aws-cdk-lib 2.171.1__py3-none-any.whl → 2.173.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +528 -161
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.171.1.jsii.tgz → aws-cdk-lib@2.173.0.jsii.tgz} +0 -0
- aws_cdk/aws_amazonmq/__init__.py +40 -40
- aws_cdk/aws_apigateway/__init__.py +1357 -120
- aws_cdk/aws_applicationautoscaling/__init__.py +141 -66
- aws_cdk/aws_appsync/__init__.py +163 -139
- aws_cdk/aws_autoscaling/__init__.py +96 -30
- aws_cdk/aws_bedrock/__init__.py +80 -44
- aws_cdk/aws_chatbot/__init__.py +803 -2
- aws_cdk/aws_cleanrooms/__init__.py +4 -6
- aws_cdk/aws_cloudformation/__init__.py +240 -159
- aws_cdk/aws_cloudfront/__init__.py +15 -7
- aws_cdk/aws_cloudtrail/__init__.py +802 -13
- aws_cdk/aws_cloudwatch/__init__.py +51 -14
- aws_cdk/aws_codebuild/__init__.py +39 -0
- aws_cdk/aws_codepipeline/__init__.py +4 -4
- aws_cdk/aws_cognito/__init__.py +1032 -43
- aws_cdk/aws_config/__init__.py +13 -10
- aws_cdk/aws_connect/__init__.py +454 -23
- aws_cdk/aws_connectcampaignsv2/__init__.py +187 -176
- aws_cdk/aws_customerprofiles/__init__.py +3148 -0
- aws_cdk/aws_docdb/__init__.py +128 -0
- aws_cdk/aws_dynamodb/__init__.py +256 -0
- aws_cdk/aws_ec2/__init__.py +976 -27
- aws_cdk/aws_ecs/__init__.py +37 -20
- aws_cdk/aws_eks/__init__.py +771 -0
- aws_cdk/aws_elasticache/__init__.py +22 -22
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +441 -177
- aws_cdk/aws_events/__init__.py +550 -30
- aws_cdk/aws_fsx/__init__.py +134 -10
- aws_cdk/aws_imagebuilder/__init__.py +8 -8
- aws_cdk/aws_invoicing/__init__.py +651 -0
- aws_cdk/aws_iot/__init__.py +70 -26
- aws_cdk/aws_iotfleetwise/__init__.py +1033 -382
- aws_cdk/aws_iotsitewise/__init__.py +158 -0
- aws_cdk/aws_ivs/__init__.py +43 -31
- aws_cdk/aws_kendra/__init__.py +4 -0
- aws_cdk/aws_lakeformation/__init__.py +2 -1
- aws_cdk/aws_lambda/__init__.py +272 -164
- aws_cdk/aws_lambda_event_sources/__init__.py +2 -1
- aws_cdk/aws_lambda_nodejs/__init__.py +11 -11
- aws_cdk/aws_logs/__init__.py +532 -0
- aws_cdk/aws_m2/__init__.py +289 -0
- aws_cdk/aws_mediaconnect/__init__.py +24 -14
- aws_cdk/aws_medialive/__init__.py +2359 -5
- aws_cdk/aws_mediapackage/__init__.py +3 -9
- aws_cdk/aws_mediapackagev2/__init__.py +19 -17
- aws_cdk/aws_memorydb/__init__.py +664 -4
- aws_cdk/aws_mwaa/__init__.py +6 -6
- aws_cdk/aws_opensearchserverless/__init__.py +249 -1
- aws_cdk/aws_pipes/__init__.py +14 -30
- aws_cdk/aws_qbusiness/__init__.py +2021 -67
- aws_cdk/aws_quicksight/__init__.py +8270 -10
- aws_cdk/aws_rbin/__init__.py +53 -34
- aws_cdk/aws_rds/__init__.py +170 -8
- aws_cdk/aws_resourcegroups/__init__.py +362 -4
- aws_cdk/aws_route53/__init__.py +1177 -10
- aws_cdk/aws_route53_targets/__init__.py +297 -91
- aws_cdk/aws_route53resolver/__init__.py +19 -8
- aws_cdk/aws_s3/__init__.py +4 -4
- aws_cdk/aws_s3express/__init__.py +421 -9
- aws_cdk/aws_sagemaker/__init__.py +905 -119
- aws_cdk/aws_secretsmanager/__init__.py +20 -6
- aws_cdk/aws_securityhub/__init__.py +64 -32
- aws_cdk/aws_servicediscovery/__init__.py +43 -0
- aws_cdk/aws_ses/__init__.py +188 -41
- aws_cdk/aws_stepfunctions_tasks/__init__.py +190 -35
- aws_cdk/aws_synthetics/__init__.py +7 -5
- aws_cdk/aws_vpclattice/__init__.py +1479 -122
- aws_cdk/aws_wisdom/__init__.py +8509 -1502
- aws_cdk/aws_workspacesweb/__init__.py +1081 -0
- {aws_cdk_lib-2.171.1.dist-info → aws_cdk_lib-2.173.0.dist-info}/METADATA +1 -1
- {aws_cdk_lib-2.171.1.dist-info → aws_cdk_lib-2.173.0.dist-info}/RECORD +78 -77
- {aws_cdk_lib-2.171.1.dist-info → aws_cdk_lib-2.173.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.171.1.dist-info → aws_cdk_lib-2.173.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.171.1.dist-info → aws_cdk_lib-2.173.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.171.1.dist-info → aws_cdk_lib-2.173.0.dist-info}/top_level.txt +0 -0
|
@@ -1326,7 +1326,8 @@ class ProvisionedPollerConfig:
|
|
|
1326
1326
|
maximum_pollers: jsii.Number,
|
|
1327
1327
|
minimum_pollers: jsii.Number,
|
|
1328
1328
|
) -> None:
|
|
1329
|
-
'''
|
|
1329
|
+
'''(Amazon MSK and self-managed Apache Kafka only) The provisioned mode configuration for the event source.
|
|
1330
|
+
|
|
1330
1331
|
:param maximum_pollers: The maximum number of pollers that can be provisioned. Default: 200
|
|
1331
1332
|
:param minimum_pollers: The minimum number of pollers that should be provisioned. Default: 1
|
|
1332
1333
|
|
|
@@ -109,7 +109,7 @@ With the `@aws-cdk/aws-lambda-nodejs:useLatestRuntimeVersion` disabled, the runt
|
|
|
109
109
|
|
|
110
110
|
## Lock file
|
|
111
111
|
|
|
112
|
-
The `NodejsFunction` requires a dependencies lock file (`yarn.lock`, `pnpm-lock.yaml` or
|
|
112
|
+
The `NodejsFunction` requires a dependencies lock file (`yarn.lock`, `pnpm-lock.yaml`, `bun.lockb` or
|
|
113
113
|
`package-lock.json`). When bundling in a Docker container, the path containing this lock file is
|
|
114
114
|
used as the source (`/asset-input`) for the volume mounted in the container.
|
|
115
115
|
|
|
@@ -200,8 +200,8 @@ nodejs.NodejsFunction(self, "my-handler",
|
|
|
200
200
|
|
|
201
201
|
The modules listed in `nodeModules` must be present in the `package.json`'s dependencies or
|
|
202
202
|
installed. The same version will be used for installation. The lock file (`yarn.lock`,
|
|
203
|
-
`pnpm-lock.yaml` or `package-lock.json`) will be used along with the right installer (`yarn`,
|
|
204
|
-
`pnpm` or `npm`).
