aws-cdk-lib 2.203.1__py3-none-any.whl → 2.205.0__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of aws-cdk-lib might be problematic. Click here for more details.
- aws_cdk/__init__.py +208 -92
- aws_cdk/_jsii/__init__.py +1 -1
- aws_cdk/_jsii/{aws-cdk-lib@2.203.1.jsii.tgz → aws-cdk-lib@2.205.0.jsii.tgz} +0 -0
- aws_cdk/aws_aiops/__init__.py +89 -39
- aws_cdk/aws_apigateway/__init__.py +164 -0
- aws_cdk/aws_apigatewayv2/__init__.py +412 -0
- aws_cdk/aws_applicationautoscaling/__init__.py +2 -2
- aws_cdk/aws_arczonalshift/__init__.py +4 -1
- aws_cdk/aws_b2bi/__init__.py +32 -16
- aws_cdk/aws_bedrock/__init__.py +198 -10
- aws_cdk/aws_cassandra/__init__.py +156 -0
- aws_cdk/aws_certificatemanager/__init__.py +28 -0
- aws_cdk/aws_chatbot/__init__.py +28 -0
- aws_cdk/aws_cloudformation/__init__.py +74 -72
- aws_cdk/aws_cloudfront/__init__.py +1273 -485
- aws_cdk/aws_cloudfront/experimental/__init__.py +32 -0
- aws_cdk/aws_cloudfront_origins/__init__.py +26 -21
- aws_cdk/aws_cloudwatch/__init__.py +278 -23
- aws_cdk/aws_codebuild/__init__.py +300 -36
- aws_cdk/aws_datasync/__init__.py +2 -2
- aws_cdk/aws_docdb/__init__.py +78 -0
- aws_cdk/aws_dynamodb/__init__.py +523 -37
- aws_cdk/aws_ec2/__init__.py +126 -30
- aws_cdk/aws_ecs/__init__.py +64 -19
- aws_cdk/aws_elasticloadbalancingv2/__init__.py +724 -0
- aws_cdk/aws_elasticsearch/__init__.py +260 -0
- aws_cdk/aws_emrserverless/__init__.py +5 -5
- aws_cdk/aws_events/__init__.py +58 -3
- aws_cdk/aws_events_targets/__init__.py +7 -2
- aws_cdk/aws_evs/__init__.py +7 -7
- aws_cdk/aws_fsx/__init__.py +138 -78
- aws_cdk/aws_gamelift/__init__.py +19 -0
- aws_cdk/aws_glue/__init__.py +3 -3
- aws_cdk/aws_iot/__init__.py +1 -1
- aws_cdk/aws_kinesis/__init__.py +391 -13
- aws_cdk/aws_kinesisfirehose/__init__.py +128 -1
- aws_cdk/aws_lambda/__init__.py +144 -0
- aws_cdk/aws_lex/__init__.py +36 -19
- aws_cdk/aws_logs/__init__.py +58 -0
- aws_cdk/aws_neptune/__init__.py +12 -12
- aws_cdk/aws_odb/__init__.py +4049 -0
- aws_cdk/aws_omics/__init__.py +1 -1
- aws_cdk/aws_opensearchservice/__init__.py +260 -0
- aws_cdk/aws_qbusiness/__init__.py +471 -4
- aws_cdk/aws_quicksight/__init__.py +185 -16
- aws_cdk/aws_rds/__init__.py +553 -17
- aws_cdk/aws_redshiftserverless/__init__.py +72 -45
- aws_cdk/aws_route53/__init__.py +41 -19
- aws_cdk/aws_s3tables/__init__.py +1005 -0
- aws_cdk/aws_sagemaker/__init__.py +20 -0
- aws_cdk/aws_scheduler/__init__.py +210 -0
- aws_cdk/aws_sns/__init__.py +164 -0
- aws_cdk/aws_sqs/__init__.py +164 -0
- aws_cdk/aws_stepfunctions/__init__.py +288 -0
- aws_cdk/aws_synthetics/__init__.py +159 -37
- aws_cdk/aws_transfer/__init__.py +23 -1
- {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/METADATA +2 -2
- {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/RECORD +62 -61
- {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/LICENSE +0 -0
- {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/NOTICE +0 -0
- {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/WHEEL +0 -0
- {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/top_level.txt +0 -0
aws_cdk/_jsii/__init__.py
CHANGED
|
@@ -34,7 +34,7 @@ import aws_cdk.cloud_assembly_schema._jsii
|
|
|
34
34
|
import constructs._jsii
|
|
35
35
|
|
|
36
36
|
__jsii_assembly__ = jsii.JSIIAssembly.load(
|
|
37
|
-
"aws-cdk-lib", "2.
