aws-cdk-lib 2.136.1__py3-none-any.whl → 2.138.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (61) hide show
  1. aws_cdk/__init__.py +8 -0
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.136.1.jsii.tgz → aws-cdk-lib@2.138.0.jsii.tgz} +0 -0
  4. aws_cdk/assertions/__init__.py +152 -5
  5. aws_cdk/aws_amplify/__init__.py +29 -113
  6. aws_cdk/aws_appconfig/__init__.py +26 -33
  7. aws_cdk/aws_apprunner/__init__.py +5 -2
  8. aws_cdk/aws_appsync/__init__.py +400 -13
  9. aws_cdk/aws_aps/__init__.py +64 -47
  10. aws_cdk/aws_b2bi/__init__.py +2 -6
  11. aws_cdk/aws_backup/__init__.py +27 -23
  12. aws_cdk/aws_batch/__init__.py +103 -0
  13. aws_cdk/aws_bcmdataexports/__init__.py +1114 -0
  14. aws_cdk/aws_chatbot/__init__.py +6 -4
  15. aws_cdk/aws_cleanrooms/__init__.py +526 -3
  16. aws_cdk/aws_cleanroomsml/__init__.py +960 -0
  17. aws_cdk/aws_cloudfront/__init__.py +196 -15
  18. aws_cdk/aws_cloudtrail/__init__.py +10 -10
  19. aws_cdk/aws_cloudwatch/__init__.py +124 -8
  20. aws_cdk/aws_codebuild/__init__.py +27 -22
  21. aws_cdk/aws_codeconnections/__init__.py +435 -0
  22. aws_cdk/aws_cognito/__init__.py +175 -79
  23. aws_cdk/aws_deadline/__init__.py +5394 -0
  24. aws_cdk/aws_ec2/__init__.py +379 -173
  25. aws_cdk/aws_ecr_assets/__init__.py +3 -4
  26. aws_cdk/aws_ecs/__init__.py +240 -1
  27. aws_cdk/aws_efs/__init__.py +2 -2
  28. aws_cdk/aws_elasticache/__init__.py +86 -32
  29. aws_cdk/aws_elasticloadbalancingv2/__init__.py +275 -5
  30. aws_cdk/aws_emr/__init__.py +2 -2
  31. aws_cdk/aws_entityresolution/__init__.py +1982 -773
  32. aws_cdk/aws_globalaccelerator/__init__.py +443 -0
  33. aws_cdk/aws_iam/__init__.py +24 -40
  34. aws_cdk/aws_internetmonitor/__init__.py +14 -6
  35. aws_cdk/aws_ivs/__init__.py +1273 -71
  36. aws_cdk/aws_kms/__init__.py +8 -13
  37. aws_cdk/aws_mediatailor/__init__.py +41 -0
  38. aws_cdk/aws_personalize/__init__.py +8 -6
  39. aws_cdk/aws_pinpoint/__init__.py +5 -3
  40. aws_cdk/aws_pipes/__init__.py +5 -1
  41. aws_cdk/aws_quicksight/__init__.py +12 -6
  42. aws_cdk/aws_rds/__init__.py +355 -85
  43. aws_cdk/aws_route53/__init__.py +591 -18
  44. aws_cdk/aws_s3_deployment/__init__.py +84 -7
  45. aws_cdk/aws_sagemaker/__init__.py +233 -2
  46. aws_cdk/aws_securityhub/__init__.py +4940 -102
  47. aws_cdk/aws_securitylake/__init__.py +1237 -55
  48. aws_cdk/aws_sns/__init__.py +183 -4
  49. aws_cdk/aws_ssmcontacts/__init__.py +11 -4
  50. aws_cdk/aws_stepfunctions/__init__.py +8 -16
  51. aws_cdk/aws_stepfunctions_tasks/__init__.py +676 -1
  52. aws_cdk/aws_transfer/__init__.py +4 -4
  53. aws_cdk/aws_verifiedpermissions/__init__.py +114 -37
  54. aws_cdk/aws_workspacesthinclient/__init__.py +8 -8
  55. aws_cdk/custom_resources/__init__.py +248 -26
  56. {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/METADATA +3 -3
  57. {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/RECORD +61 -57
  58. {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/LICENSE +0 -0
  59. {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/NOTICE +0 -0
  60. {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/WHEEL +0 -0
  61. {aws_cdk_lib-2.136.1.dist-info → aws_cdk_lib-2.138.0.dist-info}/top_level.txt +0 -0
@@ -553,14 +553,28 @@ To create an empty Key Value Store:
553
553
  store = cloudfront.KeyValueStore(self, "KeyValueStore")
554
554
  ```
555
555
 
556
- To also include an initial set of value, the `source` property can be specified. For the
557
- structure of this file, see [Creating a file of key value pairs](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/kvs-with-functions-create-s3-kvp.html).
