aws-sdk 2.1531.0 → 2.1533.0
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/README.md +1 -1
- package/apis/location-2020-11-19.min.json +37 -27
- package/apis/logs-2014-03-28.min.json +39 -37
- package/apis/qconnect-2020-10-19.min.json +6 -2
- package/apis/route53-2013-04-01.min.json +95 -74
- package/apis/route53resolver-2018-04-01.min.json +60 -56
- package/apis/wisdom-2020-10-19.min.json +6 -2
- package/clients/cloudwatchlogs.d.ts +23 -14
- package/clients/codebuild.d.ts +2 -2
- package/clients/ec2.d.ts +1 -1
- package/clients/location.d.ts +10 -0
- package/clients/redshiftserverless.d.ts +4 -4
- package/clients/route53.d.ts +44 -7
- package/clients/route53resolver.d.ts +17 -0
- package/dist/aws-sdk-core-react-native.js +1 -1
- package/dist/aws-sdk-react-native.js +7 -7
- package/dist/aws-sdk.js +174 -141
- package/dist/aws-sdk.min.js +41 -41
- package/lib/core.js +1 -1
- package/package.json +1 -1
@@ -167,14 +167,15 @@
|
|
167
167
|
"BlockOverrideTtl": {
|
168
168
|
"type": "integer"
|
169
169
|
},
|
170
|
-
"Name": {}
|
170
|
+
"Name": {},
|
171
|
+
"Qtype": {}
|
171
172
|
}
|
172
173
|
},
|
173
174
|
"output": {
|
174
175
|
"type": "structure",
|
175
176
|
"members": {
|
176
177
|
"FirewallRule": {
|
177
|
-
"shape": "
|
178
|
+
"shape": "S1l"
|
178
179
|
}
|
179
180
|
}
|
180
181
|
}
|
@@ -200,7 +201,7 @@
|
|
200
201
|
"type": "structure",
|
201
202
|
"members": {
|
202
203
|
"FirewallRuleGroup": {
|
203
|
-
"shape": "
|
204
|
+
"shape": "S1o"
|
204
205
|
}
|
205
206
|
}
|
206
207
|
}
|
@@ -231,7 +232,7 @@
|
|
231
232
|
"type": "structure",
|
232
233
|
"members": {
|
233
234
|
"OutpostResolver": {
|
234
|
-
"shape": "
|
235
|
+
"shape": "S1w"
|
235
236
|
}
|
236
237
|
}
|
237
238
|
}
|
@@ -309,7 +310,7 @@
|
|
309
310
|
"type": "structure",
|
310
311
|
"members": {
|
311
312
|
"ResolverQueryLogConfig": {
|
312
|
-
"shape": "
|
313
|
+
"shape": "S27"
|
313
314
|
}
|
314
315
|
}
|
315
316
|
}
|
@@ -327,7 +328,7 @@
|
|
327
328
|
"RuleType": {},
|
328
329
|
"DomainName": {},
|
329
330
|
"TargetIps": {
|
330
|
-
"shape": "
|
331
|
+
"shape": "S2d"
|
331
332
|
},
|
332
333
|
"ResolverEndpointId": {},
|
333
334
|
"Tags": {
|
@@ -339,7 +340,7 @@
|
|
339
340
|
"type": "structure",
|
340
341
|
"members": {
|
341
342
|
"ResolverRule": {
|
342
|
-
"shape": "
|
343
|
+
"shape": "S2h"
|
343
344
|
}
|
344
345
|
}
|
345
346
|
}
|
@@ -372,14 +373,15 @@
|
|
372
373
|
],
|
373
374
|
"members": {
|
374
375
|
"FirewallRuleGroupId": {},
|
375
|
-
"FirewallDomainListId": {}
|
376
|
+
"FirewallDomainListId": {},
|
377
|
+
"Qtype": {}
|
376
378
|
}
|
377
379
|
},
|
378
380
|
"output": {
|
379
381
|
"type": "structure",
|
380
382
|
"members": {
|
381
383
|
"FirewallRule": {
|
382
|
-
"shape": "
|
384
|
+
"shape": "S1l"
|
383
385
|
}
|
384
386
|
}
|
385
387
|
}
|
@@ -398,7 +400,7 @@
|
|
398
400
|
"type": "structure",
|
399
401
|
"members": {
|
400
402
|
"FirewallRuleGroup": {
|
401
|
-
"shape": "
|
403
|
+
"shape": "S1o"
|
402
404
|
}
|
403
405
|
}
|
404
406
|
}
|
@@ -417,7 +419,7 @@
|
|
417
419
|
"type": "structure",
|
418
420
|
"members": {
|
419
421
|
"OutpostResolver": {
|
420
|
-
"shape": "
|
422
|
+
"shape": "S1w"
|
421
423
|
}
|
422
424
|
}
|
423
425
|
}
|
@@ -455,7 +457,7 @@
|
|
455
457
|
"type": "structure",
|
456
458
|
"members": {
|
457
459
|
"ResolverQueryLogConfig": {
|
458
|
-
"shape": "
|
460
|
+
"shape": "S27"
|
459
461
|
}
|
460
462
|
}
|
461
463
|
}
|
@@ -474,7 +476,7 @@
