeImportTaskBatchesCommand";
40
+ export * from "./DescribeImportTasksCommand";
37
41
  export * from "./DescribeIndexPoliciesCommand";
38
42
  export * from "./DescribeLogGroupsCommand";
39
43
  export * from "./DescribeLogStreamsCommand";
@@ -83,6 +83,20 @@ export declare const EvaluationFrequency: {
83
83
  * @public
84
84
  */
85
85
  export type EvaluationFrequency = (typeof EvaluationFrequency)[keyof typeof EvaluationFrequency];
86
+ /**
87
+ * @public
88
+ * @enum
89
+ */
90
+ export declare const ImportStatus: {
91
+ readonly CANCELLED: "CANCELLED";
92
+ readonly COMPLETED: "COMPLETED";
93
+ readonly FAILED: "FAILED";
94
+ readonly IN_PROGRESS: "IN_PROGRESS";
95
+ };
96
+ /**
97
+ * @public
98
+ */
99
+ export type ImportStatus = (typeof ImportStatus)[keyof typeof ImportStatus];
86
100
  /**
87
101
  * @public
88
102
  * @enum