556
+ To also include an initial set of values, the `source` property can be specified, either from a
557
+ local file or an inline string. For the structure of this file, see [Creating a file of key value pairs](https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/kvs-with-functions-create-s3-kvp.html).
558
558
 
559
559
  ```python
560
- store = cloudfront.KeyValueStore(self, "KeyValueStore",
561
- key_value_store_name="KeyValueStore",
560
+ store_asset = cloudfront.KeyValueStore(self, "KeyValueStoreAsset",
561
+ key_value_store_name="KeyValueStoreAsset",
562
562
  source=cloudfront.ImportSource.from_asset("path-to-data.json")
563
563
  )
564
+
565
+ store_inline = cloudfront.KeyValueStore(self, "KeyValueStoreInline",
566
+ key_value_store_name="KeyValueStoreInline",
567
+ source=cloudfront.ImportSource.from_inline(JSON.stringify({
568
+ "data": [{
569
+ "key": "key1",
570
+ "value": "value1"
571
+ }, {
572
+ "key": "key2",
573
+ "value": "value2"
574
+ }
575
+ ]
576
+ }))
577
+ )
564
578
  ```
565
579
 
566
580
  The Key Value Store can then be associated to a function using the `cloudfront-js-2.0` runtime
@@ -17521,10 +17535,24 @@ class ImportSource(
17521
17535
 
17522
17536
  Example::
17523
17537
 
17524
- store = cloudfront.KeyValueStore(self, "KeyValueStore",
17525
- key_value_store_name="KeyValueStore",
17538
+ store_asset = cloudfront.KeyValueStore(self, "KeyValueStoreAsset",
17539
+ key_value_store_name="KeyValueStoreAsset",
17526
17540
  source=cloudfront.ImportSource.from_asset("path-to-data.json")
17527
17541
  )
17542
+
17543
+ store_inline = cloudfront.KeyValueStore(self, "KeyValueStoreInline",
17544
+ key_value_store_name="KeyValueStoreInline",
17545
+ source=cloudfront.ImportSource.from_inline(JSON.stringify({
17546
+ "data": [{
17547
+ "key": "key1",
17548
+ "value": "value1"
17549
+ }, {
17550
+ "key": "key2",
17551
+ "value": "value2"
17552
+ }
17553
+ ]
17554
+ }))
17555
+ )
17528
17556
  '''
17529
17557
 
17530
17558
  def __init__(self) -> None:
@@ -17591,6 +17619,18 @@ class ImportSource(
17591
17619
  check_type(argname="argument key", value=key, expected_type=type_hints["key"])
17592
17620
  return typing.cast("ImportSource", jsii.sinvoke(cls, "fromBucket", [bucket, key]))
17593
17621
 
17622
+ @jsii.member(jsii_name="fromInline")
17623
+ @builtins.classmethod
17624
+ def from_inline(cls, data: builtins.str) -> "ImportSource":
17625
+ '''An import source that uses an inline string.
17626
+
17627
+ :param data: the contents of the KeyValueStore.
17628
+ '''
17629
+ if __debug__:
17630
+ type_hints = typing.get_type_hints(_typecheckingstub__a50e730aa8d5bb1d3041587df3389916448f52815ee319019e3ea67abaeb349d)
17631
+ check_type(argname="argument data", value=data, expected_type=type_hints["data"])
17632
+ return typing.cast("ImportSource", jsii.sinvoke(cls, "fromInline", [data]))
17633
+
17594
17634
 
17595
17635
  class _ImportSourceProxy(ImportSource):
17596
17636
  pass
@@ -17599,6 +17639,80 @@ class _ImportSourceProxy(ImportSource):
17599
17639
  typing.cast(typing.Any, ImportSource).__jsii_proxy_class__ = lambda : _ImportSourceProxy
17600
17640
 
17601
17641
 
17642
+ class InlineImportSource(
17643
+ ImportSource,
17644
+ metaclass=jsii.JSIIMeta,
17645
+ jsii_type="aws-cdk-lib.aws_cloudfront.InlineImportSource",
17646
+ ):
17647
+ '''An import source from an inline string.