|
|
37
|
+
"aws-cdk-lib", "2.205.0", __name__[0:-6], "aws-cdk-lib@2.205.0.jsii.tgz"
|
|
38
38
|
)
|
|
39
39
|
|
|
40
40
|
__all__ = [
|
|
Binary file
|
aws_cdk/aws_aiops/__init__.py
CHANGED
|
@@ -85,7 +85,24 @@ class CfnInvestigationGroup(
|
|
|
85
85
|
metaclass=jsii.JSIIMeta,
|
|
86
86
|
jsii_type="aws-cdk-lib.aws_aiops.CfnInvestigationGroup",
|
|
87
87
|
):
|
|
88
|
-
'''
|
|
88
|
+
'''Creates an *investigation group* in your account.
|
|
89
|
+
|
|
90
|
+
Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.
|
|
91
|
+
|
|
92
|
+
Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:
|
|
93
|
+
|
|
94
|
+
- Who can access the investigations
|
|
95
|
+
- Whether investigation data is encrypted with a customer managed AWS Key Management Service key.
|
|
96
|
+
- How long investigations and their data are retained by default.
|
|
97
|
+
|
|
98
|
+
Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region
|
|
99
|
+
|
|
100
|
+
To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the ``AIOpsConsoleAdminPolicy`` or the ``AdministratorAccess`` IAM policy attached, or to an account that has similar permissions.
|
|
101
|
+
.. epigraph::
|
|
102
|
+
|
|
103
|
+
You can optionally configure CloudWatch alarms to start investigations and add events to investigations. The examples section on this page demonstrates creating an investigation group and an alarm at the same time.
|
|
104
|
+
|
|
105
|
+
For more information about configuring CloudWatch alarms to work with Amazon Q Developer operational investigations, see
|
|
89
106
|
|
|
90
107
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html
|
|
91
108
|
:cloudformationResource: AWS::AIOps::InvestigationGroup
|
|
@@ -143,16 +160,16 @@ class CfnInvestigationGroup(
|
|
|
143
160
|
'''
|
|
144
161
|
:param scope: Scope in which this resource is defined.
|
|
145
162
|
:param id: Construct identifier for this resource (unique in its scope).
|
|
146
|
-
:param name:
|
|
147
|
-
:param chatbot_notification_channels:
|
|
163
|
+
:param name: A name for the investigation group.
|
|
164
|
+
:param chatbot_notification_channels: Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
|
|
148
165
|
:param cross_account_configurations: An array of cross account configurations.
|
|
149
|
-
:param encryption_config:
|
|
166
|
+
:param encryption_config: Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
|
|
150
167
|
:param investigation_group_policy: Investigation Group policy.
|
|
151
|
-
:param is_cloud_trail_event_history_enabled:
|
|
152
|
-
:param retention_in_days:
|
|
153
|
-
:param role_arn: The
|
|
154
|
-
:param tag_key_boundaries:
|
|
155
|
-
:param tags:
|
|
168
|
+
:param is_cloud_trail_event_history_enabled: Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is ``true`` .
|
|
169
|
+
:param retention_in_days: Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ . If you omit this parameter, the default of 90 days is used.
|
|
170
|
+
:param role_arn: Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations. For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
|
|
171
|
+
:param tag_key_boundaries: Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases. You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
|
|
172
|
+
:param tags: A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. Tags can help you organize and categorize your resources.
|
|
156
173
|
'''
|
|
157
174
|
if __debug__:
|
|
158
175
|
type_hints = typing.get_type_hints(_typecheckingstub__f390e65acdf4efe0289b1b8e5f17c031f7a88a13963effed34b7d4944b31dd7e)
|
|
@@ -206,7 +223,9 @@ class CfnInvestigationGroup(
|
|
|
206
223
|
@builtins.property
|
|
207
224
|
@jsii.member(jsii_name="attrArn")
|
|
208
225
|
def attr_arn(self) -> builtins.str:
|
|
209
|
-
'''The
|
|
226
|
+
'''The Amazon Resource Name (ARN) of the investigation group.
|
|
227
|
+
|
|
228
|
+
For example, ``arn:aws:aiops: *Region* : *account-id* :investigation-group: *investigation-group-id*``
|
|
210
229
|
|
|
211
230
|
:cloudformationAttribute: Arn
|
|
212
231
|
'''
|
|
@@ -215,7 +234,7 @@ class CfnInvestigationGroup(
|
|
|
215
234
|
@builtins.property
|
|
216
235
|
@jsii.member(jsii_name="attrCreatedAt")
|
|
217
236
|
def attr_created_at(self) -> builtins.str:
|
|
218
|
-
'''The
|
|
237
|
+
'''The date and time that the investigation group was created.
