cdk-lambda-subminute 2.0.292 → 2.0.294
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- package/.jsii +3 -3
- package/lib/cdk-lambda-subminute.js +3 -3
- package/node_modules/aws-sdk/CHANGELOG.md +27 -1
- package/node_modules/aws-sdk/README.md +1 -1
- package/node_modules/aws-sdk/apis/cloudformation-2010-05-15.min.json +48 -47
- package/node_modules/aws-sdk/apis/cloudtrail-2013-11-01.min.json +11 -8
- package/node_modules/aws-sdk/apis/comprehend-2017-11-27.min.json +55 -0
- package/node_modules/aws-sdk/apis/connect-2017-08-08.min.json +7 -0
- package/node_modules/aws-sdk/apis/connectcases-2022-10-03.min.json +29 -16
- package/node_modules/aws-sdk/apis/ec2-2016-11-15.min.json +140 -82
- package/node_modules/aws-sdk/apis/eks-2017-11-01.min.json +242 -39
- package/node_modules/aws-sdk/apis/guardduty-2017-11-28.min.json +217 -52
- package/node_modules/aws-sdk/apis/logs-2014-03-28.min.json +372 -26
- package/node_modules/aws-sdk/apis/logs-2014-03-28.paginators.json +18 -0
- package/node_modules/aws-sdk/apis/models.lex.v2-2020-08-07.min.json +82 -76
- package/node_modules/aws-sdk/apis/omics-2022-11-28.min.json +26 -24
- package/node_modules/aws-sdk/apis/redshift-serverless-2021-04-21.min.json +9 -0
- package/node_modules/aws-sdk/apis/resiliencehub-2020-04-30.min.json +48 -24
- package/node_modules/aws-sdk/apis/sqs-2012-11-05.min.json +46 -117
- package/node_modules/aws-sdk/apis/sqs-2012-11-05.paginators.json +3 -3
- package/node_modules/aws-sdk/clients/cloudformation.d.ts +15 -10
- package/node_modules/aws-sdk/clients/cloudtrail.d.ts +50 -22
- package/node_modules/aws-sdk/clients/cloudwatchlogs.d.ts +422 -2
- package/node_modules/aws-sdk/clients/comprehend.d.ts +73 -19
- package/node_modules/aws-sdk/clients/connect.d.ts +6 -2
- package/node_modules/aws-sdk/clients/connectcases.d.ts +17 -2
- package/node_modules/aws-sdk/clients/ec2.d.ts +65 -0
- package/node_modules/aws-sdk/clients/eks.d.ts +221 -9
- package/node_modules/aws-sdk/clients/guardduty.d.ts +168 -2
- package/node_modules/aws-sdk/clients/lambda.d.ts +8 -8
- package/node_modules/aws-sdk/clients/lexmodelsv2.d.ts +8 -0
- package/node_modules/aws-sdk/clients/omics.d.ts +22 -4
- package/node_modules/aws-sdk/clients/rds.d.ts +2 -2
- package/node_modules/aws-sdk/clients/redshiftserverless.d.ts +12 -0
- package/node_modules/aws-sdk/clients/resiliencehub.d.ts +40 -2
- package/node_modules/aws-sdk/clients/sqs.d.ts +13 -12
- package/node_modules/aws-sdk/dist/aws-sdk-core-react-native.js +1 -1
- package/node_modules/aws-sdk/dist/aws-sdk-react-native.js +17 -17
- package/node_modules/aws-sdk/dist/aws-sdk.js +703 -285
- package/node_modules/aws-sdk/dist/aws-sdk.min.js +91 -91
- package/node_modules/aws-sdk/lib/core.js +1 -1
- package/node_modules/aws-sdk/package.json +1 -1
- package/package.json +3 -4
| @@ -140,11 +140,11 @@ declare class CloudTrail extends Service { | |
| 140 140 | 
             
               */
         | 
| 141 141 | 
             
              getImport(callback?: (err: AWSError, data: CloudTrail.Types.GetImportResponse) => void): Request<CloudTrail.Types.GetImportResponse, AWSError>;
         | 
| 142 142 | 
             
              /**
         | 
| 143 | 
            -
               * Describes the settings for the Insights event selectors that you configured for your trail. GetInsightSelectors shows if CloudTrail Insights event logging is enabled on the trail, and if it is, which  | 
| 143 | 
            +
               * Describes the settings for the Insights event selectors that you configured for your trail or event data store. GetInsightSelectors shows if CloudTrail Insights event logging is enabled on the trail or event data store, and if it is, which Insights types are enabled. If you run GetInsightSelectors on a trail or event data store that does not have Insights events enabled, the operation throws the exception InsightNotEnabledException  Specify either the EventDataStore parameter to get Insights event selectors for an event data store, or the TrailName parameter to the get Insights event selectors for a trail. You cannot specify these parameters together. For more information, see Logging CloudTrail Insights events in the CloudTrail User Guide.
         | 
| 144 144 | 
             
               */
         | 
| 145 145 | 
             
              getInsightSelectors(params: CloudTrail.Types.GetInsightSelectorsRequest, callback?: (err: AWSError, data: CloudTrail.Types.GetInsightSelectorsResponse) => void): Request<CloudTrail.Types.GetInsightSelectorsResponse, AWSError>;
         | 
| 146 146 | 
             
