aws-cdk-lib 2.152.0__py3-none-any.whl → 2.154.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +157 -215
- aws_cdk/_jsii/__init__.py +2 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.152.0.jsii.tgz → aws-cdk-lib@2.154.0.jsii.tgz} +0 -0
- aws_cdk/alexa_ask/__init__.py +3 -3
- aws_cdk/aws_accessanalyzer/__init__.py +5 -5
- aws_cdk/aws_acmpca/__init__.py +79 -24
- aws_cdk/aws_amazonmq/__init__.py +161 -161
- aws_cdk/aws_amplify/__init__.py +36 -36
- aws_cdk/aws_amplifyuibuilder/__init__.py +32 -32
- aws_cdk/aws_apigateway/__init__.py +122 -122
- aws_cdk/aws_apigatewayv2/__init__.py +135 -121
- aws_cdk/aws_apigatewayv2_integrations/__init__.py +12 -12
- aws_cdk/aws_appconfig/__init__.py +59 -59
- aws_cdk/aws_appflow/__init__.py +20 -20
- aws_cdk/aws_appintegrations/__init__.py +19 -19
- aws_cdk/aws_applicationautoscaling/__init__.py +31 -16
- aws_cdk/aws_applicationinsights/__init__.py +11 -11
- aws_cdk/aws_applicationsignals/__init__.py +5 -5
- aws_cdk/aws_appmesh/__init__.py +35 -35
- aws_cdk/aws_apprunner/__init__.py +25 -25
- aws_cdk/aws_appstream/__init__.py +105 -105
- aws_cdk/aws_appsync/__init__.py +89 -89
- aws_cdk/aws_apptest/__init__.py +25 -25
- aws_cdk/aws_aps/__init__.py +14 -14
- aws_cdk/aws_arczonalshift/__init__.py +200 -3
- aws_cdk/aws_athena/__init__.py +25 -25
- aws_cdk/aws_auditmanager/__init__.py +15 -15
- aws_cdk/aws_autoscaling/__init__.py +84 -84
- aws_cdk/aws_autoscalingplans/__init__.py +2 -2
- aws_cdk/aws_b2bi/__init__.py +24 -24
- aws_cdk/aws_backup/__init__.py +33 -33
- aws_cdk/aws_backupgateway/__init__.py +7 -7
- aws_cdk/aws_batch/__init__.py +289 -35
- aws_cdk/aws_bcmdataexports/__init__.py +2 -2
- aws_cdk/aws_bedrock/__init__.py +13239 -3277
- aws_cdk/aws_billingconductor/__init__.py +28 -28
- aws_cdk/aws_budgets/__init__.py +12 -12
- aws_cdk/aws_cassandra/__init__.py +16 -16
- aws_cdk/aws_ce/__init__.py +17 -17
- aws_cdk/aws_certificatemanager/__init__.py +9 -9
- aws_cdk/aws_chatbot/__init__.py +22 -22
- aws_cdk/aws_cleanrooms/__init__.py +2470 -307
- aws_cdk/aws_cleanroomsml/__init__.py +5 -5
- aws_cdk/aws_cloud9/__init__.py +10 -10
- aws_cdk/aws_cloudformation/__init__.py +94 -69
- aws_cdk/aws_cloudfront/__init__.py +31 -30
- aws_cdk/aws_cloudfront/experimental/__init__.py +23 -0
- aws_cdk/aws_cloudtrail/__init__.py +46 -44
- aws_cdk/aws_cloudwatch/__init__.py +61 -69
- aws_cdk/aws_codeartifact/__init__.py +19 -19
- aws_cdk/aws_codebuild/__init__.py +60 -68
- aws_cdk/aws_codecommit/__init__.py +10 -6
- aws_cdk/aws_codeconnections/__init__.py +5 -5
- aws_cdk/aws_codedeploy/__init__.py +28 -28
- aws_cdk/aws_codeguruprofiler/__init__.py +5 -5
- aws_cdk/aws_codegurureviewer/__init__.py +6 -6
- aws_cdk/aws_codepipeline/__init__.py +849 -52
- aws_cdk/aws_codepipeline_actions/__init__.py +1 -1
- aws_cdk/aws_codestar/__init__.py +8 -8
- aws_cdk/aws_codestarconnections/__init__.py +17 -17
- aws_cdk/aws_codestarnotifications/__init__.py +10 -10
- aws_cdk/aws_cognito/__init__.py +465 -133
- aws_cdk/aws_comprehend/__init__.py +20 -20
- aws_cdk/aws_config/__init__.py +67 -67
- aws_cdk/aws_connect/__init__.py +139 -137
- aws_cdk/aws_connectcampaigns/__init__.py +5 -5
- aws_cdk/aws_controltower/__init__.py +12 -12
- aws_cdk/aws_cur/__init__.py +12 -12
- aws_cdk/aws_customerprofiles/__init__.py +36 -36
- aws_cdk/aws_databrew/__init__.py +45 -45
- aws_cdk/aws_datapipeline/__init__.py +12 -8
- aws_cdk/aws_datasync/__init__.py +119 -117
- aws_cdk/aws_datazone/__init__.py +63 -63
- aws_cdk/aws_dax/__init__.py +20 -20
- aws_cdk/aws_deadline/__init__.py +221 -292
- aws_cdk/aws_detective/__init__.py +8 -8
- aws_cdk/aws_devicefarm/__init__.py +37 -37
- aws_cdk/aws_devopsguru/__init__.py +2 -2
- aws_cdk/aws_directoryservice/__init__.py +15 -15
- aws_cdk/aws_dlm/__init__.py +12 -12
- aws_cdk/aws_dms/__init__.py +300 -298
- aws_cdk/aws_docdb/__init__.py +49 -49
- aws_cdk/aws_docdbelastic/__init__.py +14 -14
- aws_cdk/aws_dynamodb/__init__.py +371 -37
- aws_cdk/aws_ec2/__init__.py +900 -606
- aws_cdk/aws_ecr/__init__.py +117 -77
- aws_cdk/aws_ecr_assets/__init__.py +4 -4
- aws_cdk/aws_ecs/__init__.py +190 -191
- aws_cdk/aws_ecs_patterns/__init__.py +2 -2
- aws_cdk/aws_efs/__init__.py +22 -22
- aws_cdk/aws_eks/__init__.py +177 -61
- aws_cdk/aws_elasticache/__init__.py +218 -226
- aws_cdk/aws_elasticbeanstalk/__init__.py +25 -25
- aws_cdk/aws_elasticloadbalancing/__init__.py +16 -16
