aws-cdk-lib 2.100.0__py3-none-any.whl → 2.101.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.100.0.jsii.tgz → aws-cdk-lib@2.101.1.jsii.tgz} +0 -0
- aws_cdk/aws_apigatewayv2/__init__.py +0 -8
- aws_cdk/aws_appconfig/__init__.py +101 -18
- aws_cdk/aws_apprunner/__init__.py +5 -2
- aws_cdk/aws_appstream/__init__.py +18 -26
- aws_cdk/aws_cloudfront/__init__.py +251 -3
- aws_cdk/aws_cloudtrail/__init__.py +47 -3
- aws_cdk/aws_cognito/__init__.py +414 -8
- aws_cdk/aws_dlm/__init__.py +10 -9
- aws_cdk/aws_ec2/__init__.py +308 -179
- aws_cdk/aws_events/__init__.py +62 -86
- aws_cdk/aws_fms/__init__.py +3 -3
- aws_cdk/aws_grafana/__init__.py +4 -4
- aws_cdk/aws_greengrassv2/__init__.py +1 -8
- aws_cdk/aws_iot/__init__.py +714 -0
- aws_cdk/aws_iotsitewise/__init__.py +3 -3
- aws_cdk/aws_kinesisanalytics/__init__.py +15 -15
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +15 -15
- aws_cdk/aws_kinesisfirehose/__init__.py +87 -40
- aws_cdk/aws_lambda/__init__.py +34 -4
- aws_cdk/aws_lightsail/__init__.py +3 -1
- aws_cdk/aws_mediatailor/__init__.py +24 -1
- aws_cdk/aws_quicksight/__init__.py +2508 -55
- aws_cdk/aws_rds/__init__.py +121 -51
- aws_cdk/aws_sagemaker/__init__.py +5 -3
- aws_cdk/aws_sns/__init__.py +42 -5
- aws_cdk/aws_ssm/__init__.py +0 -8
- aws_cdk/aws_stepfunctions/__init__.py +233 -16
- aws_cdk/aws_stepfunctions_tasks/__init__.py +926 -27
- aws_cdk/aws_transfer/__init__.py +4 -4
- aws_cdk/aws_workspacesweb/__init__.py +3 -3
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/RECORD +38 -38
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.100.0.dist-info → aws_cdk_lib-2.101.1.dist-info}/top_level.txt +0 -0
|
@@ -3600,6 +3600,19 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3600
3600
|
staging_distribution_dns_names=["stagingDistributionDnsNames"],
|
|
3601
3601
|
|
|
3602
3602
|
# the properties below are optional
|
|
3603
|
+
single_header_policy_config=cloudfront.CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty(
|
|
3604
|
+
header="header",
|
|
3605
|
+
value="value"
|
|
3606
|
+
),
|
|
3607
|
+
single_weight_policy_config=cloudfront.CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty(
|
|
3608
|
+
weight=123,
|
|
3609
|
+
|
|
3610
|
+
# the properties below are optional
|
|
3611
|
+
session_stickiness_config=cloudfront.CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty(
|
|
3612
|
+
idle_ttl=123,
|
|
3613
|
+
maximum_ttl=123
|
|
3614
|
+
)
|
|
3615
|
+
),
|
|
3603
3616
|
traffic_config=cloudfront.CfnContinuousDeploymentPolicy.TrafficConfigProperty(
|
|
3604
3617
|
type="type",
|
|
3605
3618
|
|
|
@@ -3617,7 +3630,8 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3617
3630
|
maximum_ttl=123
|
|
3618
3631
|
)
|
|
3619
3632
|
)
|
|
3620
|
-
)
|
|
3633
|
+
),
|
|
3634
|
+
type="type"
|
|
3621
3635
|
)
|
|
3622
3636
|
)
|
|
3623
3637
|
'''
|
|
@@ -3721,7 +3735,10 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3721
3735
|
name_mapping={
|
|
3722
3736
|
"enabled": "enabled",
|
|
3723
3737
|
"staging_distribution_dns_names": "stagingDistributionDnsNames",
|
|
3738
|
+
"single_header_policy_config": "singleHeaderPolicyConfig",
|
|
3739
|
+
"single_weight_policy_config": "singleWeightPolicyConfig",
|
|
3724
3740
|
"traffic_config": "trafficConfig",
|
|
3741
|
+
"type": "type",
|
|
3725
3742
|
},
|
|
3726
3743
|
)
|
|
3727
3744
|
class ContinuousDeploymentPolicyConfigProperty:
|
|
@@ -3730,13 +3747,19 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3730
3747
|
*,
|
|
3731
3748
|
enabled: typing.Union[builtins.bool, _IResolvable_da3f097b],
|
|
3732
3749
|
staging_distribution_dns_names: typing.Sequence[builtins.str],
|
|
3750
|
+
single_header_policy_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
3751
|
+
single_weight_policy_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
3733
3752
|
traffic_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnContinuousDeploymentPolicy.TrafficConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
3753
|
+
type: typing.Optional[builtins.str] = None,
|
|
3734
3754
|
) -> None:
|
|
3735
3755
|
'''Contains the configuration for a continuous deployment policy.
|
|
3736
3756
|
|
|
3737
3757
|
:param enabled: A Boolean that indicates whether this continuous deployment policy is enabled (in effect). When this value is ``true`` , this policy is enabled and in effect. When this value is ``false`` , this policy is not enabled and has no effect.
|
|
3738
3758
|
:param staging_distribution_dns_names: The CloudFront domain name of the staging distribution. For example: ``d111111abcdef8.cloudfront.net`` .
|
|
3759
|
+
:param single_header_policy_config:
|
|
3760
|
+
:param single_weight_policy_config:
|
|
3739
3761
|
:param traffic_config: Contains the parameters for routing production traffic from your primary to staging distributions.
