aws-cdk-lib 2.160.0__py3-none-any.whl → 2.161.1__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +21 -14
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.160.0.jsii.tgz → aws-cdk-lib@2.161.1.jsii.tgz} +0 -0
- aws_cdk/aws_apigatewayv2/__init__.py +13 -14
- aws_cdk/aws_autoscaling/__init__.py +2 -2
- aws_cdk/aws_b2bi/__init__.py +2283 -672
- aws_cdk/aws_batch/__init__.py +9 -5
- aws_cdk/aws_bedrock/__init__.py +52 -20
- aws_cdk/aws_cloudformation/__init__.py +9 -9
- aws_cdk/aws_cloudtrail/__init__.py +97 -183
- aws_cdk/aws_cloudwatch/__init__.py +38 -42
- aws_cdk/aws_datasync/__init__.py +1 -1
- aws_cdk/aws_ec2/__init__.py +114 -8
- aws_cdk/aws_ecs/__init__.py +513 -2
- aws_cdk/aws_eks/__init__.py +118 -2
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +5 -3
- aws_cdk/aws_glue/__init__.py +386 -0
- aws_cdk/aws_iotfleetwise/__init__.py +49 -49
- aws_cdk/aws_iottwinmaker/__init__.py +4 -4
- aws_cdk/aws_iotwireless/__init__.py +2 -1
- aws_cdk/aws_kinesisfirehose/__init__.py +52 -76
- aws_cdk/aws_lambda/__init__.py +383 -244
- aws_cdk/aws_logs/__init__.py +431 -3
- aws_cdk/aws_mediaconnect/__init__.py +6 -4
- aws_cdk/aws_medialive/__init__.py +36 -0
- aws_cdk/aws_organizations/__init__.py +4 -3
- aws_cdk/aws_pipes/__init__.py +2 -2
- aws_cdk/aws_quicksight/__init__.py +1086 -6
- aws_cdk/aws_rds/__init__.py +158 -3
- aws_cdk/aws_route53resolver/__init__.py +3 -17
- aws_cdk/aws_s3/__init__.py +20 -11
- aws_cdk/aws_s3_deployment/__init__.py +45 -0
- aws_cdk/aws_s3express/__init__.py +314 -4
- aws_cdk/aws_sagemaker/__init__.py +44 -4
- aws_cdk/aws_secretsmanager/__init__.py +14 -7
- aws_cdk/aws_securityhub/__init__.py +16 -14
- aws_cdk/aws_ses/__init__.py +52 -18
- aws_cdk/aws_sqs/__init__.py +16 -14
- aws_cdk/aws_ssm/__init__.py +6 -2
- aws_cdk/aws_synthetics/__init__.py +46 -0
- aws_cdk/aws_waf/__init__.py +33 -22
- aws_cdk/aws_wafregional/__init__.py +36 -24
- aws_cdk/aws_workspacesweb/__init__.py +54 -3
- aws_cdk/cloudformation_include/__init__.py +28 -0
- aws_cdk/cx_api/__init__.py +50 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/RECORD +51 -51
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.160.0.dist-info → aws_cdk_lib-2.161.1.dist-info}/top_level.txt +0 -0
|
@@ -1141,9 +1141,9 @@ class CfnEventDataStore(
|
|
|
1141
1141
|
field_selectors: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnEventDataStore.AdvancedFieldSelectorProperty", typing.Dict[builtins.str, typing.Any]]]]],
|
|
1142
1142
|
name: typing.Optional[builtins.str] = None,
|
|
1143
1143
|
) -> None:
|
|
1144
|
-
'''Advanced event selectors let you create fine-grained selectors for CloudTrail management and
|
|
1144
|
+
'''Advanced event selectors let you create fine-grained selectors for AWS CloudTrail management, data, and network activity events.
|
|
1145
1145
|
|
|
1146
|
-
They help you control costs by logging only those events that are important to you. For more information about advanced event selectors, see `Logging
|
|
1146
|
+
They help you control costs by logging only those events that are important to you. For more information about configuring advanced event selectors, see the `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ , `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ , and `Logging management events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html>`_ topics in the *AWS CloudTrail User Guide* .
|
|
1147
1147
|
|
|
1148
1148
|
You cannot apply both event selectors and advanced event selectors to a trail.
|
|
1149
1149
|
|
|
@@ -1161,6 +1161,17 @@ class CfnEventDataStore(
|
|
|
1161
1161
|
- ``eventName``
|
|
1162
1162
|
- ``resources.ARN``
|
|
1163
1163
|
|
|
1164
|
+
*Supported CloudTrail event record fields for network activity events*
|
|
1165
|
+
.. epigraph::
|
|
1166
|
+
|
|
1167
|
+
Network activity events is in preview release for CloudTrail and is subject to change.
|
|
1168
|
+
|
|
1169
|
+
- ``eventCategory`` (required)
|
|
1170
|
+
- ``eventSource`` (required)
|
|
1171
|
+
- ``eventName``
|
|
1172
|
+
- ``errorCode`` - The only valid value for ``errorCode`` is ``VpceAccessDenied`` .
|
|
1173
|
+
- ``vpcEndpointId``
|
|
1174
|
+
|
|
1164
1175
|
.. epigraph::
|
|
1165
1176
|
|
|
1166
1177
|
For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
|
|
@@ -1263,7 +1274,7 @@ class CfnEventDataStore(
|
|
|
1263
1274
|
) -> None:
|
|
1264
1275
|
'''A single selector statement in an advanced event selector.
