cdk-lambda-subminute 2.0.226 → 2.0.228
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +15 -15
- package/README.md +12 -0
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/CHANGELOG.md +174 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/amplifybackend-2020-08-11.min.json +4 -0
- package/node_modules/aws-sdk/apis/amplifyuibuilder-2021-08-11.min.json +40 -9
- package/node_modules/aws-sdk/apis/apigateway-2015-07-09.min.json +2 -1
- package/node_modules/aws-sdk/apis/appflow-2020-08-23.min.json +115 -87
- package/node_modules/aws-sdk/apis/application-insights-2018-11-25.min.json +228 -43
- package/node_modules/aws-sdk/apis/application-insights-2018-11-25.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/auditmanager-2017-07-25.min.json +238 -63
- package/node_modules/aws-sdk/apis/autoscaling-2011-01-01.examples.json +74 -11
- package/node_modules/aws-sdk/apis/autoscaling-2011-01-01.min.json +61 -52
- package/node_modules/aws-sdk/apis/backup-2018-11-15.min.json +217 -104
- package/node_modules/aws-sdk/apis/backup-2018-11-15.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/ce-2017-10-25.min.json +3 -1
- package/node_modules/aws-sdk/apis/chime-sdk-media-pipelines-2021-07-15.min.json +261 -21
- package/node_modules/aws-sdk/apis/chime-sdk-voice-2022-08-03.min.json +198 -182
- package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.min.json +657 -102
- package/node_modules/aws-sdk/apis/cleanrooms-2022-02-17.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +95 -80
- package/node_modules/aws-sdk/apis/cloudfront-2020-05-31.min.json +4 -1
- package/node_modules/aws-sdk/apis/cloudhsm-2014-05-30.min.json +60 -20
- package/node_modules/aws-sdk/apis/codecommit-2015-04-13.min.json +44 -0
- package/node_modules/aws-sdk/apis/codecommit-2015-04-13.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/cognito-idp-2016-04-18.examples.json +849 -0
- package/node_modules/aws-sdk/apis/cognito-idp-2016-04-18.min.json +110 -24
- package/node_modules/aws-sdk/apis/compute-optimizer-2019-11-01.min.json +200 -57
- package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +903 -316
- package/node_modules/aws-sdk/apis/connect-2017-08-08.paginators.json +18 -0
- package/node_modules/aws-sdk/apis/connectcampaigns-2021-01-30.min.json +103 -90
- package/node_modules/aws-sdk/apis/connectparticipant-2018-09-07.min.json +62 -0
- package/node_modules/aws-sdk/apis/customer-profiles-2020-08-15.min.json +269 -118
- package/node_modules/aws-sdk/apis/datasync-2018-11-09.min.json +103 -14
- package/node_modules/aws-sdk/apis/detective-2018-10-26.min.json +14 -3
- package/node_modules/aws-sdk/apis/dms-2016-01-01.min.json +1123 -217
- package/node_modules/aws-sdk/apis/dms-2016-01-01.paginators.json +50 -0
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +1254 -1191
- package/node_modules/aws-sdk/apis/elasticache-2015-02-02.min.json +37 -10
- package/node_modules/aws-sdk/apis/elasticloadbalancingv2-2015-12-01.min.json +49 -46
- package/node_modules/aws-sdk/apis/finspace-2021-03-12.min.json +74 -13
- package/node_modules/aws-sdk/apis/fsx-2018-03-01.min.json +190 -143
- package/node_modules/aws-sdk/apis/glue-2017-03-31.min.json +235 -216
- package/node_modules/aws-sdk/apis/grafana-2020-08-18.min.json +2 -1
- package/node_modules/aws-sdk/apis/health-2016-08-04.min.json +116 -34
- package/node_modules/aws-sdk/apis/inspector2-2020-06-08.min.json +291 -192
- package/node_modules/aws-sdk/apis/internetmonitor-2021-06-03.min.json +37 -19
- package/node_modules/aws-sdk/apis/kafka-2018-11-14.min.json +237 -52
- package/node_modules/aws-sdk/apis/kafka-2018-11-14.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/kafkaconnect-2021-09-14.min.json +38 -36
- package/node_modules/aws-sdk/apis/kinesis-video-archived-media-2017-09-30.min.json +0 -1
- package/node_modules/aws-sdk/apis/lookoutequipment-2020-12-15.min.json +337 -23
- package/node_modules/aws-sdk/apis/lookoutequipment-2020-12-15.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/mediaconvert-2017-08-29.min.json +134 -96
- package/node_modules/aws-sdk/apis/medialive-2017-10-14.min.json +249 -225
- package/node_modules/aws-sdk/apis/mediapackage-2017-10-12.min.json +93 -87
- package/node_modules/aws-sdk/apis/metadata.json +7 -0
- package/node_modules/aws-sdk/apis/neptunedata-2023-08-01.examples.json +5 -0
- package/node_modules/aws-sdk/apis/neptunedata-2023-08-01.min.json +1923 -0
- package/node_modules/aws-sdk/apis/neptunedata-2023-08-01.paginators.json +4 -0
- package/node_modules/aws-sdk/apis/omics-2022-11-28.min.json +756 -204
- package/node_modules/aws-sdk/apis/omics-2022-11-28.paginators.json +12 -0
- package/node_modules/aws-sdk/apis/omics-2022-11-28.waiters2.json +48 -0
- package/node_modules/aws-sdk/apis/payment-cryptography-data-2022-02-03.min.json +29 -16
- package/node_modules/aws-sdk/apis/pca-connector-ad-2018-05-10.examples.json +5 -0
- package/node_modules/aws-sdk/apis/pca-connector-ad-2018-05-10.min.json +1465 -0
- package/node_modules/aws-sdk/apis/pca-connector-ad-2018-05-10.paginators.json +34 -0
- package/node_modules/aws-sdk/apis/pi-2018-02-27.min.json +304 -11
- package/node_modules/aws-sdk/apis/pi-2018-02-27.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/pinpoint-2016-12-01.examples.json +6 -12
- package/node_modules/aws-sdk/apis/pinpoint-2016-12-01.min.json +286 -243
- package/node_modules/aws-sdk/apis/quicksight-2018-04-01.min.json +1194 -1134
- package/node_modules/aws-sdk/apis/quicksight-2018-04-01.paginators.json +30 -0
- package/node_modules/aws-sdk/apis/rds-2014-10-31.min.json +334 -180
- package/node_modules/aws-sdk/apis/rds-2014-10-31.paginators.json +6 -0
- package/node_modules/aws-sdk/apis/rekognition-2016-06-27.examples.json +501 -1
- package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.min.json +354 -125
