aws-cdk-lib 2.203.1__py3-none-any.whl → 2.205.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (62) hide show
  1. aws_cdk/__init__.py +208 -92
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.203.1.jsii.tgz → aws-cdk-lib@2.205.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_aiops/__init__.py +89 -39
  5. aws_cdk/aws_apigateway/__init__.py +164 -0
  6. aws_cdk/aws_apigatewayv2/__init__.py +412 -0
  7. aws_cdk/aws_applicationautoscaling/__init__.py +2 -2
  8. aws_cdk/aws_arczonalshift/__init__.py +4 -1
  9. aws_cdk/aws_b2bi/__init__.py +32 -16
  10. aws_cdk/aws_bedrock/__init__.py +198 -10
  11. aws_cdk/aws_cassandra/__init__.py +156 -0
  12. aws_cdk/aws_certificatemanager/__init__.py +28 -0
  13. aws_cdk/aws_chatbot/__init__.py +28 -0
  14. aws_cdk/aws_cloudformation/__init__.py +74 -72
  15. aws_cdk/aws_cloudfront/__init__.py +1273 -485
  16. aws_cdk/aws_cloudfront/experimental/__init__.py +32 -0
  17. aws_cdk/aws_cloudfront_origins/__init__.py +26 -21
  18. aws_cdk/aws_cloudwatch/__init__.py +278 -23
  19. aws_cdk/aws_codebuild/__init__.py +300 -36
  20. aws_cdk/aws_datasync/__init__.py +2 -2
  21. aws_cdk/aws_docdb/__init__.py +78 -0
  22. aws_cdk/aws_dynamodb/__init__.py +523 -37
  23. aws_cdk/aws_ec2/__init__.py +126 -30
  24. aws_cdk/aws_ecs/__init__.py +64 -19
  25. aws_cdk/aws_elasticloadbalancingv2/__init__.py +724 -0
  26. aws_cdk/aws_elasticsearch/__init__.py +260 -0
  27. aws_cdk/aws_emrserverless/__init__.py +5 -5
  28. aws_cdk/aws_events/__init__.py +58 -3
  29. aws_cdk/aws_events_targets/__init__.py +7 -2
  30. aws_cdk/aws_evs/__init__.py +7 -7
  31. aws_cdk/aws_fsx/__init__.py +138 -78
  32. aws_cdk/aws_gamelift/__init__.py +19 -0
  33. aws_cdk/aws_glue/__init__.py +3 -3
  34. aws_cdk/aws_iot/__init__.py +1 -1
  35. aws_cdk/aws_kinesis/__init__.py +391 -13
  36. aws_cdk/aws_kinesisfirehose/__init__.py +128 -1
  37. aws_cdk/aws_lambda/__init__.py +144 -0
  38. aws_cdk/aws_lex/__init__.py +36 -19
  39. aws_cdk/aws_logs/__init__.py +58 -0
  40. aws_cdk/aws_neptune/__init__.py +12 -12
  41. aws_cdk/aws_odb/__init__.py +4049 -0
  42. aws_cdk/aws_omics/__init__.py +1 -1
  43. aws_cdk/aws_opensearchservice/__init__.py +260 -0
  44. aws_cdk/aws_qbusiness/__init__.py +471 -4
  45. aws_cdk/aws_quicksight/__init__.py +185 -16
  46. aws_cdk/aws_rds/__init__.py +553 -17
  47. aws_cdk/aws_redshiftserverless/__init__.py +72 -45
  48. aws_cdk/aws_route53/__init__.py +41 -19
  49. aws_cdk/aws_s3tables/__init__.py +1005 -0
  50. aws_cdk/aws_sagemaker/__init__.py +20 -0
  51. aws_cdk/aws_scheduler/__init__.py +210 -0
  52. aws_cdk/aws_sns/__init__.py +164 -0
  53. aws_cdk/aws_sqs/__init__.py +164 -0
  54. aws_cdk/aws_stepfunctions/__init__.py +288 -0
  55. aws_cdk/aws_synthetics/__init__.py +159 -37
  56. aws_cdk/aws_transfer/__init__.py +23 -1
  57. {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/METADATA +2 -2
  58. {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/RECORD +62 -61
  59. {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/LICENSE +0 -0
  60. {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/NOTICE +0 -0
  61. {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/WHEEL +0 -0
  62. {aws_cdk_lib-2.203.1.dist-info → aws_cdk_lib-2.205.0.dist-info}/top_level.txt +0 -0
aws_cdk/_jsii/__init__.py CHANGED
@@ -34,7 +34,7 @@ import aws_cdk.cloud_assembly_schema._jsii
34
34
  import constructs._jsii
35
35
 