17648
+
17649
+ :exampleMetadata: fixture=_generated
17650
+
17651
+ Example::
17652
+
17653
+ # The code below shows an example of how to instantiate this type.
17654
+ # The values are placeholders you should change.
17655
+ import aws_cdk as cdk
17656
+ from aws_cdk import aws_cloudfront as cloudfront
17657
+ from aws_cdk import aws_iam as iam
17658
+
17659
+ # docker_image: cdk.DockerImage
17660
+ # grantable: iam.IGrantable
17661
+ # local_bundling: cdk.ILocalBundling
17662
+
17663
+ inline_import_source = cloudfront.InlineImportSource.from_asset("path",
17664
+ asset_hash="assetHash",
17665
+ asset_hash_type=cdk.AssetHashType.SOURCE,
17666
+ bundling=cdk.BundlingOptions(
17667
+ image=docker_image,
17668
+
17669
+ # the properties below are optional
17670
+ bundling_file_access=cdk.BundlingFileAccess.VOLUME_COPY,
17671
+ command=["command"],
17672
+ entrypoint=["entrypoint"],
17673
+ environment={
17674
+ "environment_key": "environment"
17675
+ },
17676
+ local=local_bundling,
17677
+ network="network",
17678
+ output_type=cdk.BundlingOutput.ARCHIVED,
17679
+ platform="platform",
17680
+ security_opt="securityOpt",
17681
+ user="user",
17682
+ volumes=[cdk.DockerVolume(
17683
+ container_path="containerPath",
17684
+ host_path="hostPath",
17685
+
17686
+ # the properties below are optional
17687
+ consistency=cdk.DockerVolumeConsistency.CONSISTENT
17688
+ )],
17689
+ volumes_from=["volumesFrom"],
17690
+ working_directory="workingDirectory"
17691
+ ),
17692
+ deploy_time=False,
17693
+ exclude=["exclude"],
17694
+ follow_symlinks=cdk.SymlinkFollowMode.NEVER,
17695
+ ignore_mode=cdk.IgnoreMode.GLOB,
17696
+ readers=[grantable]
17697
+ )
17698
+ '''
17699
+
17700
+ def __init__(self, data: builtins.str) -> None:
17701
+ '''
17702
+ :param data: the contents of the KeyValueStore.
17703
+ '''
17704
+ if __debug__:
17705
+ type_hints = typing.get_type_hints(_typecheckingstub__3f4f889ac66a946410766b5f47e88439c0d5d8056cd6bcd354c8251152edc50c)
17706
+ check_type(argname="argument data", value=data, expected_type=type_hints["data"])
17707
+ jsii.create(self.__class__, self, [data])
17708
+
17709
+ @builtins.property
17710
+ @jsii.member(jsii_name="data")
17711
+ def data(self) -> builtins.str:
17712
+ '''the contents of the KeyValueStore.'''