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +1066 -102
- aws_cdk/aws_elasticloadbalancingv2_targets/__init__.py +86 -4
- aws_cdk/aws_elasticsearch/__init__.py +16 -16
- aws_cdk/aws_emr/__init__.py +74 -74
- aws_cdk/aws_emrcontainers/__init__.py +3 -3
- aws_cdk/aws_emrserverless/__init__.py +157 -14
- aws_cdk/aws_entityresolution/__init__.py +613 -35
- aws_cdk/aws_events/__init__.py +42 -42
- aws_cdk/aws_eventschemas/__init__.py +16 -16
- aws_cdk/aws_evidently/__init__.py +38 -38
- aws_cdk/aws_finspace/__init__.py +8 -8
- aws_cdk/aws_fis/__init__.py +12 -12
- aws_cdk/aws_fms/__init__.py +21 -21
- aws_cdk/aws_forecast/__init__.py +18 -11
- aws_cdk/aws_frauddetector/__init__.py +35 -35
- aws_cdk/aws_fsx/__init__.py +35 -35
- aws_cdk/aws_gamelift/__init__.py +103 -103
- aws_cdk/aws_globalaccelerator/__init__.py +46 -24
- aws_cdk/aws_glue/__init__.py +132 -139
- aws_cdk/aws_grafana/__init__.py +17 -17
- aws_cdk/aws_greengrass/__init__.py +48 -48
- aws_cdk/aws_greengrassv2/__init__.py +10 -10
- aws_cdk/aws_groundstation/__init__.py +16 -16
- aws_cdk/aws_guardduty/__init__.py +40 -38
- aws_cdk/aws_healthimaging/__init__.py +3 -3
- aws_cdk/aws_healthlake/__init__.py +6 -6
- aws_cdk/aws_iam/__init__.py +120 -122
- aws_cdk/aws_identitystore/__init__.py +6 -6
- aws_cdk/aws_imagebuilder/__init__.py +92 -92
- aws_cdk/aws_inspector/__init__.py +8 -8
- aws_cdk/aws_inspectorv2/__init__.py +102 -97
- aws_cdk/aws_internetmonitor/__init__.py +12 -12
- aws_cdk/aws_iot/__init__.py +141 -141
- aws_cdk/aws_iot1click/__init__.py +9 -9
- aws_cdk/aws_iotanalytics/__init__.py +21 -21
- aws_cdk/aws_iotcoredeviceadvisor/__init__.py +2 -2
- aws_cdk/aws_iotevents/__init__.py +20 -20
- aws_cdk/aws_iotfleethub/__init__.py +4 -4
- aws_cdk/aws_iotfleetwise/__init__.py +45 -45
- aws_cdk/aws_iotsitewise/__init__.py +40 -40
- aws_cdk/aws_iotthingsgraph/__init__.py +2 -2
- aws_cdk/aws_iottwinmaker/__init__.py +34 -34
- aws_cdk/aws_iotwireless/__init__.py +66 -66
- aws_cdk/aws_ivs/__init__.py +32 -32
- aws_cdk/aws_ivschat/__init__.py +9 -9
- aws_cdk/aws_kafkaconnect/__init__.py +22 -22
- aws_cdk/aws_kendra/__init__.py +28 -28
- aws_cdk/aws_kendraranking/__init__.py +4 -4
- aws_cdk/aws_kinesis/__init__.py +8 -8
- aws_cdk/aws_kinesisanalytics/__init__.py +23 -23
- aws_cdk/aws_kinesisanalyticsv2/__init__.py +15 -15
- aws_cdk/aws_kinesisfirehose/__init__.py +677 -18
- aws_cdk/aws_kinesisvideo/__init__.py +10 -10
- aws_cdk/aws_kms/__init__.py +20 -20
- aws_cdk/aws_lakeformation/__init__.py +36 -36
- aws_cdk/aws_lambda/__init__.py +435 -227
- aws_cdk/aws_lambda_nodejs/__init__.py +23 -0
- aws_cdk/aws_launchwizard/__init__.py +508 -0
- aws_cdk/aws_lex/__init__.py +24 -24
- aws_cdk/aws_licensemanager/__init__.py +17 -17
- aws_cdk/aws_lightsail/__init__.py +90 -90
- aws_cdk/aws_location/__init__.py +41 -41
- aws_cdk/aws_logs/__init__.py +50 -50
- aws_cdk/aws_lookoutequipment/__init__.py +9 -9
- aws_cdk/aws_lookoutmetrics/__init__.py +10 -10
- aws_cdk/aws_lookoutvision/__init__.py +1 -1
- aws_cdk/aws_m2/__init__.py +20 -20
- aws_cdk/aws_macie/__init__.py +19 -19
- aws_cdk/aws_managedblockchain/__init__.py +10 -10
- aws_cdk/aws_mediaconnect/__init__.py +114 -77
- aws_cdk/aws_mediaconvert/__init__.py +20 -20
- aws_cdk/aws_medialive/__init__.py +44 -76
- aws_cdk/aws_mediapackage/__init__.py +38 -38
- aws_cdk/aws_mediapackagev2/__init__.py +178 -25
- aws_cdk/aws_mediastore/__init__.py +7 -7
- aws_cdk/aws_mediatailor/__init__.py +40 -40
- aws_cdk/aws_memorydb/__init__.py +41 -41
- aws_cdk/aws_msk/__init__.py +39 -39
- aws_cdk/aws_mwaa/__init__.py +25 -25
- aws_cdk/aws_neptune/__init__.py +55 -55
- aws_cdk/aws_neptunegraph/__init__.py +11 -11
- aws_cdk/aws_networkfirewall/__init__.py +36 -30
- aws_cdk/aws_networkmanager/__init__.py +1062 -91
- aws_cdk/aws_nimblestudio/__init__.py +31 -31
- aws_cdk/aws_oam/__init__.py +8 -8
- aws_cdk/aws_omics/__init__.py +36 -36
- aws_cdk/aws_opensearchserverless/__init__.py +25 -25
- aws_cdk/aws_opensearchservice/__init__.py +20 -20
- aws_cdk/aws_opsworks/__init__.py +87 -87
- aws_cdk/aws_opsworkscm/__init__.py +21 -21
- aws_cdk/aws_organizations/__init__.py +17 -17
- aws_cdk/aws_osis/__init__.py +122 -9
- aws_cdk/aws_panorama/__init__.py +27 -22
- aws_cdk/aws_paymentcryptography/__init__.py +7 -7
- aws_cdk/aws_pcaconnectorad/__init__.py +17 -17
- aws_cdk/aws_personalize/__init__.py +19 -19
