aws-cdk-lib 2.205.0__py3-none-any.whl → 2.207.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of aws-cdk-lib might be problematic. Click here for more details.

Files changed (30) hide show
  1. aws_cdk/__init__.py +96 -15
  2. aws_cdk/_jsii/__init__.py +1 -1
  3. aws_cdk/_jsii/{aws-cdk-lib@2.205.0.jsii.tgz → aws-cdk-lib@2.207.0.jsii.tgz} +0 -0
  4. aws_cdk/aws_aiops/__init__.py +66 -76
  5. aws_cdk/aws_autoscaling/__init__.py +20 -0
  6. aws_cdk/aws_bedrock/__init__.py +126 -70
  7. aws_cdk/aws_certificatemanager/__init__.py +3 -3
  8. aws_cdk/aws_cleanrooms/__init__.py +6 -2
  9. aws_cdk/aws_cloudformation/__init__.py +28 -15
  10. aws_cdk/aws_cloudwatch/__init__.py +574 -33
  11. aws_cdk/aws_datasync/__init__.py +14 -15
  12. aws_cdk/aws_ec2/__init__.py +6 -2
  13. aws_cdk/aws_ecs/__init__.py +773 -212
  14. aws_cdk/aws_iotsitewise/__init__.py +13 -9
  15. aws_cdk/aws_kms/__init__.py +19 -17
  16. aws_cdk/aws_logs/__init__.py +4725 -763
  17. aws_cdk/aws_mediapackagev2/__init__.py +69 -48
  18. aws_cdk/aws_opsworkscm/__init__.py +2 -4
  19. aws_cdk/aws_rds/__init__.py +150 -17
  20. aws_cdk/aws_s3/__init__.py +9 -6
  21. aws_cdk/aws_sagemaker/__init__.py +3 -3
  22. aws_cdk/aws_ssm/__init__.py +58 -33
  23. aws_cdk/aws_transfer/__init__.py +21 -11
  24. aws_cdk/custom_resources/__init__.py +32 -4
  25. {aws_cdk_lib-2.205.0.dist-info → aws_cdk_lib-2.207.0.dist-info}/METADATA +1 -1
  26. {aws_cdk_lib-2.205.0.dist-info → aws_cdk_lib-2.207.0.dist-info}/RECORD +30 -30
  27. {aws_cdk_lib-2.205.0.dist-info → aws_cdk_lib-2.207.0.dist-info}/LICENSE +0 -0
  28. {aws_cdk_lib-2.205.0.dist-info → aws_cdk_lib-2.207.0.dist-info}/NOTICE +0 -0
  29. {aws_cdk_lib-2.205.0.dist-info → aws_cdk_lib-2.207.0.dist-info}/WHEEL +0 -0
  30. {aws_cdk_lib-2.205.0.dist-info → aws_cdk_lib-2.207.0.dist-info}/top_level.txt +0 -0
aws_cdk/__init__.py CHANGED
@@ -1787,6 +1787,31 @@ class Annotations(metaclass=jsii.JSIIMeta, jsii_type="aws-cdk-lib.Annotations"):
1787
1787
  check_type(argname="argument scope", value=scope, expected_type=type_hints["scope"])
1788
1788
  return typing.cast("Annotations", jsii.sinvoke(cls, "of", [scope]))
1789
1789
 