              /**
         | 
| 147 | 
            -
               * Describes the settings for the Insights event selectors that you configured for your trail. GetInsightSelectors shows if CloudTrail Insights event logging is enabled on the trail, and if it is, which  | 
| 147 | 
            +
               * Describes the settings for the Insights event selectors that you configured for your trail or event data store. GetInsightSelectors shows if CloudTrail Insights event logging is enabled on the trail or event data store, and if it is, which Insights types are enabled. If you run GetInsightSelectors on a trail or event data store that does not have Insights events enabled, the operation throws the exception InsightNotEnabledException  Specify either the EventDataStore parameter to get Insights event selectors for an event data store, or the TrailName parameter to the get Insights event selectors for a trail. You cannot specify these parameters together. For more information, see Logging CloudTrail Insights events in the CloudTrail User Guide.
         | 
| 148 148 | 
             
               */
         | 
| 149 149 | 
             
              getInsightSelectors(callback?: (err: AWSError, data: CloudTrail.Types.GetInsightSelectorsResponse) => void): Request<CloudTrail.Types.GetInsightSelectorsResponse, AWSError>;
         | 
| 150 150 | 
             
              /**
         | 
| @@ -244,11 +244,11 @@ declare class CloudTrail extends Service { | |
| 244 244 | 
             
               */
         | 
| 245 245 | 
             
              listTrails(callback?: (err: AWSError, data: CloudTrail.Types.ListTrailsResponse) => void): Request<CloudTrail.Types.ListTrailsResponse, AWSError>;
         | 
| 246 246 | 
             
              /**
         | 
| 247 | 
            -
               * Looks up management events or CloudTrail Insights events that are captured by CloudTrail. You can look up events that occurred in a Region within the last 90 days. Lookup supports the following attributes for management events:   Amazon Web Services access key   Event ID   Event name   Event source   Read only   Resource name   Resource type   User name   Lookup supports the following attributes for Insights events:   Event ID   Event name   Event source   All attributes are optional. The default number of results returned is 50, with a maximum of 50 possible. The response includes a token that you can use to get the next page of results.  The rate of lookup requests is limited to two per second, per account, per Region. If this limit is exceeded, a throttling error occurs. 
         | 
| 247 | 
            +
               * Looks up management events or CloudTrail Insights events that are captured by CloudTrail. You can look up events that occurred in a Region within the last 90 days.   LookupEvents returns recent Insights events for trails that enable Insights. To view Insights events for an event data store, you can run queries on your Insights event data store, and you can also view the Lake dashboard for Insights.  Lookup supports the following attributes for management events:   Amazon Web Services access key   Event ID   Event name   Event source   Read only   Resource name   Resource type   User name   Lookup supports the following attributes for Insights events:   Event ID   Event name   Event source   All attributes are optional. The default number of results returned is 50, with a maximum of 50 possible. The response includes a token that you can use to get the next page of results.  The rate of lookup requests is limited to two per second, per account, per Region. If this limit is exceeded, a throttling error occurs. 
         | 
| 248 248 | 
             
               */
         | 
| 249 249 | 
             
              lookupEvents(params: CloudTrail.Types.LookupEventsRequest, callback?: (err: AWSError, data: CloudTrail.Types.LookupEventsResponse) => void): Request<CloudTrail.Types.LookupEventsResponse, AWSError>;
         | 
| 250 250 | 
             
              /**
         | 
| 251 | 
            -
               * Looks up management events or CloudTrail Insights events that are captured by CloudTrail. You can look up events that occurred in a Region within the last 90 days. Lookup supports the following attributes for management events:   Amazon Web Services access key   Event ID   Event name   Event source   Read only   Resource name   Resource type   User name   Lookup supports the following attributes for Insights events:   Event ID   Event name   Event source   All attributes are optional. The default number of results returned is 50, with a maximum of 50 possible. The response includes a token that you can use to get the next page of results.  The rate of lookup requests is limited to two per second, per account, per Region. If this limit is exceeded, a throttling error occurs. 
         | 
| 251 | 
            +
               * Looks up management events or CloudTrail Insights events that are captured by CloudTrail. You can look up events that occurred in a Region within the last 90 days.   LookupEvents returns recent Insights events for trails that enable Insights. To view Insights events for an event data store, you can run queries on your Insights event data store, and you can also view the Lake dashboard for Insights.  Lookup supports the following attributes for management events:   Amazon Web Services access key   Event ID   Event name   Event source   Read only   Resource name   Resource type   User name   Lookup supports the following attributes for Insights events:   Event ID   Event name   Event source   All attributes are optional. The default number of results returned is 50, with a maximum of 50 possible. The response includes a token that you can use to get the next page of results.  The rate of lookup requests is limited to two per second, per account, per Region. If this limit is exceeded, a throttling error occurs. 
         | 
| 252 252 | 
             
               */
         | 
| 253 253 | 
             
              lookupEvents(callback?: (err: AWSError, data: CloudTrail.Types.LookupEventsResponse) => void): Request<CloudTrail.Types.LookupEventsResponse, AWSError>;
         | 
| 254 254 | 
             
              /**
         | 
| @@ -260,11 +260,11 @@ declare class CloudTrail extends Service { | |
| 260 260 | 
             