|
|
203
|
+
`pnpm-lock.yaml`, `bun.lockb` or `package-lock.json`) will be used along with the right installer (`yarn`,
|
|
204
|
+
`pnpm`, `bun` or `npm`).
|
|
205
205
|
|
|
206
206
|
When working with `nodeModules` using native dependencies, you might want to force bundling in a
|
|
207
207
|
Docker container even if `esbuild` is available in your environment. This can be done by setting
|
|
@@ -338,7 +338,7 @@ nodejs.NodejsFunction(self, "my-handler",
|
|
|
338
338
|
```
|
|
339
339
|
|
|
340
340
|
This image should have `esbuild` installed **globally**. If you plan to use `nodeModules` it
|
|
341
|
-
should also have `npm`, `yarn` or `pnpm` depending on the lock file you're using.
|
|
341
|
+
should also have `npm`, `yarn`, `bun` or `pnpm` depending on the lock file you're using.
|
|
342
342
|
|
|
343
343
|
Use the [default image provided by `aws-cdk-lib/aws-lambda-nodejs`](https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-lambda-nodejs/lib/Dockerfile)
|
|
344
344
|
as a source of inspiration.
|
|
@@ -640,7 +640,7 @@ class BundlingOptions(_DockerRunOptions_81583d32):
|
|
|
640
640
|
:param charset: The charset to use for esbuild's output. By default esbuild's output is ASCII-only. Any non-ASCII characters are escaped using backslash escape sequences. Using escape sequences makes the generated output slightly bigger, and also makes it harder to read. If you would like for esbuild to print the original characters without using escape sequences, use ``Charset.UTF8``. Default: Charset.ASCII
|
|
641
641
|
:param command_hooks: Command hooks. Default: - do not run additional commands
|
|
642
642
|
:param define: Replace global identifiers with constant expressions. For example, ``{ 'process.env.DEBUG': 'true' }``. Another example, ``{ 'process.env.API_KEY': JSON.stringify('xxx-xxxx-xxx') }``. Default: - no replacements are made
|
|
643
|
-
:param docker_image: A custom bundling Docker image. This image should have esbuild installed globally. If you plan to use ``nodeModules`` it should also have ``npm``, ``yarn`` or ``pnpm`` depending on the lock file you're using. See https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-lambda-nodejs/lib/Dockerfile for the default image provided by aws-cdk-lib/aws-lambda-nodejs. Default: - use the Docker image provided by aws-cdk-lib/aws-lambda-nodejs
|
|
643
|
+
:param docker_image: A custom bundling Docker image. This image should have esbuild installed globally. If you plan to use ``nodeModules`` it should also have ``npm``, ``yarn``, ``bun`` or ``pnpm`` depending on the lock file you're using. See https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-lambda-nodejs/lib/Dockerfile for the default image provided by aws-cdk-lib/aws-lambda-nodejs. Default: - use the Docker image provided by aws-cdk-lib/aws-lambda-nodejs
|
|
644
644
|
:param esbuild_args: Build arguments to pass into esbuild. For example, to add the `--log-limit <https://esbuild.github.io/api/#log-limit>`_ flag:: new NodejsFunction(scope, id, { ... bundling: { esbuildArgs: { "--log-limit": "0", } } }); Default: - no additional esbuild arguments are passed
|
|
645
645
|
:param esbuild_version: The version of esbuild to use when running in a Docker container. Default: - latest v0
|
|
646
646
|
:param external_modules: A list of modules that should be considered as externals (already available in the runtime). Default: - no replacements are made
|
|
@@ -995,7 +995,7 @@ class BundlingOptions(_DockerRunOptions_81583d32):
|
|
|
995
995
|
'''A custom bundling Docker image.
|
|
996
996
|
|
|
997
997
|
This image should have esbuild installed globally. If you plan to use ``nodeModules``
|
|
998
|
-
it should also have ``npm``, ``yarn`` or ``pnpm`` depending on the lock file you're using.
|
|
998
|
+
it should also have ``npm``, ``yarn``, ``bun`` or ``pnpm`` depending on the lock file you're using.
|
|
999
999
|
|
|
1000
1000
|
See https://github.com/aws/aws-cdk/blob/main/packages/aws-cdk-lib/aws-lambda-nodejs/lib/Dockerfile
|
|
1001
1001
|
for the default image provided by aws-cdk-lib/aws-lambda-nodejs.
|
|
@@ -1625,7 +1625,7 @@ class NodejsFunction(
|
|
|
1625
1625
|
:param aws_sdk_connection_reuse: The ``AWS_NODEJS_CONNECTION_REUSE_ENABLED`` environment variable does not exist in the AWS SDK for JavaScript v3. This prop will be deprecated when the Lambda Node16 runtime is deprecated on June 12, 2024. See https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html#runtime-support-policy Info for Node 16 runtimes / SDK v2 users: Whether to automatically reuse TCP connections when working with the AWS SDK for JavaScript v2. This sets the ``AWS_NODEJS_CONNECTION_REUSE_ENABLED`` environment variable to ``1``. Default: - false (obsolete) for runtimes >= Node 18, true for runtimes <= Node 16.
|
|
1626
1626
|
:param bundling: Bundling options. Default: - use default bundling options: no minify, no sourcemap, all modules are bundled.
|
|
1627
1627
|
:param code: The code that will be deployed to the Lambda Handler. If included, then properties related to bundling of the code are ignored. - If the ``code`` field is specified, then you must include the ``handler`` property. Default: - the code is bundled by esbuild
|
|
1628
|
-
:param deps_lock_file_path: The path to the dependencies lock file (``yarn.lock``, ``pnpm-lock.yaml`` or ``package-lock.json``). This will be used as the source for the volume mounted in the Docker container. Modules specified in ``nodeModules`` will be installed using the right installer (``yarn``, ``pnpm`` or ``npm``) along with this lock file. Default: - the path is found by walking up parent directories searching for a ``yarn.lock``, ``pnpm-lock.yaml`` or ``package-lock.json`` file
|
|
1628
|
+
:param deps_lock_file_path: The path to the dependencies lock file (``yarn.lock``, ``pnpm-lock.yaml``, ``bun.lockb`` or ``package-lock.json``). This will be used as the source for the volume mounted in the Docker container. Modules specified in ``nodeModules`` will be installed using the right installer (``yarn``, ``pnpm``, ``bun`` or ``npm``) along with this lock file. Default: - the path is found by walking up parent directories searching for a ``yarn.lock``, ``pnpm-lock.yaml``, ``bun.lockb`` or ``package-lock.json`` file
|
|
1629
1629
|
:param entry: Path to the entry file (JavaScript or TypeScript). Default: - Derived from the name of the defining file and the construct's id. If the ``NodejsFunction`` is defined in ``stack.ts`` with ``my-handler`` as id (``new NodejsFunction(this, 'my-handler')``), the construct will look at ``stack.my-handler.ts`` and ``stack.my-handler.js``.