1790
+ @jsii.member(jsii_name="acknowledgeInfo")
1791
+ def acknowledge_info(
1792
+ self,
1793
+ id: builtins.str,
1794
+ message: typing.Optional[builtins.str] = None,
1795
+ ) -> None:
1796
+ '''Acknowledge a info. When a info is acknowledged for a scope all infos that match the id will be ignored.
1797
+
1798
+ The acknowledgement will apply to all child scopes
1799
+
1800
+ :param id: - the id of the info message to acknowledge.
1801
+ :param message: optional message to explain the reason for acknowledgement.
1802
+
1803
+ Example::
1804
+
1805
+ # my_construct: Construct
1806
+
1807
+ Annotations.of(my_construct).acknowledge_info("SomeInfoId", "This info can be ignored because...")
1808
+ '''
1809
+ if __debug__:
1810
+ type_hints = typing.get_type_hints(_typecheckingstub__71c75ad95e6c491e615a0c0a9cc9bc5b538f2d93e7057612251cfc9592380513)
1811
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
1812
+ check_type(argname="argument message", value=message, expected_type=type_hints["message"])
1813
+ return typing.cast(None, jsii.invoke(self, "acknowledgeInfo", [id, message]))
1814
+
1790
1815
  @jsii.member(jsii_name="acknowledgeWarning")
1791
1816
  def acknowledge_warning(
1792
1817
  self,
@@ -1857,6 +1882,29 @@ class Annotations(metaclass=jsii.JSIIMeta, jsii_type="aws-cdk-lib.Annotations"):
1857
1882
  check_type(argname="argument message", value=message, expected_type=type_hints["message"])
1858
1883
  return typing.cast(None, jsii.invoke(self, "addInfo", [message]))
1859
1884
 
1885
+ @jsii.member(jsii_name="addInfoV2")
1886
+ def add_info_v2(self, id: builtins.str, message: builtins.str) -> None:
1887
+ '''Adds an acknowledgeable info metadata entry to this construct.
1888
+
1889
+ The CLI will display the info when an app is synthesized.
1890
+
1891
+ If the info is acknowledged using ``acknowledgeInfo()``, it will not be shown by the CLI.
1892
+
1893
+ :param id: the unique identifier for the info. This can be used to acknowledge the info
1894
+ :param message: The info message.
1895
+
1896
+ Example::
1897
+
1898
+ # my_construct: Construct
1899
+
1900
+ Annotations.of(my_construct).add_info_v2("my-library:Construct.someInfo", "Some message explaining the info")
1901
+ '''
1902
+ if __debug__:
1903
+ type_hints = typing.get_type_hints(_typecheckingstub__843fb7798b96b5a06278ca94ba80d2ae0fb300672c44f21b2ee4d759a04bdba9)
1904
+ check_type(argname="argument id", value=id, expected_type=type_hints["id"])
1905
+ check_type(argname="argument message", value=message, expected_type=type_hints["message"])
1906
+ return typing.cast(None, jsii.invoke(self, "addInfoV2", [id, message]))
1907
+
1860
1908
  @jsii.member(jsii_name="addWarning")
1861
1909
  def add_warning(self, message: builtins.str) -> None:
1862
1910
  '''Adds a warning metadata entry to this construct. Prefer using ``addWarningV2``.
@@ -33997,7 +34045,9 @@ class CfnStackSet(
33997
34045
  enabled: typing.Optional[typing.Union[builtins.bool, IResolvable]] = None,
33998
34046
  retain_stacks_on_account_removal: typing.Optional[typing.Union[builtins.bool, IResolvable]] = None,
33999
34047
  ) -> None:
34000
- '''[ ``Service-managed`` permissions] Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organizational unit (OU).
34048
+ '''Describes whether StackSets automatically deploys to AWS Organizations accounts that are added to a target organization or organizational unit (OU).
34049
+
34050
+ For more information, see `Enable or disable automatic deployments for StackSets in AWS Organizations <https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/stacksets-orgs-manage-auto-deployment.html>`_ in the *AWS CloudFormation User Guide* .
34001
34051
 
34002
34052
  :param enabled: If set to ``true`` , StackSets automatically deploys additional stack instances to AWS Organizations accounts that are added to a target organization or organizational unit (OU) in the specified Regions. If an account is removed from a target organization or OU, StackSets deletes stack instances from the account in the specified Regions.
34003
34053
  :param retain_stacks_on_account_removal: If set to ``true`` , stack resources are retained when an account is removed from a target organization or OU. If set to ``false`` , stack resources are deleted. Specify only if ``Enabled`` is set to ``True`` .
@@ -34080,11 +34130,20 @@ class CfnStackSet(
34080
34130
  accounts_url: typing.Optional[builtins.str] = None,
34081
34131
  organizational_unit_ids: typing.Optional[typing.Sequence[builtins.str]] = None,
34082
34132
  ) -> None:
34083
- '''The AWS ``OrganizationalUnitIds`` or ``Accounts`` for which to create stack instances in the specified Regions.
34133
+ '''The AWS Organizations accounts or AWS accounts to deploy stacks to in the specified Regions.
34134
+
34135
+ When deploying to AWS Organizations accounts with ``SERVICE_MANAGED`` permissions:
34136
+
34137
+ - You must specify the ``OrganizationalUnitIds`` property.
34138
+ - If you specify organizational units (OUs) for ``OrganizationalUnitIds`` and use either the ``Accounts`` or ``AccountsUrl`` property, you must also specify the ``AccountFilterType`` property.
34084
34139
 