- aws_cdk/aws_pinpoint/__init__.py +122 -122
- aws_cdk/aws_pinpointemail/__init__.py +16 -16
- aws_cdk/aws_pipes/__init__.py +14 -16
- aws_cdk/aws_proton/__init__.py +19 -19
- aws_cdk/aws_qbusiness/__init__.py +160 -45
- aws_cdk/aws_qldb/__init__.py +12 -12
- aws_cdk/aws_quicksight/__init__.py +91 -91
- aws_cdk/aws_ram/__init__.py +11 -11
- aws_cdk/aws_rds/__init__.py +365 -259
- aws_cdk/aws_redshift/__init__.py +136 -91
- aws_cdk/aws_redshiftserverless/__init__.py +27 -27
- aws_cdk/aws_refactorspaces/__init__.py +26 -26
- aws_cdk/aws_rekognition/__init__.py +16 -16
- aws_cdk/aws_resiliencehub/__init__.py +15 -15
- aws_cdk/aws_resourceexplorer2/__init__.py +8 -8
- aws_cdk/aws_resourcegroups/__init__.py +6 -6
- aws_cdk/aws_robomaker/__init__.py +25 -25
- aws_cdk/aws_rolesanywhere/__init__.py +67 -19
- aws_cdk/aws_route53/__init__.py +36 -36
- aws_cdk/aws_route53profiles/__init__.py +11 -11
- aws_cdk/aws_route53recoverycontrol/__init__.py +14 -14
- aws_cdk/aws_route53recoveryreadiness/__init__.py +13 -13
- aws_cdk/aws_route53resolver/__init__.py +123 -82
- aws_cdk/aws_rum/__init__.py +6 -6
- aws_cdk/aws_s3/__init__.py +136 -80
- aws_cdk/aws_s3_deployment/__init__.py +30 -24
- aws_cdk/aws_s3_notifications/__init__.py +3 -4
- aws_cdk/aws_s3express/__init__.py +5 -5
- aws_cdk/aws_s3objectlambda/__init__.py +6 -6
- aws_cdk/aws_s3outposts/__init__.py +16 -16
- aws_cdk/aws_sagemaker/__init__.py +2412 -280
- aws_cdk/aws_sam/__init__.py +101 -101
- aws_cdk/aws_scheduler/__init__.py +13 -13
- aws_cdk/aws_sdb/__init__.py +1 -1
- aws_cdk/aws_secretsmanager/__init__.py +20 -19
- aws_cdk/aws_securityhub/__init__.py +70 -57
- aws_cdk/aws_securitylake/__init__.py +341 -16
- aws_cdk/aws_servicecatalog/__init__.py +87 -87
- aws_cdk/aws_servicecatalogappregistry/__init__.py +12 -12
- aws_cdk/aws_servicediscovery/__init__.py +23 -23
- aws_cdk/aws_ses/__init__.py +12038 -5604
- aws_cdk/aws_shield/__init__.py +15 -15
- aws_cdk/aws_signer/__init__.py +9 -9
- aws_cdk/aws_simspaceweaver/__init__.py +5 -5
- aws_cdk/aws_sns/__init__.py +28 -28
- aws_cdk/aws_sqs/__init__.py +20 -20
- aws_cdk/aws_ssm/__init__.py +172 -101
- aws_cdk/aws_ssmcontacts/__init__.py +18 -18
- aws_cdk/aws_ssmincidents/__init__.py +11 -11
- aws_cdk/aws_sso/__init__.py +31 -31
- aws_cdk/aws_stepfunctions/__init__.py +370 -28
- aws_cdk/aws_supportapp/__init__.py +11 -11
- aws_cdk/aws_synthetics/__init__.py +18 -18
- aws_cdk/aws_systemsmanagersap/__init__.py +48 -7
- aws_cdk/aws_timestream/__init__.py +34 -34
- aws_cdk/aws_transfer/__init__.py +57 -57
- aws_cdk/aws_verifiedpermissions/__init__.py +11 -11
- aws_cdk/aws_voiceid/__init__.py +4 -4
- aws_cdk/aws_vpclattice/__init__.py +42 -42
- aws_cdk/aws_waf/__init__.py +17 -17
- aws_cdk/aws_wafregional/__init__.py +28 -28
- aws_cdk/aws_wafv2/__init__.py +39 -39
- aws_cdk/aws_wisdom/__init__.py +16 -16
- aws_cdk/aws_workspaces/__init__.py +18 -18
- aws_cdk/aws_workspacesthinclient/__init__.py +63 -9
- aws_cdk/aws_workspacesweb/__init__.py +87 -46
- aws_cdk/aws_xray/__init__.py +12 -12
- aws_cdk/cloud_assembly_schema/__init__.py +348 -239
- aws_cdk/custom_resources/__init__.py +283 -0
- aws_cdk/cx_api/__init__.py +15 -15
- aws_cdk/pipelines/__init__.py +172 -237
- aws_cdk/triggers/__init__.py +23 -0
- {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/METADATA +3 -2
- aws_cdk_lib-2.154.0.dist-info/RECORD +292 -0
- aws_cdk_lib-2.152.0.dist-info/RECORD +0 -291
- {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.152.0.dist-info → aws_cdk_lib-2.154.0.dist-info}/top_level.txt +0 -0
|
@@ -473,7 +473,7 @@ class CfnChannel(
|
|
|
473
473
|
if __debug__:
|
|
474
474
|
type_hints = typing.get_type_hints(_typecheckingstub__af90446cbf2dae59bef52fb3ee6ec0e5b9c6098eff5af75a5963dd51c4683a5e)
|
|
475
475
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
476
|
-
jsii.set(self, "destinations", value)
|
|
476
|
+
jsii.set(self, "destinations", value) # pyright: ignore[reportArgumentType]
|
|
477
477
|
|
|
478
478
|
@builtins.property
|
|
479
479
|
@jsii.member(jsii_name="name")
|
|
@@ -486,7 +486,7 @@ class CfnChannel(
|
|
|
486
486
|
if __debug__:
|
|
487
487
|
type_hints = typing.get_type_hints(_typecheckingstub__9f6f560b40b7326691d9bf63d6ea7b8ad77377af3911f812fa5d243141752b34)
|
|
488
488
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
489
|
-
jsii.set(self, "name", value)
|
|
489