|
|
1265
1276
|
|
|
1266
|
-
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``
|
|
1277
|
+
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` . For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` . For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - This field is only used for management events and network activity events. For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events. For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source. The following are valid values for network activity events: - ``cloudtrail.amazonaws.com`` - ``ec2.amazonaws.com`` - ``kms.amazonaws.com`` - ``secretsmanager.amazonaws.com`` - *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas. - *``eventCategory``* - This field is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . - For CloudTrail network activity events, the value must be ``NetworkActivity`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator. - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator. For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* . You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector. - *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs. - *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
|
|
1267
1278
|
:param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
1268
1279
|
:param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
|
|
1269
1280
|
:param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
@@ -1323,18 +1334,32 @@ class CfnEventDataStore(
|
|
|
1323
1334
|
|
|
1324
1335
|
For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported.
|
|
1325
1336
|
|
|
1326
|
-
For CloudTrail management events, supported fields include ``
|
|
1337
|
+
For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` .
|
|
1338
|
+
|
|
1339
|
+
For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` .
|
|
1327
1340
|
|
|
1328
|
-
For CloudTrail
|
|
1341
|
+
For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` .
|
|
1329
1342
|
|
|
1330
1343
|
For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
|
|
1331
1344
|
|
|
1332
|
-
- *``readOnly``* -
|
|
1333
|
-
- *``eventSource``* -
|
|
1334
|
-
|
|
1335
|
-
|
|
1345
|
+
- *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events.
|
|
1346
|
+
- *``eventSource``* - This field is only used for management events and network activity events.
|
|
1347
|
+
|
|
1348
|
+
For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events.
|
|
1349
|
+
|
|
1350
|
+
For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source.
|
|
1351
|
+
|
|
1352
|
+
The following are valid values for network activity events:
|
|
1353
|
+
|
|
1354
|
+
- ``cloudtrail.amazonaws.com``
|
|
1355
|
+
- ``ec2.amazonaws.com``
|
|
1356
|
+
- ``kms.amazonaws.com``
|
|
1357
|
+
- ``secretsmanager.amazonaws.com``
|
|
1358
|
+
- *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas.
|
|
1359
|
+
- *``eventCategory``* - This field is required and must be set to ``Equals`` .
|
|
1336
1360
|
- For CloudTrail management events, the value must be ``Management`` .
|
|
1337
1361
|
- For CloudTrail data events, the value must be ``Data`` .
|
|
1362
|
+
- For CloudTrail network activity events, the value must be ``NetworkActivity`` .
|
|
1338
1363
|
|
|
1339
1364
|
The following are used only for event data stores:
|
|
1340
1365
|
|
|
@@ -1342,91 +1367,22 @@ class CfnEventDataStore(
|
|
|
1342
1367
|
- For AWS Config configuration items, the value must be ``ConfigurationItem`` .
|
|
1343
1368
|
- For Audit Manager evidence, the value must be ``Evidence`` .
|
|
1344
1369
|
- For non- AWS events, the value must be ``ActivityAuditLog`` .
|
|
1345
|
-
- *``
|
|
1346
|
-
- ``
|
|
1347
|
-
|
|
1348
|
-
-
|
|
1349
|
-
- ``AWS::Bedrock::FlowAlias``
|
|
1350
|
-
- ``AWS::Bedrock::Guardrail``
|
|
1351
|
-
- ``AWS::Bedrock::KnowledgeBase``
|
|
1352
|
-
- ``AWS::Cassandra::Table``
|
|
1353
|
-
- ``AWS::CloudFront::KeyValueStore``
|
|
1354
|
-
- ``AWS::CloudTrail::Channel``
|
|
1355
|
-
- ``AWS::CloudWatch::Metric``
|
|
1356
|
-
- ``AWS::CodeWhisperer::Customization``
|
|
1357
|
-
- ``AWS::CodeWhisperer::Profile``
|
|
1358
|
-
- ``AWS::Cognito::IdentityPool``
|
|
1359
|
-
- ``AWS::DynamoDB::Stream``
|
|
1360
|
-
- ``AWS::DynamoDB::Table``
|
|
1361
|
-
- ``AWS::EC2::Snapshot``
|
|
1362
|
-
- ``AWS::EMRWAL::Workspace``
|
|
1363
|
-
- ``AWS::FinSpace::Environment``
|
|
1364
|
-
- ``AWS::Glue::Table``
|
|
1365
|
-
- ``AWS::GreengrassV2::ComponentVersion``
|
|
1366
|
-
- ``AWS::GreengrassV2::Deployment``
|
|
1367
|
-
- ``AWS::GuardDuty::Detector``
|
|
1368
|
-
- ``AWS::IoT::Certificate``
|
|
1369
|
-
- ``AWS::IoT::Thing``
|
|
1370
|
-
- ``AWS::IoTSiteWise::Asset``
|
|
1371
|
-
- ``AWS::IoTSiteWise::TimeSeries``
|
|
1372
|
-
- ``AWS::IoTTwinMaker::Entity``
|
|
1373
|
-
- ``AWS::IoTTwinMaker::Workspace``
|
|
1374
|
-
- ``AWS::KendraRanking::ExecutionPlan``
|
|
1375
|
-
- ``AWS::Kinesis::Stream``
|
|
1376
|
-
- ``AWS::Kinesis::StreamConsumer``
|
|
1377
|
-
- ``AWS::KinesisVideo::Stream``
|
|
1378
|
-
- ``AWS::Lambda::Function``
|
|
1379
|
-
- ``AWS::MachineLearning::MlModel``
|
|
1380
|
-
- ``AWS::ManagedBlockchain::Network``
|
|
1381
|
-
- ``AWS::ManagedBlockchain::Node``
|
|
1382