               */
         | 
| 261 261 | 
             
              putEventSelectors(callback?: (err: AWSError, data: CloudTrail.Types.PutEventSelectorsResponse) => void): Request<CloudTrail.Types.PutEventSelectorsResponse, AWSError>;
         | 
| 262 262 | 
             
              /**
         | 
| 263 | 
            -
               * Lets you enable Insights event logging by specifying the Insights selectors that you want to enable on an existing trail. You also use PutInsightSelectors to turn off Insights event logging, by passing an empty list of  | 
| 263 | 
            +
               * Lets you enable Insights event logging by specifying the Insights selectors that you want to enable on an existing trail or event data store. You also use PutInsightSelectors to turn off Insights event logging, by passing an empty list of Insights types. The valid Insights event types are ApiErrorRateInsight and ApiCallRateInsight. To enable Insights on an event data store, you must specify the ARNs (or ID suffix of the ARNs) for the source event data store (EventDataStore) and the destination event data store (InsightsDestination). The source event data store logs management events and enables Insights. The destination event data store logs Insights events based upon the management event activity of the source event data store. The source and destination event data stores must belong to the same Amazon Web Services account. To log Insights events for a trail, you must specify the name (TrailName) of the CloudTrail trail for which you want to change or add Insights selectors. To log CloudTrail Insights events on API call volume, the trail or event data store must log write management events. To log CloudTrail Insights events on API error rate, the trail or event data store must log read or write management events. You can call GetEventSelectors on a trail to check whether the trail logs management events. You can call GetEventDataStore on an event data store to check whether the event data store logs management events. For more information, see Logging CloudTrail Insights events in the CloudTrail User Guide.
         | 
| 264 264 | 
             
               */
         | 
| 265 265 | 
             
              putInsightSelectors(params: CloudTrail.Types.PutInsightSelectorsRequest, callback?: (err: AWSError, data: CloudTrail.Types.PutInsightSelectorsResponse) => void): Request<CloudTrail.Types.PutInsightSelectorsResponse, AWSError>;
         | 
| 266 266 | 
             
              /**
         | 
| 267 | 
            -
               * Lets you enable Insights event logging by specifying the Insights selectors that you want to enable on an existing trail. You also use PutInsightSelectors to turn off Insights event logging, by passing an empty list of  | 
| 267 | 
            +
               * Lets you enable Insights event logging by specifying the Insights selectors that you want to enable on an existing trail or event data store. You also use PutInsightSelectors to turn off Insights event logging, by passing an empty list of Insights types. The valid Insights event types are ApiErrorRateInsight and ApiCallRateInsight. To enable Insights on an event data store, you must specify the ARNs (or ID suffix of the ARNs) for the source event data store (EventDataStore) and the destination event data store (InsightsDestination). The source event data store logs management events and enables Insights. The destination event data store logs Insights events based upon the management event activity of the source event data store. The source and destination event data stores must belong to the same Amazon Web Services account. To log Insights events for a trail, you must specify the name (TrailName) of the CloudTrail trail for which you want to change or add Insights selectors. To log CloudTrail Insights events on API call volume, the trail or event data store must log write management events. To log CloudTrail Insights events on API error rate, the trail or event data store must log read or write management events. You can call GetEventSelectors on a trail to check whether the trail logs management events. You can call GetEventDataStore on an event data store to check whether the event data store logs management events. For more information, see Logging CloudTrail Insights events in the CloudTrail User Guide.
         | 
| 268 268 | 
             
               */
         | 
| 269 269 | 
             
              putInsightSelectors(callback?: (err: AWSError, data: CloudTrail.Types.PutInsightSelectorsResponse) => void): Request<CloudTrail.Types.PutInsightSelectorsResponse, AWSError>;
         | 
| 270 270 | 
             
              /**
         | 
| @@ -364,11 +364,11 @@ declare class CloudTrail extends Service { | |
| 364 364 | 
             
               */
         | 
| 365 365 | 
             
              updateChannel(callback?: (err: AWSError, data: CloudTrail.Types.UpdateChannelResponse) => void): Request<CloudTrail.Types.UpdateChannelResponse, AWSError>;
         | 
| 366 366 | 
             
              /**
         | 
| 367 | 
            -
               * Updates an event data store. The required EventDataStore value is an ARN or the ID portion of the ARN. Other parameters are optional, but at least one optional parameter must be specified, or CloudTrail throws an error. RetentionPeriod is in days, and valid values are integers between 90 and 2557. By default, TerminationProtection is enabled. For event data stores for CloudTrail events, AdvancedEventSelectors includes or excludes management  | 
| 367 | 
            +
               * Updates an event data store. The required EventDataStore value is an ARN or the ID portion of the ARN. Other parameters are optional, but at least one optional parameter must be specified, or CloudTrail throws an error. RetentionPeriod is in days, and valid values are integers between 90 and 2557. By default, TerminationProtection is enabled. For event data stores for CloudTrail events, AdvancedEventSelectors includes or excludes management, data, or Insights events in your event data store. For more information about AdvancedEventSelectors, see AdvancedEventSelectors.  For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, AdvancedEventSelectors includes events of that type in your event data store.
         | 
| 368 368 | 
             