- package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/route53domains-2014-05-15.min.json +103 -44
- package/node_modules/aws-sdk/apis/runtime.sagemaker-2017-05-13.min.json +104 -0
- package/node_modules/aws-sdk/apis/s3-2006-03-01.examples.json +131 -131
- package/node_modules/aws-sdk/apis/sagemaker-2017-07-24.min.json +868 -726
- package/node_modules/aws-sdk/apis/scheduler-2021-06-30.min.json +15 -12
- package/node_modules/aws-sdk/apis/securityhub-2018-10-26.min.json +100 -61
- package/node_modules/aws-sdk/apis/service-quotas-2019-06-24.min.json +45 -23
- package/node_modules/aws-sdk/apis/sesv2-2019-09-27.examples.json +244 -0
- package/node_modules/aws-sdk/apis/sesv2-2019-09-27.min.json +491 -153
- package/node_modules/aws-sdk/apis/sesv2-2019-09-27.paginators.json +5 -0
- package/node_modules/aws-sdk/apis/swf-2012-01-25.min.json +12 -3
- package/node_modules/aws-sdk/apis/verifiedpermissions-2021-12-01.min.json +127 -33
- package/node_modules/aws-sdk/apis/workspaces-web-2020-07-08.min.json +136 -58
- package/node_modules/aws-sdk/clients/acmpca.d.ts +1 -1
- package/node_modules/aws-sdk/clients/all.d.ts +2 -0
- package/node_modules/aws-sdk/clients/all.js +3 -1
- package/node_modules/aws-sdk/clients/amplifyuibuilder.d.ts +48 -4
- package/node_modules/aws-sdk/clients/apigateway.d.ts +34 -30
- package/node_modules/aws-sdk/clients/appflow.d.ts +30 -0
- package/node_modules/aws-sdk/clients/applicationinsights.d.ts +342 -2
- package/node_modules/aws-sdk/clients/apprunner.d.ts +5 -5
- package/node_modules/aws-sdk/clients/autoscaling.d.ts +13 -2
- package/node_modules/aws-sdk/clients/backup.d.ts +131 -8
- package/node_modules/aws-sdk/clients/batch.d.ts +9 -9
- package/node_modules/aws-sdk/clients/budgets.d.ts +1 -1
- package/node_modules/aws-sdk/clients/chimesdkmediapipelines.d.ts +228 -2
- package/node_modules/aws-sdk/clients/chimesdkvoice.d.ts +17 -0
- package/node_modules/aws-sdk/clients/cleanrooms.d.ts +557 -14
- package/node_modules/aws-sdk/clients/cloud9.d.ts +1 -1
- package/node_modules/aws-sdk/clients/cloudformation.d.ts +21 -0
- package/node_modules/aws-sdk/clients/cloudfront.d.ts +14 -10
- package/node_modules/aws-sdk/clients/cloudtrail.d.ts +4 -4
- package/node_modules/aws-sdk/clients/cloudwatch.d.ts +7 -7
- package/node_modules/aws-sdk/clients/cloudwatchevents.d.ts +2 -2
- package/node_modules/aws-sdk/clients/codecommit.d.ts +87 -30
- package/node_modules/aws-sdk/clients/codestarconnections.d.ts +10 -10
- package/node_modules/aws-sdk/clients/cognitoidentityserviceprovider.d.ts +292 -215
- package/node_modules/aws-sdk/clients/computeoptimizer.d.ts +214 -2
- package/node_modules/aws-sdk/clients/configservice.d.ts +1 -1
- package/node_modules/aws-sdk/clients/connect.d.ts +609 -17
- package/node_modules/aws-sdk/clients/connectcampaigns.d.ts +30 -23
- package/node_modules/aws-sdk/clients/connectparticipant.d.ts +71 -2
- package/node_modules/aws-sdk/clients/costexplorer.d.ts +10 -2
- package/node_modules/aws-sdk/clients/customerprofiles.d.ts +56 -52
- package/node_modules/aws-sdk/clients/datasync.d.ts +170 -39
- package/node_modules/aws-sdk/clients/dms.d.ts +1289 -13
- package/node_modules/aws-sdk/clients/drs.d.ts +1 -1
- package/node_modules/aws-sdk/clients/ec2.d.ts +87 -20
- package/node_modules/aws-sdk/clients/ecs.d.ts +32 -32
- package/node_modules/aws-sdk/clients/elasticache.d.ts +22 -1
- package/node_modules/aws-sdk/clients/elbv2.d.ts +23 -9
- package/node_modules/aws-sdk/clients/finspace.d.ts +73 -5
- package/node_modules/aws-sdk/clients/fsx.d.ts +108 -33
- package/node_modules/aws-sdk/clients/gamelift.d.ts +91 -91
- package/node_modules/aws-sdk/clients/globalaccelerator.d.ts +12 -12
- package/node_modules/aws-sdk/clients/glue.d.ts +40 -2
- package/node_modules/aws-sdk/clients/guardduty.d.ts +4 -4
- package/node_modules/aws-sdk/clients/health.d.ts +86 -2
- package/node_modules/aws-sdk/clients/identitystore.d.ts +26 -26
- package/node_modules/aws-sdk/clients/inspector2.d.ts +101 -2
- package/node_modules/aws-sdk/clients/internetmonitor.d.ts +49 -26
- package/node_modules/aws-sdk/clients/ivs.d.ts +4 -4
- package/node_modules/aws-sdk/clients/ivsrealtime.d.ts +2 -2
- package/node_modules/aws-sdk/clients/kafka.d.ts +204 -0
- package/node_modules/aws-sdk/clients/kafkaconnect.d.ts +6 -8
- package/node_modules/aws-sdk/clients/kinesisvideo.d.ts +2 -2
- package/node_modules/aws-sdk/clients/kinesisvideoarchivedmedia.d.ts +16 -16
- package/node_modules/aws-sdk/clients/lookoutequipment.d.ts +522 -15
- package/node_modules/aws-sdk/clients/mediaconvert.d.ts +52 -6
- package/node_modules/aws-sdk/clients/medialive.d.ts +35 -0
- package/node_modules/aws-sdk/clients/mediapackage.d.ts +3 -2
- package/node_modules/aws-sdk/clients/mediatailor.d.ts +2 -2
- package/node_modules/aws-sdk/clients/neptunedata.d.ts +1976 -0
- package/node_modules/aws-sdk/clients/neptunedata.js +18 -0
- package/node_modules/aws-sdk/clients/networkfirewall.d.ts +9 -9
- package/node_modules/aws-sdk/clients/omics.d.ts +619 -21
- package/node_modules/aws-sdk/clients/organizations.d.ts +55 -55
- package/node_modules/aws-sdk/clients/paymentcryptographydata.d.ts +8 -6
- package/node_modules/aws-sdk/clients/pcaconnectorad.d.ts +1606 -0
- package/node_modules/aws-sdk/clients/pcaconnectorad.js +18 -0
- package/node_modules/aws-sdk/clients/pi.d.ts +382 -5
- package/node_modules/aws-sdk/clients/pinpoint.d.ts +69 -5
- package/node_modules/aws-sdk/clients/polly.d.ts +2 -2
- package/node_modules/aws-sdk/clients/quicksight.d.ts +148 -33
- package/node_modules/aws-sdk/clients/rds.d.ts +255 -23
- package/node_modules/aws-sdk/clients/rekognition.d.ts +19 -19
- package/node_modules/aws-sdk/clients/resiliencehub.d.ts +588 -274
- package/node_modules/aws-sdk/clients/route53.d.ts +9 -9
- package/node_modules/aws-sdk/clients/route53domains.d.ts +9 -3
