aws-cdk-lib 2.160.0__py3-none-any.whl → 2.161.1__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (51) hide show
  1. aws_cdk/__init__.py +21 -14
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.160.0.jsii.tgz → aws-cdk-lib@2.161.1.jsii.tgz} +0 -0
  4. aws_cdk/aws_apigatewayv2/__init__.py +13 -14
  5. aws_cdk/aws_autoscaling/__init__.py +2 -2
  6. aws_cdk/aws_b2bi/__init__.py +2283 -672
  7. aws_cdk/aws_batch/__init__.py +9 -5
  8. aws_cdk/aws_bedrock/__init__.py +52 -20
  9. aws_cdk/aws_cloudformation/__init__.py +9 -9
  10. aws_cdk/aws_cloudtrail/__init__.py +97 -183
  11. aws_cdk/aws_cloudwatch/__init__.py +38 -42
  12. aws_cdk/aws_datasync/__init__.py +1 -1
  13. aws_cdk/aws_ec2/__init__.py +114 -8
  14. aws_cdk/aws_ecs/__init__.py +513 -2
  15. aws_cdk/aws_eks/__init__.py +118 -2
  16. aws_cdk/aws_elasticloadbalancingv2/__init__.py +5 -3
  17. aws_cdk/aws_glue/__init__.py +386 -0
  18. aws_cdk/aws_iotfleetwise/__init__.py +49 -49
  19. aws_cdk/aws_iottwinmaker/__init__.py +4 -4
  20. aws_cdk/aws_iotwireless/__init__.py +2 -1
  21. aws_cdk/aws_kinesisfirehose/__init__.py +52 -76
  22. aws_cdk/aws_lambda/__init__.py +383 -244
  23. aws_cdk/aws_logs/__init__.py +431 -3
  24. aws_cdk/aws_mediaconnect/__init__.py +6 -4
  25. aws_cdk/aws_medialive/__init__.py +36 -0
  26. aws_cdk/aws_organizations/__init__.py +4 -3
  27. aws_cdk/aws_pipes/__init__.py +2 -2
  28. aws_cdk/aws_quicksight/__init__.py +1086 -6
  29. aws_cdk/aws_rds/__init__.py +158 -3
  30. aws_cdk/aws_route53resolver/__init__.py +3 -17
  31. aws_cdk/aws_s3/__init__.py +20 -11
  32. aws_cdk/aws_s3_deployment/__init__.py +45 -0
  33. aws_cdk/aws_s3express/__init__.py +314 -4
  34. aws_cdk/aws_sagemaker/__init__.py +44 -4
  35. aws_cdk/aws_secretsmanager/__init__.py +14 -7
  36. aws_cdk/aws_securityhub/__init__.py +16 -14
  37. aws_cdk/aws_ses/__init__.py +52 -18
  38. aws_cdk/aws_sqs/__init__.py +16 -14
  39. aws_cdk/aws_ssm/__init__.py +6 -2
  40. aws_cdk/aws_synthetics/__init__.py +46 -0
  41. aws_cdk/aws_waf/__init__.py +33 -22
  42. aws_cdk/aws_wafregional/__init__.py +36 -24
  43. aws_cdk/aws_workspacesweb/__init__.py +54 -3
  44. aws_cdk/cloudformation_include/__init__.py +28 -0
  45. aws_cdk/cx_api/__init__.py +50 -0
  46. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/METADATA +1 -1
  47. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/RECORD +51 -51
  48. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/LICENSE +0 -0
  49. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/NOTICE +0 -0
  50. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/WHEEL +0 -0
  51. {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/top_level.txt +0 -0
@@ -1141,9 +1141,9 @@ class CfnEventDataStore(
1141
1141
  field_selectors: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnEventDataStore.AdvancedFieldSelectorProperty", typing.Dict[builtins.str, typing.Any]]]]],
1142
1142
  name: typing.Optional[builtins.str] = None,
1143
1143
  ) -> None:
1144
- '''Advanced event selectors let you create fine-grained selectors for CloudTrail management and data events.
1144
+ '''Advanced event selectors let you create fine-grained selectors for AWS CloudTrail management, data, and network activity events.
1145
1145
 
1146
- They help you control costs by logging only those events that are important to you. For more information about advanced event selectors, see `Logging management events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html>`_ and `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
1146
+ They help you control costs by logging only those events that are important to you. For more information about configuring advanced event selectors, see the `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ , `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ , and `Logging management events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html>`_ topics in the *AWS CloudTrail User Guide* .
1147
1147
 
1148
1148
  You cannot apply both event selectors and advanced event selectors to a trail.
1149
1149
 