|
|
1630
1630
|
:param handler: The name of the exported handler in the entry file. - If the ``code`` property is supplied, then you must include the ``handler`` property. The handler should be the name of the file that contains the exported handler and the function that should be called when the AWS Lambda is invoked. For example, if you had a file called ``myLambda.js`` and the function to be invoked was ``myHandler``, then you should input ``handler`` property as ``myLambda.myHandler``. - If the ``code`` property is not supplied and the handler input does not contain a ``.``, then the handler is prefixed with ``index.`` (index period). Otherwise, the handler property is not modified. Default: handler
|
|
1631
1631
|
:param project_root: The path to the directory containing project config files (``package.json`` or ``tsconfig.json``). Default: - the directory containing the ``depsLockFilePath``
|
|
@@ -1926,7 +1926,7 @@ class NodejsFunctionProps(_FunctionOptions_328f4d39):
|
|
|
1926
1926
|
:param aws_sdk_connection_reuse: The ``AWS_NODEJS_CONNECTION_REUSE_ENABLED`` environment variable does not exist in the AWS SDK for JavaScript v3. This prop will be deprecated when the Lambda Node16 runtime is deprecated on June 12, 2024. See https://docs.aws.amazon.com/lambda/latest/dg/lambda-runtimes.html#runtime-support-policy Info for Node 16 runtimes / SDK v2 users: Whether to automatically reuse TCP connections when working with the AWS SDK for JavaScript v2. This sets the ``AWS_NODEJS_CONNECTION_REUSE_ENABLED`` environment variable to ``1``. Default: - false (obsolete) for runtimes >= Node 18, true for runtimes <= Node 16.
|
|
1927
1927
|
:param bundling: Bundling options. Default: - use default bundling options: no minify, no sourcemap, all modules are bundled.
|
|
1928
1928
|
:param code: The code that will be deployed to the Lambda Handler. If included, then properties related to bundling of the code are ignored. - If the ``code`` field is specified, then you must include the ``handler`` property. Default: - the code is bundled by esbuild
|
|
1929
|
-
:param deps_lock_file_path: The path to the dependencies lock file (``yarn.lock``, ``pnpm-lock.yaml`` or ``package-lock.json``). This will be used as the source for the volume mounted in the Docker container. Modules specified in ``nodeModules`` will be installed using the right installer (``yarn``, ``pnpm`` or ``npm``) along with this lock file. Default: - the path is found by walking up parent directories searching for a ``yarn.lock``, ``pnpm-lock.yaml`` or ``package-lock.json`` file
|
|
1929
|
+
:param deps_lock_file_path: The path to the dependencies lock file (``yarn.lock``, ``pnpm-lock.yaml``, ``bun.lockb`` or ``package-lock.json``). This will be used as the source for the volume mounted in the Docker container. Modules specified in ``nodeModules`` will be installed using the right installer (``yarn``, ``pnpm``, ``bun`` or ``npm``) along with this lock file. Default: - the path is found by walking up parent directories searching for a ``yarn.lock``, ``pnpm-lock.yaml``, ``bun.lockb`` or ``package-lock.json`` file
|
|
1930
1930
|
:param entry: Path to the entry file (JavaScript or TypeScript). Default: - Derived from the name of the defining file and the construct's id. If the ``NodejsFunction`` is defined in ``stack.ts`` with ``my-handler`` as id (``new NodejsFunction(this, 'my-handler')``), the construct will look at ``stack.my-handler.ts`` and ``stack.my-handler.js``.
|
|
1931
1931
|
:param handler: The name of the exported handler in the entry file. - If the ``code`` property is supplied, then you must include the ``handler`` property. The handler should be the name of the file that contains the exported handler and the function that should be called when the AWS Lambda is invoked. For example, if you had a file called ``myLambda.js`` and the function to be invoked was ``myHandler``, then you should input ``handler`` property as ``myLambda.myHandler``. - If the ``code`` property is not supplied and the handler input does not contain a ``.``, then the handler is prefixed with ``index.`` (index period). Otherwise, the handler property is not modified. Default: handler
|
|
1932
1932
|
:param project_root: The path to the directory containing project config files (``package.json`` or ``tsconfig.json``). Default: - the directory containing the ``depsLockFilePath``
|
|
@@ -2779,18 +2779,18 @@ class NodejsFunctionProps(_FunctionOptions_328f4d39):
|
|
|
2779
2779
|
|
|
2780
2780
|
@builtins.property
|
|
2781
2781
|
def deps_lock_file_path(self) -> typing.Optional[builtins.str]:
|
|
2782
|
-
'''The path to the dependencies lock file (``yarn.lock``, ``pnpm-lock.yaml`` or ``package-lock.json``).
|
|
2782
|
+
'''The path to the dependencies lock file (``yarn.lock``, ``pnpm-lock.yaml``, ``bun.lockb`` or ``package-lock.json``).
|
|
2783
2783
|
|
|
2784
2784
|
This will be used as the source for the volume mounted in the Docker
|
|
2785
2785
|
container.
|
|
2786
2786
|
|
|
2787
2787
|
Modules specified in ``nodeModules`` will be installed using the right
|
|
2788
|
-
installer (``yarn``, ``pnpm`` or ``npm``) along with this lock file.
|
|
2788
|
+
installer (``yarn``, ``pnpm``, ``bun`` or ``npm``) along with this lock file.
|
|
2789
2789
|
|
|
2790
2790
|
:default:
|
|
2791
2791
|
|
|
2792
2792
|
- the path is found by walking up parent directories searching for
|
|
2793
|
-
a ``yarn.lock``, ``pnpm-lock.yaml`` or ``package-lock.json`` file
|
|
2793
|
+
a ``yarn.lock``, ``pnpm-lock.yaml``, ``bun.lockb`` or ``package-lock.json`` file
|
|
2794
2794
|
'''
|
|
2795
2795
|
result = self._values.get("deps_lock_file_path")
|
|
2796
2796
|
return typing.cast(typing.Optional[builtins.str], result)
|
aws_cdk/aws_logs/__init__.py
CHANGED
|
@@ -2215,6 +2215,468 @@ class CfnDestinationProps:
|
|
|
2215
2215
|
)
|
|
2216
2216
|
|
|
2217
2217
|
|
|
2218
|
+
@jsii.implements(_IInspectable_c2943556)
|
|
2219
|
+
class CfnIntegration(
|
|
2220
|
+
_CfnResource_9df397a6,
|
|
2221
|
+
metaclass=jsii.JSIIMeta,
|
|
2222
|
+
jsii_type="aws-cdk-lib.aws_logs.CfnIntegration",
|
|
2223
|
+
):
|
|
2224
|
+
'''Creates an integration between CloudWatch Logs and another service in this account.
|
|
2225
|
+
|
|
2226
|
+
Currently, only integrations with OpenSearch Service are supported, and currently you can have only one integration in your account.
|
|
2227
|
+
|
|
2228
|
+
Integrating with OpenSearch Service makes it possible for you to create curated vended logs dashboards, powered by OpenSearch Service analytics. For more information, see `Vended log dashboards powered by Amazon OpenSearch Service <https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/CloudWatchLogs-OpenSearch-Dashboards.html>`_ .
|
|
2229
|
+
|
|
2230
|
+
You can use this operation only to create a new integration. You can't modify an existing integration.