|
|
3762
|
+
:param type:
|
|
3740
3763
|
|
|
3741
3764
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig.html
|
|
3742
3765
|
:exampleMetadata: fixture=_generated
|
|
@@ -3752,6 +3775,19 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3752
3775
|
staging_distribution_dns_names=["stagingDistributionDnsNames"],
|
|
3753
3776
|
|
|
3754
3777
|
# the properties below are optional
|
|
3778
|
+
single_header_policy_config=cloudfront.CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty(
|
|
3779
|
+
header="header",
|
|
3780
|
+
value="value"
|
|
3781
|
+
),
|
|
3782
|
+
single_weight_policy_config=cloudfront.CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty(
|
|
3783
|
+
weight=123,
|
|
3784
|
+
|
|
3785
|
+
# the properties below are optional
|
|
3786
|
+
session_stickiness_config=cloudfront.CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty(
|
|
3787
|
+
idle_ttl=123,
|
|
3788
|
+
maximum_ttl=123
|
|
3789
|
+
)
|
|
3790
|
+
),
|
|
3755
3791
|
traffic_config=cloudfront.CfnContinuousDeploymentPolicy.TrafficConfigProperty(
|
|
3756
3792
|
type="type",
|
|
3757
3793
|
|
|
@@ -3769,20 +3805,30 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3769
3805
|
maximum_ttl=123
|
|
3770
3806
|
)
|
|
3771
3807
|
)
|
|
3772
|
-
)
|
|
3808
|
+
),
|
|
3809
|
+
type="type"
|
|
3773
3810
|
)
|
|
3774
3811
|
'''
|
|
3775
3812
|
if __debug__:
|
|
3776
3813
|
type_hints = typing.get_type_hints(_typecheckingstub__5bd1a74dffe3773a269b4a42a8f5fc37c7934b0931fd845b2923603086ea48cc)
|
|
3777
3814
|
check_type(argname="argument enabled", value=enabled, expected_type=type_hints["enabled"])
|
|
3778
3815
|
check_type(argname="argument staging_distribution_dns_names", value=staging_distribution_dns_names, expected_type=type_hints["staging_distribution_dns_names"])
|
|
3816
|
+
check_type(argname="argument single_header_policy_config", value=single_header_policy_config, expected_type=type_hints["single_header_policy_config"])
|
|
3817
|
+
check_type(argname="argument single_weight_policy_config", value=single_weight_policy_config, expected_type=type_hints["single_weight_policy_config"])
|
|
3779
3818
|
check_type(argname="argument traffic_config", value=traffic_config, expected_type=type_hints["traffic_config"])
|
|
3819
|
+
check_type(argname="argument type", value=type, expected_type=type_hints["type"])
|
|
3780
3820
|
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
3781
3821
|
"enabled": enabled,
|
|
3782
3822
|
"staging_distribution_dns_names": staging_distribution_dns_names,
|
|
3783
3823
|
}
|
|
3824
|
+
if single_header_policy_config is not None:
|
|
3825
|
+
self._values["single_header_policy_config"] = single_header_policy_config
|
|
3826
|
+
if single_weight_policy_config is not None:
|
|
3827
|
+
self._values["single_weight_policy_config"] = single_weight_policy_config
|
|
3784
3828
|
if traffic_config is not None:
|
|
3785
3829
|
self._values["traffic_config"] = traffic_config
|
|
3830
|
+
if type is not None:
|
|
3831
|
+
self._values["type"] = type
|
|
3786
3832
|
|
|
3787
3833
|
@builtins.property
|
|
3788
3834
|
def enabled(self) -> typing.Union[builtins.bool, _IResolvable_da3f097b]:
|
|
@@ -3808,6 +3854,26 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3808
3854
|
assert result is not None, "Required property 'staging_distribution_dns_names' is missing"
|
|
3809
3855
|
return typing.cast(typing.List[builtins.str], result)
|
|
3810
3856
|
|
|
3857
|
+
@builtins.property
|
|
3858
|
+
def single_header_policy_config(
|
|
3859
|
+
self,
|
|
3860
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty"]]:
|
|
3861
|
+
'''
|
|
3862
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig-singleheaderpolicyconfig
|
|
3863
|
+
'''
|
|
3864
|
+
result = self._values.get("single_header_policy_config")
|
|
3865
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty"]], result)
|
|
3866
|
+
|
|
3867
|
+
@builtins.property
|
|
3868
|
+
def single_weight_policy_config(
|
|
3869
|
+
self,
|
|
3870
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty"]]:
|
|
3871
|
+
'''
|
|
3872
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig-singleweightpolicyconfig
|
|
3873
|
+
'''
|
|
3874
|
+
result = self._values.get("single_weight_policy_config")
|
|
3875
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty"]], result)
|
|
3876
|
+
|
|
3811
3877
|
@builtins.property
|
|
3812
3878
|
def traffic_config(
|
|
3813
3879
|
self,
|
|
@@ -3819,6 +3885,14 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3819
3885
|
result = self._values.get("traffic_config")
|
|
3820
3886
|
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.TrafficConfigProperty"]], result)
|
|
3821
3887
|
|
|
3888
|
+
@builtins.property
|
|
3889
|
+
def type(self) -> typing.Optional[builtins.str]:
|
|
3890
|
+
'''
|
|
3891
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-continuousdeploymentpolicyconfig-type
|
|
3892
|
+
'''
|
|
3893
|
+
result = self._values.get("type")
|
|
3894
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
3895
|
+
|
|
3822
3896
|
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
3823
3897
|
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
3824
3898
|
|
|
@@ -3970,6 +4044,69 @@ class CfnContinuousDeploymentPolicy(
|
|
|
3970
4044
|
k + "=" + repr(v) for k, v in self._values.items()
|
|
3971
4045
|
)
|
|
3972
4046
|
|
|
4047
|
+
@jsii.data_type(
|
|
4048
|
+
jsii_type="aws-cdk-lib.aws_cloudfront.CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty",
|
|
4049
|
+
jsii_struct_bases=[],
|
|
4050
|
+
name_mapping={"header": "header", "value": "value"},
|
|
4051
|
+
)
|
|
4052
|
+
class SingleHeaderPolicyConfigProperty:
|
|
4053
|
+
def __init__(self, *, header: builtins.str, value: builtins.str) -> None:
|
|
4054
|
+
'''
|
|
4055
|
+
:param header:
|
|
4056
|
+
:param value:
|
|
4057
|
+
|
|
4058
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-singleheaderpolicyconfig.html
|
|
4059
|
+
:exampleMetadata: fixture=_generated
|
|
4060
|
+
|
|
4061
|
+
Example::