@@ -1161,6 +1161,17 @@ class CfnEventDataStore(
1161
1161
  - ``eventName``
1162
1162
  - ``resources.ARN``
1163
1163
 
1164
+ *Supported CloudTrail event record fields for network activity events*
1165
+ .. epigraph::
1166
+
1167
+ Network activity events is in preview release for CloudTrail and is subject to change.
1168
+
1169
+ - ``eventCategory`` (required)
1170
+ - ``eventSource`` (required)
1171
+ - ``eventName``
1172
+ - ``errorCode`` - The only valid value for ``errorCode`` is ``VpceAccessDenied`` .
1173
+ - ``vpcEndpointId``
1174
+
1164
1175
  .. epigraph::
1165
1176
 
1166
1177
  For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
@@ -1263,7 +1274,7 @@ class CfnEventDataStore(
1263
1274
  ) -> None:
1264
1275
  '''A single selector statement in an advanced event selector.
1265
1276
 
1266
- :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::RUM::AppMonitor`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
1277
+ :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` . For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` . For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - This field is only used for management events and network activity events. For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events. For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source. The following are valid values for network activity events: - ``cloudtrail.amazonaws.com`` - ``ec2.amazonaws.com`` - ``kms.amazonaws.com`` - ``secretsmanager.amazonaws.com`` - *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas. - *``eventCategory``* - This field is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . - For CloudTrail network activity events, the value must be ``NetworkActivity`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator. - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator. For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* . You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector. - *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs. - *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
1267
1278
  :param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
1268
1279
  :param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
1269
1280
  :param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
@@ -1323,18 +1334,32 @@ class CfnEventDataStore(
1323
1334
 
1324
1335
  For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported.
1325
1336
 
1326
- For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` .
1337
+ For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` .
1338
+
1339
+ For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` .
1327
1340
 
1328
- For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` .
1341
+ For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` .
1329
1342
 
1330
1343
  For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
1331
1344
 
1332
- - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events.
1333
- - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` .
1334
- - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas.
1335
- - *``eventCategory``* - This is required and must be set to ``Equals`` .
1345
+ - *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events.
1346
+ - *``eventSource``* - This field is only used for management events and network activity events.
1347
+
1348
+ For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events.
1349
+
1350
+ For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source.
1351
+
1352
+ The following are valid values for network activity events:
1353
+
1354
+ - ``cloudtrail.amazonaws.com``
1355
+ - ``ec2.amazonaws.com``
1356
+ - ``kms.amazonaws.com``
1357
+ - ``secretsmanager.amazonaws.com``
1358
+ - *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas.
1359
+ - *``eventCategory``* - This field is required and must be set to ``Equals`` .
1336
1360
  - For CloudTrail management events, the value must be ``Management`` .
1337
1361
  - For CloudTrail data events, the value must be ``Data`` .
1362
+ - For CloudTrail network activity events, the value must be ``NetworkActivity`` .
1338
1363
 