               */
         | 
| 369 369 | 
             
              updateEventDataStore(params: CloudTrail.Types.UpdateEventDataStoreRequest, callback?: (err: AWSError, data: CloudTrail.Types.UpdateEventDataStoreResponse) => void): Request<CloudTrail.Types.UpdateEventDataStoreResponse, AWSError>;
         | 
| 370 370 | 
             
              /**
         | 
| 371 | 
            -
               * Updates an event data store. The required EventDataStore value is an ARN or the ID portion of the ARN. Other parameters are optional, but at least one optional parameter must be specified, or CloudTrail throws an error. RetentionPeriod is in days, and valid values are integers between 90 and 2557. By default, TerminationProtection is enabled. For event data stores for CloudTrail events, AdvancedEventSelectors includes or excludes management  | 
| 371 | 
            +
               * Updates an event data store. The required EventDataStore value is an ARN or the ID portion of the ARN. Other parameters are optional, but at least one optional parameter must be specified, or CloudTrail throws an error. RetentionPeriod is in days, and valid values are integers between 90 and 2557. By default, TerminationProtection is enabled. For event data stores for CloudTrail events, AdvancedEventSelectors includes or excludes management, data, or Insights events in your event data store. For more information about AdvancedEventSelectors, see AdvancedEventSelectors.  For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, AdvancedEventSelectors includes events of that type in your event data store.
         | 
| 372 372 | 
             
               */
         | 
| 373 373 | 
             
              updateEventDataStore(callback?: (err: AWSError, data: CloudTrail.Types.UpdateEventDataStoreResponse) => void): Request<CloudTrail.Types.UpdateEventDataStoreResponse, AWSError>;
         | 
| 374 374 | 
             
              /**
         | 
| @@ -407,7 +407,7 @@ declare namespace CloudTrail { | |
| 407 407 | 
             
              export type AdvancedEventSelectors = AdvancedEventSelector[];
         | 
| 408 408 | 
             