|
|
4062
|
+
|
|
4063
|
+
# The code below shows an example of how to instantiate this type.
|
|
4064
|
+
# The values are placeholders you should change.
|
|
4065
|
+
from aws_cdk import aws_cloudfront as cloudfront
|
|
4066
|
+
|
|
4067
|
+
single_header_policy_config_property = cloudfront.CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty(
|
|
4068
|
+
header="header",
|
|
4069
|
+
value="value"
|
|
4070
|
+
)
|
|
4071
|
+
'''
|
|
4072
|
+
if __debug__:
|
|
4073
|
+
type_hints = typing.get_type_hints(_typecheckingstub__cdc8f6ee6354e61b27155f9e23e4aa75f2a7ba61db0aefaa8b33d79f7772fe16)
|
|
4074
|
+
check_type(argname="argument header", value=header, expected_type=type_hints["header"])
|
|
4075
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
4076
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
4077
|
+
"header": header,
|
|
4078
|
+
"value": value,
|
|
4079
|
+
}
|
|
4080
|
+
|
|
4081
|
+
@builtins.property
|
|
4082
|
+
def header(self) -> builtins.str:
|
|
4083
|
+
'''
|
|
4084
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-singleheaderpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-singleheaderpolicyconfig-header
|
|
4085
|
+
'''
|
|
4086
|
+
result = self._values.get("header")
|
|
4087
|
+
assert result is not None, "Required property 'header' is missing"
|
|
4088
|
+
return typing.cast(builtins.str, result)
|
|
4089
|
+
|
|
4090
|
+
@builtins.property
|
|
4091
|
+
def value(self) -> builtins.str:
|
|
4092
|
+
'''
|
|
4093
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-singleheaderpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-singleheaderpolicyconfig-value
|
|
4094
|
+
'''
|
|
4095
|
+
result = self._values.get("value")
|
|
4096
|
+
assert result is not None, "Required property 'value' is missing"
|
|
4097
|
+
return typing.cast(builtins.str, result)
|
|
4098
|
+
|
|
4099
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
4100
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
4101
|
+
|
|
4102
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
4103
|
+
return not (rhs == self)
|
|
4104
|
+
|
|
4105
|
+
def __repr__(self) -> str:
|
|
4106
|
+
return "SingleHeaderPolicyConfigProperty(%s)" % ", ".join(
|
|
4107
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
4108
|
+
)
|
|
4109
|
+
|
|
3973
4110
|
@jsii.data_type(
|
|
3974
4111
|
jsii_type="aws-cdk-lib.aws_cloudfront.CfnContinuousDeploymentPolicy.SingleWeightConfigProperty",
|
|
3975
4112
|
jsii_struct_bases=[],
|
|
@@ -4053,6 +4190,84 @@ class CfnContinuousDeploymentPolicy(
|
|
|
4053
4190
|
k + "=" + repr(v) for k, v in self._values.items()
|
|
4054
4191
|
)
|
|
4055
4192
|
|
|
4193
|
+
@jsii.data_type(
|
|
4194
|
+
jsii_type="aws-cdk-lib.aws_cloudfront.CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty",
|
|
4195
|
+
jsii_struct_bases=[],
|
|
4196
|
+
name_mapping={
|
|
4197
|
+
"weight": "weight",
|
|
4198
|
+
"session_stickiness_config": "sessionStickinessConfig",
|
|
4199
|
+
},
|
|
4200
|
+
)
|
|
4201
|
+
class SingleWeightPolicyConfigProperty:
|
|
4202
|
+
def __init__(
|
|
4203
|
+
self,
|
|
4204
|
+
*,
|
|
4205
|
+
weight: jsii.Number,
|
|
4206
|
+
session_stickiness_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
4207
|
+
) -> None:
|
|
4208
|
+
'''
|
|
4209
|
+
:param weight:
|
|
4210
|
+
:param session_stickiness_config:
|
|
4211
|
+
|
|
4212
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-singleweightpolicyconfig.html
|
|
4213
|
+
:exampleMetadata: fixture=_generated
|
|
4214
|
+
|
|
4215
|
+
Example::