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
490
490
|
|
|
491
491
|
@builtins.property
|
|
492
492
|
@jsii.member(jsii_name="source")
|
|
@@ -499,7 +499,7 @@ class CfnChannel(
|
|
|
499
499
|
if __debug__:
|
|
500
500
|
type_hints = typing.get_type_hints(_typecheckingstub__63777c16355eca1495edc2932fdadb55a7e3c86d73124f1d93d1c28b2ad64ee7)
|
|
501
501
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
502
|
-
jsii.set(self, "source", value)
|
|
502
|
+
jsii.set(self, "source", value) # pyright: ignore[reportArgumentType]
|
|
503
503
|
|
|
504
504
|
@builtins.property
|
|
505
505
|
@jsii.member(jsii_name="tagsRaw")
|
|
@@ -512,7 +512,7 @@ class CfnChannel(
|
|
|
512
512
|
if __debug__:
|
|
513
513
|
type_hints = typing.get_type_hints(_typecheckingstub__29044cfd0c28f00acd85e04beb454a19a2c4d87d4786f0af019f0209c639da8b)
|
|
514
514
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
515
|
-
jsii.set(self, "tagsRaw", value)
|
|
515
|
+
jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
|
|
516
516
|
|
|
517
517
|
@jsii.data_type(
|
|
518
518
|
jsii_type="aws-cdk-lib.aws_cloudtrail.CfnChannel.DestinationProperty",
|
|
@@ -913,7 +913,7 @@ class CfnEventDataStore(
|
|
|
913
913
|
if __debug__:
|
|
914
914
|
type_hints = typing.get_type_hints(_typecheckingstub__7bc51d9a1ef5affc48ffb624785b29a7a5d0a3eba5e72b94f687da94194f4973)
|
|
915
915
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
916
|
-
jsii.set(self, "advancedEventSelectors", value)
|
|
916
|
+
jsii.set(self, "advancedEventSelectors", value) # pyright: ignore[reportArgumentType]
|
|
917
917
|
|
|
918
918
|
@builtins.property
|
|
919
919
|
@jsii.member(jsii_name="billingMode")
|
|
@@ -926,7 +926,7 @@ class CfnEventDataStore(
|
|
|
926
926
|
if __debug__:
|
|
927
927
|
type_hints = typing.get_type_hints(_typecheckingstub__106939491635761bff083d6af3ca26d1723f9df71ec433399c5746554b88e334)
|
|
928
928
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
929
|
-
jsii.set(self, "billingMode", value)
|
|
929
|
+
jsii.set(self, "billingMode", value) # pyright: ignore[reportArgumentType]
|
|
930
930
|
|
|
931
931
|
@builtins.property
|
|
932
932
|
@jsii.member(jsii_name="federationEnabled")
|
|
@@ -944,7 +944,7 @@ class CfnEventDataStore(
|
|
|
944
944
|
if __debug__:
|
|
945
945
|
type_hints = typing.get_type_hints(_typecheckingstub__765513d5a073b76962f766e5dc1a967c4ad42a5bb2200d9f880aac945789b35d)
|
|
946
946
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
947
|
-
jsii.set(self, "federationEnabled", value)
|
|
947
|
+
jsii.set(self, "federationEnabled", value) # pyright: ignore[reportArgumentType]
|
|
948
948
|
|
|
949
949
|
@builtins.property
|
|
950
950
|
@jsii.member(jsii_name="federationRoleArn")
|
|
@@ -957,7 +957,7 @@ class CfnEventDataStore(
|
|
|
957
957
|
if __debug__:
|
|
958
958
|
type_hints = typing.get_type_hints(_typecheckingstub__02d5876fb281f125b4a84c7554b6ae992b9b7433cab839d402d60601a9872704)
|
|
959
959
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
960
|
-
jsii.set(self, "federationRoleArn", value)
|
|
960
|
+
jsii.set(self, "federationRoleArn", value) # pyright: ignore[reportArgumentType]
|
|
961
961
|
|
|
962
962
|
@builtins.property
|
|
963
963
|
@jsii.member(jsii_name="ingestionEnabled")
|
|
@@ -975,7 +975,7 @@ class CfnEventDataStore(
|
|
|
975
975
|
if __debug__:
|
|
976
976
|
type_hints = typing.get_type_hints(_typecheckingstub__3120b4fc57c151f577843e6f55242684964162de4d4061991c82480a0fae581b)
|
|
977
977
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
978
|
-
jsii.set(self, "ingestionEnabled", value)
|
|
978
|
+
jsii.set(self, "ingestionEnabled", value) # pyright: ignore[reportArgumentType]
|
|
979
979
|
|
|
980
980
|
@builtins.property
|
|
981
981
|
@jsii.member(jsii_name="insightsDestination")
|
|
@@ -988,7 +988,7 @@ class CfnEventDataStore(
|
|
|
988
988
|
if __debug__:
|
|
989
989
|
type_hints = typing.get_type_hints(_typecheckingstub__d10aa59d5d60b5a68edf57d8df52934e03f5e4f0802a1d7dab4552592f2ee609)
|
|
990
990
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
991
|
-
jsii.set(self, "insightsDestination", value)
|
|
991
|
+
jsii.set(self, "insightsDestination", value) # pyright: ignore[reportArgumentType]
|
|
992
992
|
|
|
993
993
|
@builtins.property
|
|
994
994
|
@jsii.member(jsii_name="insightSelectors")
|
|
@@ -1006,7 +1006,7 @@ class CfnEventDataStore(
|
|
|
1006
1006
|
if __debug__:
|
|
1007