17713
+ return typing.cast(builtins.str, jsii.get(self, "data"))
17714
+
17715
+
17602
17716
  @jsii.implements(IKeyGroup)
17603
17717
  class KeyGroup(
17604
17718
  _Resource_45bc6135,
@@ -17801,9 +17915,12 @@ class KeyValueStore(
17801
17915
 
17802
17916
  Example::
17803
17917
 
17804
- store = cloudfront.KeyValueStore(self, "KeyValueStore",
17805
- key_value_store_name="KeyValueStore",
17806
- source=cloudfront.ImportSource.from_asset("path-to-data.json")
17918
+ store = cloudfront.KeyValueStore(self, "KeyValueStore")
17919
+ cloudfront.Function(self, "Function",
17920
+ code=cloudfront.FunctionCode.from_inline("function handler(event) { return event.request }"),
17921
+ # Note that JS_2_0 must be used for Key Value Store support
17922
+ runtime=cloudfront.FunctionRuntime.JS_2_0,
17923
+ key_value_store=store
17807
17924
  )
17808
17925
  '''
17809
17926
 
@@ -17900,10 +18017,24 @@ class KeyValueStoreProps:
17900
18017
 
17901
18018
  Example::
17902
18019
 
17903
- store = cloudfront.KeyValueStore(self, "KeyValueStore",
17904
- key_value_store_name="KeyValueStore",
18020
+ store_asset = cloudfront.KeyValueStore(self, "KeyValueStoreAsset",
18021
+ key_value_store_name="KeyValueStoreAsset",
17905
18022
  source=cloudfront.ImportSource.from_asset("path-to-data.json")
17906
18023
  )
18024
+
18025
+ store_inline = cloudfront.KeyValueStore(self, "KeyValueStoreInline",
18026
+ key_value_store_name="KeyValueStoreInline",
18027
+ source=cloudfront.ImportSource.from_inline(JSON.stringify({
18028
+ "data": [{
18029
+ "key": "key1",
18030
+ "value": "value1"
18031
+ }, {
18032
+ "key": "key2",
18033
+ "value": "value2"
18034
+ }
18035
+ ]
18036
+ }))
18037
+ )
17907
18038
  '''
17908
18039
  if __debug__:
17909
18040
  type_hints = typing.get_type_hints(_typecheckingstub__0885cf023551545b14a4696bf116b851a0c7733cc2987782ba95a29b134a062e)
@@ -21536,12 +21667,49 @@ class S3ImportSource(
21536
21667
 
21537
21668
  # The code below shows an example of how to instantiate this type.
21538
21669
  # The values are placeholders you should change.
21670
+ import aws_cdk as cdk
21539
21671
  from aws_cdk import aws_cloudfront as cloudfront
21540
- from aws_cdk import aws_s3 as s3
21672
+ from aws_cdk import aws_iam as iam
21673
+
21674
+ # docker_image: cdk.DockerImage
21675
+ # grantable: iam.IGrantable
21676
+ # local_bundling: cdk.ILocalBundling
21541
21677
 
21542
- # bucket: s3.Bucket
21678
+ s3_import_source = cloudfront.S3ImportSource.from_asset("path",
21679
+ asset_hash="assetHash",
21680
+ asset_hash_type=cdk.AssetHashType.SOURCE,
21681
+ bundling=cdk.BundlingOptions(
21682
+ image=docker_image,
21543
21683
 
21544
- s3_import_source = cloudfront.S3ImportSource(bucket, "key")
21684
+ # the properties below are optional
21685
+ bundling_file_access=cdk.BundlingFileAccess.VOLUME_COPY,
21686
+ command=["command"],
21687
+ entrypoint=["entrypoint"],
21688
+ environment={
21689
+ "environment_key": "environment"
21690
+ },
21691
+ local=local_bundling,
21692
+ network="network",
21693
+ output_type=cdk.BundlingOutput.ARCHIVED,
21694
+ platform="platform",
21695
+ security_opt="securityOpt",
21696
+ user="user",
21697
+ volumes=[cdk.DockerVolume(
21698
+ container_path="containerPath",
21699
+ host_path="hostPath",
21700
+
21701
+ # the properties below are optional
21702
+ consistency=cdk.DockerVolumeConsistency.CONSISTENT
21703
+ )],
21704
+ volumes_from=["volumesFrom"],
21705
+ working_directory="workingDirectory"
21706
+ ),
21707
+ deploy_time=False,
21708
+ exclude=["exclude"],
21709
+ follow_symlinks=cdk.SymlinkFollowMode.NEVER,
21710
+ ignore_mode=cdk.IgnoreMode.GLOB,
21711
+ readers=[grantable]
21712
+ )
21545
21713
  '''
21546
21714
 
21547
21715
  def __init__(self, bucket: _IBucket_42e086fd, key: builtins.str) -> None:
@@ -22314,7 +22482,7 @@ class AssetImportSource(
22314
22482
  # grantable: iam.IGrantable
22315
22483
  # local_bundling: cdk.ILocalBundling
22316
22484
 
22317
- asset_import_source = cloudfront.AssetImportSource("path",
22485
+ asset_import_source = cloudfront.AssetImportSource.from_asset("path",
22318
22486
  asset_hash="assetHash",
22319
22487
  asset_hash_type=cdk.AssetHashType.SOURCE,
22320
22488
  bundling=cdk.BundlingOptions(
@@ -23793,6 +23961,7 @@ __all__ = [
23793
23961
  "IRealtimeLogConfig",
23794
23962
  "IResponseHeadersPolicy",
23795
23963
  "ImportSource",
23964
+ "InlineImportSource",
23796
23965
  "KeyGroup",
23797
23966
  "KeyGroupProps",
23798
23967
  "KeyValueStore",
@@ -25437,6 +25606,18 @@ def _typecheckingstub__199a9d2f509e6bf2ce32ccd58ce284ca48a05841123773473504a43c3