34085
- :param account_filter_type: Limit deployment targets to individual accounts or include additional accounts with provided OUs. The following is a list of possible values for the ``AccountFilterType`` operation. - ``INTERSECTION`` : StackSet deploys to the accounts specified in the ``Accounts`` parameter. - ``DIFFERENCE`` : StackSet deploys to the OU, excluding the accounts specified in the ``Accounts`` parameter. - ``UNION`` StackSet deploys to the OU, and the accounts specified in the ``Accounts`` parameter. ``UNION`` is not supported for create operations when using StackSet as a resource.
34140
+ When deploying to AWS accounts with ``SELF_MANAGED`` permissions:
34141
+
34142
+ - You must specify either the ``Accounts`` or ``AccountsUrl`` property, but not both.
34143
+
34144
+ :param account_filter_type: Refines which accounts to deploy stacks to by specifying how to use the ``Accounts`` and ``OrganizationalUnitIds`` properties together. The following values determine how CloudFormation selects target accounts: - ``INTERSECTION`` : StackSet deploys to the accounts specified in the ``Accounts`` property. - ``DIFFERENCE`` : StackSet deploys to the OU, excluding the accounts specified in the ``Accounts`` property. - ``UNION`` : StackSet deploys to the OU, and the accounts specified in the ``Accounts`` property. ``UNION`` is not supported for create operations when using StackSet as a resource or the ``CreateStackInstances`` API.
34086
34145
  :param accounts: The account IDs of the AWS accounts . If you have many account numbers, you can provide those accounts using the ``AccountsUrl`` property instead. *Pattern* : ``^[0-9]{12}$``
34087
- :param accounts_url: The Amazon S3 URL path to a file that contains a list of AWS account IDs. The file format must be either ``.csv`` or ``.txt`` , and the data can be comma-separated or new-line-separated. There is currently a 10MB limit for the data (approximately 800,000 accounts).
34146
+ :param accounts_url: The Amazon S3 URL path to a file that contains a list of AWS account IDs. The file format must be either ``.csv`` or ``.txt`` , and the data can be comma-separated or new-line-separated. There is currently a 10MB limit for the data (approximately 800,000 accounts). This property serves the same purpose as ``Accounts`` but allows you to specify a large number of accounts.
34088
34147
  :param organizational_unit_ids: The organization root ID or organizational unit (OU) IDs. *Pattern* : ``^(ou-[a-z0-9]{4,32}-[a-z0-9]{8,32}|r-[a-z0-9]{4,32})$``
34089
34148
 
34090
34149
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-deploymenttargets.html
@@ -34121,13 +34180,13 @@ class CfnStackSet(
34121
34180
 
34122
34181
  @builtins.property
34123
34182
  def account_filter_type(self) -> typing.Optional[builtins.str]:
34124
- '''Limit deployment targets to individual accounts or include additional accounts with provided OUs.
34183
+ '''Refines which accounts to deploy stacks to by specifying how to use the ``Accounts`` and ``OrganizationalUnitIds`` properties together.
34125
34184
 
34126
- The following is a list of possible values for the ``AccountFilterType`` operation.
34185
+ The following values determine how CloudFormation selects target accounts:
34127
34186
 