1007
|
type_hints = typing.get_type_hints(_typecheckingstub__b360ff34d6b267287ccf6e4c636b401ab6c739c7a90856639462b1c738855c92)
|
|
1008
1008
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1009
|
-
jsii.set(self, "insightSelectors", value)
|
|
1009
|
+
jsii.set(self, "insightSelectors", value) # pyright: ignore[reportArgumentType]
|
|
1010
1010
|
|
|
1011
1011
|
@builtins.property
|
|
1012
1012
|
@jsii.member(jsii_name="kmsKeyId")
|
|
@@ -1019,7 +1019,7 @@ class CfnEventDataStore(
|
|
|
1019
1019
|
if __debug__:
|
|
1020
1020
|
type_hints = typing.get_type_hints(_typecheckingstub__b2945b7a3d4af202bf1a8d8550ce4b17a1ab219e4dd829832fc9bd51a53c69b0)
|
|
1021
1021
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1022
|
-
jsii.set(self, "kmsKeyId", value)
|
|
1022
|
+
jsii.set(self, "kmsKeyId", value) # pyright: ignore[reportArgumentType]
|
|
1023
1023
|
|
|
1024
1024
|
@builtins.property
|
|
1025
1025
|
@jsii.member(jsii_name="multiRegionEnabled")
|
|
@@ -1037,7 +1037,7 @@ class CfnEventDataStore(
|
|
|
1037
1037
|
if __debug__:
|
|
1038
1038
|
type_hints = typing.get_type_hints(_typecheckingstub__69742230d7479a5e2d180046d6dbe2ea4627b1fbe6861d248e8fa77f7c0dcd20)
|
|
1039
1039
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1040
|
-
jsii.set(self, "multiRegionEnabled", value)
|
|
1040
|
+
jsii.set(self, "multiRegionEnabled", value) # pyright: ignore[reportArgumentType]
|
|
1041
1041
|
|
|
1042
1042
|
@builtins.property
|
|
1043
1043
|
@jsii.member(jsii_name="name")
|
|
@@ -1050,7 +1050,7 @@ class CfnEventDataStore(
|
|
|
1050
1050
|
if __debug__:
|
|
1051
1051
|
type_hints = typing.get_type_hints(_typecheckingstub__a01c2b1ec1e4ebac8e9e92744ee1402309ee4033c2267e1089f605b125f4b192)
|
|
1052
1052
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1053
|
-
jsii.set(self, "name", value)
|
|
1053
|
+
jsii.set(self, "name", value) # pyright: ignore[reportArgumentType]
|
|
1054
1054
|
|
|
1055
1055
|
@builtins.property
|
|
1056
1056
|
@jsii.member(jsii_name="organizationEnabled")
|
|
@@ -1068,7 +1068,7 @@ class CfnEventDataStore(
|
|
|
1068
1068
|
if __debug__:
|
|
1069
1069
|
type_hints = typing.get_type_hints(_typecheckingstub__565712bf828bb8c2b0f6a80ca025d431aa72043d60fff9a95e02336f6f1e0d1c)
|
|
1070
1070
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1071
|
-
jsii.set(self, "organizationEnabled", value)
|
|
1071
|
+
jsii.set(self, "organizationEnabled", value) # pyright: ignore[reportArgumentType]
|
|
1072
1072
|
|
|
1073
1073
|
@builtins.property
|
|
1074
1074
|
@jsii.member(jsii_name="retentionPeriod")
|
|
@@ -1081,7 +1081,7 @@ class CfnEventDataStore(
|
|
|
1081
1081
|
if __debug__:
|
|
1082
1082
|
type_hints = typing.get_type_hints(_typecheckingstub__9508e34267838b75568905c8769ff7999130a13cb85b3d1abf67ef17b5958102)
|
|
1083
1083
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1084
|
-
jsii.set(self, "retentionPeriod", value)
|
|
1084
|
+
jsii.set(self, "retentionPeriod", value) # pyright: ignore[reportArgumentType]
|
|
1085
1085
|
|
|
1086
1086
|
@builtins.property
|
|
1087
1087
|
@jsii.member(jsii_name="tagsRaw")
|
|
@@ -1094,7 +1094,7 @@ class CfnEventDataStore(
|
|
|
1094
1094
|
if __debug__:
|
|
1095
1095
|
type_hints = typing.get_type_hints(_typecheckingstub__e6acb86a62af0621d981781f78b5611035089e25ca1472411f75d1b6e352ead2)
|
|
1096
1096
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1097
|
-
jsii.set(self, "tagsRaw", value)
|
|
1097
|
+
jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
|
|
1098
1098
|
|
|
1099
1099
|
@builtins.property
|
|
1100
1100
|
@jsii.member(jsii_name="terminationProtectionEnabled")
|
|
@@ -1112,7 +1112,7 @@ class CfnEventDataStore(
|
|
|
1112
1112
|
if __debug__:
|
|
1113
1113
|
type_hints = typing.get_type_hints(_typecheckingstub__f57ea7bcecd4a4cd58674384395db2bcf2721c3bcfa216c86922651a268041e5)
|
|
1114
1114
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1115
|
-
jsii.set(self, "terminationProtectionEnabled", value)
|
|
1115
|
+
jsii.set(self, "terminationProtectionEnabled", value) # pyright: ignore[reportArgumentType]
|
|
1116
1116
|
|
|
1117
1117
|
@jsii.data_type(
|
|
1118
1118
|
jsii_type="aws-cdk-lib.aws_cloudtrail.CfnEventDataStore.AdvancedEventSelectorProperty",
|
|
@@ -1248,7 +1248,7 @@ class CfnEventDataStore(
|
|
|
1248
1248
|
) -> None:
|
|
1249
1249
|
'''A single selector statement in an advanced event selector.