|
|
474
476
|
"type": "structure",
|
475
477
|
"members": {
|
476
478
|
"ResolverRule": {
|
477
|
-
"shape": "
|
479
|
+
"shape": "S2h"
|
478
480
|
}
|
479
481
|
}
|
480
482
|
}
|
@@ -577,7 +579,7 @@
|
|
577
579
|
"type": "structure",
|
578
580
|
"members": {
|
579
581
|
"FirewallConfig": {
|
580
|
-
"shape": "
|
582
|
+
"shape": "S37"
|
581
583
|
}
|
582
584
|
}
|
583
585
|
}
|
@@ -615,7 +617,7 @@
|
|
615
617
|
"type": "structure",
|
616
618
|
"members": {
|
617
619
|
"FirewallRuleGroup": {
|
618
|
-
"shape": "
|
620
|
+
"shape": "S1o"
|
619
621
|
}
|
620
622
|
}
|
621
623
|
}
|
@@ -670,7 +672,7 @@
|
|
670
672
|
"type": "structure",
|
671
673
|
"members": {
|
672
674
|
"OutpostResolver": {
|
673
|
-
"shape": "
|
675
|
+
"shape": "S1w"
|
674
676
|
}
|
675
677
|
}
|
676
678
|
}
|
@@ -689,7 +691,7 @@
|
|
689
691
|
"type": "structure",
|
690
692
|
"members": {
|
691
693
|
"ResolverConfig": {
|
692
|
-
"shape": "
|
694
|
+
"shape": "S3m"
|
693
695
|
}
|
694
696
|
}
|
695
697
|
}
|
@@ -708,7 +710,7 @@
|
|
708
710
|
"type": "structure",
|
709
711
|
"members": {
|
710
712
|
"ResolverDNSSECConfig": {
|
711
|
-
"shape": "
|
713
|
+
"shape": "S3q"
|
712
714
|
}
|
713
715
|
}
|
714
716
|
}
|
@@ -746,7 +748,7 @@
|
|
746
748
|
"type": "structure",
|
747
749
|
"members": {
|
748
750
|
"ResolverQueryLogConfig": {
|
749
|
-
"shape": "
|
751
|
+
"shape": "S27"
|
750
752
|
}
|
751
753
|
}
|
752
754
|
}
|
@@ -801,7 +803,7 @@
|
|
801
803
|
"type": "structure",
|
802
804
|
"members": {
|
803
805
|
"ResolverRule": {
|
804
|
-
"shape": "
|
806
|
+
"shape": "S2h"
|
805
807
|
}
|
806
808
|
}
|
807
809
|
}
|
@@ -883,7 +885,7 @@
|
|
883
885
|
"FirewallConfigs": {
|
884
886
|
"type": "list",
|
885
887
|
"member": {
|
886
|
-
"shape": "
|
888
|
+
"shape": "S37"
|
887
889
|
}
|
888
890
|
}
|
889
891
|
}
|
@@ -938,7 +940,7 @@
|
|
938
940
|
"members": {
|
939
941
|
"NextToken": {},
|
940
942
|
"Domains": {
|
941
|
-
"shape": "
|
943
|
+
"shape": "S4p"
|
942
944
|
}
|
943
945
|
}
|
944
946
|
}
|
@@ -1028,7 +1030,7 @@
|
|
1028
1030
|
"FirewallRules": {
|
1029
1031
|
"type": "list",
|
1030
1032
|
"member": {
|
1031
|
-
"shape": "
|
1033
|
+
"shape": "S1l"
|
1032
1034
|
}
|
1033
1035
|
}
|
1034
1036
|
}
|
@@ -1051,7 +1053,7 @@
|
|
1051
1053
|
"OutpostResolvers": {
|
1052
1054
|
"type": "list",
|
1053
1055
|
"member": {
|
1054
|
-
"shape": "
|
1056
|
+
"shape": "S1w"
|
1055
1057
|
}
|
1056
1058
|
},
|
1057
1059
|
"NextToken": {}
|
@@ -1075,7 +1077,7 @@
|
|
1075
1077
|
"ResolverConfigs": {
|
1076
1078
|
"type": "list",
|
1077
1079
|
"member": {
|
1078
|
-
"shape": "
|
1080
|
+
"shape": "S3m"
|
1079
1081
|
}
|
1080
1082
|
}
|
1081
1083
|
}
|
@@ -1090,7 +1092,7 @@
|
|
1090
1092
|
},
|
1091
1093
|
"NextToken": {},
|
1092
1094
|
"Filters": {
|
1093
|
-
"shape": "
|
1095
|
+
"shape": "S59"
|
1094
1096
|
}
|
1095
1097
|
}
|
1096
1098
|
},
|
@@ -1101,7 +1103,7 @@
|
|
1101
1103
|
"ResolverDnssecConfigs": {
|
1102
1104
|
"type": "list",
|
1103
1105
|
"member": {
|
1104
|
-
"shape": "
|
1106
|
+
"shape": "S3q"
|
1105
1107
|
}
|
1106
1108
|
}
|
1107
1109
|
}
|
@@ -1156,7 +1158,7 @@
|
|
1156
1158
|
},
|
1157
1159
|
"NextToken": {},
|
1158
1160
|
"Filters": {
|
1159
|
-
"shape": "
|
1161
|
+
"shape": "S59"
|
1160
1162
|
}
|
1161
1163
|
}
|
1162
1164
|
},
|
@@ -1185,7 +1187,7 @@
|
|
1185
1187
|
},
|
1186
1188
|
"NextToken": {},
|
1187
1189
|
"Filters": {
|
1188
|
-
"shape": "
|
1190
|
+
"shape": "S59"
|
1189