|
-
- ``AWS::MedicalImaging::Datastore``
|
|
1383
|
-
- ``AWS::NeptuneGraph::Graph``
|
|
1384
|
-
- ``AWS::One::UKey``
|
|
1385
|
-
- ``AWS::One::User``
|
|
1386
|
-
- ``AWS::PaymentCryptography::Alias``
|
|
1387
|
-
- ``AWS::PaymentCryptography::Key``
|
|
1388
|
-
- ``AWS::PCAConnectorAD::Connector``
|
|
1389
|
-
- ``AWS::PCAConnectorSCEP::Connector``
|
|
1390
|
-
- ``AWS::QApps:QApp``
|
|
1391
|
-
- ``AWS::QBusiness::Application``
|
|
1392
|
-
- ``AWS::QBusiness::DataSource``
|
|
1393
|
-
- ``AWS::QBusiness::Index``
|
|
1394
|
-
- ``AWS::QBusiness::WebExperience``
|
|
1395
|
-
- ``AWS::RDS::DBCluster``
|
|
1396
|
-
- ``AWS::RUM::AppMonitor``
|
|
1397
|
-
- ``AWS::S3::AccessPoint``
|
|
1398
|
-
- ``AWS::S3::Object``
|
|
1399
|
-
- ``AWS::S3Express::Object``
|
|
1400
|
-
- ``AWS::S3ObjectLambda::AccessPoint``
|
|
1401
|
-
- ``AWS::S3Outposts::Object``
|
|
1402
|
-
- ``AWS::SageMaker::Endpoint``
|
|
1403
|
-
- ``AWS::SageMaker::ExperimentTrialComponent``
|
|
1404
|
-
- ``AWS::SageMaker::FeatureGroup``
|
|
1405
|
-
- ``AWS::ServiceDiscovery::Namespace``
|
|
1406
|
-
- ``AWS::ServiceDiscovery::Service``
|
|
1407
|
-
- ``AWS::SCN::Instance``
|
|
1408
|
-
- ``AWS::SNS::PlatformEndpoint``
|
|
1409
|
-
- ``AWS::SNS::Topic``
|
|
1410
|
-
- ``AWS::SQS::Queue``
|
|
1411
|
-
- ``AWS::SSM::ManagedNode``
|
|
1412
|
-
- ``AWS::SSMMessages::ControlChannel``
|
|
1413
|
-
- ``AWS::StepFunctions::StateMachine``
|
|
1414
|
-
- ``AWS::SWF::Domain``
|
|
1415
|
-
- ``AWS::ThinClient::Device``
|
|
1416
|
-
- ``AWS::ThinClient::Environment``
|
|
1417
|
-
- ``AWS::Timestream::Database``
|
|
1418
|
-
- ``AWS::Timestream::Table``
|
|
1419
|
-
- ``AWS::VerifiedPermissions::PolicyStore``
|
|
1420
|
-
- ``AWS::XRay::Trace``
|
|
1421
|
-
|
|
1422
|
-
You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector.
|
|
1423
|
-
|
|
1424
|
-
- *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
|
|
1370
|
+
- *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator.
|
|
1371
|
+
- *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator.
|
|
1372
|
+
|
|
1373
|
+
For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* .
|
|
1425
1374
|
|
|
1375
|
+
You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector.
|
|
1376
|
+
|
|
1377
|
+
- *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value.
|
|
1378
|
+
|
|
1379
|
+
For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
|
|
1426
1380
|
.. epigraph::
|
|
1427
1381
|
|
|
1428
1382
|
You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
|
|
1429
1383
|
|
|
1384
|
+
- *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
|
|
1385
|
+
|
|
1430
1386
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-eventdatastore-advancedfieldselector.html#cfn-cloudtrail-eventdatastore-advancedfieldselector-field
|
|
1431
1387
|
'''
|
|
1432
1388
|
result = self._values.get("field")
|
|
@@ -2205,7 +2161,7 @@ class CfnTrail(
|
|
|
2205
2161
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
2206
2162
|
:param is_logging: Whether the CloudTrail trail is currently logging AWS API calls.
|
|
2207
2163
|
:param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
|
|
2208
|
-
:param advanced_event_selectors: Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
|
|
2164
|
+
:param advanced_event_selectors: Specifies the settings for advanced event selectors. You can use advanced event selectors to log management events, data events for all resource types, and network activity events. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ and `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
|
|
2209
2165
|
:param cloud_watch_logs_log_group_arn: Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
|
|
2210
2166
|
:param cloud_watch_logs_role_arn: Specifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group. You must use a role that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
|
|
2211
2167
|
:param enable_log_file_validation: Specifies whether log file validation is enabled. The default is false. .. epigraph:: When you disable log file integrity validation, the chain of digest files is broken after one hour. CloudTrail does not create digest files for log files that were delivered during a period in which log file integrity validation was disabled. For example, if you enable log file integrity validation at noon on January 1, disable it at noon on January 2, and re-enable it at noon on January 10, digest files will not be created for the log files delivered from noon on January 2 to noon on January 10. The same applies whenever you stop CloudTrail logging or delete a trail.
|
|
@@ -2571,9 +2527,9 @@ class CfnTrail(
|
|
|
2571
2527
|
field_selectors: typing.Union[_IResolvable_da3f097b, typing.Sequence[typing.Union[_IResolvable_da3f097b, typing.Union["CfnTrail.AdvancedFieldSelectorProperty", typing.Dict[builtins.str, typing.Any]]]]],
|
|
2572
2528
|
name: typing.Optional[builtins.str] = None,
|
|
2573
2529
|
) -> None:
|
|
2574
|
-
'''Advanced event selectors let you create fine-grained selectors for CloudTrail management and
|
|
2530
|
+
'''Advanced event selectors let you create fine-grained selectors for AWS CloudTrail management, data, and network activity events.