36
36
  __jsii_assembly__ = jsii.JSIIAssembly.load(
37
- "aws-cdk-lib", "2.203.1", __name__[0:-6], "aws-cdk-lib@2.203.1.jsii.tgz"
37
+ "aws-cdk-lib", "2.205.0", __name__[0:-6], "aws-cdk-lib@2.205.0.jsii.tgz"
38
38
  )
39
39
 
40
40
  __all__ = [
@@ -85,7 +85,24 @@ class CfnInvestigationGroup(
85
85
  metaclass=jsii.JSIIMeta,
86
86
  jsii_type="aws-cdk-lib.aws_aiops.CfnInvestigationGroup",
87
87
  ):
88
- '''Definition of AWS::AIOps::InvestigationGroup Resource Type.
88
+ '''Creates an *investigation group* in your account.
89
+
90
+ Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.
91
+
92
+ Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:
93
+
94
+ - Who can access the investigations
95
+ - Whether investigation data is encrypted with a customer managed AWS Key Management Service key.
96
+ - How long investigations and their data are retained by default.
97
+
98
+ Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region
99
+
100
+ To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the ``AIOpsConsoleAdminPolicy`` or the ``AdministratorAccess`` IAM policy attached, or to an account that has similar permissions.
101
+ .. epigraph::
102
+
103
+ You can optionally configure CloudWatch alarms to start investigations and add events to investigations. The examples section on this page demonstrates creating an investigation group and an alarm at the same time.
104
+
105
+ For more information about configuring CloudWatch alarms to work with Amazon Q Developer operational investigations, see
89
106
 
90
107
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html
91
108
  :cloudformationResource: AWS::AIOps::InvestigationGroup
@@ -143,16 +160,16 @@ class CfnInvestigationGroup(
143
160
  '''
144
161
  :param scope: Scope in which this resource is defined.
145
162
  :param id: Construct identifier for this resource (unique in its scope).
146
- :param name: User friendly name for resources.
147
- :param chatbot_notification_channels: An array of key-value pairs of notification channels to apply to this resource.
163
+ :param name: A name for the investigation group.
164
+ :param chatbot_notification_channels: Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
148
165
  :param cross_account_configurations: An array of cross account configurations.
149
- :param encryption_config:
166
+ :param encryption_config: Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
150
167
  :param investigation_group_policy: Investigation Group policy.
151
- :param is_cloud_trail_event_history_enabled: Flag to enable cloud trail history.
152
- :param retention_in_days: The number of days to retain the investigation group.
153
- :param role_arn: The Investigation Role's ARN.
154
- :param tag_key_boundaries:
155
- :param tags: An array of key-value pairs to apply to this resource.
168
+ :param is_cloud_trail_event_history_enabled: Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is ``true`` .
169
+ :param retention_in_days: Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ . If you omit this parameter, the default of 90 days is used.
170
+ :param role_arn: Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations. For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
171
+ :param tag_key_boundaries: Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases. You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
172
+ :param tags: A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. Tags can help you organize and categorize your resources.
156
173
  '''
157
174
  if __debug__:
158
175
  type_hints = typing.get_type_hints(_typecheckingstub__f390e65acdf4efe0289b1b8e5f17c031f7a88a13963effed34b7d4944b31dd7e)
@@ -206,7 +223,9 @@ class CfnInvestigationGroup(
206
223
  @builtins.property
207
224
  @jsii.member(jsii_name="attrArn")
208
225
  def attr_arn(self) -> builtins.str:
209
- '''The Investigation Group's ARN.
226
+ '''The Amazon Resource Name (ARN) of the investigation group.
227
+
228
+ For example, ``arn:aws:aiops: *Region* : *account-id* :investigation-group: *investigation-group-id*``
210
229
 