1191
|
},
|
1190
1192
|
"SortBy": {},
|
1191
1193
|
"SortOrder": {}
|
@@ -1219,7 +1221,7 @@
|
|
1219
1221
|
},
|
1220
1222
|
"NextToken": {},
|
1221
1223
|
"Filters": {
|
1222
|
-
"shape": "
|
1224
|
+
"shape": "S59"
|
1223
1225
|
},
|
1224
1226
|
"SortBy": {},
|
1225
1227
|
"SortOrder": {}
|
@@ -1238,7 +1240,7 @@
|
|
1238
1240
|
"ResolverQueryLogConfigs": {
|
1239
1241
|
"type": "list",
|
1240
1242
|
"member": {
|
1241
|
-
"shape": "
|
1243
|
+
"shape": "S27"
|
1242
1244
|
}
|
1243
1245
|
}
|
1244
1246
|
}
|
@@ -1253,7 +1255,7 @@
|
|
1253
1255
|
},
|
1254
1256
|
"NextToken": {},
|
1255
1257
|
"Filters": {
|
1256
|
-
"shape": "
|
1258
|
+
"shape": "S59"
|
1257
1259
|
}
|
1258
1260
|
}
|
1259
1261
|
},
|
@@ -1282,7 +1284,7 @@
|
|
1282
1284
|
},
|
1283
1285
|
"NextToken": {},
|
1284
1286
|
"Filters": {
|
1285
|
-
"shape": "
|
1287
|
+
"shape": "S59"
|
1286
1288
|
}
|
1287
1289
|
}
|
1288
1290
|
},
|
@@ -1296,7 +1298,7 @@
|
|
1296
1298
|
"ResolverRules": {
|
1297
1299
|
"type": "list",
|
1298
1300
|
"member": {
|
1299
|
-
"shape": "
|
1301
|
+
"shape": "S2h"
|
1300
1302
|
}
|
1301
1303
|
}
|
1302
1304
|
}
|
@@ -1444,7 +1446,7 @@
|
|
1444
1446
|
"type": "structure",
|
1445
1447
|
"members": {
|
1446
1448
|
"FirewallConfig": {
|
1447
|
-
"shape": "
|
1449
|
+
"shape": "S37"
|
1448
1450
|
}
|
1449
1451
|
}
|
1450
1452
|
}
|
@@ -1461,7 +1463,7 @@
|
|
1461
1463
|
"FirewallDomainListId": {},
|
1462
1464
|
"Operation": {},
|
1463
1465
|
"Domains": {
|
1464
|
-
"shape": "
|
1466
|
+
"shape": "S4p"
|
1465
1467
|
}
|
1466
1468
|
}
|
1467
1469
|
},
|
@@ -1495,14 +1497,15 @@
|
|
1495
1497
|
"BlockOverrideTtl": {
|
1496
1498
|
"type": "integer"
|
1497
1499
|
},
|
1498
|
-
"Name": {}
|
1500
|
+
"Name": {},
|
1501
|
+
"Qtype": {}
|
1499
1502
|
}
|
1500
1503
|
},
|
1501
1504
|
"output": {
|
1502
1505
|
"type": "structure",
|
1503
1506
|
"members": {
|
1504
1507
|
"FirewallRule": {
|
1505
|
-
"shape": "
|
1508
|
+
"shape": "S1l"
|
1506
1509
|
}
|
1507
1510
|
}
|
1508
1511
|
}
|
@@ -1550,7 +1553,7 @@
|
|
1550
1553
|
"type": "structure",
|
1551
1554
|
"members": {
|
1552
1555
|
"OutpostResolver": {
|
1553
|
-
"shape": "
|
1556
|
+
"shape": "S1w"
|
1554
1557
|
}
|
1555
1558
|
}
|
1556
1559
|
}
|
@@ -1571,7 +1574,7 @@
|
|
1571
1574
|
"type": "structure",
|
1572
1575
|
"members": {
|
1573
1576
|
"ResolverConfig": {
|
1574
|
-
"shape": "
|
1577
|
+
"shape": "S3m"
|
1575
1578
|
}
|
1576
1579
|
}
|
1577
1580
|
}
|
@@ -1592,7 +1595,7 @@
|
|
1592
1595
|
"type": "structure",
|
1593
1596
|
"members": {
|
1594
1597
|
"ResolverDNSSECConfig": {
|
1595
|
-
"shape": "
|
1598
|
+
"shape": "S3q"
|
1596
1599
|
}
|
1597
1600
|
}
|
1598
1601
|
}
|
@@ -1649,7 +1652,7 @@
|
|
1649
1652
|
"members": {
|
1650
1653
|
"Name": {},
|
1651
1654
|
"TargetIps": {
|
1652
|
-
"shape": "
|
1655
|
+
"shape": "S2d"
|
1653
1656
|
},
|
1654
1657
|
"ResolverEndpointId": {}
|
1655
1658
|
}
|
@@ -1660,7 +1663,7 @@
|
|
1660
1663
|
"type": "structure",
|
1661
1664
|
"members": {
|
1662
1665
|
"ResolverRule": {
|
1663
|
-
"shape": "
|
1666
|
+
"shape": "S2h"
|
1664
1667
|
}
|
1665
1668
|
}
|
1666
1669
|
}
|
@@ -1785,7 +1788,7 @@
|
|
1785
1788
|
"ModificationTime": {}
|
1786
1789
|
}
|
1787
1790
|
},
|
1788
|
-
"
|
1791
|
+
"S1l": {
|
1789
1792
|
"type": "structure",
|
1790
1793
|
"members": {
|
1791
1794
|
"FirewallRuleGroupId": {},
|
@@ -1803,10 +1806,11 @@
|
|
1803
1806
|
},
|
1804
1807
|
"CreatorRequestId": {},
|
1805
1808
|