25437
25606
  """Type checking stubs"""
25438
25607
  pass
25439
25608
 
25609
+ def _typecheckingstub__a50e730aa8d5bb1d3041587df3389916448f52815ee319019e3ea67abaeb349d(
25610
+ data: builtins.str,
25611
+ ) -> None:
25612
+ """Type checking stubs"""
25613
+ pass
25614
+
25615
+ def _typecheckingstub__3f4f889ac66a946410766b5f47e88439c0d5d8056cd6bcd354c8251152edc50c(
25616
+ data: builtins.str,
25617
+ ) -> None:
25618
+ """Type checking stubs"""
25619
+ pass
25620
+
25440
25621
  def _typecheckingstub__8c6747d6cf01bdf872790a9315f48bb3e3363e1c57d3a822e5cf812d017c9661(
25441
25622
  scope: _constructs_77d1e7e8.Construct,
25442
25623
  id: builtins.str,
@@ -782,7 +782,7 @@ class CfnEventDataStore(
782
782
  '''
783
783
  :param scope: Scope in which this resource is defined.
784
784
  :param id: Construct identifier for this resource (unique in its scope).
785
- :param advanced_event_selectors: The advanced event selectors to use to select the events for the data store. You can configure up to five advanced event selectors for each event data store. For more information about how to use advanced event selectors to log CloudTrail events, see `Log events by using advanced event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include AWS Config configuration items in your event data store, see `Create an event data store for AWS Config configuration items <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-lake-cli.html#lake-cli-create-eds-config>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include non- AWS events in your event data store, see `Create an integration to log events from outside AWS <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-lake-cli.html#lake-cli-create-integration>`_ in the CloudTrail User Guide.
785
+ :param advanced_event_selectors: The advanced event selectors to use to select the events for the data store. You can configure up to five advanced event selectors for each event data store. For more information about how to use advanced event selectors to log CloudTrail events, see `Log events by using advanced event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include AWS Config configuration items in your event data store, see `Create an event data store for AWS Config configuration items <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/lake-eds-cli.html#lake-cli-create-eds-config>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include events outside of AWS events in your event data store, see `Create an integration to log events from outside AWS <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/lake-integrations-cli.html#lake-cli-create-integration>`_ in the CloudTrail User Guide.
786
786
  :param billing_mode: The billing mode for the event data store determines the cost for ingesting events and the default and maximum retention period for the event data store. The following are the possible values: - ``EXTENDABLE_RETENTION_PRICING`` - This billing mode is generally recommended if you want a flexible retention period of up to 3653 days (about 10 years). The default retention period for this billing mode is 366 days. - ``FIXED_RETENTION_PRICING`` - This billing mode is recommended if you expect to ingest more than 25 TB of event data per month and need a retention period of up to 2557 days (about 7 years). The default retention period for this billing mode is 2557 days. The default value is ``EXTENDABLE_RETENTION_PRICING`` . For more information about CloudTrail pricing, see `AWS CloudTrail Pricing <https://docs.aws.amazon.com/cloudtrail/pricing/>`_ and `Managing CloudTrail Lake costs <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-lake-manage-costs.html>`_ .
787
787
  :param federation_enabled: Indicates if `Lake query federation <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-federation.html>`_ is enabled. By default, Lake query federation is disabled. You cannot delete an event data store if Lake query federation is enabled.
788
788
  :param federation_role_arn: If Lake query federation is enabled, provides the ARN of the federation role used to access the resources for the federated event data store. The federation role must exist in your account and provide the `required minimum permissions <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-federation.html#query-federation-permissions-role>`_ .
@@ -1814,7 +1814,7 @@ class CfnEventDataStoreProps:
1814
1814
  ) -> None:
1815
1815
  '''Properties for defining a ``CfnEventDataStore``.