              export interface AdvancedFieldSelector {
         | 
| 409 409 | 
             
                /**
         | 
| 410 | 
            -
                 *  A field in a CloudTrail event record on which to filter events to be logged. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for selecting events as filtering is not supported.   For CloudTrail event records, supported fields include readOnly, eventCategory, eventSource (for management events), eventName, resources.type, and resources.ARN.   For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is eventCategory.      readOnly  - Optional. Can be set to Equals a value of true or false. If you do not add this field, CloudTrail logs both read and write events. A value of true logs only read events. A value of false logs only write events.     eventSource  - For filtering management events only. This can be set only to NotEquals kms.amazonaws.com.     eventName  - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as PutBucket or GetSnapshotBlock. You can have multiple values for this field, separated by commas.     eventCategory  - This is required and must be set to Equals.     For CloudTrail event records, the value must be Management or Data.     For Config configuration items, the value must be ConfigurationItem.     For Audit Manager evidence, the value must be Evidence.     For non-Amazon Web Services events, the value must be ActivityAuditLog.        resources.type  - This field is required for CloudTrail data events. resources.type can only use the Equals operator, and the value can be one of the following:    AWS::DynamoDB::Table     AWS::Lambda::Function     AWS::S3::Object     AWS::CloudTrail::Channel     AWS::CodeWhisperer::Profile     AWS::Cognito::IdentityPool     AWS::DynamoDB::Stream     AWS::EC2::Snapshot     AWS::EMRWAL::Workspace     AWS::FinSpace::Environment     AWS::Glue::Table     AWS::GuardDuty::Detector     AWS::KendraRanking::ExecutionPlan     AWS::ManagedBlockchain::Network     AWS::ManagedBlockchain::Node     AWS::MedicalImaging::Datastore     AWS::SageMaker::ExperimentTrialComponent     AWS::SageMaker::FeatureGroup     AWS::S3::AccessPoint     AWS::S3ObjectLambda::AccessPoint     AWS::S3Outposts::Object     AWS::SSMMessages::ControlChannel     AWS::VerifiedPermissions::PolicyStore     You can have only one resources.type field per selector. To log data events on more than one resource type, add another selector.     resources.ARN  - You can use any operator with resources.ARN, but if you use Equals or NotEquals, the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals AWS::S3::Object, the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the StartsWith operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information.     arn:<partition>:s3:::<bucket_name>/     arn:<partition>:s3:::<bucket_name>/<object_path>/    When resources.type equals AWS::DynamoDB::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>    When resources.type equals AWS::Lambda::Function, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:lambda:<region>:<account_ID>:function:<function_name>    When resources.type equals AWS::CloudTrail::Channel, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID>    When resources.type equals AWS::CodeWhisperer::Profile, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID>    When resources.type equals AWS::Cognito::IdentityPool, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID>    When resources.type equals AWS::DynamoDB::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time>    When resources.type equals AWS::EC2::Snapshot, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:ec2:<region>::snapshot/<snapshot_ID>    When resources.type equals AWS::EMRWAL::Workspace, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:emrwal:<region>::workspace/<workspace_name>    When resources.type equals AWS::FinSpace::Environment, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID>    When resources.type equals AWS::Glue::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name>    When resources.type equals AWS::GuardDuty::Detector, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID>    When resources.type equals AWS::KendraRanking::ExecutionPlan, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID>    When resources.type equals AWS::ManagedBlockchain::Network, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:managedblockchain:::networks/<network_name>    When resources.type equals AWS::ManagedBlockchain::Node, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID>    When resources.type equals AWS::MedicalImaging::Datastore, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID>    When resources.type equals AWS::SageMaker::ExperimentTrialComponent, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name>    When resources.type equals AWS::SageMaker::FeatureGroup, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>    When resources.type equals AWS::S3::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the StartsWith or NotStartsWith operators.    arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>     arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path>    When resources.type equals AWS::S3ObjectLambda::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name>    When resources.type equals AWS::S3Outposts::Object, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>    When resources.type equals AWS::SSMMessages::ControlChannel, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>    When resources.type equals AWS::VerifiedPermissions::PolicyStore, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>     
         | 
| 410 | 
            +
                 *  A field in a CloudTrail event record on which to filter events to be logged. For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for selecting events as filtering is not supported.   For CloudTrail event records, supported fields include readOnly, eventCategory, eventSource (for management events), eventName, resources.type, and resources.ARN.   For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is eventCategory.      readOnly  - Optional. Can be set to Equals a value of true or false. If you do not add this field, CloudTrail logs both read and write events. A value of true logs only read events. A value of false logs only write events.     eventSource  - For filtering management events only. This can be set to NotEquals kms.amazonaws.com or NotEquals rdsdata.amazonaws.com.     eventName  - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as PutBucket or GetSnapshotBlock. You can have multiple values for this field, separated by commas.     eventCategory  - This is required and must be set to Equals.     For CloudTrail event records, the value must be Management or Data.     For CloudTrail Insights event records, the value must be Insight.     For Config configuration items, the value must be ConfigurationItem.     For Audit Manager evidence, the value must be Evidence.     For non-Amazon Web Services events, the value must be ActivityAuditLog.        resources.type  - This field is required for CloudTrail data events. resources.type can only use the Equals operator, and the value can be one of the following:    AWS::DynamoDB::Table     AWS::Lambda::Function     AWS::S3::Object     AWS::CloudTrail::Channel     AWS::CodeWhisperer::Customization     AWS::CodeWhisperer::Profile     AWS::Cognito::IdentityPool     AWS::DynamoDB::Stream     AWS::EC2::Snapshot     AWS::EMRWAL::Workspace     AWS::FinSpace::Environment     AWS::Glue::Table     AWS::GuardDuty::Detector     AWS::KendraRanking::ExecutionPlan     AWS::KinesisVideo::Stream     AWS::ManagedBlockchain::Network     AWS::ManagedBlockchain::Node     AWS::MedicalImaging::Datastore     AWS::PCAConnectorAD::Connector     AWS::SageMaker::Endpoint     AWS::SageMaker::ExperimentTrialComponent     AWS::SageMaker::FeatureGroup     AWS::SNS::PlatformEndpoint     AWS::SNS::Topic     AWS::S3::AccessPoint     AWS::S3ObjectLambda::AccessPoint     AWS::S3Outposts::Object     AWS::SSMMessages::ControlChannel     AWS::Timestream::Database     AWS::Timestream::Table     AWS::VerifiedPermissions::PolicyStore     You can have only one resources.type field per selector. To log data events on more than one resource type, add another selector.     resources.ARN  - You can use any operator with resources.ARN, but if you use Equals or NotEquals, the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals AWS::S3::Object, the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the StartsWith operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information.     arn:<partition>:s3:::<bucket_name>/     arn:<partition>:s3:::<bucket_name>/<object_path>/    When resources.type equals AWS::DynamoDB::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>    When resources.type equals AWS::Lambda::Function, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:lambda:<region>:<account_ID>:function:<function_name>    When resources.type equals AWS::CloudTrail::Channel, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID>    When resources.type equals AWS::CodeWhisperer::Customization, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:codewhisperer:<region>:<account_ID>:customization/<customization_ID>    When resources.type equals AWS::CodeWhisperer::Profile, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID>    When resources.type equals AWS::Cognito::IdentityPool, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID>    When resources.type equals AWS::DynamoDB::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time>    When resources.type equals AWS::EC2::Snapshot, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:ec2:<region>::snapshot/<snapshot_ID>    When resources.type equals AWS::EMRWAL::Workspace, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:emrwal:<region>::workspace/<workspace_name>    When resources.type equals AWS::FinSpace::Environment, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID>    When resources.type equals AWS::Glue::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name>    When resources.type equals AWS::GuardDuty::Detector, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID>    When resources.type equals AWS::KendraRanking::ExecutionPlan, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID>    When resources.type equals AWS::KinesisVideo::Stream, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:kinesisvideo:<region>:<account_ID>:stream/<stream_name/<creation_time>    When resources.type equals AWS::ManagedBlockchain::Network, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:managedblockchain:::networks/<network_name>    When resources.type equals AWS::ManagedBlockchain::Node, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID>    When resources.type equals AWS::MedicalImaging::Datastore, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID>    When resources.type equals AWS::PCAConnectorAD::Connector, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:pca-connector-ad:<region>:<account_ID>:connector/<connector_ID>    When resources.type equals AWS::SageMaker::Endpoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sagemaker:<region>:<account_ID>:endpoint/<endpoint_name>    When resources.type equals AWS::SageMaker::ExperimentTrialComponent, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name>    When resources.type equals AWS::SageMaker::FeatureGroup, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>    When resources.type equals AWS::SNS::PlatformEndpoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sns:<region>:<account_ID>:endpoint/<endpoint_type>/<endpoint_name>/<endpoint_ID>    When resources.type equals AWS::SNS::Topic, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:sns:<region>:<account_ID>:<topic_name>    When resources.type equals AWS::S3::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the StartsWith or NotStartsWith operators.    arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>     arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path>    When resources.type equals AWS::S3ObjectLambda::AccessPoint, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name>    When resources.type equals AWS::S3Outposts::Object, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>    When resources.type equals AWS::SSMMessages::ControlChannel, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>    When resources.type equals AWS::Timestream::Database, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>    When resources.type equals AWS::Timestream::Table, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>/table/<table_name>    When resources.type equals AWS::VerifiedPermissions::PolicyStore, and the operator is set to Equals or NotEquals, the ARN must be in the following format:    arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>     
         | 
| 411 411 | 
             