"CreationTime": {},
|
1806
|
-
"ModificationTime": {}
|
1809
|
+
"ModificationTime": {},
|
1810
|
+
"Qtype": {}
|
1807
1811
|
}
|
1808
1812
|
},
|
1809
|
-
"
|
1813
|
+
"S1o": {
|
1810
1814
|
"type": "structure",
|
1811
1815
|
"members": {
|
1812
1816
|
"Id": {},
|
@@ -1824,7 +1828,7 @@
|
|
1824
1828
|
"ModificationTime": {}
|
1825
1829
|
}
|
1826
1830
|
},
|
1827
|
-
"
|
1831
|
+
"S1w": {
|
1828
1832
|
"type": "structure",
|
1829
1833
|
"members": {
|
1830
1834
|
"Arn": {},
|
@@ -1842,7 +1846,7 @@
|
|
1842
1846
|
"OutpostArn": {}
|
1843
1847
|
}
|
1844
1848
|
},
|
1845
|
-
"
|
1849
|
+
"S27": {
|
1846
1850
|
"type": "structure",
|
1847
1851
|
"members": {
|
1848
1852
|
"Id": {},
|
@@ -1859,7 +1863,7 @@
|
|
1859
1863
|
"CreationTime": {}
|
1860
1864
|
}
|
1861
1865
|
},
|
1862
|
-
"
|
1866
|
+
"S2d": {
|
1863
1867
|
"type": "list",
|
1864
1868
|
"member": {
|
1865
1869
|
"type": "structure",
|
@@ -1873,7 +1877,7 @@
|
|
1873
1877
|
}
|
1874
1878
|
}
|
1875
1879
|
},
|
1876
|
-
"
|
1880
|
+
"S2h": {
|
1877
1881
|
"type": "structure",
|
1878
1882
|
"members": {
|
1879
1883
|
"Id": {},
|
@@ -1885,7 +1889,7 @@
|
|
1885
1889
|
"RuleType": {},
|
1886
1890
|
"Name": {},
|
1887
1891
|
"TargetIps": {
|
1888
|
-
"shape": "
|
1892
|
+
"shape": "S2d"
|
1889
1893
|
},
|
1890
1894
|
"ResolverEndpointId": {},
|
1891
1895
|
"OwnerId": {},
|
@@ -1894,7 +1898,7 @@
|
|
1894
1898
|
"ModificationTime": {}
|
1895
1899
|
}
|
1896
1900
|
},
|
1897
|
-
"
|
1901
|
+
"S37": {
|
1898
1902
|
"type": "structure",
|
1899
1903
|
"members": {
|
1900
1904
|
"Id": {},
|
@@ -1903,7 +1907,7 @@
|
|
1903
1907
|
"FirewallFailOpen": {}
|
1904
1908
|
}
|
1905
1909
|
},
|
1906
|
-
"
|
1910
|
+
"S3m": {
|
1907
1911
|
"type": "structure",
|
1908
1912
|
"members": {
|
1909
1913
|
"Id": {},
|
@@ -1912,7 +1916,7 @@
|
|
1912
1916
|
"AutodefinedReverse": {}
|
1913
1917
|
}
|
1914
1918
|
},
|
1915
|
-
"
|
1919
|
+
"S3q": {
|
1916
1920
|
"type": "structure",
|
1917
1921
|
"members": {
|
1918
1922
|
"Id": {},
|
@@ -1921,11 +1925,11 @@
|
|
1921
1925
|
"ValidationStatus": {}
|
1922
1926
|
}
|
1923
1927
|
},
|
1924
|
-
"
|
1928
|
+
"S4p": {
|
1925
1929
|
"type": "list",
|
1926
1930
|
"member": {}
|
1927
1931
|
},
|
1928
|
-
"
|
1932
|
+
"S59": {
|
1929
1933
|
"type": "list",
|
1930
1934
|
"member": {
|
1931
1935
|
"type": "structure",
|
@@ -737,7 +737,9 @@
|
|
737
737
|
}
|
738
738
|
}
|
739
739
|
}
|
740
|
-
}
|
740
|
+
},
|
741
|
+
"deprecated": true,
|
742
|
+
"deprecatedMessage": "GetRecommendations API will be discontinued starting June 1, 2024. To receive generative responses after March 1, 2024 you will need to create a new Assistant in the Connect console and integrate the Amazon Q in Connect JavaScript library (amazon-q-connectjs) into your applications."
|
741
743
|
},
|
742
744
|
"GetSession": {
|
743
745
|
"http": {
|
@@ -1276,7 +1278,9 @@
|
|
1276
1278
|
}
|
1277
1279
|
}
|
1278
1280
|
}
|
1279
|
-
}
|
1281
|
+
},
|
1282
|
+
"deprecated": true,
|
1283
|
+
"deprecatedMessage": "QueryAssistant API will be discontinued starting June 1, 2024. To receive generative responses after March 1, 2024 you will need to create a new Assistant in the Connect console and integrate the Amazon Q in Connect JavaScript library (amazon-q-connectjs) into your applications."
|
1280
1284
|
},
|
1281
1285
|
"RemoveKnowledgeBaseTemplateUri": {
|
1282
1286
|
"http": {
|
@@ -69,11 +69,11 @@ declare class CloudWatchLogs extends Service {
|
|
69