34128
- - ``INTERSECTION`` : StackSet deploys to the accounts specified in the ``Accounts`` parameter.
34129
- - ``DIFFERENCE`` : StackSet deploys to the OU, excluding the accounts specified in the ``Accounts`` parameter.
34130
- - ``UNION`` StackSet deploys to the OU, and the accounts specified in the ``Accounts`` parameter. ``UNION`` is not supported for create operations when using StackSet as a resource.
34187
+ - ``INTERSECTION`` : StackSet deploys to the accounts specified in the ``Accounts`` property.
34188
+ - ``DIFFERENCE`` : StackSet deploys to the OU, excluding the accounts specified in the ``Accounts`` property.
34189
+ - ``UNION`` : StackSet deploys to the OU, and the accounts specified in the ``Accounts`` property. ``UNION`` is not supported for create operations when using StackSet as a resource or the ``CreateStackInstances`` API.
34131
34190
 
34132
34191
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-deploymenttargets.html#cfn-cloudformation-stackset-deploymenttargets-accountfiltertype
34133
34192
  '''
@@ -34153,6 +34212,8 @@ class CfnStackSet(
34153
34212
 
34154
34213
  The file format must be either ``.csv`` or ``.txt`` , and the data can be comma-separated or new-line-separated. There is currently a 10MB limit for the data (approximately 800,000 accounts).
34155
34214
 
34215
+ This property serves the same purpose as ``Accounts`` but allows you to specify a large number of accounts.
34216
+
34156
34217
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-deploymenttargets.html#cfn-cloudformation-stackset-deploymenttargets-accountsurl
34157
34218
  '''
34158
34219
  result = self._values.get("accounts_url")
@@ -34193,7 +34254,7 @@ class CfnStackSet(
34193
34254
  ) -> None:
34194
34255
  '''Describes whether StackSets performs non-conflicting operations concurrently and queues conflicting operations.
34195
34256
 
34196
- :param active: When ``true`` , StackSets performs non-conflicting operations concurrently and queues conflicting operations. After conflicting operations finish, StackSets starts queued operations in request order. .. epigraph:: If there are already running or queued operations, StackSets queues all incoming operations even if they are non-conflicting. You can't modify your StackSet's execution configuration while there are running or queued operations for that StackSet. When ``false`` (default), StackSets performs one operation at a time in request order.
34257
+ :param active: When ``true`` , CloudFormation performs non-conflicting operations concurrently and queues conflicting operations. After conflicting operations finish, CloudFormation starts queued operations in request order. .. epigraph:: If there are already running or queued operations, CloudFormation queues all incoming operations even if they are non-conflicting. You can't modify your StackSet's execution configuration while there are running or queued operations for that StackSet. When ``false`` (default), StackSets performs one operation at a time in request order.
34197
34258
 
34198
34259
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-managedexecution.html
34199
34260
  :exampleMetadata: fixture=_generated
@@ -34217,12 +34278,12 @@ class CfnStackSet(
34217
34278
 
34218
34279
  @builtins.property
34219
34280
  def active(self) -> typing.Optional[typing.Union[builtins.bool, IResolvable]]:
34220
- '''When ``true`` , StackSets performs non-conflicting operations concurrently and queues conflicting operations.
34281
+ '''When ``true`` , CloudFormation performs non-conflicting operations concurrently and queues conflicting operations.
34221
34282
 
34222
- After conflicting operations finish, StackSets starts queued operations in request order.
34283
+ After conflicting operations finish, CloudFormation starts queued operations in request order.
34223
34284
  .. epigraph::
34224
34285
 
34225
- If there are already running or queued operations, StackSets queues all incoming operations even if they are non-conflicting.
34286
+ If there are already running or queued operations, CloudFormation queues all incoming operations even if they are non-conflicting.
34226
34287
 
34227
34288
  You can't modify your StackSet's execution configuration while there are running or queued operations for that StackSet.
34228
34289
 
@@ -34522,7 +34583,7 @@ class CfnStackSet(
34522
34583
  ) -> None:
34523
34584
  '''Stack instances in some specific accounts and Regions.
34524
34585
 
34525
- :param deployment_targets: The AWS ``OrganizationalUnitIds`` or ``Accounts`` for which to create stack instances in the specified Regions.
34586
+ :param deployment_targets: The AWS Organizations accounts or AWS accounts to deploy stacks to in the specified Regions.
34526
34587
  :param regions: The names of one or more Regions where you want to create stack instances using the specified AWS accounts .
34527
34588
  :param parameter_overrides: A list of StackSet parameters whose values you want to override in the selected stack instances.
34528
34589
 