|
|
2231
|
+
|
|
2232
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-integration.html
|
|
2233
|
+
:cloudformationResource: AWS::Logs::Integration
|
|
2234
|
+
:exampleMetadata: fixture=_generated
|
|
2235
|
+
|
|
2236
|
+
Example::
|
|
2237
|
+
|
|
2238
|
+
# The code below shows an example of how to instantiate this type.
|
|
2239
|
+
# The values are placeholders you should change.
|
|
2240
|
+
from aws_cdk import aws_logs as logs
|
|
2241
|
+
|
|
2242
|
+
cfn_integration = logs.CfnIntegration(self, "MyCfnIntegration",
|
|
2243
|
+
integration_name="integrationName",
|
|
2244
|
+
integration_type="integrationType",
|
|
2245
|
+
resource_config=logs.CfnIntegration.ResourceConfigProperty(
|
|
2246
|
+
open_search_resource_config=logs.CfnIntegration.OpenSearchResourceConfigProperty(
|
|
2247
|
+
dashboard_viewer_principals=["dashboardViewerPrincipals"],
|
|
2248
|
+
data_source_role_arn="dataSourceRoleArn",
|
|
2249
|
+
|
|
2250
|
+
# the properties below are optional
|
|
2251
|
+
application_arn="applicationArn",
|
|
2252
|
+
kms_key_arn="kmsKeyArn",
|
|
2253
|
+
retention_days=123
|
|
2254
|
+
)
|
|
2255
|
+
)
|
|
2256
|
+
)
|
|
2257
|
+
'''
|
|
2258
|
+
|
|
2259
|
+
def __init__(
|
|
2260
|
+
self,
|
|
2261
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
2262
|
+
id: builtins.str,
|
|
2263
|
+
*,
|
|
2264
|
+
integration_name: builtins.str,
|
|
2265
|
+
integration_type: builtins.str,
|
|
2266
|
+
resource_config: typing.Union[_IResolvable_da3f097b, typing.Union["CfnIntegration.ResourceConfigProperty", typing.Dict[builtins.str, typing.Any]]],
|
|
2267
|
+
) -> None:
|
|
2268
|
+
'''
|
|
2269
|
+
:param scope: Scope in which this resource is defined.
|
|
2270
|
+
:param id: Construct identifier for this resource (unique in its scope).
|
|
2271
|
+
:param integration_name: The name of this integration.
|
|
2272
|
+
:param integration_type: The type of integration. Integrations with OpenSearch Service have the type ``OPENSEARCH`` .
|
|
2273
|
+
:param resource_config: This structure contains configuration details about an integration between CloudWatch Logs and another entity.
|
|
2274
|
+
'''
|
|
2275
|
+
if __debug__:
|
|
2276
|
+
type_hints = typing.get_type_hints(_typecheckingstub__7d25ae5aedb6cfa0b6f3765f329d81581fbcd3ff378cc552133e5d0fdd6d99ff)
|
|
2277
|
+
check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
|
|
2278
|
+
check_type(argname="argument id", value=id, expected_type=type_hints["id"])
|
|
2279
|
+
props = CfnIntegrationProps(
|
|
2280
|
+
integration_name=integration_name,
|
|
2281
|
+
integration_type=integration_type,
|
|
2282
|
+
resource_config=resource_config,
|
|
2283
|
+
)
|
|
2284
|
+
|
|
2285
|
+
jsii.create(self.__class__, self, [scope, id, props])
|
|
2286
|
+
|
|
2287
|
+
@jsii.member(jsii_name="inspect")
|
|
2288
|
+
def inspect(self, inspector: _TreeInspector_488e0dd5) -> None:
|
|
2289
|
+
'''Examines the CloudFormation resource and discloses attributes.
|
|
2290
|
+
|
|
2291
|
+
:param inspector: tree inspector to collect and process attributes.
|
|
2292
|
+
'''
|
|
2293
|
+
if __debug__:
|
|
2294
|
+
type_hints = typing.get_type_hints(_typecheckingstub__4444f0ef7fd9d069bfce488a66baa068bb1b87a18239a8510d4cfa183a652a0b)
|
|
2295
|
+
check_type(argname="argument inspector", value=inspector, expected_type=type_hints["inspector"])
|
|
2296
|
+
return typing.cast(None, jsii.invoke(self, "inspect", [inspector]))
|
|
2297
|
+
|
|
2298
|
+
@jsii.member(jsii_name="renderProperties")
|
|
2299
|
+
def _render_properties(
|
|
2300
|
+
self,
|
|
2301
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
2302
|
+
) -> typing.Mapping[builtins.str, typing.Any]:
|
|
2303
|
+
'''
|
|
2304
|
+
:param props: -
|
|
2305
|
+
'''
|
|
2306
|
+
if __debug__:
|
|
2307
|
+
type_hints = typing.get_type_hints(_typecheckingstub__ed5813f598ecc3cd5a557ae647d3d2e9b8b9b4d638ea5a9a5ac68d4ef1281007)
|
|
2308
|
+
check_type(argname="argument props", value=props, expected_type=type_hints["props"])
|
|
2309
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.invoke(self, "renderProperties", [props]))
|
|
2310
|
+
|
|
2311
|
+
@jsii.python.classproperty
|
|
2312
|
+
@jsii.member(jsii_name="CFN_RESOURCE_TYPE_NAME")
|
|
2313
|
+
def CFN_RESOURCE_TYPE_NAME(cls) -> builtins.str:
|
|
2314
|
+
'''The CloudFormation resource type name for this resource class.'''
|
|
2315
|
+
return typing.cast(builtins.str, jsii.sget(cls, "CFN_RESOURCE_TYPE_NAME"))
|
|
2316
|
+
|
|
2317
|
+
@builtins.property
|
|
2318
|
+
@jsii.member(jsii_name="attrIntegrationStatus")
|
|
2319
|
+
def attr_integration_status(self) -> builtins.str:
|
|
2320
|
+
'''The current status of this integration.
|
|
2321
|
+
|
|
2322
|
+
:cloudformationAttribute: IntegrationStatus
|
|
2323
|
+
'''
|
|
2324
|
+
return typing.cast(builtins.str, jsii.get(self, "attrIntegrationStatus"))
|
|
2325
|
+
|
|
2326
|
+
@builtins.property
|
|
2327
|
+
@jsii.member(jsii_name="cfnProperties")
|
|
2328
|
+
def _cfn_properties(self) -> typing.Mapping[builtins.str, typing.Any]:
|
|
2329
|
+
return typing.cast(typing.Mapping[builtins.str, typing.Any], jsii.get(self, "cfnProperties"))
|
|
2330
|
+
|
|
2331
|
+
@builtins.property
|
|
2332
|
+
@jsii.member(jsii_name="integrationName")
|
|
2333
|
+
def integration_name(self) -> builtins.str:
|
|
2334
|
+
'''The name of this integration.'''
|
|
2335
|
+
return typing.cast(builtins.str, jsii.get(self, "integrationName"))
|
|
2336
|
+
|
|
2337
|
+
@integration_name.setter
|
|
2338
|
+
def integration_name(self, value: builtins.str) -> None:
|
|
2339
|
+
if __debug__:
|
|
2340
|
+
type_hints = typing.get_type_hints(_typecheckingstub__c789029fae3c40d804160d555fcd880577fad4f74f1191f7b52562964594751e)
|
|
2341
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2342
|
+
jsii.set(self, "integrationName", value) # pyright: ignore[reportArgumentType]
|
|
2343
|
+
|
|
2344
|
+
@builtins.property
|
|
2345
|
+
@jsii.member(jsii_name="integrationType")
|
|
2346
|
+
def integration_type(self) -> builtins.str:
|
|
2347
|
+
'''The type of integration.'''