|
|
4216
|
+
|
|
4217
|
+
# The code below shows an example of how to instantiate this type.
|
|
4218
|
+
# The values are placeholders you should change.
|
|
4219
|
+
from aws_cdk import aws_cloudfront as cloudfront
|
|
4220
|
+
|
|
4221
|
+
single_weight_policy_config_property = cloudfront.CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty(
|
|
4222
|
+
weight=123,
|
|
4223
|
+
|
|
4224
|
+
# the properties below are optional
|
|
4225
|
+
session_stickiness_config=cloudfront.CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty(
|
|
4226
|
+
idle_ttl=123,
|
|
4227
|
+
maximum_ttl=123
|
|
4228
|
+
)
|
|
4229
|
+
)
|
|
4230
|
+
'''
|
|
4231
|
+
if __debug__:
|
|
4232
|
+
type_hints = typing.get_type_hints(_typecheckingstub__84e0588982dd4503df87db99f734b545b51a61216a04cbf8ae433c7e6041c065)
|
|
4233
|
+
check_type(argname="argument weight", value=weight, expected_type=type_hints["weight"])
|
|
4234
|
+
check_type(argname="argument session_stickiness_config", value=session_stickiness_config, expected_type=type_hints["session_stickiness_config"])
|
|
4235
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
4236
|
+
"weight": weight,
|
|
4237
|
+
}
|
|
4238
|
+
if session_stickiness_config is not None:
|
|
4239
|
+
self._values["session_stickiness_config"] = session_stickiness_config
|
|
4240
|
+
|
|
4241
|
+
@builtins.property
|
|
4242
|
+
def weight(self) -> jsii.Number:
|
|
4243
|
+
'''
|
|
4244
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-singleweightpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-singleweightpolicyconfig-weight
|
|
4245
|
+
'''
|
|
4246
|
+
result = self._values.get("weight")
|
|
4247
|
+
assert result is not None, "Required property 'weight' is missing"
|
|
4248
|
+
return typing.cast(jsii.Number, result)
|
|
4249
|
+
|
|
4250
|
+
@builtins.property
|
|
4251
|
+
def session_stickiness_config(
|
|
4252
|
+
self,
|
|
4253
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty"]]:
|
|
4254
|
+
'''
|
|
4255
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudfront-continuousdeploymentpolicy-singleweightpolicyconfig.html#cfn-cloudfront-continuousdeploymentpolicy-singleweightpolicyconfig-sessionstickinessconfig
|
|
4256
|
+
'''
|
|
4257
|
+
result = self._values.get("session_stickiness_config")
|
|
4258
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty"]], result)
|
|
4259
|
+
|
|
4260
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
4261
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
4262
|
+
|
|
4263
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
4264
|
+
return not (rhs == self)
|
|
4265
|
+
|
|
4266
|
+
def __repr__(self) -> str:
|
|
4267
|
+
return "SingleWeightPolicyConfigProperty(%s)" % ", ".join(
|
|
4268
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
4269
|
+
)
|
|
4270
|
+
|
|
4056
4271
|
@jsii.data_type(
|
|
4057
4272
|
jsii_type="aws-cdk-lib.aws_cloudfront.CfnContinuousDeploymentPolicy.TrafficConfigProperty",
|
|
4058
4273
|
jsii_struct_bases=[],
|
|
@@ -4193,6 +4408,19 @@ class CfnContinuousDeploymentPolicyProps:
|
|
|
4193
4408
|
staging_distribution_dns_names=["stagingDistributionDnsNames"],
|
|
4194
4409
|
|
|
4195
4410
|
# the properties below are optional
|
|
4411
|
+
single_header_policy_config=cloudfront.CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty(
|
|
4412
|
+
header="header",
|
|
4413
|
+
value="value"
|
|
4414
|
+
),
|
|
4415
|
+
single_weight_policy_config=cloudfront.CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty(
|
|
4416
|
+
weight=123,
|
|
4417
|
+
|
|
4418
|
+
# the properties below are optional
|
|
4419
|
+
session_stickiness_config=cloudfront.CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty(
|
|
4420
|
+
idle_ttl=123,
|
|
4421
|
+
maximum_ttl=123
|
|
4422
|
+
)
|
|
4423
|
+
),
|
|
4196
4424
|
traffic_config=cloudfront.CfnContinuousDeploymentPolicy.TrafficConfigProperty(
|
|
4197
4425
|
type="type",
|
|
4198
4426
|
|
|
@@ -4210,7 +4438,8 @@ class CfnContinuousDeploymentPolicyProps:
|
|
|
4210
4438
|
maximum_ttl=123
|
|
4211
4439
|
)
|
|
4212
4440
|
)
|
|
4213
|
-
)
|
|
4441
|
+
),
|
|
4442
|
+
type="type"
|
|
4214
4443
|
)
|
|
4215
4444
|
)
|
|
4216
4445
|
'''
|
|
@@ -22074,7 +22303,10 @@ def _typecheckingstub__5bd1a74dffe3773a269b4a42a8f5fc37c7934b0931fd845b292360308
|
|
|
22074
22303
|
*,
|
|
22075
22304
|
enabled: typing.Union[builtins.bool, _IResolvable_da3f097b],
|
|
22076
22305
|
staging_distribution_dns_names: typing.Sequence[builtins.str],
|
|
22306
|
+
single_header_policy_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnContinuousDeploymentPolicy.SingleHeaderPolicyConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22307
|
+
single_weight_policy_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnContinuousDeploymentPolicy.SingleWeightPolicyConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22077
22308
|
traffic_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnContinuousDeploymentPolicy.TrafficConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22309
|
+
type: typing.Optional[builtins.str] = None,
|
|
22078
22310
|
) -> None:
|
|
22079
22311
|
"""Type checking stubs"""
|
|
22080
22312
|
pass
|
|
@@ -22095,6 +22327,14 @@ def _typecheckingstub__ab2cd352992c9ba2b394cb9901d11c00f78ce00fd375f0cc51f4ae240
|
|
|
22095
22327
|
"""Type checking stubs"""
|
|
22096
22328
|
pass
|
|
22097
22329
|
|
|
22330
|
+
def _typecheckingstub__cdc8f6ee6354e61b27155f9e23e4aa75f2a7ba61db0aefaa8b33d79f7772fe16(
|
|
22331
|
+
*,
|
|
22332
|
+
header: builtins.str,
|
|
22333
|
+
value: builtins.str,
|
|
22334
|
+
) -> None:
|
|
22335
|
+
"""Type checking stubs"""
|
|
22336
|
+
pass
|
|
22337
|
+
|
|
22098
22338
|
def _typecheckingstub__1ba7d952d1015505a10d7999960852df19dab54d6b3113134cf9174ef1030b16(
|
|
22099
22339
|
*,
|
|
22100
22340
|
weight: jsii.Number,
|
|
@@ -22103,6 +22343,14 @@ def _typecheckingstub__1ba7d952d1015505a10d7999960852df19dab54d6b3113134cf9174ef
|
|
|
22103
22343
|
"""Type checking stubs"""
|
|
22104
22344
|
pass
|
|
22105
22345
|
|
|
22346
|
+
def _typecheckingstub__84e0588982dd4503df87db99f734b545b51a61216a04cbf8ae433c7e6041c065(
|
|
22347
|
+
*,
|
|
22348
|
+
weight: jsii.Number,
|
|
22349
|
+
session_stickiness_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnContinuousDeploymentPolicy.SessionStickinessConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
22350
|
+
) -> None:
|
|
22351
|
+
"""Type checking stubs"""
|
|
22352
|
+
pass
|
|
22353
|
+
|
|
22106
22354
|
def _typecheckingstub__25e3b1d96d558cd97eeb1dde2cdbe1659675a2229aa5fd29c732485f764f4aa8(
|
|
22107
22355
|
*,
|
|
22108
22356
|
type: builtins.str,
|
|
@@ -1137,7 +1137,7 @@ class CfnEventDataStore(
|
|
|
1137
1137
|
) -> None:
|
|
1138
1138
|
'''A single selector statement in an advanced event selector.