@@ -34567,7 +34628,7 @@ class CfnStackSet(
34567
34628
  def deployment_targets(
34568
34629
  self,
34569
34630
  ) -> typing.Union[IResolvable, "CfnStackSet.DeploymentTargetsProperty"]:
34570
- '''The AWS ``OrganizationalUnitIds`` or ``Accounts`` for which to create stack instances in the specified Regions.
34631
+ '''The AWS Organizations accounts or AWS accounts to deploy stacks to in the specified Regions.
34571
34632
 
34572
34633
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-cloudformation-stackset-stackinstances.html#cfn-cloudformation-stackset-stackinstances-deploymenttargets
34573
34634
  '''
@@ -36446,6 +36507,12 @@ class NestedStack(Stack, metaclass=jsii.JSIIMeta, jsii_type="aws-cdk-lib.NestedS
36446
36507
  check_type(argname="argument value", value=value, expected_type=type_hints["value"])
36447
36508
  return typing.cast(None, jsii.invoke(self, "setParameter", [name, value]))
36448
36509
 
36510
+ @builtins.property
36511
+ @jsii.member(jsii_name="bundlingRequired")
36512
+ def bundling_required(self) -> builtins.bool:
36513
+ '''Indicates whether the stack requires bundling or not.'''
36514
+ return typing.cast(builtins.bool, jsii.get(self, "bundlingRequired"))
36515
+
36449
36516
  @builtins.property
36450
36517
  @jsii.member(jsii_name="stackId")
36451
36518
  def stack_id(self) -> builtins.str:
@@ -38387,6 +38454,13 @@ def _typecheckingstub__cfddeb4c359528028785fb7ca8a01e86bcda81d53c82cdaef6ad18dd0
38387
38454
  """Type checking stubs"""
38388
38455
  pass
38389
38456
 
38457
+ def _typecheckingstub__71c75ad95e6c491e615a0c0a9cc9bc5b538f2d93e7057612251cfc9592380513(
38458
+ id: builtins.str,
38459
+ message: typing.Optional[builtins.str] = None,
38460
+ ) -> None:
38461
+ """Type checking stubs"""
38462
+ pass
38463
+
38390
38464
  def _typecheckingstub__58bb467dabbe29a0334a62f44fa1a8a9b59742b9dfac031624ed782055bf0ada(
38391
38465
  id: builtins.str,
38392
38466
  message: typing.Optional[builtins.str] = None,
@@ -38413,6 +38487,13 @@ def _typecheckingstub__42febf8c4cbec6748c47fab1f601511d3bc57ef5bc415cb489e10605f
38413
38487
  """Type checking stubs"""
38414
38488
  pass
38415
38489
 
38490
+ def _typecheckingstub__843fb7798b96b5a06278ca94ba80d2ae0fb300672c44f21b2ee4d759a04bdba9(
38491
+ id: builtins.str,
38492
+ message: builtins.str,
38493
+ ) -> None:
38494
+ """Type checking stubs"""
38495
+ pass
38496
+
38416
38497
  def _typecheckingstub__e2fdcebb577d63295330a53b495fc6906cfbd98497144c53b1cb802e3e082f72(
38417
38498
  message: builtins.str,
38418
38499
  ) -> None:
aws_cdk/_jsii/__init__.py CHANGED
@@ -34,7 +34,7 @@ import aws_cdk.cloud_assembly_schema._jsii
34
34
  import constructs._jsii
35
35
 
36
36
  __jsii_assembly__ = jsii.JSIIAssembly.load(
37
- "aws-cdk-lib", "2.205.0", __name__[0:-6], "aws-cdk-lib@2.205.0.jsii.tgz"
37
+ "aws-cdk-lib", "2.207.0", __name__[0:-6], "aws-cdk-lib@2.207.0.jsii.tgz"
38
38
  )
39
39
 
40
40
  __all__ = [
@@ -97,12 +97,12 @@ class CfnInvestigationGroup(
97
97
 
98
98
  Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region
99
99
 
100
- To create an investigation group and set up Amazon Q Developer operational investigations, you must be signed in to an IAM principal that has the either the ``AIOpsConsoleAdminPolicy`` or the ``AdministratorAccess`` IAM policy attached, or to an account that has similar permissions.
100
+ To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has the either the ``AIOpsConsoleAdminPolicy`` or the ``AdministratorAccess`` IAM policy attached, or to an account that has similar permissions.
101
101
  .. epigraph::
102
102
 