1816
1816
 
1817
- :param advanced_event_selectors: The advanced event selectors to use to select the events for the data store. You can configure up to five advanced event selectors for each event data store. For more information about how to use advanced event selectors to log CloudTrail events, see `Log events by using advanced event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include AWS Config configuration items in your event data store, see `Create an event data store for AWS Config configuration items <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-lake-cli.html#lake-cli-create-eds-config>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include non- AWS events in your event data store, see `Create an integration to log events from outside AWS <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-lake-cli.html#lake-cli-create-integration>`_ in the CloudTrail User Guide.
1817
+ :param advanced_event_selectors: The advanced event selectors to use to select the events for the data store. You can configure up to five advanced event selectors for each event data store. For more information about how to use advanced event selectors to log CloudTrail events, see `Log events by using advanced event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include AWS Config configuration items in your event data store, see `Create an event data store for AWS Config configuration items <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/lake-eds-cli.html#lake-cli-create-eds-config>`_ in the CloudTrail User Guide. For more information about how to use advanced event selectors to include events outside of AWS events in your event data store, see `Create an integration to log events from outside AWS <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/lake-integrations-cli.html#lake-cli-create-integration>`_ in the CloudTrail User Guide.
1818
1818
  :param billing_mode: The billing mode for the event data store determines the cost for ingesting events and the default and maximum retention period for the event data store. The following are the possible values: - ``EXTENDABLE_RETENTION_PRICING`` - This billing mode is generally recommended if you want a flexible retention period of up to 3653 days (about 10 years). The default retention period for this billing mode is 366 days. - ``FIXED_RETENTION_PRICING`` - This billing mode is recommended if you expect to ingest more than 25 TB of event data per month and need a retention period of up to 2557 days (about 7 years). The default retention period for this billing mode is 2557 days. The default value is ``EXTENDABLE_RETENTION_PRICING`` . For more information about CloudTrail pricing, see `AWS CloudTrail Pricing <https://docs.aws.amazon.com/cloudtrail/pricing/>`_ and `Managing CloudTrail Lake costs <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-lake-manage-costs.html>`_ .
1819
1819
  :param federation_enabled: Indicates if `Lake query federation <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-federation.html>`_ is enabled. By default, Lake query federation is disabled. You cannot delete an event data store if Lake query federation is enabled.
1820
1820
  :param federation_role_arn: If Lake query federation is enabled, provides the ARN of the federation role used to access the resources for the federated event data store. The federation role must exist in your account and provide the `required minimum permissions <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-federation.html#query-federation-permissions-role>`_ .
@@ -1931,9 +1931,9 @@ class CfnEventDataStoreProps:
1931
1931
 
1932
1932
  For more information about how to use advanced event selectors to log CloudTrail events, see `Log events by using advanced event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-advanced>`_ in the CloudTrail User Guide.
1933
1933
 
1934
- For more information about how to use advanced event selectors to include AWS Config configuration items in your event data store, see `Create an event data store for AWS Config configuration items <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-lake-cli.html#lake-cli-create-eds-config>`_ in the CloudTrail User Guide.
1934
+ For more information about how to use advanced event selectors to include AWS Config configuration items in your event data store, see `Create an event data store for AWS Config configuration items <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/lake-eds-cli.html#lake-cli-create-eds-config>`_ in the CloudTrail User Guide.
1935
1935
 
1936
- For more information about how to use advanced event selectors to include non- AWS events in your event data store, see `Create an integration to log events from outside AWS <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/query-lake-cli.html#lake-cli-create-integration>`_ in the CloudTrail User Guide.
1936
+ For more information about how to use advanced event selectors to include events outside of AWS events in your event data store, see `Create an integration to log events from outside AWS <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/lake-integrations-cli.html#lake-cli-create-integration>`_ in the CloudTrail User Guide.
1937
1937
 
1938
1938
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-eventdatastore.html#cfn-cloudtrail-eventdatastore-advancedeventselectors
1939
1939
  '''
@@ -2417,7 +2417,7 @@ class CfnTrail(
2417
2417
  :param scope: Scope in which this resource is defined.
2418
2418
  :param id: Construct identifier for this resource (unique in its scope).
2419
2419
  :param is_logging: Whether the CloudTrail trail is currently logging AWS API calls.
2420
- :param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket Naming Requirements <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/create_trail_naming_policy.html>`_ .