|
|
2348
|
+
return typing.cast(builtins.str, jsii.get(self, "integrationType"))
|
|
2349
|
+
|
|
2350
|
+
@integration_type.setter
|
|
2351
|
+
def integration_type(self, value: builtins.str) -> None:
|
|
2352
|
+
if __debug__:
|
|
2353
|
+
type_hints = typing.get_type_hints(_typecheckingstub__4e7ea06be2423b6609ab61f003f306246fb58e590842d8ee6d0b889e4e4d1bce)
|
|
2354
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2355
|
+
jsii.set(self, "integrationType", value) # pyright: ignore[reportArgumentType]
|
|
2356
|
+
|
|
2357
|
+
@builtins.property
|
|
2358
|
+
@jsii.member(jsii_name="resourceConfig")
|
|
2359
|
+
def resource_config(
|
|
2360
|
+
self,
|
|
2361
|
+
) -> typing.Union[_IResolvable_da3f097b, "CfnIntegration.ResourceConfigProperty"]:
|
|
2362
|
+
'''This structure contains configuration details about an integration between CloudWatch Logs and another entity.'''
|
|
2363
|
+
return typing.cast(typing.Union[_IResolvable_da3f097b, "CfnIntegration.ResourceConfigProperty"], jsii.get(self, "resourceConfig"))
|
|
2364
|
+
|
|
2365
|
+
@resource_config.setter
|
|
2366
|
+
def resource_config(
|
|
2367
|
+
self,
|
|
2368
|
+
value: typing.Union[_IResolvable_da3f097b, "CfnIntegration.ResourceConfigProperty"],
|
|
2369
|
+
) -> None:
|
|
2370
|
+
if __debug__:
|
|
2371
|
+
type_hints = typing.get_type_hints(_typecheckingstub__e70a870af94762893ff1564b472074d1ad1ea7d25c502af37606c4cce91a529a)
|
|
2372
|
+
check_type(argname="argument value", value=value, expected_type=type_hints["value"])
|
|
2373
|
+
jsii.set(self, "resourceConfig", value) # pyright: ignore[reportArgumentType]
|
|
2374
|
+
|
|
2375
|
+
@jsii.data_type(
|
|
2376
|
+
jsii_type="aws-cdk-lib.aws_logs.CfnIntegration.OpenSearchResourceConfigProperty",
|
|
2377
|
+
jsii_struct_bases=[],
|
|
2378
|
+
name_mapping={
|
|
2379
|
+
"dashboard_viewer_principals": "dashboardViewerPrincipals",
|
|
2380
|
+
"data_source_role_arn": "dataSourceRoleArn",
|
|
2381
|
+
"application_arn": "applicationArn",
|
|
2382
|
+
"kms_key_arn": "kmsKeyArn",
|
|
2383
|
+
"retention_days": "retentionDays",
|
|
2384
|
+
},
|
|
2385
|
+
)
|
|
2386
|
+
class OpenSearchResourceConfigProperty:
|
|
2387
|
+
def __init__(
|
|
2388
|
+
self,
|
|
2389
|
+
*,
|
|
2390
|
+
dashboard_viewer_principals: typing.Sequence[builtins.str],
|
|
2391
|
+
data_source_role_arn: builtins.str,
|
|
2392
|
+
application_arn: typing.Optional[builtins.str] = None,
|
|
2393
|
+
kms_key_arn: typing.Optional[builtins.str] = None,
|
|
2394
|
+
retention_days: typing.Optional[jsii.Number] = None,
|
|
2395
|
+
) -> None:
|
|
2396
|
+
'''This structure contains configuration details about an integration between CloudWatch Logs and OpenSearch Service.
|
|
2397
|
+
|
|
2398
|
+
:param dashboard_viewer_principals: Specify the ARNs of IAM roles and IAM users who you want to grant permission to for viewing the dashboards. .. epigraph:: In addition to specifying these users here, you must also grant them the *CloudWatchOpenSearchDashboardsAccess* IAM policy. For more information, see
|
|
2399
|
+
:param data_source_role_arn: Specify the ARN of an IAM role that CloudWatch Logs will use to create the integration. This role must have the permissions necessary to access the OpenSearch Service collection to be able to create the dashboards. For more information about the permissions needed, see `Create an IAM role to access the OpenSearch Service collection <https://docs.aws.amazon.com/OpenSearch-Dashboards-CreateRole>`_ in the CloudWatch Logs User Guide.
|
|
2400
|
+
:param application_arn: If you want to use an existing OpenSearch Service application for your integration with OpenSearch Service, specify it here. If you omit this, a new application will be created.
|
|
2401
|
+
:param kms_key_arn: To have the vended dashboard data encrypted with AWS KMS instead of the CloudWatch Logs default encryption method, specify the ARN of the AWS KMS key that you want to use.
|
|
2402
|
+
:param retention_days: Specify how many days that you want the data derived by OpenSearch Service to be retained in the index that the dashboard refers to. This also sets the maximum time period that you can choose when viewing data in the dashboard. Choosing a longer time frame will incur additional costs.
|
|
2403
|
+
|
|
2404
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-opensearchresourceconfig.html
|
|
2405
|
+
:exampleMetadata: fixture=_generated
|
|
2406
|
+
|
|
2407
|
+
Example::
|
|
2408
|
+
|
|
2409
|
+
# The code below shows an example of how to instantiate this type.
|
|
2410
|
+
# The values are placeholders you should change.
|
|
2411
|
+
from aws_cdk import aws_logs as logs
|
|
2412
|
+
|
|
2413
|
+
open_search_resource_config_property = logs.CfnIntegration.OpenSearchResourceConfigProperty(
|
|
2414
|
+
dashboard_viewer_principals=["dashboardViewerPrincipals"],
|
|
2415
|
+
data_source_role_arn="dataSourceRoleArn",
|
|
2416
|
+
|
|
2417
|
+
# the properties below are optional
|
|
2418
|
+
application_arn="applicationArn",
|
|
2419
|
+
kms_key_arn="kmsKeyArn",
|
|
2420
|
+
retention_days=123
|
|
2421
|
+
)
|
|
2422
|
+
'''
|
|
2423
|
+
if __debug__:
|
|
2424
|
+
type_hints = typing.get_type_hints(_typecheckingstub__0c674a258b3e224416fabb1fbddb9ff6620ca73f500c2c766f439b1ff2d42221)
|
|
2425
|
+
check_type(argname="argument dashboard_viewer_principals", value=dashboard_viewer_principals, expected_type=type_hints["dashboard_viewer_principals"])
|
|
2426
|
+
check_type(argname="argument data_source_role_arn", value=data_source_role_arn, expected_type=type_hints["data_source_role_arn"])
|
|
2427
|
+
check_type(argname="argument application_arn", value=application_arn, expected_type=type_hints["application_arn"])
|
|
2428
|
+
check_type(argname="argument kms_key_arn", value=kms_key_arn, expected_type=type_hints["kms_key_arn"])
|
|
2429
|
+
check_type(argname="argument retention_days", value=retention_days, expected_type=type_hints["retention_days"])
|
|
2430
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
2431
|
+
"dashboard_viewer_principals": dashboard_viewer_principals,
|
|
2432
|
+
"data_source_role_arn": data_source_role_arn,
|
|
2433
|
+
}
|
|
2434
|
+
if application_arn is not None:
|
|
2435
|
+
self._values["application_arn"] = application_arn
|
|
2436
|
+
if kms_key_arn is not None:
|
|
2437
|
+
self._values["kms_key_arn"] = kms_key_arn
|
|
2438
|
+
if retention_days is not None:
|
|
2439
|
+
self._values["retention_days"] = retention_days
|
|
2440
|
+
|
|
2441
|
+
@builtins.property
|
|
2442
|
+
def dashboard_viewer_principals(self) -> typing.List[builtins.str]:
|
|
2443
|
+
'''Specify the ARNs of IAM roles and IAM users who you want to grant permission to for viewing the dashboards.