|
|
219
238
|
|
|
220
239
|
:cloudformationAttribute: CreatedAt
|
|
221
240
|
'''
|
|
@@ -224,7 +243,7 @@ class CfnInvestigationGroup(
|
|
|
224
243
|
@builtins.property
|
|
225
244
|
@jsii.member(jsii_name="attrCreatedBy")
|
|
226
245
|
def attr_created_by(self) -> builtins.str:
|
|
227
|
-
'''
|
|
246
|
+
'''The name of the user who created the investigation group.
|
|
228
247
|
|
|
229
248
|
:cloudformationAttribute: CreatedBy
|
|
230
249
|
'''
|
|
@@ -233,7 +252,7 @@ class CfnInvestigationGroup(
|
|
|
233
252
|
@builtins.property
|
|
234
253
|
@jsii.member(jsii_name="attrLastModifiedAt")
|
|
235
254
|
def attr_last_modified_at(self) -> builtins.str:
|
|
236
|
-
'''
|
|
255
|
+
'''The date and time that the investigation group was most recently modified.
|
|
237
256
|
|
|
238
257
|
:cloudformationAttribute: LastModifiedAt
|
|
239
258
|
'''
|
|
@@ -242,7 +261,7 @@ class CfnInvestigationGroup(
|
|
|
242
261
|
@builtins.property
|
|
243
262
|
@jsii.member(jsii_name="attrLastModifiedBy")
|
|
244
263
|
def attr_last_modified_by(self) -> builtins.str:
|
|
245
|
-
'''
|
|
264
|
+
'''The name of the user who most recently modified the investigation group.
|
|
246
265
|
|
|
247
266
|
:cloudformationAttribute: LastModifiedBy
|
|
248
267
|
'''
|
|
@@ -262,7 +281,7 @@ class CfnInvestigationGroup(
|
|
|
262
281
|
@builtins.property
|
|
263
282
|
@jsii.member(jsii_name="name")
|
|
264
283
|
def name(self) -> builtins.str:
|
|
265
|
-
'''
|
|
284
|
+
'''A name for the investigation group.'''
|
|
266
285
|
return typing.cast(builtins.str, jsii.get(self, "name"))
|
|
267
286
|
|
|
268
287
|
@name.setter
|
|
@@ -277,7 +296,7 @@ class CfnInvestigationGroup(
|
|
|
277
296
|
def chatbot_notification_channels(
|
|
278
297
|
self,
|
|
279
298
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.ChatbotNotificationChannelProperty"]]]]:
|
|
280
|
-
'''
|
|
299
|
+
'''Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications.'''
|
|
281
300
|
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.ChatbotNotificationChannelProperty"]]]], jsii.get(self, "chatbotNotificationChannels"))
|
|
282
301
|
|
|
283
302
|
@chatbot_notification_channels.setter
|
|
@@ -313,6 +332,7 @@ class CfnInvestigationGroup(
|
|
|
313
332
|
def encryption_config(
|
|
314
333
|
self,
|
|
315
334
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.EncryptionConfigMapProperty"]]:
|
|
335
|
+
'''Use this property to specify a customer managed AWS KMS key to encrypt your investigation data.'''
|
|
316
336
|
return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.EncryptionConfigMapProperty"]], jsii.get(self, "encryptionConfig"))
|
|
317
337
|
|
|
318
338
|
@encryption_config.setter
|
|
@@ -343,7 +363,7 @@ class CfnInvestigationGroup(
|
|
|
343
363
|
def is_cloud_trail_event_history_enabled(
|
|
344
364
|
self,
|
|
345
365
|
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
346
|
-
'''
|
|
366
|
+
'''Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail .'''
|
|
347
367
|
return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "isCloudTrailEventHistoryEnabled"))
|
|
348
368
|
|
|
349
369
|
@is_cloud_trail_event_history_enabled.setter
|
|
@@ -359,7 +379,10 @@ class CfnInvestigationGroup(
|
|
|
359
379
|
@builtins.property
|
|
360
380
|
@jsii.member(jsii_name="retentionInDays")
|
|
361
381
|
def retention_in_days(self) -> typing.Optional[jsii.Number]:
|
|
362
|
-
'''
|
|
382
|
+
'''Specify how long that investigation data is kept.
|
|
383
|
+
|
|
384
|
+
For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ .
|
|
385
|
+
'''
|
|
363
386
|
return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "retentionInDays"))
|
|
364
387
|
|
|
365
388
|
@retention_in_days.setter
|
|
@@ -372,7 +395,7 @@ class CfnInvestigationGroup(
|
|
|
372
395
|
@builtins.property
|
|
373
396
|
@jsii.member(jsii_name="roleArn")
|
|
374
397
|
def role_arn(self) -> typing.Optional[builtins.str]:
|
|
375
|
-
'''
|
|
398
|
+
'''Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data.'''
|
|
376
399
|
return typing.cast(typing.Optional[builtins.str], jsii.get(self, "roleArn"))
|
|
377
400
|
|
|
378
401
|
@role_arn.setter
|
|
@@ -385,6 +408,7 @@ class CfnInvestigationGroup(
|
|
|
385
408
|
@builtins.property
|
|
386
409
|
@jsii.member(jsii_name="tagKeyBoundaries")
|
|
387
410
|
def tag_key_boundaries(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
411
|
+
'''Enter the existing custom tag keys for custom applications in your system.'''
|
|
388
412
|
return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "tagKeyBoundaries"))
|
|
389
413
|
|
|
390
414
|
@tag_key_boundaries.setter
|
|
@@ -400,7 +424,7 @@ class CfnInvestigationGroup(
|
|
|
400
424
|
@builtins.property
|
|
401
425
|
@jsii.member(jsii_name="tags")
|
|
402
426
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
403
|
-
'''
|
|
427
|
+
'''A list of key-value pairs to associate with the investigation group.'''
|
|
404
428
|
return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
|
|
405
429
|
|
|
406
430
|
@tags.setter
|
|
@@ -425,7 +449,10 @@ class CfnInvestigationGroup(
|
|
|
425
449
|
chat_configuration_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
|
|
426
450
|
sns_topic_arn: typing.Optional[builtins.str] = None,
|
|
427
451
|
) -> None:
|
|
428
|
-
'''
|
|
452
|
+
'''This structure is a string array.
|
|
453
|
+
|
|
454
|
+
The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of Amazon Q in chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
|
|
455
|
+
|
|
429
456
|
:param chat_configuration_arns:
|
|
430
457
|
:param sns_topic_arn:
|
|
431
458
|
|
|
@@ -551,7 +578,7 @@ class CfnInvestigationGroup(
|
|
|
551
578
|
) -> None:
|
|
552
579
|
'''
|
|
553
580
|
:param encryption_configuration_type:
|
|
554
|
-
:param kms_key_id:
|
|
581
|
+
:param kms_key_id: If the investigation group uses a customer managed key for encryption, this field displays the ID of that key.
|
|
555
582
|
|
|
556
583
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html
|
|
557
584
|
:exampleMetadata: fixture=_generated
|
|
@@ -587,7 +614,8 @@ class CfnInvestigationGroup(
|
|
|
587
614
|
|
|
588
615
|
@builtins.property
|
|
589
616
|
def kms_key_id(self) -> typing.Optional[builtins.str]:
|
|
590
|
-
'''
|
|
617
|
+
'''If the investigation group uses a customer managed key for encryption, this field displays the ID of that key.
|
|
618
|
+
|
|
591
619
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html#cfn-aiops-investigationgroup-encryptionconfigmap-kmskeyid
|
|
592
620
|
'''
|
|
593
621
|
result = self._values.get("kms_key_id")
|
|
@@ -638,16 +666,16 @@ class CfnInvestigationGroupProps:
|
|
|
638
666
|
) -> None:
|
|
639
667
|
'''Properties for defining a ``CfnInvestigationGroup``.
|
|
640
668
|
|
|
641
|
-
:param name:
|
|
642
|
-
:param chatbot_notification_channels:
|
|
669
|
+
:param name: A name for the investigation group.
|
|
670
|
+
:param chatbot_notification_channels: Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
|
|
643
671
|
:param cross_account_configurations: An array of cross account configurations.
|
|
644
|
-
:param encryption_config:
|
|
672
|
+
:param encryption_config: Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
|
|
645
673
|
:param investigation_group_policy: Investigation Group policy.
|
|
646
|
-
:param is_cloud_trail_event_history_enabled:
|
|
647
|
-
:param retention_in_days:
|
|
648
|
-
:param role_arn: The
|
|
649
|
-
:param tag_key_boundaries:
|
|
650
|
-
:param tags:
|
|
674
|
+
:param is_cloud_trail_event_history_enabled: Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is ``true`` .
|
|
675
|
+
:param retention_in_days: Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ . If you omit this parameter, the default of 90 days is used.
|
|
676
|
+
:param role_arn: Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations. For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
|
|
677
|
+
:param tag_key_boundaries: Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases. You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
|
|
678
|
+
:param tags: A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. Tags can help you organize and categorize your resources.