|
|
2575
2531
|
|
|
2576
|
-
They help you control costs by logging only those events that are important to you. For more information about advanced event selectors, see `Logging
|
|
2532
|
+
They help you control costs by logging only those events that are important to you. For more information about configuring advanced event selectors, see the `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ , `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ , and `Logging management events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-management-events-with-cloudtrail.html>`_ topics in the *AWS CloudTrail User Guide* .
|
|
2577
2533
|
|
|
2578
2534
|
You cannot apply both event selectors and advanced event selectors to a trail.
|
|
2579
2535
|
|
|
@@ -2591,6 +2547,17 @@ class CfnTrail(
|
|
|
2591
2547
|
- ``eventName``
|
|
2592
2548
|
- ``resources.ARN``
|
|
2593
2549
|
|
|
2550
|
+
*Supported CloudTrail event record fields for network activity events*
|
|
2551
|
+
.. epigraph::
|
|
2552
|
+
|
|
2553
|
+
Network activity events is in preview release for CloudTrail and is subject to change.
|
|
2554
|
+
|
|
2555
|
+
- ``eventCategory`` (required)
|
|
2556
|
+
- ``eventSource`` (required)
|
|
2557
|
+
- ``eventName``
|
|
2558
|
+
- ``errorCode`` - The only valid value for ``errorCode`` is ``VpceAccessDenied`` .
|
|
2559
|
+
- ``vpcEndpointId``
|
|
2560
|
+
|
|
2594
2561
|
.. epigraph::
|
|
2595
2562
|
|
|
2596
2563
|
For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
|
|
@@ -2693,7 +2660,7 @@ class CfnTrail(
|
|
|
2693
2660
|
) -> None:
|
|
2694
2661
|
'''A single selector statement in an advanced event selector.
|
|
2695
2662
|
|
|
2696
|
-
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``
|
|
2663
|
+
:param field: A field in a CloudTrail event record on which to filter events to be logged. For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported. For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` . For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` . For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` . For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` . - *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events. - *``eventSource``* - This field is only used for management events and network activity events. For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events. For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source. The following are valid values for network activity events: - ``cloudtrail.amazonaws.com`` - ``ec2.amazonaws.com`` - ``kms.amazonaws.com`` - ``secretsmanager.amazonaws.com`` - *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas. - *``eventCategory``* - This field is required and must be set to ``Equals`` . - For CloudTrail management events, the value must be ``Management`` . - For CloudTrail data events, the value must be ``Data`` . - For CloudTrail network activity events, the value must be ``NetworkActivity`` . The following are used only for event data stores: - For CloudTrail Insights events, the value must be ``Insight`` . - For AWS Config configuration items, the value must be ``ConfigurationItem`` . - For Audit Manager evidence, the value must be ``Evidence`` . - For non- AWS events, the value must be ``ActivityAuditLog`` . - *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator. - *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator. For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* . You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector. - *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* . .. epigraph:: You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs. - *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
|
|
2697
2664
|
:param ends_with: An operator that includes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
2698
2665
|
:param equal_to: An operator that includes events that match the exact value of the event record field specified as the value of ``Field`` . This is the only valid operator that you can use with the ``readOnly`` , ``eventCategory`` , and ``resources.type`` fields.
|
|
2699
2666
|
:param not_ends_with: An operator that excludes events that match the last few characters of the event record field specified as the value of ``Field`` .
|
|
@@ -2753,18 +2720,32 @@ class CfnTrail(
|
|
|
2753
2720
|
|
|
2754
2721
|
For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the field is used only for selecting events as filtering is not supported.
|
|
2755
2722
|
|
|
2756
|
-
For CloudTrail management events, supported fields include ``
|
|
2723
|
+
For CloudTrail management events, supported fields include ``eventCategory`` (required), ``eventSource`` , and ``readOnly`` .
|
|
2757
2724
|
|
|
2758
|
-
For CloudTrail data events, supported fields include ``
|
|
2725
|
+
For CloudTrail data events, supported fields include ``eventCategory`` (required), ``resources.type`` (required), ``eventName`` , ``readOnly`` , and ``resources.ARN`` .
|
|
2726
|
+
|
|
2727
|
+
For CloudTrail network activity events, supported fields include ``eventCategory`` (required), ``eventSource`` (required), ``eventName`` , ``errorCode`` , and ``vpcEndpointId`` .
|
|
2759
2728
|
|
|
2760
2729
|
For event data stores for CloudTrail Insights events, AWS Config configuration items, Audit Manager evidence, or events outside of AWS , the only supported field is ``eventCategory`` .
|
|
2761
2730
|
|
|
2762
|
-
- *``readOnly``* -
|
|
2763
|
-
- *``eventSource``* -
|
|
2764
|
-
|
|
2765
|
-
|
|
2731
|
+
- *``readOnly``* - This is an optional field that is only used for management events and data events. This field can be set to ``Equals`` with a value of ``true`` or ``false`` . If you do not add this field, CloudTrail logs both ``read`` and ``write`` events. A value of ``true`` logs only ``read`` events. A value of ``false`` logs only ``write`` events.
|
|
2732
|
+
- *``eventSource``* - This field is only used for management events and network activity events.
|
|
2733
|
+
|
|
2734
|
+
For management events, this is an optional field that can be set to ``NotEquals`` ``kms.amazonaws.com`` to exclude KMS management events, or ``NotEquals`` ``rdsdata.amazonaws.com`` to exclude RDS management events.