1339
1364
  The following are used only for event data stores:
1340
1365
 
@@ -1342,91 +1367,22 @@ class CfnEventDataStore(
1342
1367
  - For AWS Config configuration items, the value must be ``ConfigurationItem`` .
1343
1368
  - For Audit Manager evidence, the value must be ``Evidence`` .
1344
1369
  - For non- AWS events, the value must be ``ActivityAuditLog`` .
1345
- - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following:
1346
- - ``AWS::AppConfig::Configuration``
1347
- - ``AWS::B2BI::Transformer``
1348
- - ``AWS::Bedrock::AgentAlias``
1349
- - ``AWS::Bedrock::FlowAlias``
1350
- - ``AWS::Bedrock::Guardrail``
1351
- - ``AWS::Bedrock::KnowledgeBase``
1352
- - ``AWS::Cassandra::Table``
1353
- - ``AWS::CloudFront::KeyValueStore``
1354
- - ``AWS::CloudTrail::Channel``
1355
- - ``AWS::CloudWatch::Metric``
1356
- - ``AWS::CodeWhisperer::Customization``
1357
- - ``AWS::CodeWhisperer::Profile``
1358
- - ``AWS::Cognito::IdentityPool``
1359
- - ``AWS::DynamoDB::Stream``
1360
- - ``AWS::DynamoDB::Table``
1361
- - ``AWS::EC2::Snapshot``
1362
- - ``AWS::EMRWAL::Workspace``
1363
- - ``AWS::FinSpace::Environment``
1364
- - ``AWS::Glue::Table``
1365
- - ``AWS::GreengrassV2::ComponentVersion``
1366
- - ``AWS::GreengrassV2::Deployment``
1367
- - ``AWS::GuardDuty::Detector``
1368
- - ``AWS::IoT::Certificate``
1369
- - ``AWS::IoT::Thing``
1370
- - ``AWS::IoTSiteWise::Asset``
1371
- - ``AWS::IoTSiteWise::TimeSeries``
1372
- - ``AWS::IoTTwinMaker::Entity``
1373
- - ``AWS::IoTTwinMaker::Workspace``
1374
- - ``AWS::KendraRanking::ExecutionPlan``
1375
- - ``AWS::Kinesis::Stream``
1376
- - ``AWS::Kinesis::StreamConsumer``
1377
- - ``AWS::KinesisVideo::Stream``
1378
- - ``AWS::Lambda::Function``
1379
- - ``AWS::MachineLearning::MlModel``
1380
- - ``AWS::ManagedBlockchain::Network``
1381
- - ``AWS::ManagedBlockchain::Node``
1382
- - ``AWS::MedicalImaging::Datastore``
1383
- - ``AWS::NeptuneGraph::Graph``
1384
- - ``AWS::One::UKey``
1385
- - ``AWS::One::User``
1386
- - ``AWS::PaymentCryptography::Alias``
1387
- - ``AWS::PaymentCryptography::Key``
1388
- - ``AWS::PCAConnectorAD::Connector``
1389
- - ``AWS::PCAConnectorSCEP::Connector``
1390
- - ``AWS::QApps:QApp``
1391
- - ``AWS::QBusiness::Application``
1392
- - ``AWS::QBusiness::DataSource``
1393
- - ``AWS::QBusiness::Index``
1394
- - ``AWS::QBusiness::WebExperience``
1395
- - ``AWS::RDS::DBCluster``
1396
- - ``AWS::RUM::AppMonitor``
1397
- - ``AWS::S3::AccessPoint``
1398
- - ``AWS::S3::Object``
1399
- - ``AWS::S3Express::Object``
1400
- - ``AWS::S3ObjectLambda::AccessPoint``
1401
- - ``AWS::S3Outposts::Object``
1402
- - ``AWS::SageMaker::Endpoint``
1403
- - ``AWS::SageMaker::ExperimentTrialComponent``
1404
- - ``AWS::SageMaker::FeatureGroup``
1405
- - ``AWS::ServiceDiscovery::Namespace``
1406
- - ``AWS::ServiceDiscovery::Service``
1407
- - ``AWS::SCN::Instance``
1408
- - ``AWS::SNS::PlatformEndpoint``
1409
- - ``AWS::SNS::Topic``
1410
- - ``AWS::SQS::Queue``
1411
- - ``AWS::SSM::ManagedNode``
1412
- - ``AWS::SSMMessages::ControlChannel``
1413
- - ``AWS::StepFunctions::StateMachine``
1414
- - ``AWS::SWF::Domain``
1415
- - ``AWS::ThinClient::Device``
1416
- - ``AWS::ThinClient::Environment``
1417
- - ``AWS::Timestream::Database``
1418
- - ``AWS::Timestream::Table``
1419
- - ``AWS::VerifiedPermissions::PolicyStore``
1420
- - ``AWS::XRay::Trace``
1421
-
1422
- You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector.
1423
-
1424
- - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
1370
+ - *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator.
1371
+ - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator.
1372
+
1373
+ For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* .
1425
1374
 
1375
+ You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector.
1376
+
1377
+ - *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value.
1378
+
1379
+ For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
1426
1380
  .. epigraph::
1427
1381
 
1428
1382
  You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
1429
1383
 
1384
+ - *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
1385
+
1430
1386
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-eventdatastore-advancedfieldselector.html#cfn-cloudtrail-eventdatastore-advancedfieldselector-field
1431
1387
  '''
1432
1388
  result = self._values.get("field")
@@ -2205,7 +2161,7 @@ class CfnTrail(
2205
2161
  :param id: Construct identifier for this resource (unique in its scope).
2206
2162
  :param is_logging: Whether the CloudTrail trail is currently logging AWS API calls.
2207
2163
  :param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
2208
- :param advanced_event_selectors: Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
2164
+ :param advanced_event_selectors: Specifies the settings for advanced event selectors. You can use advanced event selectors to log management events, data events for all resource types, and network activity events. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ and `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
2209
2165
  :param cloud_watch_logs_log_group_arn: Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
2210
2166
  :param cloud_watch_logs_role_arn: Specifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group. You must use a role that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
2211
2167
  :param enable_log_file_validation: Specifies whether log file validation is enabled. The default is false. .. epigraph:: When you disable log file integrity validation, the chain of digest files is broken after one hour. CloudTrail does not create digest files for log files that were delivered during a period in which log file integrity validation was disabled. For example, if you enable log file integrity validation at noon on January 1, disable it at noon on January 2, and re-enable it at noon on January 10, digest files will not be created for the log files delivered from noon on January 2 to noon on January 10. The same applies whenever you stop CloudTrail logging or delete a trail.
@@ -2571,9 +2527,9 @@ class CfnTrail(
2571
2527
  field_selectors: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTrail.AdvancedFieldSelectorProperty", typing.Dict[builtins.str, typing.Any]]]]],
2572
2528
  name: typing.Optional[builtins.str] = None,
2573
2529
  ) -> None:
2574
- '''Advanced event selectors let you create fine-grained selectors for CloudTrail management and data events.
2530
+ '''Advanced event selectors let you create fine-grained selectors for AWS CloudTrail management, data, and network activity events.
2575
2531
 