103
- You can optionally configure CloudWatch alarms to start investigations and add events to investigations. The examples section on this page demonstrates creating an investigation group and an alarm at the same time.
103
+ You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with ``CreateInvestigationGroup`` and you want to enable alarms to do this, you must use ``PutInvestigationGroupPolicy`` to create a resource policy that grants this permission to CloudWatch alarms.
104
104
 
105
- For more information about configuring CloudWatch alarms to work with Amazon Q Developer operational investigations, see
105
+ For more information about configuring CloudWatch alarms to work with CloudWatch investigations, see
106
106
 
107
107
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html
108
108
  :cloudformationResource: AWS::AIOps::InvestigationGroup
@@ -160,16 +160,16 @@ class CfnInvestigationGroup(
160
160
  '''
161
161
  :param scope: Scope in which this resource is defined.
162
162
  :param id: Construct identifier for this resource (unique in its scope).
163
- :param name: A name for the investigation group.
164
- :param chatbot_notification_channels: Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
165
- :param cross_account_configurations: An array of cross account configurations.
166
- :param encryption_config: Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
167
- :param investigation_group_policy: Investigation Group policy.
168
- :param is_cloud_trail_event_history_enabled: Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is ``true`` .
169
- :param retention_in_days: Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ . If you omit this parameter, the default of 90 days is used.
170
- :param role_arn: Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations. For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
171
- :param tag_key_boundaries: Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases. You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
172
- :param tags: A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. Tags can help you organize and categorize your resources.
163
+ :param name: Specify either the name or the ARN of the investigation group that you want to view.
164
+ :param chatbot_notification_channels: Use this property to integrate CloudWatch investigations with chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
165
+ :param cross_account_configurations: Number of ``sourceAccountId`` values that have been configured for cross-account access.
166
+ :param encryption_config: Specifies the customer managed AWS KMS key that the investigation group uses to encrypt data, if there is one. If not, the investigation group uses an AWS key to encrypt the data.
167
+ :param investigation_group_policy: Returns the IAM resource policy that is associated with the specified investigation group.
168
+ :param is_cloud_trail_event_history_enabled: Specify ``true`` to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is ``true`` .
169
+ :param retention_in_days: Specifies how long that investigation data is kept.
170
+ :param role_arn: The ARN of the IAM role that the investigation group uses for permissions to gather data.
171
+ :param tag_key_boundaries: Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources.
172
+ :param tags: The list of key-value pairs to associate with the resource.
173
173
  '''
174
174
  if __debug__:
175
175
  type_hints = typing.get_type_hints(_typecheckingstub__f390e65acdf4efe0289b1b8e5f17c031f7a88a13963effed34b7d4944b31dd7e)
@@ -225,8 +225,6 @@ class CfnInvestigationGroup(
225
225
  def attr_arn(self) -> builtins.str:
226
226
  '''The Amazon Resource Name (ARN) of the investigation group.
227
227
 
228
- For example, ``arn:aws:aiops: *Region* : *account-id* :investigation-group: *investigation-group-id*``
229
-
230
228
  :cloudformationAttribute: Arn
231
229
  '''
232
230
  return typing.cast(builtins.str, jsii.get(self, "attrArn"))
@@ -261,7 +259,7 @@ class CfnInvestigationGroup(
261
259
  @builtins.property
262
260
  @jsii.member(jsii_name="attrLastModifiedBy")
263
261
  def attr_last_modified_by(self) -> builtins.str:
264
- '''The name of the user who most recently modified the investigation group.
262
+ '''The name of the user who created the investigation group.
265
263
 
266
264
  :cloudformationAttribute: LastModifiedBy
267
265
  '''
@@ -281,7 +279,7 @@ class CfnInvestigationGroup(
281
279
  @builtins.property
282
280
  @jsii.member(jsii_name="name")
283
281
  def name(self) -> builtins.str:
284
- '''A name for the investigation group.'''
282
+ '''Specify either the name or the ARN of the investigation group that you want to view.'''
285
283
  return typing.cast(builtins.str, jsii.get(self, "name"))
286
284
 