|
|
2735
|
+
|
|
2736
|
+
For network activity events, this is a required field that only uses the ``Equals`` operator. Set this field to the event source for which you want to log network activity events. If you want to log network activity events for multiple event sources, you must create a separate field selector for each event source.
|
|
2737
|
+
|
|
2738
|
+
The following are valid values for network activity events:
|
|
2739
|
+
|
|
2740
|
+
- ``cloudtrail.amazonaws.com``
|
|
2741
|
+
- ``ec2.amazonaws.com``
|
|
2742
|
+
- ``kms.amazonaws.com``
|
|
2743
|
+
- ``secretsmanager.amazonaws.com``
|
|
2744
|
+
- *``eventName``* - This is an optional field that is only used for data events and network activity events. You can use any operator with ``eventName`` . You can use it to filter in or filter out specific events. You can have multiple values for this field, separated by commas.
|
|
2745
|
+
- *``eventCategory``* - This field is required and must be set to ``Equals`` .
|
|
2766
2746
|
- For CloudTrail management events, the value must be ``Management`` .
|
|
2767
2747
|
- For CloudTrail data events, the value must be ``Data`` .
|
|
2748
|
+
- For CloudTrail network activity events, the value must be ``NetworkActivity`` .
|
|
2768
2749
|
|
|
2769
2750
|
The following are used only for event data stores:
|
|
2770
2751
|
|
|
@@ -2772,91 +2753,22 @@ class CfnTrail(
|
|
|
2772
2753
|
- For AWS Config configuration items, the value must be ``ConfigurationItem`` .
|
|
2773
2754
|
- For Audit Manager evidence, the value must be ``Evidence`` .
|
|
2774
2755
|
- For non- AWS events, the value must be ``ActivityAuditLog`` .
|
|
2775
|
-
- *``
|
|
2776
|
-
- ``
|
|
2777
|
-
|
|
2778
|
-
-
|
|
2779
|
-
- ``AWS::Bedrock::FlowAlias``
|
|
2780
|
-
- ``AWS::Bedrock::Guardrail``
|
|
2781
|
-
- ``AWS::Bedrock::KnowledgeBase``
|
|
2782
|
-
- ``AWS::Cassandra::Table``
|
|
2783
|
-
- ``AWS::CloudFront::KeyValueStore``
|
|
2784
|
-
- ``AWS::CloudTrail::Channel``
|
|
2785
|
-
- ``AWS::CloudWatch::Metric``
|
|
2786
|
-
- ``AWS::CodeWhisperer::Customization``
|
|
2787
|
-
- ``AWS::CodeWhisperer::Profile``
|
|
2788
|
-
- ``AWS::Cognito::IdentityPool``
|
|
2789
|
-
- ``AWS::DynamoDB::Stream``
|
|
2790
|
-
- ``AWS::DynamoDB::Table``
|
|
2791
|
-
- ``AWS::EC2::Snapshot``
|
|
2792
|
-
- ``AWS::EMRWAL::Workspace``
|
|
2793
|
-
- ``AWS::FinSpace::Environment``
|
|
2794
|
-
- ``AWS::Glue::Table``
|
|
2795
|
-
- ``AWS::GreengrassV2::ComponentVersion``
|
|
2796
|
-
- ``AWS::GreengrassV2::Deployment``
|
|
2797
|
-
- ``AWS::GuardDuty::Detector``
|
|
2798
|
-
- ``AWS::IoT::Certificate``
|
|
2799
|
-
- ``AWS::IoT::Thing``
|
|
2800
|
-
- ``AWS::IoTSiteWise::Asset``
|
|
2801
|
-
- ``AWS::IoTSiteWise::TimeSeries``
|
|
2802
|
-
- ``AWS::IoTTwinMaker::Entity``
|
|
2803
|
-
- ``AWS::IoTTwinMaker::Workspace``
|
|
2804
|
-
- ``AWS::KendraRanking::ExecutionPlan``
|
|
2805
|
-
- ``AWS::Kinesis::Stream``
|
|
2806
|
-
- ``AWS::Kinesis::StreamConsumer``
|
|
2807
|
-
- ``AWS::KinesisVideo::Stream``
|
|
2808
|
-
- ``AWS::Lambda::Function``
|
|
2809
|
-
- ``AWS::MachineLearning::MlModel``
|
|
2810
|
-
- ``AWS::ManagedBlockchain::Network``
|
|
2811
|
-
- ``AWS::ManagedBlockchain::Node``
|
|
2812
|
-
- ``AWS::MedicalImaging::Datastore``
|
|
2813
|
-
- ``AWS::NeptuneGraph::Graph``
|
|
2814
|
-
- ``AWS::One::UKey``
|
|
2815
|
-
- ``AWS::One::User``
|
|
2816
|
-
- ``AWS::PaymentCryptography::Alias``
|
|
2817
|
-
- ``AWS::PaymentCryptography::Key``
|
|
2818
|
-
- ``AWS::PCAConnectorAD::Connector``
|
|
2819
|
-
- ``AWS::PCAConnectorSCEP::Connector``
|
|
2820
|
-
- ``AWS::QApps:QApp``
|
|
2821
|
-
- ``AWS::QBusiness::Application``
|
|
2822
|
-
- ``AWS::QBusiness::DataSource``
|
|
2823
|
-
- ``AWS::QBusiness::Index``
|
|
2824
|
-
- ``AWS::QBusiness::WebExperience``
|
|
2825
|
-
- ``AWS::RDS::DBCluster``
|
|
2826
|
-
- ``AWS::RUM::AppMonitor``
|
|
2827
|
-
- ``AWS::S3::AccessPoint``
|
|
2828
|
-
- ``AWS::S3::Object``
|
|
2829
|
-
- ``AWS::S3Express::Object``
|
|
2830
|
-
- ``AWS::S3ObjectLambda::AccessPoint``
|
|
2831
|
-
- ``AWS::S3Outposts::Object``
|
|
2832
|
-
- ``AWS::SageMaker::Endpoint``
|
|
2833
|
-
- ``AWS::SageMaker::ExperimentTrialComponent``
|
|
2834
|
-
- ``AWS::SageMaker::FeatureGroup``
|
|
2835
|
-
- ``AWS::ServiceDiscovery::Namespace``
|
|
2836
|
-
- ``AWS::ServiceDiscovery::Service``
|
|
2837
|
-
- ``AWS::SCN::Instance``
|
|
2838
|
-
- ``AWS::SNS::PlatformEndpoint``