|
|
2444
|
+
|
|
2445
|
+
.. epigraph::
|
|
2446
|
+
|
|
2447
|
+
In addition to specifying these users here, you must also grant them the *CloudWatchOpenSearchDashboardsAccess* IAM policy. For more information, see
|
|
2448
|
+
|
|
2449
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-opensearchresourceconfig.html#cfn-logs-integration-opensearchresourceconfig-dashboardviewerprincipals
|
|
2450
|
+
'''
|
|
2451
|
+
result = self._values.get("dashboard_viewer_principals")
|
|
2452
|
+
assert result is not None, "Required property 'dashboard_viewer_principals' is missing"
|
|
2453
|
+
return typing.cast(typing.List[builtins.str], result)
|
|
2454
|
+
|
|
2455
|
+
@builtins.property
|
|
2456
|
+
def data_source_role_arn(self) -> builtins.str:
|
|
2457
|
+
'''Specify the ARN of an IAM role that CloudWatch Logs will use to create the integration.
|
|
2458
|
+
|
|
2459
|
+
This role must have the permissions necessary to access the OpenSearch Service collection to be able to create the dashboards. For more information about the permissions needed, see `Create an IAM role to access the OpenSearch Service collection <https://docs.aws.amazon.com/OpenSearch-Dashboards-CreateRole>`_ in the CloudWatch Logs User Guide.
|
|
2460
|
+
|
|
2461
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-opensearchresourceconfig.html#cfn-logs-integration-opensearchresourceconfig-datasourcerolearn
|
|
2462
|
+
'''
|
|
2463
|
+
result = self._values.get("data_source_role_arn")
|
|
2464
|
+
assert result is not None, "Required property 'data_source_role_arn' is missing"
|
|
2465
|
+
return typing.cast(builtins.str, result)
|
|
2466
|
+
|
|
2467
|
+
@builtins.property
|
|
2468
|
+
def application_arn(self) -> typing.Optional[builtins.str]:
|
|
2469
|
+
'''If you want to use an existing OpenSearch Service application for your integration with OpenSearch Service, specify it here.
|
|
2470
|
+
|
|
2471
|
+
If you omit this, a new application will be created.
|
|
2472
|
+
|
|
2473
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-opensearchresourceconfig.html#cfn-logs-integration-opensearchresourceconfig-applicationarn
|
|
2474
|
+
'''
|
|
2475
|
+
result = self._values.get("application_arn")
|
|
2476
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
2477
|
+
|
|
2478
|
+
@builtins.property
|
|
2479
|
+
def kms_key_arn(self) -> typing.Optional[builtins.str]:
|
|
2480
|
+
'''To have the vended dashboard data encrypted with AWS KMS instead of the CloudWatch Logs default encryption method, specify the ARN of the AWS KMS key that you want to use.
|
|
2481
|
+
|
|
2482
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-opensearchresourceconfig.html#cfn-logs-integration-opensearchresourceconfig-kmskeyarn
|
|
2483
|
+
'''
|
|
2484
|
+
result = self._values.get("kms_key_arn")
|
|
2485
|
+
return typing.cast(typing.Optional[builtins.str], result)
|
|
2486
|
+
|
|
2487
|
+
@builtins.property
|
|
2488
|
+
def retention_days(self) -> typing.Optional[jsii.Number]:
|
|
2489
|
+
'''Specify how many days that you want the data derived by OpenSearch Service to be retained in the index that the dashboard refers to.
|
|
2490
|
+
|
|
2491
|
+
This also sets the maximum time period that you can choose when viewing data in the dashboard. Choosing a longer time frame will incur additional costs.
|
|
2492
|
+
|
|
2493
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-opensearchresourceconfig.html#cfn-logs-integration-opensearchresourceconfig-retentiondays
|
|
2494
|
+
'''
|
|
2495
|
+
result = self._values.get("retention_days")
|
|
2496
|
+
return typing.cast(typing.Optional[jsii.Number], result)
|
|
2497
|
+
|
|
2498
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
2499
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
2500
|
+
|
|
2501
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
2502
|
+
return not (rhs == self)
|
|
2503
|
+
|
|
2504
|
+
def __repr__(self) -> str:
|
|
2505
|
+
return "OpenSearchResourceConfigProperty(%s)" % ", ".join(
|
|
2506
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
2507
|
+
)
|
|
2508
|
+
|
|
2509
|
+
@jsii.data_type(
|
|
2510
|
+
jsii_type="aws-cdk-lib.aws_logs.CfnIntegration.ResourceConfigProperty",
|
|
2511
|
+
jsii_struct_bases=[],
|
|
2512
|
+
name_mapping={"open_search_resource_config": "openSearchResourceConfig"},
|
|
2513
|
+
)
|
|
2514
|
+
class ResourceConfigProperty:
|
|
2515
|
+
def __init__(
|
|
2516
|
+
self,
|
|
2517
|
+
*,
|
|
2518
|
+
open_search_resource_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union["CfnIntegration.OpenSearchResourceConfigProperty", typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
2519
|
+
) -> None:
|
|
2520
|
+
'''This structure contains configuration details about an integration between CloudWatch Logs and another entity.
|
|
2521
|
+
|
|
2522
|
+
:param open_search_resource_config: This structure contains configuration details about an integration between CloudWatch Logs and OpenSearch Service.
|
|
2523
|
+
|
|
2524
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-resourceconfig.html
|
|
2525
|
+
:exampleMetadata: fixture=_generated
|
|
2526
|
+
|
|
2527
|
+
Example::
|
|
2528
|
+
|
|
2529
|
+
# The code below shows an example of how to instantiate this type.
|
|
2530
|
+
# The values are placeholders you should change.
|
|
2531
|
+
from aws_cdk import aws_logs as logs
|
|
2532
|
+
|
|
2533
|
+
resource_config_property = logs.CfnIntegration.ResourceConfigProperty(
|
|
2534
|
+
open_search_resource_config=logs.CfnIntegration.OpenSearchResourceConfigProperty(
|
|
2535
|
+
dashboard_viewer_principals=["dashboardViewerPrincipals"],
|
|
2536
|
+
data_source_role_arn="dataSourceRoleArn",
|
|
2537
|
+
|
|
2538
|
+
# the properties below are optional
|
|
2539
|
+
application_arn="applicationArn",
|
|
2540
|
+
kms_key_arn="kmsKeyArn",
|
|
2541
|
+
retention_days=123
|
|
2542
|
+
)
|
|
2543
|
+
)
|
|
2544
|
+
'''
|
|
2545
|
+
if __debug__:
|
|
2546
|
+
type_hints = typing.get_type_hints(_typecheckingstub__d0dad8c7beab9d66f0a9d16731a931e58e75731a8cb6142e5ecd221eea5f4bab)
|
|
2547
|
+
check_type(argname="argument open_search_resource_config", value=open_search_resource_config, expected_type=type_hints["open_search_resource_config"])
|
|
2548
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {}
|
|
2549
|
+
if open_search_resource_config is not None:
|
|
2550
|
+
self._values["open_search_resource_config"] = open_search_resource_config
|
|
2551
|
+
|
|
2552
|
+
@builtins.property
|
|
2553
|
+
def open_search_resource_config(
|
|
2554
|
+
self,
|
|
2555
|
+
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnIntegration.OpenSearchResourceConfigProperty"]]:
|
|
2556
|
+
'''This structure contains configuration details about an integration between CloudWatch Logs and OpenSearch Service.