- package/node_modules/aws-sdk/clients/sagemaker.d.ts +227 -22
- package/node_modules/aws-sdk/clients/sagemakerruntime.d.ts +86 -8
- package/node_modules/aws-sdk/clients/scheduler.d.ts +16 -3
- package/node_modules/aws-sdk/clients/securityhub.d.ts +68 -4
- package/node_modules/aws-sdk/clients/servicecatalog.d.ts +16 -16
- package/node_modules/aws-sdk/clients/servicequotas.d.ts +138 -80
- package/node_modules/aws-sdk/clients/ses.d.ts +158 -158
- package/node_modules/aws-sdk/clients/sesv2.d.ts +374 -3
- package/node_modules/aws-sdk/clients/sqs.d.ts +9 -9
- package/node_modules/aws-sdk/clients/swf.d.ts +18 -1
- package/node_modules/aws-sdk/clients/transfer.d.ts +12 -12
- package/node_modules/aws-sdk/clients/verifiedpermissions.d.ts +27 -27
- package/node_modules/aws-sdk/clients/workspacesweb.d.ts +69 -16
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +2 -2
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +152 -78
- package/node_modules/aws-sdk/dist/aws-sdk.js +3098 -1970
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +101 -101
- package/node_modules/aws-sdk/lib/config_service_placeholders.d.ts +4 -0
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/lib/token/sso_token_provider.js +3 -3
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +13 -13
@@ -143,7 +143,7 @@ declare namespace Cloud9 {
|
|
143
143
|
*/
|
144
144
|
subnetId?: SubnetId;
|
145
145
|
/**
|
146
|
-
* The identifier for the Amazon Machine Image (AMI) that's used to create the EC2 instance. To choose an AMI for the instance, you must specify a valid AMI alias or a valid Amazon EC2 Systems Manager (SSM) path. The default Amazon Linux AMI is currently used if the parameter isn't explicitly assigned a value in the request.
|
146
|
+
* The identifier for the Amazon Machine Image (AMI) that's used to create the EC2 instance. To choose an AMI for the instance, you must specify a valid AMI alias or a valid Amazon EC2 Systems Manager (SSM) path. The default Amazon Linux AMI is currently used if the parameter isn't explicitly assigned a value in the request. Because Amazon Linux AMI has ended standard support as of December 31, 2020, we recommend you choose Amazon Linux 2, which includes long term support through 2023. From December 31, 2023, the parameter for Amazon Linux will no longer be available when you specify an AMI for your instance. Amazon Linux 2 will then become the default AMI, which is used to launch your instance if no parameter is explicitly defined. AMI aliases Amazon Linux (default): amazonlinux-1-x86_64 Amazon Linux 2: amazonlinux-2-x86_64 Ubuntu 18.04: ubuntu-18.04-x86_64 SSM paths Amazon Linux (default): resolve:ssm:/aws/service/cloud9/amis/amazonlinux-1-x86_64 Amazon Linux 2: resolve:ssm:/aws/service/cloud9/amis/amazonlinux-2-x86_64 Ubuntu 18.04: resolve:ssm:/aws/service/cloud9/amis/ubuntu-18.04-x86_64
|
147
147
|
*/
|
148
148
|
imageId?: ImageId;
|
149
149
|
/**
|
@@ -1090,6 +1090,10 @@ declare namespace CloudFormation {
|
|
1090
1090
|
* Whether to enable termination protection on the specified stack. If a user attempts to delete a stack with termination protection enabled, the operation fails and the stack remains unchanged. For more information, see Protecting a Stack From Being Deleted in the CloudFormation User Guide. Termination protection is deactivated on stacks by default. For nested stacks, termination protection is set on the root stack and can't be changed directly on the nested stack.
|
1091
1091
|
*/
|
1092
1092
|
EnableTerminationProtection?: EnableTerminationProtection;
|
1093
|
+
/**
|
1094
|
+
* This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are retained. RetainExceptOnCreate can be specified for any resource that supports the DeletionPolicy attribute.
|
1095
|
+
*/
|
1096
|
+
RetainExceptOnCreate?: RetainExceptOnCreate;
|
1093
1097
|
}
|
1094
1098
|
export interface CreateStackInstancesInput {
|
1095
1099
|
/**
|
@@ -2006,6 +2010,10 @@ declare namespace CloudFormation {
|
|
2006
2010
|
* Preserves the state of previously provisioned resources when an operation fails. This parameter can't be specified when the OnStackFailure parameter to the CreateChangeSet API operation was specified. True - if the stack creation fails, do nothing. This is equivalent to specifying DO_NOTHING for the OnStackFailure parameter to the CreateChangeSet API operation. False - if the stack creation fails, roll back the stack. This is equivalent to specifying ROLLBACK for the OnStackFailure parameter to the CreateChangeSet API operation. Default: True
|
2007
2011
|
*/
|
2008
2012
|
DisableRollback?: DisableRollback;
|
2013
|
+
/**
|
2014
|
+
* This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are retained. RetainExceptOnCreate can be specified for any resource that supports the DeletionPolicy attribute.
|
2015
|
+
*/
|
2016
|
+
RetainExceptOnCreate?: RetainExceptOnCreate;
|
2009
2017
|
}
|
2010
2018
|
export interface ExecuteChangeSetOutput {
|
2011
2019
|
}
|
@@ -3013,6 +3021,7 @@ declare namespace CloudFormation {
|
|
3013
3021
|
export type ResourceTypes = ResourceType[];
|
3014
3022
|
export type ResourcesToImport = ResourceToImport[];
|
3015
3023
|
export type ResourcesToSkip = ResourceToSkip[];
|
3024
|
+
export type RetainExceptOnCreate = boolean;
|
3016
3025
|
export type RetainResources = LogicalResourceId[];
|
3017
3026
|
export type RetainStacks = boolean;
|
3018
3027
|
export type RetainStacksNullable = boolean;
|
@@ -3042,6 +3051,10 @@ declare namespace CloudFormation {
|
|
3042
3051
|
* A unique identifier for this RollbackStack request.
|
3043
3052
|
*/
|
3044
3053
|
ClientRequestToken?: ClientRequestToken;
|
3054
|
+
/**
|
3055
|
+
* This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are retained. RetainExceptOnCreate can be specified for any resource that supports the DeletionPolicy attribute.