2576
- They help you control costs by logging only those events that are important to you. For more information about advanced event selectors, see `Logging management events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html>`_ and `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
2532
+ They help you control costs by logging only those events that are important to you. For more information about configuring advanced event selectors, see the `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ , `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ , and `Logging management events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html>`_ topics in the *AWS CloudTrail User Guide* .
2577
2533
 
2578
2534
  You cannot apply both event selectors and advanced event selectors to a trail.
2579
2535
 
@@ -2591,6 +2547,17 @@ class CfnTrail(
2591
2547
  - ``eventName``
2592
2548
  - ``resources.ARN``
2593
2549
 
2550
+ *Supported CloudTrail event record fields for network activity events*
2551
+ .. epigraph::
2552
+
2553
+ Network activity events is in preview release for CloudTrail and is subject to change.
2554
+
2555
+ - ``eventCategory`` (required)
2556
+ - ``eventSource`` (required)
2557
+ - ``eventName``
2558
+ - ``errorCode`` - The only valid value for ``errorCode`` is ``VpceAccessDenied`` .
2559
+ - ``vpcEndpointId``
2560
+
2594
2561
  .. epigraph::
2595
2562
 
2596
2563
  For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
@@ -2693,7 +2660,7 @@ class CfnTrail(
2693
2660
  ) -> None:
2694
2661
  '''A single selector statement in an advanced event selector.
2695
2662
 
2696
- :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` . For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` . - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas. - *``eventCategory``* - This is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following: - ``AWS::AppConfig::Configuration`` - ``AWS::B2BI::Transformer`` - ``AWS::Bedrock::AgentAlias`` - ``AWS::Bedrock::FlowAlias`` - ``AWS::Bedrock::Guardrail`` - ``AWS::Bedrock::KnowledgeBase`` - ``AWS::Cassandra::Table`` - ``AWS::CloudFront::KeyValueStore`` - ``AWS::CloudTrail::Channel`` - ``AWS::CloudWatch::Metric`` - ``AWS::CodeWhisperer::Customization`` - ``AWS::CodeWhisperer::Profile`` - ``AWS::Cognito::IdentityPool`` - ``AWS::DynamoDB::Stream`` - ``AWS::DynamoDB::Table`` - ``AWS::EC2::Snapshot`` - ``AWS::EMRWAL::Workspace`` - ``AWS::FinSpace::Environment`` - ``AWS::Glue::Table`` - ``AWS::GreengrassV2::ComponentVersion`` - ``AWS::GreengrassV2::Deployment`` - ``AWS::GuardDuty::Detector`` - ``AWS::IoT::Certificate`` - ``AWS::IoT::Thing`` - ``AWS::IoTSiteWise::Asset`` - ``AWS::IoTSiteWise::TimeSeries`` - ``AWS::IoTTwinMaker::Entity`` - ``AWS::IoTTwinMaker::Workspace`` - ``AWS::KendraRanking::ExecutionPlan`` - ``AWS::Kinesis::Stream`` - ``AWS::Kinesis::StreamConsumer`` - ``AWS::KinesisVideo::Stream`` - ``AWS::Lambda::Function`` - ``AWS::MachineLearning::MlModel`` - ``AWS::ManagedBlockchain::Network`` - ``AWS::ManagedBlockchain::Node`` - ``AWS::MedicalImaging::Datastore`` - ``AWS::NeptuneGraph::Graph`` - ``AWS::One::UKey`` - ``AWS::One::User`` - ``AWS::PaymentCryptography::Alias`` - ``AWS::PaymentCryptography::Key`` - ``AWS::PCAConnectorAD::Connector`` - ``AWS::PCAConnectorSCEP::Connector`` - ``AWS::QApps:QApp`` - ``AWS::QBusiness::Application`` - ``AWS::QBusiness::DataSource`` - ``AWS::QBusiness::Index`` - ``AWS::QBusiness::WebExperience`` - ``AWS::RDS::DBCluster`` - ``AWS::RUM::AppMonitor`` - ``AWS::S3::AccessPoint`` - ``AWS::S3::Object`` - ``AWS::S3Express::Object`` - ``AWS::S3ObjectLambda::AccessPoint`` - ``AWS::S3Outposts::Object`` - ``AWS::SageMaker::Endpoint`` - ``AWS::SageMaker::ExperimentTrialComponent`` - ``AWS::SageMaker::FeatureGroup`` - ``AWS::ServiceDiscovery::Namespace`` - ``AWS::ServiceDiscovery::Service`` - ``AWS::SCN::Instance`` - ``AWS::SNS::PlatformEndpoint`` - ``AWS::SNS::Topic`` - ``AWS::SQS::Queue`` - ``AWS::SSM::ManagedNode`` - ``AWS::SSMMessages::ControlChannel`` - ``AWS::StepFunctions::StateMachine`` - ``AWS::SWF::Domain`` - ``AWS::ThinClient::Device`` - ``AWS::ThinClient::Environment`` - ``AWS::Timestream::Database`` - ``AWS::Timestream::Table`` - ``AWS::VerifiedPermissions::PolicyStore`` - ``AWS::XRay::Trace`` You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector. - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
2663
+ :param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` . For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` . For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - This field is only used for management events and network activity events. For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events. For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source. The following are valid values for network activity events: - ``cloudtrail.amazonaws.com`` - ``ec2.amazonaws.com`` - ``kms.amazonaws.com`` - ``secretsmanager.amazonaws.com`` - *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas. - *``eventCategory``* - This field is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . - For CloudTrail network activity events, the value must be ``NetworkActivity`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator. - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator. For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* . You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector. - *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs. - *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
2697
2664
  :param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
2698
2665
  :param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
2699
2666
  :param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
@@ -2753,18 +2720,32 @@ class CfnTrail(
2753
2720
 