211
230
  :cloudformationAttribute: Arn
212
231
  '''
@@ -215,7 +234,7 @@ class CfnInvestigationGroup(
215
234
  @builtins.property
216
235
  @jsii.member(jsii_name="attrCreatedAt")
217
236
  def attr_created_at(self) -> builtins.str:
218
- '''The timestamp value.
237
+ '''The date and time that the investigation group was created.
219
238
 
220
239
  :cloudformationAttribute: CreatedAt
221
240
  '''
@@ -224,7 +243,7 @@ class CfnInvestigationGroup(
224
243
  @builtins.property
225
244
  @jsii.member(jsii_name="attrCreatedBy")
226
245
  def attr_created_by(self) -> builtins.str:
227
- '''User friendly name for resources.
246
+ '''The name of the user who created the investigation group.
228
247
 
229
248
  :cloudformationAttribute: CreatedBy
230
249
  '''
@@ -233,7 +252,7 @@ class CfnInvestigationGroup(
233
252
  @builtins.property
234
253
  @jsii.member(jsii_name="attrLastModifiedAt")
235
254
  def attr_last_modified_at(self) -> builtins.str:
236
- '''User friendly name for resources.
255
+ '''The date and time that the investigation group was most recently modified.
237
256
 
238
257
  :cloudformationAttribute: LastModifiedAt
239
258
  '''
@@ -242,7 +261,7 @@ class CfnInvestigationGroup(
242
261
  @builtins.property
243
262
  @jsii.member(jsii_name="attrLastModifiedBy")
244
263
  def attr_last_modified_by(self) -> builtins.str:
245
- '''User friendly name for resources.
264
+ '''The name of the user who most recently modified the investigation group.
246
265
 
247
266
  :cloudformationAttribute: LastModifiedBy
248
267
  '''
@@ -262,7 +281,7 @@ class CfnInvestigationGroup(
262
281
  @builtins.property
263
282
  @jsii.member(jsii_name="name")
264
283
  def name(self) -> builtins.str:
265
- '''User friendly name for resources.'''
284
+ '''A name for the investigation group.'''
266
285
  return typing.cast(builtins.str, jsii.get(self, "name"))
267
286
 
268
287
  @name.setter
@@ -277,7 +296,7 @@ class CfnInvestigationGroup(
277
296
  def chatbot_notification_channels(
278
297
  self,
279
298
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.ChatbotNotificationChannelProperty"]]]]:
280
- '''An array of key-value pairs of notification channels to apply to this resource.'''
299
+ '''Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications.'''
281
300
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.ChatbotNotificationChannelProperty"]]]], jsii.get(self, "chatbotNotificationChannels"))
282
301
 
283
302
  @chatbot_notification_channels.setter
@@ -313,6 +332,7 @@ class CfnInvestigationGroup(
313
332
  def encryption_config(
314
333
  self,
315
334
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.EncryptionConfigMapProperty"]]:
335
+ '''Use this property to specify a customer managed AWS KMS key to encrypt your investigation data.'''
316
336
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.EncryptionConfigMapProperty"]], jsii.get(self, "encryptionConfig"))
317
337
 
318
338
  @encryption_config.setter
@@ -343,7 +363,7 @@ class CfnInvestigationGroup(
343
363
  def is_cloud_trail_event_history_enabled(
344
364
  self,
345
365
  ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
346
- '''Flag to enable cloud trail history.'''
366
+ '''Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail .'''
347
367
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "isCloudTrailEventHistoryEnabled"))
348
368
 