69
|
*/
|
70
70
|
createLogStream(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
71
71
|
/**
|
72
|
-
* Deletes a CloudWatch Logs account policy. To use this operation, you must be signed on with the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions.
|
72
|
+
* Deletes a CloudWatch Logs account policy. This stops the policy from applying to all log groups or a subset of log groups in the account. Log-group level policies will still be in effect. To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are deleting. To delete a data protection policy, you must have the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions. To delete a subscription filter policy, you must have the logs:DeleteSubscriptionFilter and logs:DeleteAccountPolicy permissions.
|
73
73
|
*/
|
74
74
|
deleteAccountPolicy(params: CloudWatchLogs.Types.DeleteAccountPolicyRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
75
75
|
/**
|
76
|
-
* Deletes a CloudWatch Logs account policy. To use this operation, you must be signed on with the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions.
|
76
|
+
* Deletes a CloudWatch Logs account policy. This stops the policy from applying to all log groups or a subset of log groups in the account. Log-group level policies will still be in effect. To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are deleting. To delete a data protection policy, you must have the logs:DeleteDataProtectionPolicy and logs:DeleteAccountPolicy permissions. To delete a subscription filter policy, you must have the logs:DeleteSubscriptionFilter and logs:DeleteAccountPolicy permissions.
|
77
77
|
*/
|
78
78
|
deleteAccountPolicy(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
79
79
|
/**
|
@@ -421,11 +421,11 @@ declare class CloudWatchLogs extends Service {
|
|
421
421
|
*/
|
422
422
|
listTagsLogGroup(callback?: (err: AWSError, data: CloudWatchLogs.Types.ListTagsLogGroupResponse) => void): Request<CloudWatchLogs.Types.ListTagsLogGroupResponse, AWSError>;
|
423
423
|
/**
|
424
|
-
* Creates an account-level data protection policy that applies to all log groups in the account. A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can
|
424
|
+
* Creates an account-level data protection policy or subscription filter policy that applies to all log groups or a subset of log groups in the account. Data protection policy A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level data protection policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account-level policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation for a data protection policy, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked. Subscription filter policy A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to both existing log groups and log groups that are created later in this account. Supported destinations are Kinesis Data Streams, Kinesis Data Firehose, and Lambda. When log events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP format. The following destinations are supported for subscription filters: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. Each account can have one account-level subscription filter policy. If you are updating an existing filter, you must specify the correct name in PolicyName. To perform a PutAccountPolicy subscription filter operation for any destination except a Lambda function, you must also have the iam:PassRole permission.