2754
2721
  For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported.
2755
2722
 
2756
- For CloudTrail management events, supported fields include ``readOnly`` , ``eventCategory`` , and ``eventSource`` .
2723
+ For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` .
2757
2724
 
2758
- For CloudTrail data events, supported fields include ``readOnly`` , ``eventCategory`` , ``eventName`` , ``resources.type`` , and ``resources.ARN`` .
2725
+ For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` .
2726
+
2727
+ For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` .
2759
2728
 
2760
2729
  For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
2761
2730
 
2762
- - *``readOnly``* - Optional. Can be set to ``Equals`` a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events.
2763
- - *``eventSource``* - For filtering management events only. This can be set to ``NotEquals`` ``kms.amazonaws.com`` or ``NotEquals`` ``rdsdata.amazonaws.com`` .
2764
- - *``eventName``* - Can use any operator. You can use it to filter in or filter out any data event logged to CloudTrail, such as ``PutBucket`` or ``GetSnapshotBlock`` . You can have multiple values for this field, separated by commas.
2765
- - *``eventCategory``* - This is required and must be set to ``Equals`` .
2731
+ - *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events.
2732
+ - *``eventSource``* - This field is only used for management events and network activity events.
2733
+
2734
+ For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events.
2735
+
2736
+ For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source.
2737
+
2738
+ The following are valid values for network activity events:
2739
+
2740
+ - ``cloudtrail.amazonaws.com``
2741
+ - ``ec2.amazonaws.com``
2742
+ - ``kms.amazonaws.com``
2743
+ - ``secretsmanager.amazonaws.com``
2744
+ - *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas.
2745
+ - *``eventCategory``* - This field is required and must be set to ``Equals`` .
2766
2746
  - For CloudTrail management events, the value must be ``Management`` .
2767
2747
  - For CloudTrail data events, the value must be ``Data`` .
2748
+ - For CloudTrail network activity events, the value must be ``NetworkActivity`` .
2768
2749
 