|
|
1139
1139
|
|
|
1140
|
-
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include ``readOnly`` , ``eventCategory`` , ``eventSource`` (for management events), ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail event records, the value must be ``Management`` or ``Data`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` - ``AWS::CloudTrail::Channel`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GuardDuty::Detector`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::KinesisVideo::Stream`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::S3::AccessPoint`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::VerifiedPermissions::PolicyStore`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals ``AWS::S3::Object`` , the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. - ``arn:<partition>:s3:::<bucket_name>/`` - ``arn:<partition>:s3:::<bucket_name>/<object_path>/`` When resources.type equals ``AWS::DynamoDB::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>`` When resources.type equals ``AWS::Lambda::Function`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:lambda:<region>:<account_ID>:function:<function_name>`` When resources.type equals ``AWS::CloudTrail::Channel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID>`` When resources.type equals ``AWS::CodeWhisperer::Profile`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID>`` When resources.type equals ``AWS::Cognito::IdentityPool`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID>`` When ``resources.type`` equals ``AWS::DynamoDB::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time>`` When ``resources.type`` equals ``AWS::EC2::Snapshot`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ec2:<region>::snapshot/<snapshot_ID>`` When ``resources.type`` equals ``AWS::EMRWAL::Workspace`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:emrwal:<region>::workspace/<workspace_name>`` When ``resources.type`` equals ``AWS::FinSpace::Environment`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID>`` When ``resources.type`` equals ``AWS::Glue::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name>`` When ``resources.type`` equals ``AWS::GuardDuty::Detector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID>`` When ``resources.type`` equals ``AWS::KendraRanking::ExecutionPlan`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID>`` When ``resources.type`` equals ``AWS::KinesisVideo::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kinesisvideo:<region>:<account_ID>:stream/<stream_name/<creation_time>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Network`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:::networks/<network_name>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Node`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID>`` When ``resources.type`` equals ``AWS::MedicalImaging::Datastore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID>`` When ``resources.type`` equals ``AWS::PCAConnectorAD::Connector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:pca-connector-ad:<region>:<account_ID>:connector/<connector_ID>`` When ``resources.type`` equals ``AWS::SageMaker::Endpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:endpoint/<endpoint_name>`` When ``resources.type`` equals ``AWS::SageMaker::ExperimentTrialComponent`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name>`` When ``resources.type`` equals ``AWS::SageMaker::FeatureGroup`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>`` When ``resources.type`` equals ``AWS::S3::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the ``StartsWith`` or ``NotStartsWith`` operators. - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>`` - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path>`` When ``resources.type`` equals ``AWS::S3ObjectLambda::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name>`` When ``resources.type`` equals ``AWS::S3Outposts::Object`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>`` When ``resources.type`` equals ``AWS::SSMMessages::ControlChannel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>`` When resources.type equals ``AWS::VerifiedPermissions::PolicyStore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>``
|
|
1140
|
+
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include ``readOnly`` , ``eventCategory`` , ``eventSource`` (for management events), ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail event records, the value must be ``Management`` or ``Data`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` - ``AWS::CloudTrail::Channel`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GuardDuty::Detector`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::KinesisVideo::Stream`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::S3::AccessPoint`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals ``AWS::S3::Object`` , the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. - ``arn:<partition>:s3:::<bucket_name>/`` - ``arn:<partition>:s3:::<bucket_name>/<object_path>/`` When resources.type equals ``AWS::DynamoDB::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>`` When resources.type equals ``AWS::Lambda::Function`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:lambda:<region>:<account_ID>:function:<function_name>`` When resources.type equals ``AWS::CloudTrail::Channel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID>`` When resources.type equals ``AWS::CodeWhisperer::Profile`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID>`` When resources.type equals ``AWS::Cognito::IdentityPool`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID>`` When ``resources.type`` equals ``AWS::DynamoDB::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time>`` When ``resources.type`` equals ``AWS::EC2::Snapshot`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ec2:<region>::snapshot/<snapshot_ID>`` When ``resources.type`` equals ``AWS::EMRWAL::Workspace`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:emrwal:<region>::workspace/<workspace_name>`` When ``resources.type`` equals ``AWS::FinSpace::Environment`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID>`` When ``resources.type`` equals ``AWS::Glue::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name>`` When ``resources.type`` equals ``AWS::GuardDuty::Detector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID>`` When ``resources.type`` equals ``AWS::KendraRanking::ExecutionPlan`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID>`` When ``resources.type`` equals ``AWS::KinesisVideo::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kinesisvideo:<region>:<account_ID>:stream/<stream_name/<creation_time>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Network`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:::networks/<network_name>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Node`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID>`` When ``resources.type`` equals ``AWS::MedicalImaging::Datastore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID>`` When ``resources.type`` equals ``AWS::PCAConnectorAD::Connector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:pca-connector-ad:<region>:<account_ID>:connector/<connector_ID>`` When ``resources.type`` equals ``AWS::SageMaker::Endpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:endpoint/<endpoint_name>`` When ``resources.type`` equals ``AWS::SageMaker::ExperimentTrialComponent`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name>`` When ``resources.type`` equals ``AWS::SageMaker::FeatureGroup`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>`` When ``resources.type`` equals ``AWS::SNS::PlatformEndpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sns:<region>:<account_ID>:endpoint/<endpoint_type>/<endpoint_name>/<endpoint_ID>`` When ``resources.type`` equals ``AWS::SNS::Topic`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sns:<region>:<account_ID>:<topic_name>`` When ``resources.type`` equals ``AWS::S3::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the ``StartsWith`` or ``NotStartsWith`` operators. - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>`` - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path>`` When ``resources.type`` equals ``AWS::S3ObjectLambda::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name>`` When ``resources.type`` equals ``AWS::S3Outposts::Object`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>`` When ``resources.type`` equals ``AWS::SSMMessages::ControlChannel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>`` When ``resources.type`` equals ``AWS::Timestream::Database`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>`` When ``resources.type`` equals ``AWS::Timestream::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>/table/<table_name>`` When resources.type equals ``AWS::VerifiedPermissions::PolicyStore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>``
|
|
1141
1141
|
:param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
1142
1142
|
:param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
|
|
1143
1143
|
:param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
@@ -1231,10 +1231,14 @@ class CfnEventDataStore(
|
|
|
1231
1231
|
- ``AWS::SageMaker::Endpoint``
|
|
1232
1232
|
- ``AWS::SageMaker::ExperimentTrialComponent``
|
|
1233
1233
|
- ``AWS::SageMaker::FeatureGroup``
|
|
1234
|
+
- ``AWS::SNS::PlatformEndpoint``
|
|
1235
|
+
- ``AWS::SNS::Topic``
|
|
1234
1236
|
- ``AWS::S3::AccessPoint``
|
|
1235
1237
|
- ``AWS::S3ObjectLambda::AccessPoint``
|
|
1236
1238
|
- ``AWS::S3Outposts::Object``
|
|
1237
1239
|
- ``AWS::SSMMessages::ControlChannel``
|
|
1240
|
+
- ``AWS::Timestream::Database``
|
|
1241
|
+
- ``AWS::Timestream::Table``
|
|
1238
1242
|
- ``AWS::VerifiedPermissions::PolicyStore``
|
|
1239
1243
|
|
|
1240
1244
|
You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector.
|
|
@@ -1326,6 +1330,14 @@ class CfnEventDataStore(
|
|
|
1326
1330
|
|
|
1327
1331
|
- ``arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>``
|
|
1328
1332
|
|
|
1333
|
+
When ``resources.type`` equals ``AWS::SNS::PlatformEndpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
1334
|
+
|
|
1335
|
+
- ``arn:<partition>:sns:<region>:<account_ID>:endpoint/<endpoint_type>/<endpoint_name>/<endpoint_ID>``
|
|
1336
|
+
|
|
1337
|
+
When ``resources.type`` equals ``AWS::SNS::Topic`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
1338
|
+
|
|
1339
|
+
- ``arn:<partition>:sns:<region>:<account_ID>:<topic_name>``
|
|
1340
|
+
|
|
1329
1341
|
When ``resources.type`` equals ``AWS::S3::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the ``StartsWith`` or ``NotStartsWith`` operators.
|
|
1330
1342
|
|
|
1331
1343
|
- ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>``
|
|
@@ -1343,6 +1355,14 @@ class CfnEventDataStore(
|
|
|
1343
1355
|
|
|
1344
1356
|
- ``arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>``
|
|
1345
1357
|
|
|
1358
|
+
When ``resources.type`` equals ``AWS::Timestream::Database`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
1359
|
+
|
|
1360
|
+
- ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>``
|
|
1361
|
+
|
|
1362
|
+
When ``resources.type`` equals ``AWS::Timestream::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
1363
|
+
|
|
1364
|
+
- ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>/table/<table_name>``
|
|
1365
|
+
|
|
1346
1366
|
When resources.type equals ``AWS::VerifiedPermissions::PolicyStore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
1347
1367
|
|
|
1348
1368
|
- ``arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>``
|
|
@@ -2433,7 +2453,7 @@ class CfnTrail(
|
|
|
2433
2453
|
) -> None:
|
|
2434
2454
|
'''A single selector statement in an advanced event selector.
|
|
2435
2455
|
|
|
2436
|
-
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include ``readOnly`` , ``eventCategory`` , ``eventSource`` (for management events), ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail event records, the value must be ``Management`` or ``Data`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` - ``AWS::CloudTrail::Channel`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GuardDuty::Detector`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::KinesisVideo::Stream`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::S3::AccessPoint`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::VerifiedPermissions::PolicyStore`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals ``AWS::S3::Object`` , the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. - ``arn:<partition>:s3:::<bucket_name>/`` - ``arn:<partition>:s3:::<bucket_name>/<object_path>/`` When resources.type equals ``AWS::DynamoDB::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>`` When resources.type equals ``AWS::Lambda::Function`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:lambda:<region>:<account_ID>:function:<function_name>`` When resources.type equals ``AWS::CloudTrail::Channel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID>`` When resources.type equals ``AWS::CodeWhisperer::Profile`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID>`` When resources.type equals ``AWS::Cognito::IdentityPool`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID>`` When ``resources.type`` equals ``AWS::DynamoDB::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time>`` When ``resources.type`` equals ``AWS::EC2::Snapshot`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ec2:<region>::snapshot/<snapshot_ID>`` When ``resources.type`` equals ``AWS::EMRWAL::Workspace`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:emrwal:<region>::workspace/<workspace_name>`` When ``resources.type`` equals ``AWS::FinSpace::Environment`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID>`` When ``resources.type`` equals ``AWS::Glue::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name>`` When ``resources.type`` equals ``AWS::GuardDuty::Detector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID>`` When ``resources.type`` equals ``AWS::KendraRanking::ExecutionPlan`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID>`` When ``resources.type`` equals ``AWS::KinesisVideo::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kinesisvideo:<region>:<account_ID>:stream/<stream_name/<creation_time>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Network`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:::networks/<network_name>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Node`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID>`` When ``resources.type`` equals ``AWS::MedicalImaging::Datastore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID>`` When ``resources.type`` equals ``AWS::PCAConnectorAD::Connector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:pca-connector-ad:<region>:<account_ID>:connector/<connector_ID>`` When ``resources.type`` equals ``AWS::SageMaker::Endpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:endpoint/<endpoint_name>`` When ``resources.type`` equals ``AWS::SageMaker::ExperimentTrialComponent`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name>`` When ``resources.type`` equals ``AWS::SageMaker::FeatureGroup`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>`` When ``resources.type`` equals ``AWS::S3::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the ``StartsWith`` or ``NotStartsWith`` operators. - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>`` - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path>`` When ``resources.type`` equals ``AWS::S3ObjectLambda::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name>`` When ``resources.type`` equals ``AWS::S3Outposts::Object`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>`` When ``resources.type`` equals ``AWS::SSMMessages::ControlChannel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>`` When resources.type equals ``AWS::VerifiedPermissions::PolicyStore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>``