349
369
  @is_cloud_trail_event_history_enabled.setter
@@ -359,7 +379,10 @@ class CfnInvestigationGroup(
359
379
  @builtins.property
360
380
  @jsii.member(jsii_name="retentionInDays")
361
381
  def retention_in_days(self) -> typing.Optional[jsii.Number]:
362
- '''The number of days to retain the investigation group.'''
382
+ '''Specify how long that investigation data is kept.
383
+
384
+ For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ .
385
+ '''
363
386
  return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "retentionInDays"))
364
387
 
365
388
  @retention_in_days.setter
@@ -372,7 +395,7 @@ class CfnInvestigationGroup(
372
395
  @builtins.property
373
396
  @jsii.member(jsii_name="roleArn")
374
397
  def role_arn(self) -> typing.Optional[builtins.str]:
375
- '''The Investigation Role's ARN.'''
398
+ '''Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data.'''
376
399
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "roleArn"))
377
400
 
378
401
  @role_arn.setter
@@ -385,6 +408,7 @@ class CfnInvestigationGroup(
385
408
  @builtins.property
386
409
  @jsii.member(jsii_name="tagKeyBoundaries")
387
410
  def tag_key_boundaries(self) -> typing.Optional[typing.List[builtins.str]]:
411
+ '''Enter the existing custom tag keys for custom applications in your system.'''
388
412
  return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "tagKeyBoundaries"))
389
413
 
390
414
  @tag_key_boundaries.setter
@@ -400,7 +424,7 @@ class CfnInvestigationGroup(
400
424
  @builtins.property
401
425
  @jsii.member(jsii_name="tags")
402
426
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
403
- '''An array of key-value pairs to apply to this resource.'''
427
+ '''A list of key-value pairs to associate with the investigation group.'''
404
428
  return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
405
429
 
406
430
  @tags.setter
@@ -425,7 +449,10 @@ class CfnInvestigationGroup(
425
449
  chat_configuration_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
426
450
  sns_topic_arn: typing.Optional[builtins.str] = None,
427
451
  ) -> None:
428
- '''
452
+ '''This structure is a string array.
453
+
454
+ The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of Amazon Q in chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
455
+
429
456
  :param chat_configuration_arns:
430
457
  :param sns_topic_arn:
431
458
 
@@ -551,7 +578,7 @@ class CfnInvestigationGroup(
551
578
  ) -> None:
552
579
  '''
553
580
  :param encryption_configuration_type:
554
- :param kms_key_id:
581
+ :param kms_key_id: If the investigation group uses a customer managed key for encryption, this field displays the ID of that key.
555
582
 
556
583
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html
557
584
  :exampleMetadata: fixture=_generated
@@ -587,7 +614,8 @@ class CfnInvestigationGroup(
587
614
 
588
615
  @builtins.property
589
616
  def kms_key_id(self) -> typing.Optional[builtins.str]:
590
- '''
617
+ '''If the investigation group uses a customer managed key for encryption, this field displays the ID of that key.
618
+
591
619
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html#cfn-aiops-investigationgroup-encryptionconfigmap-kmskeyid
592
620
  '''
593
621
  result = self._values.get("kms_key_id")
@@ -638,16 +666,16 @@ class CfnInvestigationGroupProps:
638
666
  ) -> None:
639
667
  '''Properties for defining a ``CfnInvestigationGroup``.
640
668
 
641
- :param name: User friendly name for resources.
642
- :param chatbot_notification_channels: An array of key-value pairs of notification channels to apply to this resource.
669
+ :param name: A name for the investigation group.
670
+ :param chatbot_notification_channels: Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
643
671
  :param cross_account_configurations: An array of cross account configurations.
644
- :param encryption_config:
672
+ :param encryption_config: Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
645
673
  :param investigation_group_policy: Investigation Group policy.
646
- :param is_cloud_trail_event_history_enabled: Flag to enable cloud trail history.
647
- :param retention_in_days: The number of days to retain the investigation group.
648
- :param role_arn: The Investigation Role's ARN.
649
- :param tag_key_boundaries:
650
- :param tags: An array of key-value pairs to apply to this resource.
674
+ :param is_cloud_trail_event_history_enabled: Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is ``true`` .
675
+ :param retention_in_days: Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ . If you omit this parameter, the default of 90 days is used.
676
+ :param role_arn: Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations. For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
677
+ :param tag_key_boundaries: Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases. You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
678
+ :param tags: A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. Tags can help you organize and categorize your resources.
651
679
 