2769
2750
  The following are used only for event data stores:
2770
2751
 
@@ -2772,91 +2753,22 @@ class CfnTrail(
2772
2753
  - For AWS Config configuration items, the value must be ``ConfigurationItem`` .
2773
2754
  - For Audit Manager evidence, the value must be ``Evidence`` .
2774
2755
  - For non- AWS events, the value must be ``ActivityAuditLog`` .
2775
- - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator, and the value can be one of the following:
2776
- - ``AWS::AppConfig::Configuration``
2777
- - ``AWS::B2BI::Transformer``
2778
- - ``AWS::Bedrock::AgentAlias``
2779
- - ``AWS::Bedrock::FlowAlias``
2780
- - ``AWS::Bedrock::Guardrail``
2781
- - ``AWS::Bedrock::KnowledgeBase``
2782
- - ``AWS::Cassandra::Table``
2783
- - ``AWS::CloudFront::KeyValueStore``
2784
- - ``AWS::CloudTrail::Channel``
2785
- - ``AWS::CloudWatch::Metric``
2786
- - ``AWS::CodeWhisperer::Customization``
2787
- - ``AWS::CodeWhisperer::Profile``
2788
- - ``AWS::Cognito::IdentityPool``
2789
- - ``AWS::DynamoDB::Stream``
2790
- - ``AWS::DynamoDB::Table``
2791
- - ``AWS::EC2::Snapshot``
2792
- - ``AWS::EMRWAL::Workspace``
2793
- - ``AWS::FinSpace::Environment``
2794
- - ``AWS::Glue::Table``
2795
- - ``AWS::GreengrassV2::ComponentVersion``
2796
- - ``AWS::GreengrassV2::Deployment``
2797
- - ``AWS::GuardDuty::Detector``
2798
- - ``AWS::IoT::Certificate``
2799
- - ``AWS::IoT::Thing``
2800
- - ``AWS::IoTSiteWise::Asset``
2801
- - ``AWS::IoTSiteWise::TimeSeries``
2802
- - ``AWS::IoTTwinMaker::Entity``
2803
- - ``AWS::IoTTwinMaker::Workspace``
2804
- - ``AWS::KendraRanking::ExecutionPlan``
2805
- - ``AWS::Kinesis::Stream``
2806
- - ``AWS::Kinesis::StreamConsumer``
2807
- - ``AWS::KinesisVideo::Stream``
2808
- - ``AWS::Lambda::Function``
2809
- - ``AWS::MachineLearning::MlModel``
2810
- - ``AWS::ManagedBlockchain::Network``
2811
- - ``AWS::ManagedBlockchain::Node``
2812
- - ``AWS::MedicalImaging::Datastore``
2813
- - ``AWS::NeptuneGraph::Graph``
2814
- - ``AWS::One::UKey``
2815
- - ``AWS::One::User``
2816
- - ``AWS::PaymentCryptography::Alias``
2817
- - ``AWS::PaymentCryptography::Key``
2818
- - ``AWS::PCAConnectorAD::Connector``
2819
- - ``AWS::PCAConnectorSCEP::Connector``
2820
- - ``AWS::QApps:QApp``
2821
- - ``AWS::QBusiness::Application``
2822
- - ``AWS::QBusiness::DataSource``
2823
- - ``AWS::QBusiness::Index``
2824
- - ``AWS::QBusiness::WebExperience``
2825
- - ``AWS::RDS::DBCluster``
2826
- - ``AWS::RUM::AppMonitor``
2827
- - ``AWS::S3::AccessPoint``
2828
- - ``AWS::S3::Object``
2829
- - ``AWS::S3Express::Object``
2830
- - ``AWS::S3ObjectLambda::AccessPoint``
2831
- - ``AWS::S3Outposts::Object``
2832
- - ``AWS::SageMaker::Endpoint``
2833
- - ``AWS::SageMaker::ExperimentTrialComponent``
2834
- - ``AWS::SageMaker::FeatureGroup``
2835
- - ``AWS::ServiceDiscovery::Namespace``
2836
- - ``AWS::ServiceDiscovery::Service``
2837
- - ``AWS::SCN::Instance``
2838
- - ``AWS::SNS::PlatformEndpoint``
2839
- - ``AWS::SNS::Topic``
2840
- - ``AWS::SQS::Queue``
2841
- - ``AWS::SSM::ManagedNode``
2842
- - ``AWS::SSMMessages::ControlChannel``
2843
- - ``AWS::StepFunctions::StateMachine``
2844
- - ``AWS::SWF::Domain``
2845
- - ``AWS::ThinClient::Device``
2846
- - ``AWS::ThinClient::Environment``
2847
- - ``AWS::Timestream::Database``
2848
- - ``AWS::Timestream::Table``
2849
- - ``AWS::VerifiedPermissions::PolicyStore``
2850
- - ``AWS::XRay::Trace``
2851
-
2852
- You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector.
2853
-
2854
- - *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
2756
+ - *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator.
2757
+ - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator.
2758
+
2759
+ For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* .
2855
2760
 
2761
+ You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector.
2762
+
2763
+ - *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value.
2764
+
2765
+ For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
2856
2766
  .. epigraph::
2857
2767
 