                 */
         | 
| 412 412 | 
             
                Field: SelectorField;
         | 
| 413 413 | 
             
                /**
         | 
| @@ -617,7 +617,7 @@ declare namespace CloudTrail { | |
| 617 617 | 
             
                 */
         | 
| 618 618 | 
             
                EnableLogFileValidation?: Boolean;
         | 
| 619 619 | 
             
                /**
         | 
| 620 | 
            -
                 * Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs will be delivered. You must use a log group that exists in your account. Not required unless you specify CloudWatchLogsRoleArn.
         | 
| 620 | 
            +
                 * Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs will be delivered. You must use a log group that exists in your account. Not required unless you specify CloudWatchLogsRoleArn.  Only the management account can configure a CloudWatch Logs log group for an organization trail.  
         | 
| 621 621 | 
             
                 */
         | 
| 622 622 | 
             
                CloudWatchLogsLogGroupArn?: String;
         | 
| 623 623 | 
             
                /**
         | 
| @@ -690,7 +690,7 @@ declare namespace CloudTrail { | |
| 690 690 | 
             
              }
         | 
| 691 691 | 
             
              export interface DataResource {
         | 
| 692 692 | 
             
                /**
         | 
| 693 | 
            -
                 * The resource type in which you want to log data events. You can specify the following basic event selector resource types:    AWS::DynamoDB::Table     AWS::Lambda::Function     AWS::S3::Object    The following resource types are also available through advanced event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see AdvancedFieldSelector.    AWS::CloudTrail::Channel     AWS::CodeWhisperer::Profile     AWS::Cognito::IdentityPool     AWS::DynamoDB::Stream     AWS::EC2::Snapshot     AWS::EMRWAL::Workspace     AWS::FinSpace::Environment     AWS::Glue::Table     AWS::GuardDuty::Detector     AWS::KendraRanking::ExecutionPlan     AWS::ManagedBlockchain::Network     AWS::ManagedBlockchain::Node     AWS::MedicalImaging::Datastore     AWS::SageMaker::ExperimentTrialComponent     AWS::SageMaker::FeatureGroup     AWS::S3::AccessPoint     AWS::S3ObjectLambda::AccessPoint     AWS::S3Outposts::Object     AWS::SSMMessages::ControlChannel     AWS::VerifiedPermissions::PolicyStore   
         | 
| 693 | 
            +
                 * The resource type in which you want to log data events. You can specify the following basic event selector resource types:    AWS::DynamoDB::Table     AWS::Lambda::Function     AWS::S3::Object    The following resource types are also available through advanced event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see AdvancedFieldSelector.    AWS::CloudTrail::Channel     AWS::CodeWhisperer::Customization     AWS::CodeWhisperer::Profile     AWS::Cognito::IdentityPool     AWS::DynamoDB::Stream     AWS::EC2::Snapshot     AWS::EMRWAL::Workspace     AWS::FinSpace::Environment     AWS::Glue::Table     AWS::GuardDuty::Detector     AWS::KendraRanking::ExecutionPlan     AWS::KinesisVideo::Stream     AWS::ManagedBlockchain::Network     AWS::ManagedBlockchain::Node     AWS::MedicalImaging::Datastore     AWS::PCAConnectorAD::Connector     AWS::SageMaker::Endpoint     AWS::SageMaker::ExperimentTrialComponent     AWS::SageMaker::FeatureGroup     AWS::SNS::PlatformEndpoint     AWS::SNS::Topic     AWS::S3::AccessPoint     AWS::S3ObjectLambda::AccessPoint     AWS::S3Outposts::Object     AWS::SSMMessages::ControlChannel     AWS::Timestream::Database     AWS::Timestream::Table     AWS::VerifiedPermissions::PolicyStore   
         | 
| 694 694 | 
             
                 */
         | 
| 695 695 | 
             
                Type?: String;
         | 
| 696 696 | 
             
                /**
         | 
| @@ -1073,9 +1073,13 @@ declare namespace CloudTrail { | |
| 1073 1073 | 
             