|
|
2839
|
-
- ``AWS::SNS::Topic``
|
|
2840
|
-
- ``AWS::SQS::Queue``
|
|
2841
|
-
- ``AWS::SSM::ManagedNode``
|
|
2842
|
-
- ``AWS::SSMMessages::ControlChannel``
|
|
2843
|
-
- ``AWS::StepFunctions::StateMachine``
|
|
2844
|
-
- ``AWS::SWF::Domain``
|
|
2845
|
-
- ``AWS::ThinClient::Device``
|
|
2846
|
-
- ``AWS::ThinClient::Environment``
|
|
2847
|
-
- ``AWS::Timestream::Database``
|
|
2848
|
-
- ``AWS::Timestream::Table``
|
|
2849
|
-
- ``AWS::VerifiedPermissions::PolicyStore``
|
|
2850
|
-
- ``AWS::XRay::Trace``
|
|
2851
|
-
|
|
2852
|
-
You can have only one ``resources.type`` field per selector. To log data events on more than one resource type, add another selector.
|
|
2853
|
-
|
|
2854
|
-
- *``resources.ARN``* - You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value. For information about filtering on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
|
|
2756
|
+
- *``errorCode``* - This field is only used to filter CloudTrail network activity events and is optional. This is the error code to filter on. Currently, the only valid ``errorCode`` is ``VpceAccessDenied`` . ``errorCode`` can only use the ``Equals`` operator.
|
|
2757
|
+
- *``resources.type``* - This field is required for CloudTrail data events. ``resources.type`` can only use the ``Equals`` operator.
|
|
2758
|
+
|
|
2759
|
+
For a list of available resource types for data events, see `Data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#logging-data-events>`_ in the *AWS CloudTrail User Guide* .
|
|
2855
2760
|
|
|
2761
|
+
You can have only one ``resources.type`` field per selector. To log events on more than one resource type, add another selector.
|
|
2762
|
+
|
|
2763
|
+
- *``resources.ARN``* - The ``resources.ARN`` is an optional field for data events. You can use any operator with ``resources.ARN`` , but if you use ``Equals`` or ``NotEquals`` , the value must exactly match the ARN of a valid resource of the type you've specified in the template as the value of resources.type. To log all data events for all objects in a specific S3 bucket, use the ``StartsWith`` operator, and include only the bucket ARN as the matching value.
|
|
2764
|
+
|
|
2765
|
+
For information about filtering data events on the ``resources.ARN`` field, see `Filtering data events by resources.ARN <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/filtering-data-events.html#filtering-data-events-resourcearn>`_ in the *AWS CloudTrail User Guide* .
|
|
2856
2766
|
.. epigraph::
|
|
2857
2767
|
|
|
2858
2768
|
You can't use the ``resources.ARN`` field to filter resource types that do not have ARNs.
|
|
2859
2769
|
|
|
2770
|
+
- *``vpcEndpointId``* - This field is only used to filter CloudTrail network activity events and is optional. This field identifies the VPC endpoint that the request passed through. You can use any operator with ``vpcEndpointId`` .
|
|
2771
|
+
|
|
2860
2772
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-advancedfieldselector.html#cfn-cloudtrail-trail-advancedfieldselector-field
|
|
2861
2773
|
'''
|
|
2862
2774
|
result = self._values.get("field")
|
|
@@ -2968,7 +2880,7 @@ class CfnTrail(
|
|
|
2968
2880
|
- The ``Invoke`` API operation on *MyLambdaFunction* is an Lambda API. It is recorded as a data event in CloudTrail. Because the CloudTrail user specified logging data events for *MyLambdaFunction* , any invocations of that function are logged. The trail processes and logs the event.
|
|
2969
2881
|
- The ``Invoke`` API operation on *MyOtherLambdaFunction* is an Lambda API. Because the CloudTrail user did not specify logging data events for all Lambda functions, the ``Invoke`` operation for *MyOtherLambdaFunction* does not match the function specified for the trail. The trail doesn’t log the event.
|
|
2970
2882
|
|
|
2971
|
-
:param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` Additional resource types are available through *advanced* event selectors. For more information
|
|
2883
|
+
:param type: The resource type in which you want to log data events. You can specify the following *basic* event selector resource types: - ``AWS::DynamoDB::Table`` - ``AWS::Lambda::Function`` - ``AWS::S3::Object`` Additional resource types are available through *advanced* event selectors. For more information, see `AdvancedEventSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedEventSelector.html>`_ .