287
285
  @name.setter
@@ -296,7 +294,7 @@ class CfnInvestigationGroup(
296
294
  def chatbot_notification_channels(
297
295
  self,
298
296
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.ChatbotNotificationChannelProperty"]]]]:
299
- '''Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications.'''
297
+ '''Use this property to integrate CloudWatch investigations with chat applications.'''
300
298
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.ChatbotNotificationChannelProperty"]]]], jsii.get(self, "chatbotNotificationChannels"))
301
299
 
302
300
  @chatbot_notification_channels.setter
@@ -314,7 +312,7 @@ class CfnInvestigationGroup(
314
312
  def cross_account_configurations(
315
313
  self,
316
314
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.CrossAccountConfigurationProperty"]]]]:
317
- '''An array of cross account configurations.'''
315
+ '''Number of ``sourceAccountId`` values that have been configured for cross-account access.'''
318
316
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.CrossAccountConfigurationProperty"]]]], jsii.get(self, "crossAccountConfigurations"))
319
317
 
320
318
  @cross_account_configurations.setter
@@ -332,7 +330,7 @@ class CfnInvestigationGroup(
332
330
  def encryption_config(
333
331
  self,
334
332
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.EncryptionConfigMapProperty"]]:
335
- '''Use this property to specify a customer managed AWS KMS key to encrypt your investigation data.'''
333
+ '''Specifies the customer managed AWS KMS key that the investigation group uses to encrypt data, if there is one.'''
336
334
  return typing.cast(typing.Optional[typing.Union[_IResolvable_da3f097b, "CfnInvestigationGroup.EncryptionConfigMapProperty"]], jsii.get(self, "encryptionConfig"))
337
335
 
338
336
  @encryption_config.setter
@@ -348,7 +346,7 @@ class CfnInvestigationGroup(
348
346
  @builtins.property
349
347
  @jsii.member(jsii_name="investigationGroupPolicy")
350
348
  def investigation_group_policy(self) -> typing.Optional[builtins.str]:
351
- '''Investigation Group policy.'''
349
+ '''Returns the IAM resource policy that is associated with the specified investigation group.'''
352
350
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "investigationGroupPolicy"))
353
351
 
354
352
  @investigation_group_policy.setter
@@ -363,7 +361,7 @@ class CfnInvestigationGroup(
363
361
  def is_cloud_trail_event_history_enabled(
364
362
  self,
365
363
  ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
366
- '''Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail .'''
364
+ '''Specify ``true`` to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail.'''
367
365
  return typing.cast(typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]], jsii.get(self, "isCloudTrailEventHistoryEnabled"))
368
366
 
369
367
  @is_cloud_trail_event_history_enabled.setter
@@ -379,10 +377,7 @@ class CfnInvestigationGroup(
379
377
  @builtins.property
380
378
  @jsii.member(jsii_name="retentionInDays")
381
379
  def retention_in_days(self) -> typing.Optional[jsii.Number]:
382
- '''Specify how long that investigation data is kept.
383
-
384
- For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ .
385
- '''
380
+ '''Specifies how long that investigation data is kept.'''
386
381
  return typing.cast(typing.Optional[jsii.Number], jsii.get(self, "retentionInDays"))
387
382
 
388
383
  @retention_in_days.setter
@@ -395,7 +390,7 @@ class CfnInvestigationGroup(
395
390
  @builtins.property
396
391
  @jsii.member(jsii_name="roleArn")
397
392
  def role_arn(self) -> typing.Optional[builtins.str]:
398
- '''Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data.'''
393
+ '''The ARN of the IAM role that the investigation group uses for permissions to gather data.'''
399
394
  return typing.cast(typing.Optional[builtins.str], jsii.get(self, "roleArn"))
400
395
 