|
|
2456
|
+
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the field is used only for selecting events as filtering is not supported. For CloudTrail event records, supported fields include ``readOnly`` , ``eventCategory`` , ``eventSource`` (for management events), ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for AWS Config configuration items, Audit Manager evidence, or non- AWS events, the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail event records, the value must be ``Management`` or ``Data`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` - ``AWS::CloudTrail::Channel`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GuardDuty::Detector`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::KinesisVideo::Stream`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::S3::AccessPoint`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. For example, if resources.type equals ``AWS::S3::Object`` , the ARN must be in one of the following formats. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. The trailing slash is intentional; do not exclude it. Replace the text between less than and greater than symbols (<>) with resource-specific information. - ``arn:<partition>:s3:::<bucket_name>/`` - ``arn:<partition>:s3:::<bucket_name>/<object_path>/`` When resources.type equals ``AWS::DynamoDB::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>`` When resources.type equals ``AWS::Lambda::Function`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:lambda:<region>:<account_ID>:function:<function_name>`` When resources.type equals ``AWS::CloudTrail::Channel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cloudtrail:<region>:<account_ID>:channel/<channel_UUID>`` When resources.type equals ``AWS::CodeWhisperer::Profile`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:codewhisperer:<region>:<account_ID>:profile/<profile_ID>`` When resources.type equals ``AWS::Cognito::IdentityPool`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:cognito-identity:<region>:<account_ID>:identitypool/<identity_pool_ID>`` When ``resources.type`` equals ``AWS::DynamoDB::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:dynamodb:<region>:<account_ID>:table/<table_name>/stream/<date_time>`` When ``resources.type`` equals ``AWS::EC2::Snapshot`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ec2:<region>::snapshot/<snapshot_ID>`` When ``resources.type`` equals ``AWS::EMRWAL::Workspace`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:emrwal:<region>::workspace/<workspace_name>`` When ``resources.type`` equals ``AWS::FinSpace::Environment`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:finspace:<region>:<account_ID>:environment/<environment_ID>`` When ``resources.type`` equals ``AWS::Glue::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:glue:<region>:<account_ID>:table/<database_name>/<table_name>`` When ``resources.type`` equals ``AWS::GuardDuty::Detector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:guardduty:<region>:<account_ID>:detector/<detector_ID>`` When ``resources.type`` equals ``AWS::KendraRanking::ExecutionPlan`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kendra-ranking:<region>:<account_ID>:rescore-execution-plan/<rescore_execution_plan_ID>`` When ``resources.type`` equals ``AWS::KinesisVideo::Stream`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:kinesisvideo:<region>:<account_ID>:stream/<stream_name/<creation_time>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Network`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:::networks/<network_name>`` When ``resources.type`` equals ``AWS::ManagedBlockchain::Node`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:managedblockchain:<region>:<account_ID>:nodes/<node_ID>`` When ``resources.type`` equals ``AWS::MedicalImaging::Datastore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:medical-imaging:<region>:<account_ID>:datastore/<data_store_ID>`` When ``resources.type`` equals ``AWS::PCAConnectorAD::Connector`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:pca-connector-ad:<region>:<account_ID>:connector/<connector_ID>`` When ``resources.type`` equals ``AWS::SageMaker::Endpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:endpoint/<endpoint_name>`` When ``resources.type`` equals ``AWS::SageMaker::ExperimentTrialComponent`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:experiment-trial-component/<experiment_trial_component_name>`` When ``resources.type`` equals ``AWS::SageMaker::FeatureGroup`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>`` When ``resources.type`` equals ``AWS::SNS::PlatformEndpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sns:<region>:<account_ID>:endpoint/<endpoint_type>/<endpoint_name>/<endpoint_ID>`` When ``resources.type`` equals ``AWS::SNS::Topic`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:sns:<region>:<account_ID>:<topic_name>`` When ``resources.type`` equals ``AWS::S3::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the ``StartsWith`` or ``NotStartsWith`` operators. - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>`` - ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>/object/<object_path>`` When ``resources.type`` equals ``AWS::S3ObjectLambda::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-object-lambda:<region>:<account_ID>:accesspoint/<access_point_name>`` When ``resources.type`` equals ``AWS::S3Outposts::Object`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:s3-outposts:<region>:<account_ID>:<object_path>`` When ``resources.type`` equals ``AWS::SSMMessages::ControlChannel`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>`` When ``resources.type`` equals ``AWS::Timestream::Database`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>`` When ``resources.type`` equals ``AWS::Timestream::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>/table/<table_name>`` When resources.type equals ``AWS::VerifiedPermissions::PolicyStore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format: - ``arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>``
|
|
2437
2457
|
:param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
2438
2458
|
:param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
|
|
2439
2459
|
:param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
@@ -2527,10 +2547,14 @@ class CfnTrail(
|
|
|
2527
2547
|
- ``AWS::SageMaker::Endpoint``
|
|
2528
2548
|
- ``AWS::SageMaker::ExperimentTrialComponent``
|
|
2529
2549
|
- ``AWS::SageMaker::FeatureGroup``
|
|
2550
|
+
- ``AWS::SNS::PlatformEndpoint``
|
|
2551
|
+
- ``AWS::SNS::Topic``
|
|
2530
2552
|
- ``AWS::S3::AccessPoint``
|
|
2531
2553
|
- ``AWS::S3ObjectLambda::AccessPoint``
|
|
2532
2554
|
- ``AWS::S3Outposts::Object``
|
|
2533
2555
|
- ``AWS::SSMMessages::ControlChannel``
|
|
2556
|
+
- ``AWS::Timestream::Database``
|
|
2557
|
+
- ``AWS::Timestream::Table``
|
|
2534
2558
|
- ``AWS::VerifiedPermissions::PolicyStore``
|
|
2535
2559
|
|
|
2536
2560
|
You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector.