|
3056
|
+
*/
|
3057
|
+
RetainExceptOnCreate?: RetainExceptOnCreate;
|
3045
3058
|
}
|
3046
3059
|
export interface RollbackStackOutput {
|
3047
3060
|
/**
|
@@ -3232,6 +3245,10 @@ declare namespace CloudFormation {
|
|
3232
3245
|
* Information about whether a stack's actual configuration differs, or has drifted, from its expected configuration, as defined in the stack template and any values specified as template parameters. For more information, see Detecting Unregulated Configuration Changes to Stacks and Resources.
|
3233
3246
|
*/
|
3234
3247
|
DriftInformation?: StackDriftInformation;
|
3248
|
+
/**
|
3249
|
+
* This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are retained. RetainExceptOnCreate can be specified for any resource that supports the DeletionPolicy attribute.
|
3250
|
+
*/
|
3251
|
+
RetainExceptOnCreate?: RetainExceptOnCreate;
|
3235
3252
|
}
|
3236
3253
|
export type StackDriftDetectionId = string;
|
3237
3254
|
export type StackDriftDetectionStatus = "DETECTION_IN_PROGRESS"|"DETECTION_FAILED"|"DETECTION_COMPLETE"|string;
|
@@ -4382,6 +4399,10 @@ declare namespace CloudFormation {
|
|
4382
4399
|
* A unique identifier for this UpdateStack request. Specify this token if you plan to retry requests so that CloudFormation knows that you're not attempting to update a stack with the same name. You might retry UpdateStack requests to ensure that CloudFormation successfully received them. All events triggered by a given stack operation are assigned the same client request token, which you can use to track operations. For example, if you execute a CreateStack operation with the token token1, then all the StackEvents generated by that operation will have ClientRequestToken set as token1. In the console, stack operations display the client request token on the Events tab. Stack operations that are initiated from the console use the token format Console-StackOperation-ID, which helps you easily identify the stack operation . For example, if you create a stack using the console, each stack event would be assigned the same token in the following format: Console-CreateStack-7f59c3cf-00d2-40c7-b2ff-e75db0987002.
|
4383
4400
|
*/
|
4384
4401
|
ClientRequestToken?: ClientRequestToken;
|
4402
|
+
/**
|
4403
|
+
* This deletion policy deletes newly created resources, but retains existing resources, when a stack operation is rolled back. This ensures new, empty, and unused resources are deleted, while critical resources and their data are retained. RetainExceptOnCreate can be specified for any resource that supports the DeletionPolicy attribute.
|
4404
|
+
*/
|
4405
|
+
RetainExceptOnCreate?: RetainExceptOnCreate;
|
4385
4406
|
}
|
4386
4407
|
export interface UpdateStackInstancesInput {
|
4387
4408
|
/**
|
@@ -22,11 +22,11 @@ declare class CloudFront extends CloudFrontCustomizations {
|
|
22
22
|
*/
|
23
23
|
associateAlias(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
|
24
24
|
/**
|
25
|
-
* Creates a staging distribution using the configuration of the provided primary distribution. A staging distribution is a copy of an existing distribution (called the primary distribution) that you can use in a continuous deployment workflow. After you create a staging distribution, you can use UpdateDistribution to modify the staging distribution's configuration. Then you can use CreateContinuousDeploymentPolicy to incrementally move traffic to the staging distribution.
|
25
|
+
* Creates a staging distribution using the configuration of the provided primary distribution. A staging distribution is a copy of an existing distribution (called the primary distribution) that you can use in a continuous deployment workflow. After you create a staging distribution, you can use UpdateDistribution to modify the staging distribution's configuration. Then you can use CreateContinuousDeploymentPolicy to incrementally move traffic to the staging distribution. This API operation requires the following IAM permissions: GetDistribution CreateDistribution CopyDistribution
|
26
26
|
*/
|
27
27
|
copyDistribution(params: CloudFront.Types.CopyDistributionRequest, callback?: (err: AWSError, data: CloudFront.Types.CopyDistributionResult) => void): Request<CloudFront.Types.CopyDistributionResult, AWSError>;
|
28
28
|
/**
|
29
|
-
* Creates a staging distribution using the configuration of the provided primary distribution. A staging distribution is a copy of an existing distribution (called the primary distribution) that you can use in a continuous deployment workflow. After you create a staging distribution, you can use UpdateDistribution to modify the staging distribution's configuration. Then you can use CreateContinuousDeploymentPolicy to incrementally move traffic to the staging distribution.
|
29
|
+
* Creates a staging distribution using the configuration of the provided primary distribution. A staging distribution is a copy of an existing distribution (called the primary distribution) that you can use in a continuous deployment workflow. After you create a staging distribution, you can use UpdateDistribution to modify the staging distribution's configuration. Then you can use CreateContinuousDeploymentPolicy to incrementally move traffic to the staging distribution. This API operation requires the following IAM permissions: GetDistribution CreateDistribution CopyDistribution
|
30
30
|
*/
|
31
31
|
copyDistribution(callback?: (err: AWSError, data: CloudFront.Types.CopyDistributionResult) => void): Request<CloudFront.Types.CopyDistributionResult, AWSError>;
|
32
32
|
/**
|
@@ -62,11 +62,11 @@ declare class CloudFront extends CloudFrontCustomizations {
|
|
62
62
|
*/
|
63
63
|
createDistribution(callback?: (err: AWSError, data: CloudFront.Types.CreateDistributionResult) => void): Request<CloudFront.Types.CreateDistributionResult, AWSError>;
|
64
64
|
/**
|
65
|
-
* Create a new distribution with tags.
|
65
|
+
* Create a new distribution with tags. This API operation requires the following IAM permissions: CreateDistribution TagResource
|
66
66
|
*/
|
67
67
|
createDistributionWithTags(params: CloudFront.Types.CreateDistributionWithTagsRequest, callback?: (err: AWSError, data: CloudFront.Types.CreateDistributionWithTagsResult) => void): Request<CloudFront.Types.CreateDistributionWithTagsResult, AWSError>;
|
68
68
|
/**
|
69
|
-
* Create a new distribution with tags.
|
69
|
+
* Create a new distribution with tags. This API operation requires the following IAM permissions: CreateDistribution TagResource
|
70
70
|
*/
|
71
71
|
createDistributionWithTags(callback?: (err: AWSError, data: CloudFront.Types.CreateDistributionWithTagsResult) => void): Request<CloudFront.Types.CreateDistributionWithTagsResult, AWSError>;
|
72
72
|
/**
|
@@ -774,11 +774,11 @@ declare class CloudFront extends CloudFrontCustomizations {
|
|
774
774
|
*/
|
775
775
|
updateDistribution(callback?: (err: AWSError, data: CloudFront.Types.UpdateDistributionResult) => void): Request<CloudFront.Types.UpdateDistributionResult, AWSError>;
|
776
776
|
/**
|
777
|
-
* Copies the staging distribution's configuration to its corresponding primary distribution. The primary distribution retains its Aliases (also known as alternate domain names or CNAMEs) and ContinuousDeploymentPolicyId value, but otherwise its configuration is overwritten to match the staging distribution. You can use this operation in a continuous deployment workflow after you have tested configuration changes on the staging distribution. After using a continuous deployment policy to move a portion of your domain name's traffic to the staging distribution and verifying that it works as intended, you can use this operation to copy the staging distribution's configuration to the primary distribution. This action will disable the continuous deployment policy and move your domain's traffic back to the primary distribution.