2420
+ :param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
2421
2421
  :param advanced_event_selectors: Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
2422
2422
  :param cloud_watch_logs_log_group_arn: Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. Not required unless you specify ``CloudWatchLogsRoleArn`` .
2423
2423
  :param cloud_watch_logs_role_arn: Specifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group. You must use a role that exists in your account.
@@ -2428,7 +2428,7 @@ class CfnTrail(
2428
2428
  :param is_multi_region_trail: Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
2429
2429
  :param is_organization_trail: Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to ``true`` , the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set to ``false`` , the trail will remain in the current AWS account but be deleted from all member accounts in the organization. .. epigraph:: Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail.
2430
2430
  :param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
2431
- :param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-find-log-files.html>`_ . The maximum length is 200 characters.
2431
+ :param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
2432
2432
  :param sns_topic_name: Specifies the name of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.
2433
2433
  :param tags: A custom set of tags (key-value pairs) for this trail.
2434
2434
  :param trail_name: Specifies the name of the trail. The name must meet the following requirements:. - Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), or dashes (-) - Start with a letter or number, and end with a letter or number - Be between 3 and 128 characters - Have no adjacent periods, underscores or dashes. Names like ``my-_namespace`` and ``my--namespace`` are not valid. - Not be in IP address format (for example, 192.168.5.4)
@@ -3738,7 +3738,7 @@ class CfnTrailProps:
3738
3738
  '''Properties for defining a ``CfnTrail``.
3739
3739
 
3740
3740
  :param is_logging: Whether the CloudTrail trail is currently logging AWS API calls.
3741
- :param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket Naming Requirements <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/create_trail_naming_policy.html>`_ .
3741
+ :param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
3742
3742
  :param advanced_event_selectors: Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
3743
3743
  :param cloud_watch_logs_log_group_arn: Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. Not required unless you specify ``CloudWatchLogsRoleArn`` .
3744
3744
  :param cloud_watch_logs_role_arn: Specifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group. You must use a role that exists in your account.
@@ -3749,7 +3749,7 @@ class CfnTrailProps:
3749
3749
  :param is_multi_region_trail: Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
3750
3750
  :param is_organization_trail: Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to ``true`` , the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set to ``false`` , the trail will remain in the current AWS account but be deleted from all member accounts in the organization. .. epigraph:: Only the management account for the organization can convert an organization trail to a non-organization trail, or convert a non-organization trail to an organization trail.
3751
3751
  :param kms_key_id: Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by "alias/", a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see `Using multi-Region keys <https://docs.aws.amazon.com/kms/latest/developerguide/multi-region-keys-overview.html>`_ in the *AWS Key Management Service Developer Guide* . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012
3752
- :param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-find-log-files.html>`_ . The maximum length is 200 characters.
3752
+ :param s3_key_prefix: Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
3753
3753
  :param sns_topic_name: Specifies the name of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.
3754
3754
  :param tags: A custom set of tags (key-value pairs) for this trail.
3755
3755
  :param trail_name: Specifies the name of the trail. The name must meet the following requirements:. - Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), or dashes (-) - Start with a letter or number, and end with a letter or number - Be between 3 and 128 characters - Have no adjacent periods, underscores or dashes. Names like ``my-_namespace`` and ``my--namespace`` are not valid. - Not be in IP address format (for example, 192.168.5.4)
@@ -3879,7 +3879,7 @@ class CfnTrailProps:
3879
3879
  def s3_bucket_name(self) -> builtins.str:
3880
3880
  '''Specifies the name of the Amazon S3 bucket designated for publishing log files.
3881
3881
 
3882
- See `Amazon S3 Bucket Naming Requirements <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/create_trail_naming_policy.html>`_ .
3882
+ See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
3883
3883
 
3884
3884
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html#cfn-cloudtrail-trail-s3bucketname
3885
3885
  '''
@@ -4037,7 +4037,7 @@ class CfnTrailProps:
4037
4037
  def s3_key_prefix(self) -> typing.Optional[builtins.str]:
4038
4038
  '''Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery.
4039
4039
 
4040
- For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-find-log-files.html>`_ . The maximum length is 200 characters.
4040
+ For more information, see `Finding Your CloudTrail Log Files <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/get-and-view-cloudtrail-log-files.html#cloudtrail-find-log-files>`_ . The maximum length is 200 characters.
4041
4041
 
4042
4042
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html#cfn-cloudtrail-trail-s3keyprefix
4043
4043
  '''