|
|
2972
2884
|
:param values: An array of Amazon Resource Name (ARN) strings or partial ARN strings for the specified resource type. - To log data events for all objects in all S3 buckets in your AWS account , specify the prefix as ``arn:aws:s3`` . .. epigraph:: This also enables logging of data event activity performed by any user or role in your AWS account , even if that activity is performed on a bucket that belongs to another AWS account . - To log data events for all objects in an S3 bucket, specify the bucket and an empty object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/`` . The trail logs data events for all objects in this S3 bucket. - To log data events for specific objects, specify the S3 bucket and object prefix such as ``arn:aws:s3:::amzn-s3-demo-bucket1/example-images`` . The trail logs data events for objects in this S3 bucket that match the prefix. - To log data events for all Lambda functions in your AWS account , specify the prefix as ``arn:aws:lambda`` . .. epigraph:: This also enables logging of ``Invoke`` activity performed by any user or role in your AWS account , even if that activity is performed on a function that belongs to another AWS account . - To log data events for a specific Lambda function, specify the function ARN. .. epigraph:: Lambda function ARNs are exact. For example, if you specify a function ARN *arn:aws:lambda:us-west-2:111111111111:function:helloworld* , data events will only be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld* . They will not be logged for *arn:aws:lambda:us-west-2:111111111111:function:helloworld2* . - To log data events for all DynamoDB tables in your AWS account , specify the prefix as ``arn:aws:dynamodb`` .
|
|
2973
2885
|
|
|
2974
2886
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html
|
|
@@ -3007,7 +2919,7 @@ class CfnTrail(
|
|
|
3007
2919
|
- ``AWS::Lambda::Function``
|
|
3008
2920
|
- ``AWS::S3::Object``
|
|
3009
2921
|
|
|
3010
|
-
Additional resource types are available through *advanced* event selectors. For more information
|
|
2922
|
+
Additional resource types are available through *advanced* event selectors. For more information, see `AdvancedEventSelector <https://docs.aws.amazon.com/awscloudtrail/latest/APIReference/API_AdvancedEventSelector.html>`_ .
|
|
3011
2923
|
|
|
3012
2924
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudtrail-trail-dataresource.html#cfn-cloudtrail-trail-dataresource-type
|
|
3013
2925
|
'''
|
|
@@ -3305,7 +3217,7 @@ class CfnTrailProps:
|
|
|
3305
3217
|
|
|
3306
3218
|
:param is_logging: Whether the CloudTrail trail is currently logging AWS API calls.
|
|
3307
3219
|
:param s3_bucket_name: Specifies the name of the Amazon S3 bucket designated for publishing log files. See `Amazon S3 Bucket naming rules <https://docs.aws.amazon.com/AmazonS3/latest/userguide/bucketnamingrules.html>`_ .
|
|
3308
|
-
:param advanced_event_selectors: Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
|
|
3220
|
+
:param advanced_event_selectors: Specifies the settings for advanced event selectors. You can use advanced event selectors to log management events, data events for all resource types, and network activity events. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ and `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
|
|
3309
3221
|
:param cloud_watch_logs_log_group_arn: Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
|
|
3310
3222
|
:param cloud_watch_logs_role_arn: Specifies the role for the CloudWatch Logs endpoint to assume to write to a user's log group. You must use a role that exists in your account. To enable CloudWatch Logs delivery, you must provide values for ``CloudWatchLogsLogGroupArn`` and ``CloudWatchLogsRoleArn`` . .. epigraph:: If you previously enabled CloudWatch Logs delivery and want to disable CloudWatch Logs delivery, you must set the values of the ``CloudWatchLogsRoleArn`` and ``CloudWatchLogsLogGroupArn`` fields to ``""`` .
|
|
3311
3223
|
:param enable_log_file_validation: Specifies whether log file validation is enabled. The default is false. .. epigraph:: When you disable log file integrity validation, the chain of digest files is broken after one hour. CloudTrail does not create digest files for log files that were delivered during a period in which log file integrity validation was disabled. For example, if you enable log file integrity validation at noon on January 1, disable it at noon on January 2, and re-enable it at noon on January 10, digest files will not be created for the log files delivered from noon on January 2 to noon on January 10. The same applies whenever you stop CloudTrail logging or delete a trail.
|
|
@@ -3459,7 +3371,9 @@ class CfnTrailProps:
|
|
|
3459
3371
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnTrail.AdvancedEventSelectorProperty]]]]:
|
|
3460
3372
|
'''Specifies the settings for advanced event selectors.
|
|
3461
3373
|
|
|
3462
|
-
You can
|
|
3374
|
+
You can use advanced event selectors to log management events, data events for all resource types, and network activity events.
|
|
3375
|
+
|
|
3376
|
+
You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either ``AdvancedEventSelectors`` or ``EventSelectors`` , but not both. If you apply ``AdvancedEventSelectors`` to a trail, any existing ``EventSelectors`` are overwritten. For more information about advanced event selectors, see `Logging data events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html>`_ and `Logging network activity events <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-network-events-with-cloudtrail.html>`_ in the *AWS CloudTrail User Guide* .