|
|
@@ -2622,6 +2646,14 @@ class CfnTrail(
|
|
|
2622
2646
|
|
|
2623
2647
|
- ``arn:<partition>:sagemaker:<region>:<account_ID>:feature-group/<feature_group_name>``
|
|
2624
2648
|
|
|
2649
|
+
When ``resources.type`` equals ``AWS::SNS::PlatformEndpoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
2650
|
+
|
|
2651
|
+
- ``arn:<partition>:sns:<region>:<account_ID>:endpoint/<endpoint_type>/<endpoint_name>/<endpoint_ID>``
|
|
2652
|
+
|
|
2653
|
+
When ``resources.type`` equals ``AWS::SNS::Topic`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
2654
|
+
|
|
2655
|
+
- ``arn:<partition>:sns:<region>:<account_ID>:<topic_name>``
|
|
2656
|
+
|
|
2625
2657
|
When ``resources.type`` equals ``AWS::S3::AccessPoint`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in one of the following formats. To log events on all objects in an S3 access point, we recommend that you use only the access point ARN, don’t include the object path, and use the ``StartsWith`` or ``NotStartsWith`` operators.
|
|
2626
2658
|
|
|
2627
2659
|
- ``arn:<partition>:s3:<region>:<account_ID>:accesspoint/<access_point_name>``
|
|
@@ -2639,6 +2671,14 @@ class CfnTrail(
|
|
|
2639
2671
|
|
|
2640
2672
|
- ``arn:<partition>:ssmmessages:<region>:<account_ID>:control-channel/<channel_ID>``
|
|
2641
2673
|
|
|
2674
|
+
When ``resources.type`` equals ``AWS::Timestream::Database`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
2675
|
+
|
|
2676
|
+
- ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>``
|
|
2677
|
+
|
|
2678
|
+
When ``resources.type`` equals ``AWS::Timestream::Table`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
2679
|
+
|
|
2680
|
+
- ``arn:<partition>:timestream:<region>:<account_ID>:database/<database_name>/table/<table_name>``
|
|
2681
|
+
|
|
2642
2682
|
When resources.type equals ``AWS::VerifiedPermissions::PolicyStore`` , and the operator is set to ``Equals`` or ``NotEquals`` , the ARN must be in the following format:
|
|
2643
2683
|
|
|
2644
2684
|
- ``arn:<partition>:verifiedpermissions:<region>:<account_ID>:policy-store/<policy_store_UUID>``
|
|
@@ -2750,7 +2790,7 @@ class CfnTrail(
|
|
|
2750
2790
|
- The ``Invoke`` API operation on *MyLambdaFunction* is an Lambda API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified logging data events for *MyLambdaFunction* , any invocations of that function are logged. The trail processes and logs the event.
|
|
2751
2791
|
- The ``Invoke`` API operation on *MyOtherLambdaFunction* is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the ``Invoke`` operation for *MyOtherLambdaFunction* does not match the function specified for the trail. The trail doesn’t log the event.
|
|
2752
2792
|
|
|
2753
|
-
:param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` The following resource types are also available through *advanced* event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see `AdvancedFieldSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedFieldSelector.html>`_ . - ``AWS::CloudTrail::Channel`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GuardDuty::Detector`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::KinesisVideo::Stream`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::S3::AccessPoint`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::VerifiedPermissions::PolicyStore``
|
|
2793
|
+
:param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` The following resource types are also available through *advanced* event selectors. Basic event selector resource types are valid in advanced event selectors, but advanced event selector resource types are not valid in basic event selectors. For more information, see `AdvancedFieldSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedFieldSelector.html>`_ . - ``AWS::CloudTrail::Channel`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GuardDuty::Detector`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::KinesisVideo::Stream`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::S3::AccessPoint`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore``
|
|
2754
2794
|
:param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified objects. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::bucket-1/`` . The trail logs data events for all objects in this S3 bucket. - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::bucket-1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix. - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` . .. epigraph:: This also enables logging of ``Invoke`` activity performed by any user or role in your AWS account , even if that activity is performed on a function that belongs to another AWS account . - To log data events for a specific Lambda function, specify the function ARN. .. epigraph:: Lambda function ARNs are exact. For example, if you specify a function ARN *arn:aws:lambda:us-west-2:111111111111:function:helloworld* , data events will only be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld* . They will not be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld2* . - To log data events for all DynamoDB tables in your AWS account , specify the prefix as ``arn:aws:dynamodb`` .
|
|
2755
2795
|
|
|
2756
2796
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html
|
|
@@ -2809,10 +2849,14 @@ class CfnTrail(
|
|
|
2809
2849
|
- ``AWS::SageMaker::Endpoint``
|
|
2810
2850
|
- ``AWS::SageMaker::ExperimentTrialComponent``
|
|
2811
2851
|
- ``AWS::SageMaker::FeatureGroup``
|
|
2852
|
+
- ``AWS::SNS::PlatformEndpoint``
|
|
2853
|
+
- ``AWS::SNS::Topic``
|
|
2812
2854
|
- ``AWS::S3::AccessPoint``
|
|
2813
2855
|
- ``AWS::S3ObjectLambda::AccessPoint``
|
|
2814
2856
|
- ``AWS::S3Outposts::Object``
|
|
2815
2857
|
- ``AWS::SSMMessages::ControlChannel``
|
|
2858
|
+
- ``AWS::Timestream::Database``
|
|
2859
|
+
- ``AWS::Timestream::Table``
|
|
2816
2860
|
- ``AWS::VerifiedPermissions::PolicyStore``
|
|
2817
2861
|
|
|
2818
2862
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html#cfn-cloudtrail-trail-dataresource-type
|