2858
2768
  You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
2859
2769
 
2770
+ - *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
2771
+
2860
2772
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-advancedfieldselector.html#cfn-cloudtrail-trail-advancedfieldselector-field
2861
2773
  '''
2862
2774
  result = self._values.get("field")
@@ -2968,7 +2880,7 @@ class CfnTrail(
2968
2880
  - The ``Invoke`` API operation on *MyLambdaFunction* is an Lambda API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified logging data events for *MyLambdaFunction* , any invocations of that function are logged. The trail processes and logs the event.
2969
2881
  - The ``Invoke`` API operation on *MyOtherLambdaFunction* is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the ``Invoke`` operation for *MyOtherLambdaFunction* does not match the function specified for the trail. The trail doesn’t log the event.
2970
2882
 
2971
- :param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` Additional resource types are available through *advanced* event selectors. For more information about these additional resource types, see `AdvancedFieldSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedFieldSelector.html>`_ .
2883
+ :param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` Additional resource types are available through *advanced* event selectors. For more information, see `AdvancedEventSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedEventSelector.html>`_ .
2972
2884
  :param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/`` . The trail logs data events for all objects in this S3 bucket. - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix. - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` . .. epigraph:: This also enables logging of ``Invoke`` activity performed by any user or role in your AWS account , even if that activity is performed on a function that belongs to another AWS account . - To log data events for a specific Lambda function, specify the function ARN. .. epigraph:: Lambda function ARNs are exact. For example, if you specify a function ARN *arn:aws:lambda:us-west-2:111111111111:function:helloworld* , data events will only be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld* . They will not be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld2* . - To log data events for all DynamoDB tables in your AWS account , specify the prefix as ``arn:aws:dynamodb`` .
2973
2885
 
2974
2886
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html
@@ -3007,7 +2919,7 @@ class CfnTrail(
3007
2919
  - ``AWS::Lambda::Function``
3008
2920
  - ``AWS::S3::Object``
3009
2921
 
3010
- Additional resource types are available through *advanced* event selectors. For more information about these additional resource types, see `AdvancedFieldSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedFieldSelector.html>`_ .
2922
+ Additional resource types are available through *advanced* event selectors. For more information, see `AdvancedEventSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedEventSelector.html>`_ .
3011
2923
 
3012
2924
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html#cfn-cloudtrail-trail-dataresource-type
3013
2925
  '''
@@ -3305,7 +3217,7 @@ class CfnTrailProps:
3305
3217
 
3306
3218
  :param is_logging: Whether the CloudTrail trail is currently logging AWS API calls.
3307
3219
  :param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
3308
- :param advanced_event_selectors: Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
3220
+ :param advanced_event_selectors: Specifies the settings for advanced event selectors. You can use advanced event selectors to log management events, data events for all resource types, and network activity events. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ and `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
3309
3221
  :param cloud_watch_logs_log_group_arn: Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
3310
3222
  :param cloud_watch_logs_role_arn: Specifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group. You must use a role that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
3311
3223
  :param enable_log_file_validation: Specifies whether log file validation is enabled. The default is false. .. epigraph:: When you disable log file integrity validation, the chain of digest files is broken after one hour. CloudTrail does not create digest files for log files that were delivered during a period in which log file integrity validation was disabled. For example, if you enable log file integrity validation at noon on January 1, disable it at noon on January 2, and re-enable it at noon on January 10, digest files will not be created for the log files delivered from noon on January 2 to noon on January 10. The same applies whenever you stop CloudTrail logging or delete a trail.
@@ -3459,7 +3371,9 @@ class CfnTrailProps:
3459
3371
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnTrail.AdvancedEventSelectorProperty]]]]:
3460
3372
  '''Specifies the settings for advanced event selectors.
3461
3373
 
3462
- You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
3374
+ You can use advanced event selectors to log management events, data events for all resource types, and network activity events.
3375
+
3376
+ You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ and `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
3463
3377
 
3464
3378
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html#cfn-cloudtrail-trail-advancedeventselectors
3465
3379
  '''
@@ -12415,31 +12415,29 @@ class AlarmProps(CreateAlarmOptions):
12415
12415
 
12416
12416
  Example::
12417
12417
 
12418
- import aws_cdk.aws_cloudwatch as cloudwatch
12418
+ # log_group: logs.LogGroup
12419
12419
 
12420
- # alias: lambda.Alias
12420
+ mf = logs.MetricFilter(self, "MetricFilter",
12421
+ log_group=log_group,
12422
+ metric_namespace="MyApp",
12423
+ metric_name="Latency",
12424
+ filter_pattern=logs.FilterPattern.exists("$.latency"),
12425
+ metric_value="$.latency",
12426
+ dimensions={
12427
+ "ErrorCode": "$.errorCode"
12428
+ },
12429
+ unit=cloudwatch.Unit.MILLISECONDS
12430
+ )
12421
12431
 
12422
- # or add alarms to an existing group
12423
- # blue_green_alias: lambda.Alias
12432
+ # expose a metric from the metric filter
12433
+ metric = mf.metric()
12424
12434
 