|
|
1250
1250
|
|
|
1251
|
-
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
|
|
1251
|
+
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::RUM::AppMonitor`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
|
|
1252
1252
|
:param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
1253
1253
|
:param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
|
|
1254
1254
|
:param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
@@ -1378,6 +1378,7 @@ class CfnEventDataStore(
|
|
|
1378
1378
|
- ``AWS::QBusiness::Index``
|
|
1379
1379
|
- ``AWS::QBusiness::WebExperience``
|
|
1380
1380
|
- ``AWS::RDS::DBCluster``
|
|
1381
|
+
- ``AWS::RUM::AppMonitor``
|
|
1381
1382
|
- ``AWS::S3::AccessPoint``
|
|
1382
1383
|
- ``AWS::S3::Object``
|
|
1383
1384
|
- ``AWS::S3Express::Object``
|
|
@@ -1994,7 +1995,7 @@ class CfnResourcePolicy(
|
|
|
1994
1995
|
if __debug__:
|
|
1995
1996
|
type_hints = typing.get_type_hints(_typecheckingstub__c2bbc7a61c40e678ccc323afced9d77064978b41254369fee4db815497450dcd)
|
|
1996
1997
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
1997
|
-
jsii.set(self, "resourceArn", value)
|
|
1998
|
+
jsii.set(self, "resourceArn", value) # pyright: ignore[reportArgumentType]
|
|
1998
1999
|
|
|
1999
2000
|
@builtins.property
|
|
2000
2001
|
@jsii.member(jsii_name="resourcePolicy")
|
|
@@ -2007,7 +2008,7 @@ class CfnResourcePolicy(
|
|
|
2007
2008
|
if __debug__:
|
|
2008
2009
|
type_hints = typing.get_type_hints(_typecheckingstub__e81052ff397bfd1d58bc17a51da7f1ee393c63b322c1b7d43b49b11f481e0ade)
|
|
2009
2010
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2010
|
-
jsii.set(self, "resourcePolicy", value)
|
|
2011
|
+
jsii.set(self, "resourcePolicy", value) # pyright: ignore[reportArgumentType]
|
|
2011
2012
|
|
|
2012
2013
|
|
|
2013
2014
|
@jsii.data_type(
|
|
@@ -2302,7 +2303,7 @@ class CfnTrail(
|
|
|
2302
2303
|
if __debug__:
|
|
2303
2304
|
type_hints = typing.get_type_hints(_typecheckingstub__28420bf6c9605a8eeb3ac59acf7f894b63e53a96b92e9d477f9cd206f2f9cf41)
|
|
2304
2305
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2305
|
-
jsii.set(self, "isLogging", value)
|
|
2306
|
+
jsii.set(self, "isLogging", value) # pyright: ignore[reportArgumentType]
|
|
2306
2307
|
|
|
2307
2308
|
@builtins.property
|
|
2308
2309
|
@jsii.member(jsii_name="s3BucketName")
|
|
@@ -2315,7 +2316,7 @@ class CfnTrail(
|
|
|
2315
2316
|
if __debug__:
|
|
2316
2317
|
type_hints = typing.get_type_hints(_typecheckingstub__950bb01f69a31c7f47512f3a4330d4ce5db85c66795a79936ef3af33a322c8b2)
|
|
2317
2318
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2318
|
-
jsii.set(self, "s3BucketName", value)
|
|
2319
|
+
jsii.set(self, "s3BucketName", value) # pyright: ignore[reportArgumentType]
|
|
2319
2320
|
|
|
2320
2321
|
@builtins.property
|
|
2321
2322
|
@jsii.member(jsii_name="advancedEventSelectors")
|
|
@@ -2333,7 +2334,7 @@ class CfnTrail(
|
|
|
2333
2334
|
if __debug__:
|
|
2334
2335
|
type_hints = typing.get_type_hints(_typecheckingstub__ae10dc28d41ecf82427e4cef4ce27f9c40933974aaf57ffd8e73f19c06621f53)
|
|
2335
2336
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2336
|
-
jsii.set(self, "advancedEventSelectors", value)
|
|
2337
|
+
jsii.set(self, "advancedEventSelectors", value) # pyright: ignore[reportArgumentType]
|
|
2337
2338
|
|
|
2338
2339
|
@builtins.property
|
|
2339
2340
|
@jsii.member(jsii_name="cloudWatchLogsLogGroupArn")
|
|
@@ -2349,7 +2350,7 @@ class CfnTrail(
|
|
|
2349
2350
|
if __debug__:
|
|
2350
2351
|
type_hints = typing.get_type_hints(_typecheckingstub__58f37437f0af59fad3f65c1d9ef003f52fa49f6aabcba3b40c779f379b8b0410)
|
|
2351
2352
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2352
|
-
jsii.set(self, "cloudWatchLogsLogGroupArn", value)
|
|
2353
|
+
jsii.set(self, "cloudWatchLogsLogGroupArn", value) # pyright: ignore[reportArgumentType]
|
|
2353
2354
|
|
|
2354
2355
|
@builtins.property
|
|
2355
2356
|
@jsii.member(jsii_name="cloudWatchLogsRoleArn")
|
|
@@ -2362,7 +2363,7 @@ class CfnTrail(
|
|
|
2362
2363
|
if __debug__:
|
|
2363
2364
|
type_hints = typing.get_type_hints(_typecheckingstub__cabe9b73fb8bc4d76fde324653a247811fa621cc9003d2c46e84b890b919cd28)
|
|
2364
2365
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2365
|
-
jsii.set(self, "cloudWatchLogsRoleArn", value)
|
|
2366
|
+
jsii.set(self, "cloudWatchLogsRoleArn", value) # pyright: ignore[reportArgumentType]
|
|
2366
2367
|
|
|
2367
2368
|
@builtins.property
|
|
2368
2369
|
@jsii.member(jsii_name="enableLogFileValidation")
|
|
@@ -2383,7 +2384,7 @@ class CfnTrail(
|
|
|
2383
2384
|
if __debug__:
|
|
2384
2385
|
type_hints = typing.get_type_hints(_typecheckingstub__0b942505386f8e61551da02925be57cd0474923089182c193fde0b17fe804056)
|
|
2385
2386
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2386
|
-
jsii.set(self, "enableLogFileValidation", value)
|
|
2387
|
+
jsii.set(self, "enableLogFileValidation", value) # pyright: ignore[reportArgumentType]
|
|
2387
2388
|
|
|
2388
2389
|
@builtins.property
|
|
2389
2390
|
@jsii.member(jsii_name="eventSelectors")
|
|
@@ -2401,7 +2402,7 @@ class CfnTrail(
|
|
|
2401
2402
|
if __debug__:
|
|
2402
2403
|
type_hints = typing.get_type_hints(_typecheckingstub__1ef2943100a700e4bd2b0922f697c3d0da51c014bec4f2a8c4063f59e83067d7)