|
425
425
|
*/
|
426
426
|
putAccountPolicy(params: CloudWatchLogs.Types.PutAccountPolicyRequest, callback?: (err: AWSError, data: CloudWatchLogs.Types.PutAccountPolicyResponse) => void): Request<CloudWatchLogs.Types.PutAccountPolicyResponse, AWSError>;
|
427
427
|
/**
|
428
|
-
* Creates an account-level data protection policy that applies to all log groups in the account. A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can
|
428
|
+
* Creates an account-level data protection policy or subscription filter policy that applies to all log groups or a subset of log groups in the account. Data protection policy A data protection policy can help safeguard sensitive data that's ingested by your log groups by auditing and masking the sensitive log data. Each account can have only one account-level data protection policy. Sensitive data is detected and masked when it is ingested into a log group. When you set a data protection policy, log events ingested into the log groups before that time are not masked. If you use PutAccountPolicy to create a data protection policy for your whole account, it applies to both existing log groups and all log groups that are created later in this account. The account-level policy is applied to existing log groups with eventual consistency. It might take up to 5 minutes before sensitive data in existing log groups begins to be masked. By default, when a user views a log event that includes masked data, the sensitive data is replaced by asterisks. A user who has the logs:Unmask permission can use a GetLogEvents or FilterLogEvents operation with the unmask parameter set to true to view the unmasked log events. Users with the logs:Unmask can also view unmasked data in the CloudWatch Logs console by running a CloudWatch Logs Insights query with the unmask query command. For more information, including a list of types of data that can be audited and masked, see Protect sensitive log data with masking. To use the PutAccountPolicy operation for a data protection policy, you must be signed on with the logs:PutDataProtectionPolicy and logs:PutAccountPolicy permissions. The PutAccountPolicy operation applies to all log groups in the account. You can use PutDataProtectionPolicy to create a data protection policy that applies to just one log group. If a log group has its own data protection policy and the account also has an account-level data protection policy, then the two policies are cumulative. Any sensitive term specified in either policy is masked. Subscription filter policy A subscription filter policy sets up a real-time feed of log events from CloudWatch Logs to other Amazon Web Services services. Account-level subscription filter policies apply to both existing log groups and log groups that are created later in this account. Supported destinations are Kinesis Data Streams, Kinesis Data Firehose, and Lambda. When log events are sent to the receiving service, they are Base64 encoded and compressed with the GZIP format. The following destinations are supported for subscription filters: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. Each account can have one account-level subscription filter policy. If you are updating an existing filter, you must specify the correct name in PolicyName. To perform a PutAccountPolicy subscription filter operation for any destination except a Lambda function, you must also have the iam:PassRole permission.
|
429
429
|
*/
|
430
430
|
putAccountPolicy(callback?: (err: AWSError, data: CloudWatchLogs.Types.PutAccountPolicyResponse) => void): Request<CloudWatchLogs.Types.PutAccountPolicyResponse, AWSError>;
|
431
431
|
/**
|
@@ -525,11 +525,11 @@ declare class CloudWatchLogs extends Service {
|
|
525
525
|
*/
|
526
526
|
putSubscriptionFilter(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
527
527
|
/**
|
528
|
-
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks.
|
528
|
+
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks. For examples of using an SDK to start a Live Tail session, see Start a Live Tail session using an Amazon Web Services SDK.
|
529
529
|
*/
|
530
530
|
startLiveTail(params: CloudWatchLogs.Types.StartLiveTailRequest, callback?: (err: AWSError, data: CloudWatchLogs.Types.StartLiveTailResponse) => void): Request<CloudWatchLogs.Types.StartLiveTailResponse, AWSError>;
|
531
531
|
/**
|
532
|
-
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks.