|
777
|
+
* Copies the staging distribution's configuration to its corresponding primary distribution. The primary distribution retains its Aliases (also known as alternate domain names or CNAMEs) and ContinuousDeploymentPolicyId value, but otherwise its configuration is overwritten to match the staging distribution. You can use this operation in a continuous deployment workflow after you have tested configuration changes on the staging distribution. After using a continuous deployment policy to move a portion of your domain name's traffic to the staging distribution and verifying that it works as intended, you can use this operation to copy the staging distribution's configuration to the primary distribution. This action will disable the continuous deployment policy and move your domain's traffic back to the primary distribution. This API operation requires the following IAM permissions: GetDistribution UpdateDistribution
|
778
778
|
*/
|
779
779
|
updateDistributionWithStagingConfig(params: CloudFront.Types.UpdateDistributionWithStagingConfigRequest, callback?: (err: AWSError, data: CloudFront.Types.UpdateDistributionWithStagingConfigResult) => void): Request<CloudFront.Types.UpdateDistributionWithStagingConfigResult, AWSError>;
|
780
780
|
/**
|
781
|
-
* Copies the staging distribution's configuration to its corresponding primary distribution. The primary distribution retains its Aliases (also known as alternate domain names or CNAMEs) and ContinuousDeploymentPolicyId value, but otherwise its configuration is overwritten to match the staging distribution. You can use this operation in a continuous deployment workflow after you have tested configuration changes on the staging distribution. After using a continuous deployment policy to move a portion of your domain name's traffic to the staging distribution and verifying that it works as intended, you can use this operation to copy the staging distribution's configuration to the primary distribution. This action will disable the continuous deployment policy and move your domain's traffic back to the primary distribution.
|
781
|
+
* Copies the staging distribution's configuration to its corresponding primary distribution. The primary distribution retains its Aliases (also known as alternate domain names or CNAMEs) and ContinuousDeploymentPolicyId value, but otherwise its configuration is overwritten to match the staging distribution. You can use this operation in a continuous deployment workflow after you have tested configuration changes on the staging distribution. After using a continuous deployment policy to move a portion of your domain name's traffic to the staging distribution and verifying that it works as intended, you can use this operation to copy the staging distribution's configuration to the primary distribution. This action will disable the continuous deployment policy and move your domain's traffic back to the primary distribution. This API operation requires the following IAM permissions: GetDistribution UpdateDistribution
|
782
782
|
*/
|
783
783
|
updateDistributionWithStagingConfig(callback?: (err: AWSError, data: CloudFront.Types.UpdateDistributionWithStagingConfigResult) => void): Request<CloudFront.Types.UpdateDistributionWithStagingConfigResult, AWSError>;
|
784
784
|
/**
|
@@ -910,7 +910,7 @@ declare namespace CloudFront {
|
|
910
910
|
}
|
911
911
|
export interface ActiveTrustedSigners {
|
912
912
|
/**
|
913
|
-
* This field is true if any of the Amazon Web Services accounts in the list
|
913
|
+
* This field is true if any of the Amazon Web Services accounts in the list are configured as trusted signers. If not, this field is false.
|
914
914
|
*/
|
915
915
|
Enabled: boolean;
|
916
916
|
/**
|
@@ -1400,6 +1400,10 @@ declare namespace CloudFront {
|
|
1400
1400
|
* A value that uniquely identifies a request to create a resource. This helps to prevent CloudFront from creating a duplicate resource if you accidentally resubmit an identical request.
|
1401
1401
|
*/
|
1402
1402
|
CallerReference: string;
|
1403
|
+
/**
|
1404
|
+
* A Boolean flag to specify the state of the staging distribution when it's created. When you set this value to True, the staging distribution is enabled. When you set this value to False, the staging distribution is disabled. If you omit this field, the default value is True.
|
1405
|
+
*/
|
1406
|
+
Enabled?: boolean;
|
1403
1407
|
}
|
1404
1408
|
export interface CopyDistributionResult {
|
1405
1409
|
Distribution?: Distribution;
|
@@ -2598,7 +2602,7 @@ declare namespace CloudFront {
|
|
2598
2602
|
*/
|
2599
2603
|
Comment: string;
|
2600
2604
|
/**
|
2601
|
-
* The function's runtime environment
|
2605
|
+
* The function's runtime environment verion.
|
2602
2606
|
*/
|
2603
2607
|
Runtime: FunctionRuntime;
|
2604
2608
|
}
|
@@ -2641,7 +2645,7 @@ declare namespace CloudFront {
|
|
2641
2645
|
LastModifiedTime: timestamp;
|
2642
2646
|
}
|
2643
2647
|
export type FunctionName = string;
|
2644
|
-
export type FunctionRuntime = "cloudfront-js-1.0"|string;
|
2648
|
+
export type FunctionRuntime = "cloudfront-js-1.0"|"cloudfront-js-2.0"|string;
|
2645
2649
|
export type FunctionStage = "DEVELOPMENT"|"LIVE"|string;
|
2646
2650
|
export interface FunctionSummary {
|
2647
2651
|
/**
|
@@ -4940,7 +4944,7 @@ declare namespace CloudFront {
|
|
4940
4944
|
}
|
4941
4945
|
export interface TrustedSigners {
|
4942
4946
|
/**
|
4943
|
-
* This field is true if any of the Amazon Web Services accounts
|
4947
|
+
* This field is true if any of the Amazon Web Services accounts in the list are configured as trusted signers. If not, this field is false.