|
|
2403
2404
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2404
|
-
jsii.set(self, "eventSelectors", value)
|
|
2405
|
+
jsii.set(self, "eventSelectors", value) # pyright: ignore[reportArgumentType]
|
|
2405
2406
|
|
|
2406
2407
|
@builtins.property
|
|
2407
2408
|
@jsii.member(jsii_name="includeGlobalServiceEvents")
|
|
@@ -2419,7 +2420,7 @@ class CfnTrail(
|
|
|
2419
2420
|
if __debug__:
|
|
2420
2421
|
type_hints = typing.get_type_hints(_typecheckingstub__1a1c2489b0dca720e7fab9917132eaf8dc9468d58f2d500bccd7579577d74434)
|
|
2421
2422
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2422
|
-
jsii.set(self, "includeGlobalServiceEvents", value)
|
|
2423
|
+
jsii.set(self, "includeGlobalServiceEvents", value) # pyright: ignore[reportArgumentType]
|
|
2423
2424
|
|
|
2424
2425
|
@builtins.property
|
|
2425
2426
|
@jsii.member(jsii_name="insightSelectors")
|
|
@@ -2437,7 +2438,7 @@ class CfnTrail(
|
|
|
2437
2438
|
if __debug__:
|
|
2438
2439
|
type_hints = typing.get_type_hints(_typecheckingstub__2d11150f51682efcafc38f048d84c35a263b443e02355965298d566b0714947d)
|
|
2439
2440
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2440
|
-
jsii.set(self, "insightSelectors", value)
|
|
2441
|
+
jsii.set(self, "insightSelectors", value) # pyright: ignore[reportArgumentType]
|
|
2441
2442
|
|
|
2442
2443
|
@builtins.property
|
|
2443
2444
|
@jsii.member(jsii_name="isMultiRegionTrail")
|
|
@@ -2455,7 +2456,7 @@ class CfnTrail(
|
|
|
2455
2456
|
if __debug__:
|
|
2456
2457
|
type_hints = typing.get_type_hints(_typecheckingstub__48558347dbb5febc8abf93096cfc174c76cbab4c443d68076643e329fb0787c0)
|
|
2457
2458
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2458
|
-
jsii.set(self, "isMultiRegionTrail", value)
|
|
2459
|
+
jsii.set(self, "isMultiRegionTrail", value) # pyright: ignore[reportArgumentType]
|
|
2459
2460
|
|
|
2460
2461
|
@builtins.property
|
|
2461
2462
|
@jsii.member(jsii_name="isOrganizationTrail")
|
|
@@ -2473,7 +2474,7 @@ class CfnTrail(
|
|
|
2473
2474
|
if __debug__:
|
|
2474
2475
|
type_hints = typing.get_type_hints(_typecheckingstub__583ab7d05361279f7f55956fec04616c02d033f55ef6113a3cf8c36630cd5ec5)
|
|
2475
2476
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2476
|
-
jsii.set(self, "isOrganizationTrail", value)
|
|
2477
|
+
jsii.set(self, "isOrganizationTrail", value) # pyright: ignore[reportArgumentType]
|
|
2477
2478
|
|
|
2478
2479
|
@builtins.property
|
|
2479
2480
|
@jsii.member(jsii_name="kmsKeyId")
|
|
@@ -2486,7 +2487,7 @@ class CfnTrail(
|
|
|
2486
2487
|
if __debug__:
|
|
2487
2488
|
type_hints = typing.get_type_hints(_typecheckingstub__4fac6d2810385893265f6ef2611c9d8ceaa7635731b1ae56291d8e43a83cc907)
|
|
2488
2489
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2489
|
-
jsii.set(self, "kmsKeyId", value)
|
|
2490
|
+
jsii.set(self, "kmsKeyId", value) # pyright: ignore[reportArgumentType]
|
|
2490
2491
|
|
|
2491
2492
|
@builtins.property
|
|
2492
2493
|
@jsii.member(jsii_name="s3KeyPrefix")
|
|
@@ -2499,7 +2500,7 @@ class CfnTrail(
|
|
|
2499
2500
|
if __debug__:
|
|
2500
2501
|
type_hints = typing.get_type_hints(_typecheckingstub__a62410d04026f326fad72a00ba17b36e83eb965baeada846126607f600de0f7f)
|
|
2501
2502
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2502
|
-
jsii.set(self, "s3KeyPrefix", value)
|
|
2503
|
+
jsii.set(self, "s3KeyPrefix", value) # pyright: ignore[reportArgumentType]
|
|
2503
2504
|
|
|
2504
2505
|
@builtins.property
|
|
2505
2506
|
@jsii.member(jsii_name="snsTopicName")
|
|
@@ -2512,7 +2513,7 @@ class CfnTrail(
|
|
|
2512
2513
|
if __debug__:
|
|
2513
2514
|
type_hints = typing.get_type_hints(_typecheckingstub__99ce4d6977c0c8f0ad39dd667104baf8babcda3f6e64b94361cd24302f9bfb12)
|
|
2514
2515
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2515
|
-
jsii.set(self, "snsTopicName", value)
|
|
2516
|
+
jsii.set(self, "snsTopicName", value) # pyright: ignore[reportArgumentType]
|
|
2516
2517
|
|
|
2517
2518
|
@builtins.property
|
|
2518
2519
|
@jsii.member(jsii_name="tagsRaw")
|
|
@@ -2525,7 +2526,7 @@ class CfnTrail(
|
|
|
2525
2526
|
if __debug__:
|
|
2526
2527
|
type_hints = typing.get_type_hints(_typecheckingstub__b6e90bde6d2082aefdd7c19acee054825987d54ead9c95ec2dbe11a014f72339)
|
|
2527
2528
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2528
|
-
jsii.set(self, "tagsRaw", value)
|
|
2529
|
+
jsii.set(self, "tagsRaw", value) # pyright: ignore[reportArgumentType]
|
|
2529
2530
|
|
|
2530
2531
|
@builtins.property
|
|
2531
2532
|
@jsii.member(jsii_name="trailName")
|
|
@@ -2541,7 +2542,7 @@ class CfnTrail(
|
|
|
2541
2542
|
if __debug__:
|
|
2542
2543
|
type_hints = typing.get_type_hints(_typecheckingstub__29683f56476eaa26adca4a9a9312d409428d1af457282b2a0f93af552333a02e)
|
|
2543
2544
|
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2544
|
-
jsii.set(self, "trailName", value)
|
|
2545
|
+
jsii.set(self, "trailName", value) # pyright: ignore[reportArgumentType]
|
|
2545
2546
|
|
|
2546
2547
|
@jsii.data_type(
|
|
2547
2548
|
jsii_type="aws-cdk-lib.aws_cloudtrail.CfnTrail.AdvancedEventSelectorProperty",
|
|
@@ -2677,7 +2678,7 @@ class CfnTrail(
|
|
|
2677
2678
|
) -> None:
|
|
2678
2679
|
'''A single selector statement in an advanced event selector.