|
|
3463
3377
|
|
|
3464
3378
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html#cfn-cloudtrail-trail-advancedeventselectors
|
|
3465
3379
|
'''
|
|
@@ -12415,31 +12415,29 @@ class AlarmProps(CreateAlarmOptions):
|
|
|
12415
12415
|
|
|
12416
12416
|
Example::
|
|
12417
12417
|
|
|
12418
|
-
|
|
12418
|
+
# log_group: logs.LogGroup
|
|
12419
12419
|
|
|
12420
|
-
|
|
12420
|
+
mf = logs.MetricFilter(self, "MetricFilter",
|
|
12421
|
+
log_group=log_group,
|
|
12422
|
+
metric_namespace="MyApp",
|
|
12423
|
+
metric_name="Latency",
|
|
12424
|
+
filter_pattern=logs.FilterPattern.exists("$.latency"),
|
|
12425
|
+
metric_value="$.latency",
|
|
12426
|
+
dimensions={
|
|
12427
|
+
"ErrorCode": "$.errorCode"
|
|
12428
|
+
},
|
|
12429
|
+
unit=cloudwatch.Unit.MILLISECONDS
|
|
12430
|
+
)
|
|
12421
12431
|
|
|
12422
|
-
#
|
|
12423
|
-
|
|
12432
|
+
# expose a metric from the metric filter
|
|
12433
|
+
metric = mf.metric()
|
|
12424
12434
|
|
|
12425
|
-
|
|
12426
|
-
|
|
12427
|
-
|
|
12428
|
-
|
|
12429
|
-
|
|
12430
|
-
)
|
|
12431
|
-
deployment_group = codedeploy.LambdaDeploymentGroup(self, "BlueGreenDeployment",
|
|
12432
|
-
alias=alias,
|
|
12433
|
-
deployment_config=codedeploy.LambdaDeploymentConfig.LINEAR_10PERCENT_EVERY_1MINUTE,
|
|
12434
|
-
alarms=[alarm
|
|
12435
|
-
]
|
|
12435
|
+
# you can use the metric to create a new alarm
|
|
12436
|
+
cloudwatch.Alarm(self, "alarm from metric filter",
|
|
12437
|
+
metric=metric,
|
|
12438
|
+
threshold=100,
|
|
12439
|
+
evaluation_periods=2
|
|
12436
12440
|
)
|
|
12437
|
-
deployment_group.add_alarm(cloudwatch.Alarm(self, "BlueGreenErrors",
|
|
12438
|
-
comparison_operator=cloudwatch.ComparisonOperator.GREATER_THAN_THRESHOLD,
|
|
12439
|
-
threshold=1,
|
|
12440
|
-
evaluation_periods=1,
|
|
12441
|
-
metric=blue_green_alias.metric_errors()
|
|
12442
|
-
))
|
|
12443
12441
|
'''
|
|
12444
12442
|
if __debug__:
|
|
12445
12443
|
type_hints = typing.get_type_hints(_typecheckingstub__b2e7c873c118fbc1f6cf26e1bb5bd3d8549040c626a6450f2d686bb07b87266b)
|
|
@@ -14684,31 +14682,29 @@ class Alarm(
|
|
|
14684
14682
|
|
|
14685
14683
|
Example::
|
|
14686
14684
|
|
|
14687
|
-
|
|
14685
|
+
# log_group: logs.LogGroup
|
|
14688
14686
|
|
|
14689
|
-
|
|
14687
|
+
mf = logs.MetricFilter(self, "MetricFilter",
|
|
14688
|
+
log_group=log_group,
|
|
14689
|
+
metric_namespace="MyApp",
|
|
14690
|
+
metric_name="Latency",
|
|
14691
|
+
filter_pattern=logs.FilterPattern.exists("$.latency"),
|
|
14692
|
+
metric_value="$.latency",
|
|
14693
|
+
dimensions={
|
|
14694
|
+
"ErrorCode": "$.errorCode"
|
|
14695
|
+
},
|
|
14696
|
+
unit=cloudwatch.Unit.MILLISECONDS
|
|
14697
|
+
)
|
|
14690
14698
|
|
|
14691
|
-
#
|
|
14692
|
-
|
|
14699
|
+
# expose a metric from the metric filter
|
|
14700
|
+
metric = mf.metric()
|
|
14693
14701
|
|
|
14694
|
-
|
|
14695
|
-
|
|
14696
|
-
|
|
14697
|
-
|
|
14698
|
-
|
|
14699
|
-
)
|
|
14700
|
-
deployment_group = codedeploy.LambdaDeploymentGroup(self, "BlueGreenDeployment",
|
|
14701
|
-
alias=alias,
|
|
14702
|
-
deployment_config=codedeploy.LambdaDeploymentConfig.LINEAR_10PERCENT_EVERY_1MINUTE,
|
|
14703
|
-
alarms=[alarm
|
|
14704
|
-
]
|
|
14702
|
+
# you can use the metric to create a new alarm
|
|
14703
|
+
cloudwatch.Alarm(self, "alarm from metric filter",
|
|
14704
|
+
metric=metric,
|
|
14705
|
+
threshold=100,
|
|
14706
|
+
evaluation_periods=2
|
|
14705
14707
|
)
|
|
14706
|
-
deployment_group.add_alarm(cloudwatch.Alarm(self, "BlueGreenErrors",
|
|
14707
|
-
comparison_operator=cloudwatch.ComparisonOperator.GREATER_THAN_THRESHOLD,
|
|
14708
|
-
threshold=1,
|
|
14709
|
-
evaluation_periods=1,
|
|
14710
|
-
metric=blue_green_alias.metric_errors()
|
|
14711
|
-
))
|
|
14712
14708
|
'''
|
|
14713
14709
|
|
|
14714
14710
|
def __init__(
|
aws_cdk/aws_datasync/__init__.py
CHANGED
|
@@ -5222,7 +5222,7 @@ class CfnLocationS3(
|
|
|
5222
5222
|
):
|
|
5223
5223
|
'''The ``AWS::DataSync::LocationS3`` resource specifies an endpoint for an Amazon S3 bucket.
|
|
5224
5224
|
|
|
5225
|
-
For more information, see
|
|
5225
|
+
For more information, see the `*AWS DataSync User Guide* <https://docs.aws.amazon.com/datasync/latest/userguide/create-s3-location.html>`_ .
|
|
5226
5226
|
|
|
5227
5227
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-datasync-locations3.html
|
|
5228
5228
|
:cloudformationResource: AWS::DataSync::LocationS3
|