|
|
651
679
|
|
|
652
680
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html
|
|
653
681
|
:exampleMetadata: fixture=_generated
|
|
@@ -720,7 +748,7 @@ class CfnInvestigationGroupProps:
|
|
|
720
748
|
|
|
721
749
|
@builtins.property
|
|
722
750
|
def name(self) -> builtins.str:
|
|
723
|
-
'''
|
|
751
|
+
'''A name for the investigation group.
|
|
724
752
|
|
|
725
753
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-name
|
|
726
754
|
'''
|
|
@@ -732,7 +760,9 @@ class CfnInvestigationGroupProps:
|
|
|
732
760
|
def chatbot_notification_channels(
|
|
733
761
|
self,
|
|
734
762
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.ChatbotNotificationChannelProperty]]]]:
|
|
735
|
-
'''
|
|
763
|
+
'''Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications.
|
|
764
|
+
|
|
765
|
+
This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
|
|
736
766
|
|
|
737
767
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-chatbotnotificationchannels
|
|
738
768
|
'''
|
|
@@ -754,7 +784,10 @@ class CfnInvestigationGroupProps:
|
|
|
754
784
|
def encryption_config(
|
|
755
785
|
self,
|
|
756
786
|
) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.EncryptionConfigMapProperty]]:
|
|
757
|
-
'''
|
|
787
|
+
'''Use this property to specify a customer managed AWS KMS key to encrypt your investigation data.
|
|
788
|
+
|
|
789
|
+
If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
|
|
790
|
+
|
|
758
791
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-encryptionconfig
|
|
759
792
|
'''
|
|
760
793
|
result = self._values.get("encryption_config")
|
|
@@ -773,7 +806,9 @@ class CfnInvestigationGroupProps:
|
|
|
773
806
|
def is_cloud_trail_event_history_enabled(
|
|
774
807
|
self,
|
|
775
808
|
) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
|
|
776
|
-
'''
|
|
809
|
+
'''Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail .
|
|
810
|
+
|
|
811
|
+
The default is ``true`` .
|
|
777
812
|
|
|
778
813
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-iscloudtraileventhistoryenabled
|
|
779
814
|
'''
|
|
@@ -782,7 +817,9 @@ class CfnInvestigationGroupProps:
|
|
|
782
817
|
|
|
783
818
|
@builtins.property
|
|
784
819
|
def retention_in_days(self) -> typing.Optional[jsii.Number]:
|
|
785
|
-
'''
|
|
820
|
+
'''Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ .
|
|
821
|
+
|
|
822
|
+
If you omit this parameter, the default of 90 days is used.
|
|
786
823
|
|
|
787
824
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-retentionindays
|
|
788
825
|
'''
|
|
@@ -791,7 +828,11 @@ class CfnInvestigationGroupProps:
|
|
|
791
828
|
|
|
792
829
|
@builtins.property
|
|
793
830
|
def role_arn(self) -> typing.Optional[builtins.str]:
|
|
794
|
-
'''
|
|
831
|
+
'''Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data.
|
|
832
|
+
|
|
833
|
+
The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations.
|
|
834
|
+
|
|
835
|
+
For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
|
|
795
836
|
|
|
796
837
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-rolearn
|
|
797
838
|
'''
|
|
@@ -800,7 +841,12 @@ class CfnInvestigationGroupProps:
|
|
|
800
841
|
|
|
801
842
|
@builtins.property
|
|
802
843
|
def tag_key_boundaries(self) -> typing.Optional[typing.List[builtins.str]]:
|
|
803
|
-
'''
|
|
844
|
+
'''Enter the existing custom tag keys for custom applications in your system.
|
|
845
|
+
|
|
846
|
+
Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.
|
|
847
|
+
|
|
848
|
+
You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
|
|
849
|
+
|
|
804
850
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tagkeyboundaries
|
|
805
851
|
'''
|
|
806
852
|
result = self._values.get("tag_key_boundaries")
|
|
@@ -808,7 +854,11 @@ class CfnInvestigationGroupProps:
|
|
|
808
854
|
|
|
809
855
|
@builtins.property
|
|
810
856
|
def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
|
|
811
|
-
'''
|
|
857
|
+
'''A list of key-value pairs to associate with the investigation group.
|
|
858
|
+
|
|
859
|
+
You can associate as many as 50 tags with an investigation group.
|
|
860
|
+
|
|
861
|
+
Tags can help you organize and categorize your resources.
|
|
812
862
|
|
|
813
863
|
:see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tags
|
|
814
864
|
'''
|