652
680
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html
653
681
  :exampleMetadata: fixture=_generated
@@ -720,7 +748,7 @@ class CfnInvestigationGroupProps:
720
748
 
721
749
  @builtins.property
722
750
  def name(self) -> builtins.str:
723
- '''User friendly name for resources.
751
+ '''A name for the investigation group.
724
752
 
725
753
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-name
726
754
  '''
@@ -732,7 +760,9 @@ class CfnInvestigationGroupProps:
732
760
  def chatbot_notification_channels(
733
761
  self,
734
762
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.ChatbotNotificationChannelProperty]]]]:
735
- '''An array of key-value pairs of notification channels to apply to this resource.
763
+ '''Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications.
764
+
765
+ This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
736
766
 
737
767
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-chatbotnotificationchannels
738
768
  '''
@@ -754,7 +784,10 @@ class CfnInvestigationGroupProps:
754
784
  def encryption_config(
755
785
  self,
756
786
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.EncryptionConfigMapProperty]]:
757
- '''
787
+ '''Use this property to specify a customer managed AWS KMS key to encrypt your investigation data.
788
+
789
+ If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
790
+
758
791
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-encryptionconfig
759
792
  '''
760
793
  result = self._values.get("encryption_config")
@@ -773,7 +806,9 @@ class CfnInvestigationGroupProps:
773
806
  def is_cloud_trail_event_history_enabled(
774
807
  self,
775
808
  ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
776
- '''Flag to enable cloud trail history.
809
+ '''Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail .
810
+
811
+ The default is ``true`` .
777
812
 
778
813
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-iscloudtraileventhistoryenabled
779
814
  '''
@@ -782,7 +817,9 @@ class CfnInvestigationGroupProps:
782
817
 
783
818
  @builtins.property
784
819
  def retention_in_days(self) -> typing.Optional[jsii.Number]:
785
- '''The number of days to retain the investigation group.
820
+ '''Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ .
821
+
822
+ If you omit this parameter, the default of 90 days is used.
786
823
 
787
824
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-retentionindays
788
825
  '''
@@ -791,7 +828,11 @@ class CfnInvestigationGroupProps:
791
828
 
792
829
  @builtins.property
793
830
  def role_arn(self) -> typing.Optional[builtins.str]:
794
- '''The Investigation Role's ARN.
831
+ '''Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data.
832
+
833
+ The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations.
834
+
835
+ For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
795
836
 
796
837
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-rolearn
797
838
  '''
@@ -800,7 +841,12 @@ class CfnInvestigationGroupProps:
800
841
 
801
842
  @builtins.property
802
843
  def tag_key_boundaries(self) -> typing.Optional[typing.List[builtins.str]]:
803
- '''
844
+ '''Enter the existing custom tag keys for custom applications in your system.
845
+
846
+ Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.
847
+
848
+ You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
849
+
804
850
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tagkeyboundaries
805
851
  '''
806
852
  result = self._values.get("tag_key_boundaries")
@@ -808,7 +854,11 @@ class CfnInvestigationGroupProps:
808
854
 
809
855
  @builtins.property
810
856
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
811
- '''An array of key-value pairs to apply to this resource.
857
+ '''A list of key-value pairs to associate with the investigation group.
858
+
859
+ You can associate as many as 50 tags with an investigation group.
860
+
861
+ Tags can help you organize and categorize your resources.
812
862
 
813
863
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tags
814
864
  '''