|
|
2557
|
+
|
|
2558
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-logs-integration-resourceconfig.html#cfn-logs-integration-resourceconfig-opensearchresourceconfig
|
|
2559
|
+
'''
|
|
2560
|
+
result = self._values.get("open_search_resource_config")
|
|
2561
|
+
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnIntegration.OpenSearchResourceConfigProperty"]], result)
|
|
2562
|
+
|
|
2563
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
2564
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
2565
|
+
|
|
2566
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
2567
|
+
return not (rhs == self)
|
|
2568
|
+
|
|
2569
|
+
def __repr__(self) -> str:
|
|
2570
|
+
return "ResourceConfigProperty(%s)" % ", ".join(
|
|
2571
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
2572
|
+
)
|
|
2573
|
+
|
|
2574
|
+
|
|
2575
|
+
@jsii.data_type(
|
|
2576
|
+
jsii_type="aws-cdk-lib.aws_logs.CfnIntegrationProps",
|
|
2577
|
+
jsii_struct_bases=[],
|
|
2578
|
+
name_mapping={
|
|
2579
|
+
"integration_name": "integrationName",
|
|
2580
|
+
"integration_type": "integrationType",
|
|
2581
|
+
"resource_config": "resourceConfig",
|
|
2582
|
+
},
|
|
2583
|
+
)
|
|
2584
|
+
class CfnIntegrationProps:
|
|
2585
|
+
def __init__(
|
|
2586
|
+
self,
|
|
2587
|
+
*,
|
|
2588
|
+
integration_name: builtins.str,
|
|
2589
|
+
integration_type: builtins.str,
|
|
2590
|
+
resource_config: typing.Union[_IResolvable_da3f097b, typing.Union[CfnIntegration.ResourceConfigProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
2591
|
+
) -> None:
|
|
2592
|
+
'''Properties for defining a ``CfnIntegration``.
|
|
2593
|
+
|
|
2594
|
+
:param integration_name: The name of this integration.
|
|
2595
|
+
:param integration_type: The type of integration. Integrations with OpenSearch Service have the type ``OPENSEARCH`` .
|
|
2596
|
+
:param resource_config: This structure contains configuration details about an integration between CloudWatch Logs and another entity.
|
|
2597
|
+
|
|
2598
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-integration.html
|
|
2599
|
+
:exampleMetadata: fixture=_generated
|
|
2600
|
+
|
|
2601
|
+
Example::
|
|
2602
|
+
|
|
2603
|
+
# The code below shows an example of how to instantiate this type.
|
|
2604
|
+
# The values are placeholders you should change.
|
|
2605
|
+
from aws_cdk import aws_logs as logs
|
|
2606
|
+
|
|
2607
|
+
cfn_integration_props = logs.CfnIntegrationProps(
|
|
2608
|
+
integration_name="integrationName",
|
|
2609
|
+
integration_type="integrationType",
|
|
2610
|
+
resource_config=logs.CfnIntegration.ResourceConfigProperty(
|
|
2611
|
+
open_search_resource_config=logs.CfnIntegration.OpenSearchResourceConfigProperty(
|
|
2612
|
+
dashboard_viewer_principals=["dashboardViewerPrincipals"],
|
|
2613
|
+
data_source_role_arn="dataSourceRoleArn",
|
|
2614
|
+
|
|
2615
|
+
# the properties below are optional
|
|
2616
|
+
application_arn="applicationArn",
|
|
2617
|
+
kms_key_arn="kmsKeyArn",
|
|
2618
|
+
retention_days=123
|
|
2619
|
+
)
|
|
2620
|
+
)
|
|
2621
|
+
)
|
|
2622
|
+
'''
|
|
2623
|
+
if __debug__:
|
|
2624
|
+
type_hints = typing.get_type_hints(_typecheckingstub__e3fde65aad1184bb5a5e5498b7fec6844a978b48eb0a9d57607f44ec0c65fc3a)
|
|
2625
|
+
check_type(argname="argument integration_name", value=integration_name, expected_type=type_hints["integration_name"])
|
|
2626
|
+
check_type(argname="argument integration_type", value=integration_type, expected_type=type_hints["integration_type"])
|
|
2627
|
+
check_type(argname="argument resource_config", value=resource_config, expected_type=type_hints["resource_config"])
|
|
2628
|
+
self._values: typing.Dict[builtins.str, typing.Any] = {
|
|
2629
|
+
"integration_name": integration_name,
|
|
2630
|
+
"integration_type": integration_type,
|
|
2631
|
+
"resource_config": resource_config,
|
|
2632
|
+
}
|
|
2633
|
+
|
|
2634
|
+
@builtins.property
|
|
2635
|
+
def integration_name(self) -> builtins.str:
|
|
2636
|
+
'''The name of this integration.
|
|
2637
|
+
|
|
2638
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-integration.html#cfn-logs-integration-integrationname
|
|
2639
|
+
'''
|
|
2640
|
+
result = self._values.get("integration_name")
|
|
2641
|
+
assert result is not None, "Required property 'integration_name' is missing"
|
|
2642
|
+
return typing.cast(builtins.str, result)
|
|
2643
|
+
|
|
2644
|
+
@builtins.property
|
|
2645
|
+
def integration_type(self) -> builtins.str:
|
|
2646
|
+
'''The type of integration.
|
|
2647
|
+
|
|
2648
|
+
Integrations with OpenSearch Service have the type ``OPENSEARCH`` .
|
|
2649
|
+
|
|
2650
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-integration.html#cfn-logs-integration-integrationtype
|
|
2651
|
+
'''
|
|
2652
|
+
result = self._values.get("integration_type")
|
|
2653
|
+
assert result is not None, "Required property 'integration_type' is missing"
|
|
2654
|
+
return typing.cast(builtins.str, result)
|
|
2655
|
+
|
|
2656
|
+
@builtins.property
|
|
2657
|
+
def resource_config(
|
|
2658
|
+
self,
|
|
2659
|
+
) -> typing.Union[_IResolvable_da3f097b, CfnIntegration.ResourceConfigProperty]:
|
|
2660
|
+
'''This structure contains configuration details about an integration between CloudWatch Logs and another entity.