|
4944
4948
|
*/
|
4945
4949
|
Enabled: boolean;
|
4946
4950
|
/**
|
@@ -407,7 +407,7 @@ declare namespace CloudTrail {
|
|
407
407
|
export type AdvancedEventSelectors = AdvancedEventSelector[];
|
408
408
|
export interface AdvancedFieldSelector {
|
409
409
|
/**
|
410
|
-
* A field in a CloudTrail event record on which to filter events to be logged. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include readOnly, eventCategory, eventSource (for management events), eventName, resources.type, and resources.ARN. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is eventCategory. readOnly - Optional. Can be set to Equals a value of true or false. If you do not add this field, CloudTrail logs both read and write events. A value of true logs only read events. A value of false logs only write events. eventSource - For filtering management events only. This can be set only to NotEquals kms.amazonaws.com. eventName - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as PutBucket or GetSnapshotBlock. You can have multiple values for this field, separated by commas. eventCategory - This is required and must be set to Equals. For CloudTrail event records, the value must be Management or Data. For Config configuration items, the value must be ConfigurationItem. For Audit Manager evidence, the value must be Evidence. For non-Amazon Web Services events, the value must be ActivityAuditLog. resources.type - This field is required for CloudTrail data events. resources.type can only use the Equals operator, and the value can be one of the following: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Node AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object You can have only one resources.type field per selector. To log data events on more than one resource type, add another selector. resources.ARN - You can use any operator with resources.ARN, but if you use Equals or NotEquals, the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals AWS::S3::Object, the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the StartsWith operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. arn:<partition>:s3:::<bucket_name>/ arn:<partition>:s3:::<bucket_name>/<object_path>/ When resources.type equals AWS::DynamoDB::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name> When resources.type equals AWS::Lambda::Function, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:lambda:<region>:<account_ID>:function:<function_name> When resources.type equals AWS::CloudTrail::Channel, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID> When resources.type equals AWS::CodeWhisperer::Profile, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID> When resources.type equals AWS::Cognito::IdentityPool, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID> When resources.type equals AWS::DynamoDB::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time> When resources.type equals AWS::EC2::Snapshot, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:ec2:<region>::snapshot/<snapshot_ID> When resources.type equals AWS::EMRWAL::Workspace, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:emrwal:<region>::workspace/<workspace_name> When resources.type equals AWS::FinSpace::Environment, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID> When resources.type equals AWS::Glue::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name> When resources.type equals AWS::GuardDuty::Detector, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID> When resources.type equals AWS::KendraRanking::ExecutionPlan, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID> When resources.type equals AWS::ManagedBlockchain::Node, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID> When resources.type equals AWS::SageMaker::ExperimentTrialComponent, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name> When resources.type equals AWS::SageMaker::FeatureGroup, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name> When resources.type equals AWS::S3::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the StartsWith or NotStartsWith operators. arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name> arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path> When resources.type equals AWS::S3ObjectLambda::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name> When resources.type equals AWS::S3Outposts::Object, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>
|
410
|
+
* A field in a CloudTrail event record on which to filter events to be logged. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include readOnly, eventCategory, eventSource (for management events), eventName, resources.type, and resources.ARN. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is eventCategory. readOnly - Optional. Can be set to Equals a value of true or false. If you do not add this field, CloudTrail logs both read and write events. A value of true logs only read events. A value of false logs only write events. eventSource - For filtering management events only. This can be set only to NotEquals kms.amazonaws.com. eventName - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as PutBucket or GetSnapshotBlock. You can have multiple values for this field, separated by commas. eventCategory - This is required and must be set to Equals. For CloudTrail event records, the value must be Management or Data. For Config configuration items, the value must be ConfigurationItem. For Audit Manager evidence, the value must be Evidence. For non-Amazon Web Services events, the value must be ActivityAuditLog. resources.type - This field is required for CloudTrail data events. resources.type can only use the Equals operator, and the value can be one of the following: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Network AWS::ManagedBlockchain::Node AWS::MedicalImaging::Datastore AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object AWS::SSMMessages::ControlChannel AWS::VerifiedPermissions::PolicyStore You can have only one resources.type field per selector. To log data events on more than one resource type, add another selector. resources.ARN - You can use any operator with resources.ARN, but if you use Equals or NotEquals, the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals AWS::S3::Object, the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the StartsWith operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. arn:<partition>:s3:::<bucket_name>/ arn:<partition>:s3:::<bucket_name>/<object_path>/ When resources.type equals AWS::DynamoDB::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name> When resources.type equals AWS::Lambda::Function, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:lambda:<region>:<account_ID>:function:<function_name> When resources.type equals AWS::CloudTrail::Channel, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID> When resources.type equals AWS::CodeWhisperer::Profile, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID> When resources.type equals AWS::Cognito::IdentityPool, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID> When resources.type equals AWS::DynamoDB::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time> When resources.type equals AWS::EC2::Snapshot, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:ec2:<region>::snapshot/<snapshot_ID> When resources.type equals AWS::EMRWAL::Workspace, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:emrwal:<region>::workspace/<workspace_name> When resources.type equals AWS::FinSpace::Environment, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID> When resources.type equals AWS::Glue::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name> When resources.type equals AWS::GuardDuty::Detector, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID> When resources.type equals AWS::KendraRanking::ExecutionPlan, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID> When resources.type equals AWS::ManagedBlockchain::Network, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:managedblockchain:::networks/<network_name> When resources.type equals AWS::ManagedBlockchain::Node, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID> When resources.type equals AWS::MedicalImaging::Datastore, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID> When resources.type equals AWS::SageMaker::ExperimentTrialComponent, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name> When resources.type equals AWS::SageMaker::FeatureGroup, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name> When resources.type equals AWS::S3::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the StartsWith or NotStartsWith operators. arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name> arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path> When resources.type equals AWS::S3ObjectLambda::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name> When resources.type equals AWS::S3Outposts::Object, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path> When resources.type equals AWS::SSMMessages::ControlChannel, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID> When resources.type equals AWS::VerifiedPermissions::PolicyStore, and the operator is set to Equals or NotEquals, the ARN must be in the following format: arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>
|
411
411
|
*/
|
412
412
|
Field: SelectorField;
|
413
413
|
/**
|
@@ -523,7 +523,7 @@ declare namespace CloudTrail {
|
|
523
523
|
*/
|
524
524
|
OrganizationEnabled?: Boolean;
|
525
525
|
/**
|
526
|
-
* The retention period of the event data store, in days. You can set a retention period of up to 2557 days, the equivalent of seven years.
|
526
|
+
* The retention period of the event data store, in days. You can set a retention period of up to 2557 days, the equivalent of seven years. CloudTrail Lake determines whether to retain an event by checking if the eventTime of the event is within the specified retention period. For example, if you set a retention period of 90 days, CloudTrail will remove events when the eventTime is older than 90 days. If you plan to copy trail events to this event data store, we recommend that you consider both the age of the events that you want to copy as well as how long you want to keep the copied events in your event data store. For example, if you copy trail events that are 5 years old and specify a retention period of 7 years, the event data store will retain those events for two years.