12425
- alarm = cloudwatch.Alarm(self, "Errors",
12426
- comparison_operator=cloudwatch.ComparisonOperator.GREATER_THAN_THRESHOLD,
12427
- threshold=1,
12428
- evaluation_periods=1,
12429
- metric=alias.metric_errors()
12430
- )
12431
- deployment_group = codedeploy.LambdaDeploymentGroup(self, "BlueGreenDeployment",
12432
- alias=alias,
12433
- deployment_config=codedeploy.LambdaDeploymentConfig.LINEAR_10PERCENT_EVERY_1MINUTE,
12434
- alarms=[alarm
12435
- ]
12435
+ # you can use the metric to create a new alarm
12436
+ cloudwatch.Alarm(self, "alarm from metric filter",
12437
+ metric=metric,
12438
+ threshold=100,
12439
+ evaluation_periods=2
12436
12440
  )
12437
- deployment_group.add_alarm(cloudwatch.Alarm(self, "BlueGreenErrors",
12438
- comparison_operator=cloudwatch.ComparisonOperator.GREATER_THAN_THRESHOLD,
12439
- threshold=1,
12440
- evaluation_periods=1,
12441
- metric=blue_green_alias.metric_errors()
12442
- ))
12443
12441
  '''
12444
12442
  if __debug__:
12445
12443
  type_hints = typing.get_type_hints(_typecheckingstub__b2e7c873c118fbc1f6cf26e1bb5bd3d8549040c626a6450f2d686bb07b87266b)
@@ -14684,31 +14682,29 @@ class Alarm(
14684
14682
 
14685
14683
  Example::
14686
14684
 
14687
- import aws_cdk.aws_cloudwatch as cloudwatch
14685
+ # log_group: logs.LogGroup
14688
14686
 
14689
- # alias: lambda.Alias
14687
+ mf = logs.MetricFilter(self, "MetricFilter",
14688
+ log_group=log_group,
14689
+ metric_namespace="MyApp",
14690
+ metric_name="Latency",
14691
+ filter_pattern=logs.FilterPattern.exists("$.latency"),
14692
+ metric_value="$.latency",
14693
+ dimensions={
14694
+ "ErrorCode": "$.errorCode"
14695
+ },
14696
+ unit=cloudwatch.Unit.MILLISECONDS
14697
+ )
14690
14698
 
14691
- # or add alarms to an existing group
14692
- # blue_green_alias: lambda.Alias
14699
+ # expose a metric from the metric filter
14700
+ metric = mf.metric()
14693
14701
 
14694
- alarm = cloudwatch.Alarm(self, "Errors",
14695
- comparison_operator=cloudwatch.ComparisonOperator.GREATER_THAN_THRESHOLD,
14696
- threshold=1,
14697
- evaluation_periods=1,
14698
- metric=alias.metric_errors()
14699
- )
14700
- deployment_group = codedeploy.LambdaDeploymentGroup(self, "BlueGreenDeployment",
14701
- alias=alias,
14702
- deployment_config=codedeploy.LambdaDeploymentConfig.LINEAR_10PERCENT_EVERY_1MINUTE,
14703
- alarms=[alarm
14704
- ]
14702
+ # you can use the metric to create a new alarm
14703
+ cloudwatch.Alarm(self, "alarm from metric filter",
14704
+ metric=metric,
14705
+ threshold=100,
14706
+ evaluation_periods=2
14705
14707
  )
14706
- deployment_group.add_alarm(cloudwatch.Alarm(self, "BlueGreenErrors",
14707
- comparison_operator=cloudwatch.ComparisonOperator.GREATER_THAN_THRESHOLD,
14708
- threshold=1,
14709
- evaluation_periods=1,
14710
- metric=blue_green_alias.metric_errors()
14711
- ))
14712
14708
  '''
14713
14709
 
14714
14710
  def __init__(
@@ -5222,7 +5222,7 @@ class CfnLocationS3(
5222
5222
  ):
5223
5223
  '''The ``AWS::DataSync::LocationS3`` resource specifies an endpoint for an Amazon S3 bucket.
5224
5224
 
5225
- For more information, see `Create an Amazon S3 location <https://docs.aws.amazon.com/datasync/latest/userguide/create-locations-cli.html#create-location-s3-cli>`_ in the *AWS DataSync User Guide* .
5225
+ For more information, see the `*AWS DataSync User Guide* <https://docs.aws.amazon.com/datasync/latest/userguide/create-s3-location.html>`_ .
5226
5226
 
5227
5227
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-datasync-locations3.html
5228
5228
  :cloudformationResource: AWS::DataSync::LocationS3