|
532
|
+
* Starts a Live Tail streaming session for one or more log groups. A Live Tail session returns a stream of log events that have been recently ingested in the log groups. For more information, see Use Live Tail to view logs in near real time. The response to this operation is a response stream, over which the server sends live log events and the client receives them. The following objects are sent over the stream: A single LiveTailSessionStart object is sent at the start of the session. Every second, a LiveTailSessionUpdate object is sent. Each of these objects contains an array of the actual log events. If no new log events were ingested in the past second, the LiveTailSessionUpdate object will contain an empty array. The array of log events contained in a LiveTailSessionUpdate can include as many as 500 log events. If the number of log events matching the request exceeds 500 per second, the log events are sampled down to 500 log events to be included in each LiveTailSessionUpdate object. If your client consumes the log events slower than the server produces them, CloudWatch Logs buffers up to 10 LiveTailSessionUpdate events or 5000 log events, after which it starts dropping the oldest events. A SessionStreamingException object is returned if an unknown error occurs on the server side. A SessionTimeoutException object is returned when the session times out, after it has been kept open for three hours. You can end a session before it times out by closing the session stream or by closing the client that is receiving the stream. The session also ends if the established connection between the client and the server breaks. For examples of using an SDK to start a Live Tail session, see Start a Live Tail session using an Amazon Web Services SDK.
|
533
533
|
*/
|
534
534
|
startLiveTail(callback?: (err: AWSError, data: CloudWatchLogs.Types.StartLiveTailResponse) => void): Request<CloudWatchLogs.Types.StartLiveTailResponse, AWSError>;
|
535
535
|
/**
|
@@ -631,6 +631,10 @@ declare namespace CloudWatchLogs {
|
|
631
631
|
* The scope of the account policy.
|
632
632
|
*/
|
633
633
|
scope?: Scope;
|
634
|
+
/**
|
635
|
+
* The log group selection criteria for this subscription filter policy.
|
636
|
+
*/
|
637
|
+
selectionCriteria?: SelectionCriteria;
|
634
638
|
/**
|
635
639
|
* The Amazon Web Services account ID that the policy applies to.
|
636
640
|
*/
|
@@ -891,7 +895,7 @@ declare namespace CloudWatchLogs {
|
|
891
895
|
*/
|
892
896
|
tags?: Tags;
|
893
897
|
/**
|
894
|
-
* Use this parameter to specify the log group class for this log group. There are two classes: The Standard log class supports all CloudWatch Logs features. The Infrequent Access log class supports a subset of CloudWatch Logs features and incurs lower costs. If you omit this parameter, the default of STANDARD is used.
|
898
|
+
* Use this parameter to specify the log group class for this log group. There are two classes: The Standard log class supports all CloudWatch Logs features. The Infrequent Access log class supports a subset of CloudWatch Logs features and incurs lower costs. If you omit this parameter, the default of STANDARD is used. The value of logGroupClass can't be changed after a log group is created. For details about the features supported by each class, see Log classes
|
895
899
|
*/
|
896
900
|
logGroupClass?: LogGroupClass;
|
897
901
|
}
|
@@ -915,7 +919,7 @@ declare namespace CloudWatchLogs {
|
|
915
919
|
*/
|
916
920
|
policyName: PolicyName;
|
917
921
|
/**
|
918
|
-
* The type of policy to delete.
|
922
|
+
* The type of policy to delete.
|
919
923
|
*/
|
920
924
|
policyType: PolicyType;
|
921
925
|
}
|
@@ -1116,7 +1120,7 @@ declare namespace CloudWatchLogs {
|
|
1116
1120
|
export type Descending = boolean;
|
1117
1121
|
export interface DescribeAccountPoliciesRequest {
|
1118
1122
|
/**
|
1119
|
-
* Use this parameter to limit the returned policies to only the policies that match the policy type that you specify.
|
1123
|
+
* Use this parameter to limit the returned policies to only the policies that match the policy type that you specify.
|
1120
1124
|
*/
|
1121
1125
|
policyType: PolicyType;
|
1122
1126
|
/**
|
@@ -2207,7 +2211,7 @@ declare namespace CloudWatchLogs {
|
|
2207
2211
|
}
|
2208
2212
|
export type PolicyDocument = string;
|
2209
2213
|
export type PolicyName = string;
|
2210
|
-
export type PolicyType = "DATA_PROTECTION_POLICY"|string;
|
2214
|
+
export type PolicyType = "DATA_PROTECTION_POLICY"|"SUBSCRIPTION_FILTER_POLICY"|string;
|
2211
2215
|
export type Priority = string;
|
2212
2216
|
export interface PutAccountPolicyRequest {
|
2213
2217
|
/**
|
@@ -2215,17 +2219,21 @@ declare namespace CloudWatchLogs {
|
|
2215
2219
|
*/
|
2216
2220
|
policyName: PolicyName;
|
2217
2221
|
/**
|
2218
|
-
* Specify the
|
2222
|
+