              }
         | 
| 1074 1074 | 
             
              export interface GetInsightSelectorsRequest {
         | 
| 1075 1075 | 
             
                /**
         | 
| 1076 | 
            -
                 * Specifies the name of the trail or trail ARN. If you specify a trail name, the string must meet the following requirements:   Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), or dashes (-)   Start with a letter or number, and end with a letter or number   Be between 3 and 128 characters   Have no adjacent periods, underscores or dashes. Names like my-_namespace and my--namespace are not valid.   Not be in IP address format (for example, 192.168.5.4)   If you specify a trail ARN, it must be in the format:  arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail 
         | 
| 1076 | 
            +
                 * Specifies the name of the trail or trail ARN. If you specify a trail name, the string must meet the following requirements:   Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), or dashes (-)   Start with a letter or number, and end with a letter or number   Be between 3 and 128 characters   Have no adjacent periods, underscores or dashes. Names like my-_namespace and my--namespace are not valid.   Not be in IP address format (for example, 192.168.5.4)   If you specify a trail ARN, it must be in the format:  arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail  You cannot use this parameter with the EventDataStore parameter.
         | 
| 1077 1077 | 
             
                 */
         | 
| 1078 | 
            -
                TrailName | 
| 1078 | 
            +
                TrailName?: String;
         | 
| 1079 | 
            +
                /**
         | 
| 1080 | 
            +
                 *  Specifies the ARN (or ID suffix of the ARN) of the event data store for which you want to get Insights selectors.  You cannot use this parameter with the TrailName parameter.
         | 
| 1081 | 
            +
                 */
         | 
| 1082 | 
            +
                EventDataStore?: EventDataStoreArn;
         | 
| 1079 1083 | 
             
              }
         | 
| 1080 1084 | 
             
              export interface GetInsightSelectorsResponse {
         | 
| 1081 1085 | 
             
                /**
         | 
| @@ -1083,9 +1087,17 @@ declare namespace CloudTrail { | |
| 1083 1087 | 
             
                 */
         | 
| 1084 1088 | 
             
                TrailARN?: String;
         | 
| 1085 1089 | 
             
                /**
         | 
| 1086 | 
            -
                 * A JSON string that contains the  | 
| 1090 | 
            +
                 * A JSON string that contains the Insight types you want to log on a trail or event data store. ApiErrorRateInsight and ApiCallRateInsight are supported as Insights types.
         | 
| 1087 1091 | 
             
                 */
         | 
| 1088 1092 | 
             
                InsightSelectors?: InsightSelectors;
         | 
| 1093 | 
            +
                /**
         | 
| 1094 | 
            +
                 *  The ARN of the source event data store that enabled Insights events. 
         | 
| 1095 | 
            +
                 */
         | 
| 1096 | 
            +
                EventDataStoreArn?: EventDataStoreArn;
         | 
| 1097 | 
            +
                /**
         | 
| 1098 | 
            +
                 *  The ARN of the destination event data store that logs Insights events. 
         | 
| 1099 | 
            +
                 */
         | 
| 1100 | 
            +
                InsightsDestination?: EventDataStoreArn;
         | 
| 1089 1101 | 
             
              }
         | 
| 1090 1102 | 
             
              export interface GetQueryResultsRequest {
         | 
| 1091 1103 | 
             
                /**
         | 
| @@ -1329,7 +1341,7 @@ declare namespace CloudTrail { | |
| 1329 1341 | 
             
              }
         | 
| 1330 1342 | 
             
              export interface InsightSelector {
         | 
| 1331 1343 | 
             
                /**
         | 
| 1332 | 
            -
                 * The type of Insights events to log on a trail. ApiCallRateInsight and ApiErrorRateInsight are valid Insight types. The ApiCallRateInsight Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ApiErrorRateInsight Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
         | 
| 1344 | 
            +
                 * The type of Insights events to log on a trail or event data store. ApiCallRateInsight and ApiErrorRateInsight are valid Insight types. The ApiCallRateInsight Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ApiErrorRateInsight Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
         | 
| 1333 1345 | 
             
                 */
         | 
| 1334 1346 | 
             
                InsightType?: InsightType;
         | 
| 1335 1347 | 
             
              }
         | 
| @@ -1635,13 +1647,21 @@ declare namespace CloudTrail { | |
| 1635 1647 | 
             
              }
         | 
| 1636 1648 | 
             
              export interface PutInsightSelectorsRequest {
         | 
| 1637 1649 | 
             
                /**
         | 
| 1638 | 
            -
                 * The name of the CloudTrail trail for which you want to change or add Insights selectors.
         | 
| 1650 | 
            +
                 * The name of the CloudTrail trail for which you want to change or add Insights selectors. You cannot use this parameter with the EventDataStore and InsightsDestination parameters.
         | 
| 1639 1651 | 
             
                 */
         | 
| 1640 | 
            -
                TrailName | 
| 1652 | 
            +
                TrailName?: String;
         | 
| 1641 1653 | 
             
                /**
         | 
| 1642 | 
            -
                 * A JSON string that contains the  | 
| 1654 | 
            +
                 * A JSON string that contains the Insights types you want to log on a trail or event data store. ApiCallRateInsight and ApiErrorRateInsight are valid Insight types. The ApiCallRateInsight Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. The ApiErrorRateInsight Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
         | 
| 1643 1655 | 
             