|
|
2679
2680
|
|
|
2680
|
-
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
|
|
2681
|
+
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::RUM::AppMonitor`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
|
|
2681
2682
|
:param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
2682
2683
|
:param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
|
|
2683
2684
|
:param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
@@ -2807,6 +2808,7 @@ class CfnTrail(
|
|
|
2807
2808
|
- ``AWS::QBusiness::Index``
|
|
2808
2809
|
- ``AWS::QBusiness::WebExperience``
|
|
2809
2810
|
- ``AWS::RDS::DBCluster``
|
|
2811
|
+
- ``AWS::RUM::AppMonitor``
|
|
2810
2812
|
- ``AWS::S3::AccessPoint``
|
|
2811
2813
|
- ``AWS::S3::Object``
|
|
2812
2814
|
- ``AWS::S3Express::Object``
|
|
@@ -2938,11 +2940,11 @@ class CfnTrail(
|
|
|
2938
2940
|
|
|
2939
2941
|
The total number of allowed data resources is 250. This number can be distributed between 1 and 5 event selectors, but the total cannot exceed 250 across all selectors for the trail.
|
|
2940
2942
|
|
|
2941
|
-
The following example demonstrates how logging works when you configure logging of all data events for a general purpose bucket named ``
|
|
2943
|
+
The following example demonstrates how logging works when you configure logging of all data events for a general purpose bucket named ``amzn-s3-demo-bucket1`` . In this example, the CloudTrail user specified an empty prefix, and the option to log both ``Read`` and ``Write`` data events.
|
|
2942
2944
|
|
|
2943
|
-
- A user uploads an image file to ``
|
|
2945
|
+
- A user uploads an image file to ``amzn-s3-demo-bucket1`` .
|
|
2944
2946
|
- The ``PutObject`` API operation is an Amazon S3 object-level API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified an S3 bucket with an empty prefix, events that occur on any object in that bucket are logged. The trail processes and logs the event.
|
|
2945
|
-
- A user uploads an object to an Amazon S3 bucket named ``arn:aws:s3:::
|
|
2947
|
+
- A user uploads an object to an Amazon S3 bucket named ``arn:aws:s3:::amzn-s3-demo-bucket1`` .
|
|
2946
2948
|
- The ``PutObject`` API operation occurred for an object in an S3 bucket that the CloudTrail user didn't specify for the trail. The trail doesn’t log the event.
|
|
2947
2949
|
|
|
2948
2950
|
The following example demonstrates how logging works when you configure logging of AWS Lambda data events for a Lambda function named *MyLambdaFunction* , but not for all Lambda functions.
|
|
@@ -2952,7 +2954,7 @@ class CfnTrail(
|
|
|
2952
2954
|
- The ``Invoke`` API operation on *MyOtherLambdaFunction* is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the ``Invoke`` operation for *MyOtherLambdaFunction* does not match the function specified for the trail. The trail doesn’t log the event.
|
|
2953
2955
|
|
|
2954
2956
|
:param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` Additional resource types are available through *advanced* event selectors. For more information about these additional resource types, see `AdvancedFieldSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedFieldSelector.html>`_ .
|
|
2955
|
-
:param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::
|
|
2957
|
+
:param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/`` . The trail logs data events for all objects in this S3 bucket. - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix. - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` . .. epigraph:: This also enables logging of ``Invoke`` activity performed by any user or role in your AWS account , even if that activity is performed on a function that belongs to another AWS account . - To log data events for a specific Lambda function, specify the function ARN. .. epigraph:: Lambda function ARNs are exact. For example, if you specify a function ARN *arn:aws:lambda:us-west-2:111111111111:function:helloworld* , data events will only be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld* . They will not be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld2* . - To log data events for all DynamoDB tables in your AWS account , specify the prefix as ``arn:aws:dynamodb`` .
|
|
2956
2958
|
|
|
2957
2959
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html
|
|
2958
2960
|
:exampleMetadata: fixture=_generated
|
|
@@ -3008,8 +3010,8 @@ class CfnTrail(
|
|
|
3008
3010
|
|
|
3009
3011
|
This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account .
|
|
3010
3012
|
|
|
3011
|
-
- To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::
|
|
3012
|
-
- To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::
|
|
3013
|
+
- To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/`` . The trail logs data events for all objects in this S3 bucket.
|
|
3014
|
+
- To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix.
|
|
3013
3015
|
- To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` .
|
|
3014
3016
|
|
|
3015
3017
|
.. epigraph::
|