* Specify the policy, in JSON. Data protection policy A data protection policy must include two JSON blocks: The first block must include both a DataIdentifer array and an Operation property with an Audit action. The DataIdentifer array lists the types of sensitive data that you want to mask. For more information about the available options, see Types of data that you can mask. The Operation property with an Audit action is required to find the sensitive data terms. This Audit action must contain a FindingsDestination object. You can optionally use that FindingsDestination object to list one or more destinations to send audit findings to. If you specify destinations such as log groups, Kinesis Data Firehose streams, and S3 buckets, they must already exist. The second block must include both a DataIdentifer array and an Operation property with an Deidentify action. The DataIdentifer array must exactly match the DataIdentifer array in the first block of the policy. The Operation property with the Deidentify action is what actually masks the data, and it must contain the "MaskConfig": {} object. The "MaskConfig": {} object must be empty. For an example data protection policy, see the Examples section on this page. The contents of the two DataIdentifer arrays must match exactly. In addition to the two JSON blocks, the policyDocument can also include Name, Description, and Version fields. The Name is different than the operation's policyName parameter, and is used as a dimension when CloudWatch Logs reports audit findings metrics to CloudWatch. The JSON specified in policyDocument can be up to 30,720 characters long. Subscription filter policy A subscription filter policy can include the following attributes in a JSON block: DestinationArn The ARN of the destination to deliver log events to. Supported destinations are: An Kinesis Data Streams data stream in the same account as the subscription policy, for same-account delivery. An Kinesis Data Firehose data stream in the same account as the subscription policy, for same-account delivery. A Lambda function in the same account as the subscription policy, for same-account delivery. A logical destination in a different account created with PutDestination, for cross-account delivery. Kinesis Data Streams and Kinesis Data Firehose are supported as logical destinations. RoleArn The ARN of an IAM role that grants CloudWatch Logs permissions to deliver ingested log events to the destination stream. You don't need to provide the ARN when you are working with a logical destination for cross-account delivery. FilterPattern A filter pattern for subscribing to a filtered stream of log events. DistributionThe method used to distribute log data to the destination. By default, log data is grouped by log stream, but the grouping can be set to Random for a more even distribution. This property is only applicable when the destination is an Kinesis Data Streams data stream.
|
2219
2223
|
*/
|
2220
2224
|
policyDocument: AccountPolicyDocument;
|
2221
2225
|
/**
|
2222
|
-
*
|
2226
|
+
* The type of policy that you're creating or updating.
|
2223
2227
|
*/
|
2224
2228
|
policyType: PolicyType;
|
2225
2229
|
/**
|
2226
2230
|
* Currently the only valid value for this parameter is ALL, which specifies that the data protection policy applies to all log groups in the account. If you omit this parameter, the default of ALL is used.
|
2227
2231
|
*/
|
2228
2232
|
scope?: Scope;
|
2233
|
+
/**
|
2234
|
+
* Use this parameter to apply the subscription filter policy to a subset of log groups in the account. Currently, the only supported filter is LogGroupName NOT IN []. The selectionCriteria string can be up to 25KB in length. The length is determined by using its UTF-8 bytes. Using the selectionCriteria parameter is useful to help prevent infinite loops. For more information, see Log recursion prevention. Specifing selectionCriteria is valid only when you specify SUBSCRIPTION_FILTER_POLICY for policyType.
|
2235
|
+
*/
|
2236
|
+
selectionCriteria?: SelectionCriteria;
|
2229
2237
|
}
|
2230
2238
|
export interface PutAccountPolicyResponse {
|
2231
2239
|
/**
|
@@ -2605,6 +2613,7 @@ declare namespace CloudWatchLogs {
|
|
2605
2613
|
searchedCompletely?: LogStreamSearchedCompletely;
|
2606
2614
|
}
|
2607
2615
|
export type SearchedLogStreams = SearchedLogStream[];
|
2616
|
+
export type SelectionCriteria = string;
|
2608
2617
|
export type SequenceToken = string;
|
2609
2618
|
export type Service = string;
|
2610
2619
|
export type SessionId = string;
|
@@ -2623,11 +2632,11 @@ declare namespace CloudWatchLogs {
|
|
2623
2632
|
*/
|
2624
2633
|
logGroupIdentifiers: StartLiveTailLogGroupIdentifiers;
|
2625
2634
|
/**
|
2626
|
-
* If you specify this parameter, then only log events in the log streams that you specify here are included in the Live Tail session. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2635
|
+
* If you specify this parameter, then only log events in the log streams that you specify here are included in the Live Tail session. If you specify this field, you can't also specify the logStreamNamePrefixes field. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2627
2636
|
*/
|
2628
2637
|
logStreamNames?: InputLogStreamNames;
|
2629
2638
|
/**
|
2630
|
-
* If you specify this parameter, then only log events in the log streams that have names that start with the prefixes that you specify here are included in the Live Tail session. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2639
|
+
* If you specify this parameter, then only log events in the log streams that have names that start with the prefixes that you specify here are included in the Live Tail session. If you specify this field, you can't also specify the logStreamNames field. You can specify this parameter only if you specify only one log group in logGroupIdentifiers.
|
2631
2640
|
*/
|
2632
2641
|
logStreamNamePrefixes?: InputLogStreamNames;
|
2633
2642
|
/**
|