                 */
         | 
| 1644 1656 | 
             
                InsightSelectors: InsightSelectors;
         | 
| 1657 | 
            +
                /**
         | 
| 1658 | 
            +
                 * The ARN (or ID suffix of the ARN) of the source event data store for which you want to change or add Insights selectors. To enable Insights on an event data store, you must provide both the EventDataStore and InsightsDestination parameters. You cannot use this parameter with the TrailName parameter.
         | 
| 1659 | 
            +
                 */
         | 
| 1660 | 
            +
                EventDataStore?: EventDataStoreArn;
         | 
| 1661 | 
            +
                /**
         | 
| 1662 | 
            +
                 *  The ARN (or ID suffix of the ARN) of the destination event data store that logs Insights events. To enable Insights on an event data store, you must provide both the EventDataStore and InsightsDestination parameters.  You cannot use this parameter with the TrailName parameter.
         | 
| 1663 | 
            +
                 */
         | 
| 1664 | 
            +
                InsightsDestination?: EventDataStoreArn;
         | 
| 1645 1665 | 
             
              }
         | 
| 1646 1666 | 
             
              export interface PutInsightSelectorsResponse {
         | 
| 1647 1667 | 
             
                /**
         | 
| @@ -1649,9 +1669,17 @@ declare namespace CloudTrail { | |
| 1649 1669 | 
             
                 */
         | 
| 1650 1670 | 
             
                TrailARN?: String;
         | 
| 1651 1671 | 
             
                /**
         | 
| 1652 | 
            -
                 * A JSON string that contains the Insights event types that you want to log on a trail. The valid Insights types  | 
| 1672 | 
            +
                 * A JSON string that contains the Insights event types that you want to log on a trail or event data store. The valid Insights types are ApiErrorRateInsight and ApiCallRateInsight.
         | 
| 1653 1673 | 
             
                 */
         | 
| 1654 1674 | 
             
                InsightSelectors?: InsightSelectors;
         | 
| 1675 | 
            +
                /**
         | 
| 1676 | 
            +
                 * The Amazon Resource Name (ARN) of the source event data store for which you want to change or add Insights selectors.
         | 
| 1677 | 
            +
                 */
         | 
| 1678 | 
            +
                EventDataStoreArn?: EventDataStoreArn;
         | 
| 1679 | 
            +
                /**
         | 
| 1680 | 
            +
                 *  The ARN of the destination event data store that logs Insights events. 
         | 
| 1681 | 
            +
                 */
         | 
| 1682 | 
            +
                InsightsDestination?: EventDataStoreArn;
         | 
| 1655 1683 | 
             
              }
         | 
| 1656 1684 | 
             
              export interface PutResourcePolicyRequest {
         | 
| 1657 1685 | 
             
                /**
         | 
| @@ -2165,7 +2193,7 @@ declare namespace CloudTrail { | |
| 2165 2193 | 
             
                 */
         | 
| 2166 2194 | 
             
                MultiRegionEnabled?: Boolean;
         | 
| 2167 2195 | 
             
                /**
         | 
| 2168 | 
            -
                 * Specifies whether an event data store collects events logged for an organization in Organizations.
         | 
| 2196 | 
            +
                 * Specifies whether an event data store collects events logged for an organization in Organizations.  Only the management account for the organization can convert an organization event data store to a non-organization event data store, or convert a non-organization event data store to an organization event data store. 
         | 
| 2169 2197 | 
             
                 */
         | 
| 2170 2198 | 
             
                OrganizationEnabled?: Boolean;
         | 
| 2171 2199 | 
             
                /**
         | 
| @@ -2257,7 +2285,7 @@ declare namespace CloudTrail { | |
| 2257 2285 | 
             
                 */
         | 
| 2258 2286 | 
             
                EnableLogFileValidation?: Boolean;
         | 
| 2259 2287 | 
             
                /**
         | 
| 2260 | 
            -
                 * Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. Not required unless you specify CloudWatchLogsRoleArn.
         | 
| 2288 | 
            +
                 * Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. Not required unless you specify CloudWatchLogsRoleArn.  Only the management account can configure a CloudWatch Logs log group for an organization trail.  
         | 
| 2261 2289 | 
             
                 */
         | 
| 2262 2290 | 
             
                CloudWatchLogsLogGroupArn?: String;
         | 
| 2263 2291 | 
             
                /**
         | 
| @@ -2269,7 +2297,7 @@ declare namespace CloudTrail { | |
| 2269 2297 | 
             
                 */
         | 
| 2270 2298 | 
             
                KmsKeyId?: String;
         | 
| 2271 2299 | 
             
                /**
         | 
| 2272 | 
            -
                 * Specifies whether the trail is applied to all accounts in an organization in Organizations, or only for the current Amazon Web Services account. The default is false, and cannot be true unless the call is made on behalf of an Amazon Web Services account that is the management account  | 
| 2300 | 
            +
                 * Specifies whether the trail is applied to all accounts in an organization in Organizations, or only for the current Amazon Web Services account. The default is false, and cannot be true unless the call is made on behalf of an Amazon Web Services account that is the management account for an organization in Organizations. If the trail is not an organization trail and this is set to true, the trail will be created in all Amazon Web Services accounts that belong to the organization. If the trail is an organization trail and this is set to false, the trail will remain in the current Amazon Web Services account but be deleted from all member accounts in the organization.  Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail. 
         | 
| 2273 2301 | 
             
                 */
         | 
| 2274 2302 | 
             
                IsOrganizationTrail?: Boolean;
         | 
| 2275 2303 | 
             
              }
         |