|
|
2661
|
+
|
|
2662
|
+
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-logs-integration.html#cfn-logs-integration-resourceconfig
|
|
2663
|
+
'''
|
|
2664
|
+
result = self._values.get("resource_config")
|
|
2665
|
+
assert result is not None, "Required property 'resource_config' is missing"
|
|
2666
|
+
return typing.cast(typing.Union[_IResolvable_da3f097b, CfnIntegration.ResourceConfigProperty], result)
|
|
2667
|
+
|
|
2668
|
+
def __eq__(self, rhs: typing.Any) -> builtins.bool:
|
|
2669
|
+
return isinstance(rhs, self.__class__) and rhs._values == self._values
|
|
2670
|
+
|
|
2671
|
+
def __ne__(self, rhs: typing.Any) -> builtins.bool:
|
|
2672
|
+
return not (rhs == self)
|
|
2673
|
+
|
|
2674
|
+
def __repr__(self) -> str:
|
|
2675
|
+
return "CfnIntegrationProps(%s)" % ", ".join(
|
|
2676
|
+
k + "=" + repr(v) for k, v in self._values.items()
|
|
2677
|
+
)
|
|
2678
|
+
|
|
2679
|
+
|
|
2218
2680
|
@jsii.implements(_IInspectable_c2943556)
|
|
2219
2681
|
class CfnLogAnomalyDetector(
|
|
2220
2682
|
_CfnResource_9df397a6,
|
|
@@ -9443,6 +9905,8 @@ __all__ = [
|
|
|
9443
9905
|
"CfnDeliverySourceProps",
|
|
9444
9906
|
"CfnDestination",
|
|
9445
9907
|
"CfnDestinationProps",
|
|
9908
|
+
"CfnIntegration",
|
|
9909
|
+
"CfnIntegrationProps",
|
|
9446
9910
|
"CfnLogAnomalyDetector",
|
|
9447
9911
|
"CfnLogAnomalyDetectorProps",
|
|
9448
9912
|
"CfnLogGroup",
|
|
@@ -9829,6 +10293,74 @@ def _typecheckingstub__faf2f9f88fd096e79a2445aab3efdc3a85509df7ba06ffc305c9faf39
|
|
|
9829
10293
|
"""Type checking stubs"""
|
|
9830
10294
|
pass
|
|
9831
10295
|
|
|
10296
|
+
def _typecheckingstub__7d25ae5aedb6cfa0b6f3765f329d81581fbcd3ff378cc552133e5d0fdd6d99ff(
|
|
10297
|
+
scope: _constructs_77d1e7e8.Construct,
|
|
10298
|
+
id: builtins.str,
|
|
10299
|
+
*,
|
|
10300
|
+
integration_name: builtins.str,
|
|
10301
|
+
integration_type: builtins.str,
|
|
10302
|
+
resource_config: typing.Union[_IResolvable_da3f097b, typing.Union[CfnIntegration.ResourceConfigProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
10303
|
+
) -> None:
|
|
10304
|
+
"""Type checking stubs"""
|
|
10305
|
+
pass
|
|
10306
|
+
|
|
10307
|
+
def _typecheckingstub__4444f0ef7fd9d069bfce488a66baa068bb1b87a18239a8510d4cfa183a652a0b(
|
|
10308
|
+
inspector: _TreeInspector_488e0dd5,
|
|
10309
|
+
) -> None:
|
|
10310
|
+
"""Type checking stubs"""
|
|
10311
|
+
pass
|
|
10312
|
+
|
|
10313
|
+
def _typecheckingstub__ed5813f598ecc3cd5a557ae647d3d2e9b8b9b4d638ea5a9a5ac68d4ef1281007(
|
|
10314
|
+
props: typing.Mapping[builtins.str, typing.Any],
|
|
10315
|
+
) -> None:
|
|
10316
|
+
"""Type checking stubs"""
|
|
10317
|
+
pass
|
|
10318
|
+
|
|
10319
|
+
def _typecheckingstub__c789029fae3c40d804160d555fcd880577fad4f74f1191f7b52562964594751e(
|
|
10320
|
+
value: builtins.str,
|
|
10321
|
+
) -> None:
|
|
10322
|
+
"""Type checking stubs"""
|
|
10323
|
+
pass
|
|
10324
|
+
|
|
10325
|
+
def _typecheckingstub__4e7ea06be2423b6609ab61f003f306246fb58e590842d8ee6d0b889e4e4d1bce(
|
|
10326
|
+
value: builtins.str,
|
|
10327
|
+
) -> None:
|
|
10328
|
+
"""Type checking stubs"""
|
|
10329
|
+
pass
|
|
10330
|
+
|
|
10331
|
+
def _typecheckingstub__e70a870af94762893ff1564b472074d1ad1ea7d25c502af37606c4cce91a529a(
|
|
10332
|
+
value: typing.Union[_IResolvable_da3f097b, CfnIntegration.ResourceConfigProperty],
|
|
10333
|
+
) -> None:
|
|
10334
|
+
"""Type checking stubs"""
|
|
10335
|
+
pass
|
|
10336
|
+
|
|
10337
|
+
def _typecheckingstub__0c674a258b3e224416fabb1fbddb9ff6620ca73f500c2c766f439b1ff2d42221(
|
|
10338
|
+
*,
|
|
10339
|
+
dashboard_viewer_principals: typing.Sequence[builtins.str],
|
|
10340
|
+
data_source_role_arn: builtins.str,
|
|
10341
|
+
application_arn: typing.Optional[builtins.str] = None,
|
|
10342
|
+
kms_key_arn: typing.Optional[builtins.str] = None,
|
|
10343
|
+
retention_days: typing.Optional[jsii.Number] = None,
|
|
10344
|
+
) -> None:
|
|
10345
|
+
"""Type checking stubs"""
|
|
10346
|
+
pass
|
|
10347
|
+
|
|
10348
|
+
def _typecheckingstub__d0dad8c7beab9d66f0a9d16731a931e58e75731a8cb6142e5ecd221eea5f4bab(
|
|
10349
|
+
*,
|
|
10350
|
+
open_search_resource_config: typing.Optional[typing.Union[_IResolvable_da3f097b, typing.Union[CfnIntegration.OpenSearchResourceConfigProperty, typing.Dict[builtins.str, typing.Any]]]] = None,
|
|
10351
|
+
) -> None:
|
|
10352
|
+
"""Type checking stubs"""
|
|
10353
|
+
pass
|
|
10354
|
+
|
|
10355
|
+
def _typecheckingstub__e3fde65aad1184bb5a5e5498b7fec6844a978b48eb0a9d57607f44ec0c65fc3a(
|
|
10356
|
+
*,
|
|
10357
|
+
integration_name: builtins.str,
|
|
10358
|
+
integration_type: builtins.str,
|
|
10359
|
+
resource_config: typing.Union[_IResolvable_da3f097b, typing.Union[CfnIntegration.ResourceConfigProperty, typing.Dict[builtins.str, typing.Any]]],
|
|
10360
|
+
) -> None:
|
|
10361
|
+
"""Type checking stubs"""
|
|
10362
|
+
pass
|
|
10363
|
+
|
|
9832
10364
|
def _typecheckingstub__7d152ea0809d051d39430771f957ddf1edb48a2711f5f1dac144632c4025106f(
|
|
9833
10365
|
scope: _constructs_77d1e7e8.Construct,
|
|
9834
10366
|
id: builtins.str,
|