|
527
527
|
*/
|
528
528
|
RetentionPeriod?: RetentionPeriod;
|
529
529
|
/**
|
@@ -690,7 +690,7 @@ declare namespace CloudTrail {
|
|
690
690
|
}
|
691
691
|
export interface DataResource {
|
692
692
|
/**
|
693
|
-
* The resource type in which you want to log data events. You can specify the following basic event selector resource types: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object The following resource types are also available through advanced event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see AdvancedFieldSelector. AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Node AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object
|
693
|
+
* The resource type in which you want to log data events. You can specify the following basic event selector resource types: AWS::DynamoDB::Table AWS::Lambda::Function AWS::S3::Object The following resource types are also available through advanced event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see AdvancedFieldSelector. AWS::CloudTrail::Channel AWS::CodeWhisperer::Profile AWS::Cognito::IdentityPool AWS::DynamoDB::Stream AWS::EC2::Snapshot AWS::EMRWAL::Workspace AWS::FinSpace::Environment AWS::Glue::Table AWS::GuardDuty::Detector AWS::KendraRanking::ExecutionPlan AWS::ManagedBlockchain::Network AWS::ManagedBlockchain::Node AWS::MedicalImaging::Datastore AWS::SageMaker::ExperimentTrialComponent AWS::SageMaker::FeatureGroup AWS::S3::AccessPoint AWS::S3ObjectLambda::AccessPoint AWS::S3Outposts::Object AWS::SSMMessages::ControlChannel AWS::VerifiedPermissions::PolicyStore
|
694
694
|
*/
|
695
695
|
Type?: String;
|
696
696
|
/**
|
@@ -2169,7 +2169,7 @@ declare namespace CloudTrail {
|
|
2169
2169
|
*/
|
2170
2170
|
OrganizationEnabled?: Boolean;
|
2171
2171
|
/**
|
2172
|
-
* The retention period, in days.
|
2172
|
+
* The retention period of the event data store, in days. You can set a retention period of up to 2557 days, the equivalent of seven years. CloudTrail Lake determines whether to retain an event by checking if the eventTime of the event is within the specified retention period. For example, if you set a retention period of 90 days, CloudTrail will remove events when the eventTime is older than 90 days. If you decrease the retention period of an event data store, CloudTrail will remove any events with an eventTime older than the new retention period. For example, if the previous retention period was 365 days and you decrease it to 100 days, CloudTrail will remove events with an eventTime older than 100 days.
|
2173
2173
|
*/
|
2174
2174
|
RetentionPeriod?: RetentionPeriod;
|
2175
2175
|
/**
|
@@ -735,7 +735,7 @@ declare namespace CloudWatch {
|
|
735
735
|
*/
|
736
736
|
AlarmNamePrefix?: AlarmNamePrefix;
|
737
737
|
/**
|
738
|
-
* Use this parameter to specify whether you want the operation to return metric alarms or composite alarms. If you omit this parameter, only metric alarms are returned.
|
738
|
+
* Use this parameter to specify whether you want the operation to return metric alarms or composite alarms. If you omit this parameter, only metric alarms are returned, even if composite alarms exist in the account. For example, if you omit this parameter or specify MetricAlarms, the operation returns only a list of metric alarms. It does not return any composite alarms, even if composite alarms exist in the account. If you specify CompositeAlarms, the operation returns only a list of composite alarms, and does not return any metric alarms.
|
739
739
|
*/
|
740
740
|
AlarmTypes?: AlarmTypes;
|
741
741
|
/**
|
@@ -948,7 +948,7 @@ declare namespace CloudWatch {
|
|
948
948
|
*/
|
949
949
|
Metrics?: InsightRuleMetricList;
|
950
950
|
/**
|
951
|
-
* Determines what statistic to use to rank the contributors. Valid values are
|
951
|
+
* Determines what statistic to use to rank the contributors. Valid values are Sum and Maximum.
|
952
952
|
*/
|
953
953
|
OrderBy?: InsightRuleOrderBy;
|
954
954
|
}
|
@@ -1369,7 +1369,7 @@ declare namespace CloudWatch {
|
|
1369
1369
|
}
|
1370
1370
|
export interface ListTagsForResourceInput {
|
1371
1371
|
/**
|
1372
|
-
* The ARN of the CloudWatch resource that you want to view tags for. The ARN format of an alarm is arn:aws:cloudwatch:Region:account-id:alarm:alarm-name The ARN format of a Contributor Insights rule is arn:aws:cloudwatch:Region:account-id:insight-rule
|
1372
|
+
* The ARN of the CloudWatch resource that you want to view tags for. The ARN format of an alarm is arn:aws:cloudwatch:Region:account-id:alarm:alarm-name The ARN format of a Contributor Insights rule is arn:aws:cloudwatch:Region:account-id:insight-rule/insight-rule-name For more information about ARN format, see Resource Types Defined by Amazon CloudWatch in the Amazon Web Services General Reference.
|
1373
1373
|
*/
|
1374
1374
|
ResourceARN: AmazonResourceName;
|
1375
1375
|
}
|
@@ -1954,7 +1954,7 @@ declare namespace CloudWatch {
|
|
1954
1954
|
*/
|
1955
1955
|
Statistic?: Statistic;
|
1956
1956
|
/**
|
1957
|
-
* The
|
1957
|
+
* The extended statistic for the metric specified in MetricName. When you call PutMetricAlarm and specify a MetricName, you must specify either Statistic or ExtendedStatistic but not both. If you specify ExtendedStatistic, the following are valid values: p90 tm90 tc90 ts90 wm90 IQM PR(n:m) where n and m are values of the metric TC(X%:X%) where X is between 10 and 90 inclusive. TM(X%:X%) where X is between 10 and 90 inclusive. TS(X%:X%) where X is between 10 and 90 inclusive. WM(X%:X%) where X is between 10 and 90 inclusive. For more information about these extended statistics, see CloudWatch statistics definitions.
|
1958
1958
|
*/
|
1959
1959
|
ExtendedStatistic?: ExtendedStatistic;
|
1960
1960
|
/**
|
@@ -1998,7 +1998,7 @@ declare namespace CloudWatch {
|
|
1998
1998
|
*/
|
1999
1999
|
Metrics?: MetricDataQueries;
|
2000
2000
|
/**
|
2001
|
-
* A list of key-value pairs to associate with the alarm. You can associate as many as 50 tags with an alarm. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. If you are using this operation to update an existing alarm, any tags you specify in this parameter are ignored. To change the tags of an existing alarm, use TagResource or UntagResource.
|
2001
|
+
* A list of key-value pairs to associate with the alarm. You can associate as many as 50 tags with an alarm. To be able to associate tags with the alarm when you create the alarm, you must have the cloudwatch:TagResource permission. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. If you are using this operation to update an existing alarm, any tags you specify in this parameter are ignored. To change the tags of an existing alarm, use TagResource or UntagResource.
|
2002
2002
|
*/
|
2003
2003
|
Tags?: TagList;
|
2004
2004
|
/**
|
@@ -2171,7 +2171,7 @@ declare namespace CloudWatch {
|
|
2171
2171
|
export type TagList = Tag[];
|
2172
2172
|
export interface TagResourceInput {
|
2173
2173
|
/**
|
2174
|
-
* The ARN of the CloudWatch resource that you're adding tags to. The ARN format of an alarm is arn:aws:cloudwatch:Region:account-id:alarm:alarm-name The ARN format of a Contributor Insights rule is arn:aws:cloudwatch:Region:account-id:insight-rule
|
2174
|
+
* The ARN of the CloudWatch resource that you're adding tags to. The ARN format of an alarm is arn:aws:cloudwatch:Region:account-id:alarm:alarm-name The ARN format of a Contributor Insights rule is arn:aws:cloudwatch:Region:account-id:insight-rule/insight-rule-name For more information about ARN format, see Resource Types Defined by Amazon CloudWatch in the Amazon Web Services General Reference.
|
2175
2175
|
*/
|
2176
2176
|
ResourceARN: AmazonResourceName;
|
2177
2177
|
/**
|
@@ -2189,7 +2189,7 @@ declare namespace CloudWatch {
|
|
2189
2189
|
export type TreatMissingData = string;
|
2190
2190
|
export interface UntagResourceInput {
|
2191
2191
|
/**
|
2192
|
-
* The ARN of the CloudWatch resource that you're removing tags from. The ARN format of an alarm is arn:aws:cloudwatch:Region:account-id:alarm:alarm-name The ARN format of a Contributor Insights rule is arn:aws:cloudwatch:Region:account-id:insight-rule
|
2192
|
+
* The ARN of the CloudWatch resource that you're removing tags from. The ARN format of an alarm is arn:aws:cloudwatch:Region:account-id:alarm:alarm-name The ARN format of a Contributor Insights rule is arn:aws:cloudwatch:Region:account-id:insight-rule/insight-rule-name For more information about ARN format, see Resource Types Defined by Amazon CloudWatch in the Amazon Web Services General Reference.
|
2193
2193
|
*/
|
2194
2194
|
ResourceARN: AmazonResourceName;
|
2195
2195
|
/**
|
@@ -340,11 +340,11 @@ declare class CloudWatchEvents extends Service {
|
|
340
340
|
*/
|
341
341
|
putRule(callback?: (err: AWSError, data: CloudWatchEvents.Types.PutRuleResponse) => void): Request<CloudWatchEvents.Types.PutRuleResponse, AWSError>;
|
342
342
|
/**
|
343
|
-
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: API destination Amazon API Gateway REST API endpoints API Gateway Batch job queue CloudWatch Logs group CodeBuild project CodePipeline Amazon EC2 CreateSnapshot API call Amazon EC2 RebootInstances API call Amazon EC2 StopInstances API call Amazon EC2 TerminateInstances API call Amazon ECS tasks Event bus in a different Amazon Web Services account or Region. You can use an event bus in the US East (N. Virginia) us-east-1, US West (Oregon) us-west-2, or Europe (Ireland) eu-west-1 Regions as a target for a rule. Firehose delivery stream (Kinesis Data Firehose) Inspector assessment template (Amazon Inspector) Kinesis stream (Kinesis Data Stream) Lambda function Redshift clusters (Data API statement execution) Amazon SNS topic Amazon SQS queues (includes FIFO queues SSM Automation SSM OpsItem SSM Run Command Step Functions state machines Creating rules with built-in targets is supported only in the Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge needs the appropriate permissions. For Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis Data Streams, Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another Amazon Web Services account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different Amazon Web Services account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between Amazon Web Services Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
343
|
+
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: API destination Amazon API Gateway REST API endpoints API Gateway Batch job queue CloudWatch Logs group CodeBuild project CodePipeline Amazon EC2 CreateSnapshot API call Amazon EC2 RebootInstances API call Amazon EC2 StopInstances API call Amazon EC2 TerminateInstances API call Amazon ECS tasks Event bus in a different Amazon Web Services account or Region. You can use an event bus in the US East (N. Virginia) us-east-1, US West (Oregon) us-west-2, or Europe (Ireland) eu-west-1 Regions as a target for a rule. Firehose delivery stream (Kinesis Data Firehose) Inspector assessment template (Amazon Inspector) Kinesis stream (Kinesis Data Stream) Lambda function Redshift clusters (Data API statement execution) Amazon SNS topic Amazon SQS queues (includes FIFO queues SSM Automation SSM OpsItem SSM Run Command Step Functions state machines Creating rules with built-in targets is supported only in the Amazon Web Services Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge needs the appropriate permissions. For Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis Data Streams, Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another Amazon Web Services account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different Amazon Web Services account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between Amazon Web Services Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
344
344
|
*/
|
345
345
|
putTargets(params: CloudWatchEvents.Types.PutTargetsRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.PutTargetsResponse) => void): Request<CloudWatchEvents.Types.PutTargetsResponse, AWSError>;
|
346
346
|
/**
|
347
|
-
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: API destination Amazon API Gateway REST API endpoints API Gateway Batch job queue CloudWatch Logs group CodeBuild project CodePipeline Amazon EC2 CreateSnapshot API call Amazon EC2 RebootInstances API call Amazon EC2 StopInstances API call Amazon EC2 TerminateInstances API call Amazon ECS tasks Event bus in a different Amazon Web Services account or Region. You can use an event bus in the US East (N. Virginia) us-east-1, US West (Oregon) us-west-2, or Europe (Ireland) eu-west-1 Regions as a target for a rule. Firehose delivery stream (Kinesis Data Firehose) Inspector assessment template (Amazon Inspector) Kinesis stream (Kinesis Data Stream) Lambda function Redshift clusters (Data API statement execution) Amazon SNS topic Amazon SQS queues (includes FIFO queues SSM Automation SSM OpsItem SSM Run Command Step Functions state machines Creating rules with built-in targets is supported only in the Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge needs the appropriate permissions. For Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis Data Streams, Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another Amazon Web Services account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different Amazon Web Services account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between Amazon Web Services Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
347
|
+
* Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for Events: API destination Amazon API Gateway REST API endpoints API Gateway Batch job queue CloudWatch Logs group CodeBuild project CodePipeline Amazon EC2 CreateSnapshot API call Amazon EC2 RebootInstances API call Amazon EC2 StopInstances API call Amazon EC2 TerminateInstances API call Amazon ECS tasks Event bus in a different Amazon Web Services account or Region. You can use an event bus in the US East (N. Virginia) us-east-1, US West (Oregon) us-west-2, or Europe (Ireland) eu-west-1 Regions as a target for a rule. Firehose delivery stream (Kinesis Data Firehose) Inspector assessment template (Amazon Inspector) Kinesis stream (Kinesis Data Stream) Lambda function Redshift clusters (Data API statement execution) Amazon SNS topic Amazon SQS queues (includes FIFO queues SSM Automation SSM OpsItem SSM Run Command Step Functions state machines Creating rules with built-in targets is supported only in the Amazon Web Services Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon EventBridge needs the appropriate permissions. For Lambda and Amazon SNS resources, EventBridge relies on resource-based policies. For EC2 instances, Kinesis Data Streams, Step Functions state machines and API Gateway REST APIs, EventBridge relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon EventBridge User Guide. If another Amazon Web Services account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon EventBridge Pricing. Input, InputPath, and InputTransformer are not available with PutTarget if the target is an event bus of a different Amazon Web Services account. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between Amazon Web Services Accounts in the Amazon EventBridge User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
|
348
348
|
*/
|
349
349
|
putTargets(callback?: (err: AWSError, data: CloudWatchEvents.Types.PutTargetsResponse) => void): Request<CloudWatchEvents.Types.PutTargetsResponse, AWSError>;
|
350
350
|
/**
|