401
396
  @role_arn.setter
@@ -408,7 +403,7 @@ class CfnInvestigationGroup(
408
403
  @builtins.property
409
404
  @jsii.member(jsii_name="tagKeyBoundaries")
410
405
  def tag_key_boundaries(self) -> typing.Optional[typing.List[builtins.str]]:
411
- '''Enter the existing custom tag keys for custom applications in your system.'''
406
+ '''Displays the custom tag keys for custom applications in your system that you have specified in the investigation group.'''
412
407
  return typing.cast(typing.Optional[typing.List[builtins.str]], jsii.get(self, "tagKeyBoundaries"))
413
408
 
414
409
  @tag_key_boundaries.setter
@@ -424,7 +419,7 @@ class CfnInvestigationGroup(
424
419
  @builtins.property
425
420
  @jsii.member(jsii_name="tags")
426
421
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
427
- '''A list of key-value pairs to associate with the investigation group.'''
422
+ '''The list of key-value pairs to associate with the resource.'''
428
423
  return typing.cast(typing.Optional[typing.List[_CfnTag_f6864754]], jsii.get(self, "tags"))
429
424
 
430
425
  @tags.setter
@@ -449,12 +444,12 @@ class CfnInvestigationGroup(
449
444
  chat_configuration_arns: typing.Optional[typing.Sequence[builtins.str]] = None,
450
445
  sns_topic_arn: typing.Optional[builtins.str] = None,
451
446
  ) -> None:
452
- '''This structure is a string array.
447
+ '''Use this structure to integrate CloudWatch investigations with chat applications.
453
448
 
454
- The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of Amazon Q in chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
449
+ This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
455
450
 
456
- :param chat_configuration_arns:
457
- :param sns_topic_arn:
451
+ :param chat_configuration_arns: Returns the Amazon Resource Name (ARN) of any third-party chat integrations configured for the account.
452
+ :param sns_topic_arn: Returns the ARN of an Amazon SNS topic used for third-party chat integrations.
458
453
 
459
454
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-chatbotnotificationchannel.html
460
455
  :exampleMetadata: fixture=_generated
@@ -482,7 +477,8 @@ class CfnInvestigationGroup(
482
477
 
483
478
  @builtins.property
484
479
  def chat_configuration_arns(self) -> typing.Optional[typing.List[builtins.str]]:
485
- '''
480
+ '''Returns the Amazon Resource Name (ARN) of any third-party chat integrations configured for the account.
481
+
486
482
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-chatbotnotificationchannel.html#cfn-aiops-investigationgroup-chatbotnotificationchannel-chatconfigurationarns
487
483
  '''
488
484
  result = self._values.get("chat_configuration_arns")
@@ -490,7 +486,8 @@ class CfnInvestigationGroup(
490
486
 
491
487
  @builtins.property
492
488
  def sns_topic_arn(self) -> typing.Optional[builtins.str]:
493
- '''
489
+ '''Returns the ARN of an Amazon SNS topic used for third-party chat integrations.
490
+
494
491
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-chatbotnotificationchannel.html#cfn-aiops-investigationgroup-chatbotnotificationchannel-snstopicarn
495
492
  '''
496
493
  result = self._values.get("sns_topic_arn")
@@ -518,8 +515,9 @@ class CfnInvestigationGroup(
518
515
  *,
519
516
  source_role_arn: typing.Optional[builtins.str] = None,
520
517
  ) -> None:
521
- '''
522
- :param source_role_arn: The Investigation Role's ARN.
518
+ '''This structure contains information about the cross-account configuration in the account.
519
+
520
+ :param source_role_arn: The ARN of an existing role which will be used to do investigations on your behalf.
523
521
 
524
522
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-crossaccountconfiguration.html
525
523
  :exampleMetadata: fixture=_generated
@@ -543,7 +541,7 @@ class CfnInvestigationGroup(
543
541
 
544
542
  @builtins.property
545
543
  def source_role_arn(self) -> typing.Optional[builtins.str]:
546
- '''The Investigation Role's ARN.
544
+ '''The ARN of an existing role which will be used to do investigations on your behalf.
547
545
 
548
546
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-crossaccountconfiguration.html#cfn-aiops-investigationgroup-crossaccountconfiguration-sourcerolearn
549
547
  '''
@@ -576,8 +574,11 @@ class CfnInvestigationGroup(
576
574
  encryption_configuration_type: typing.Optional[builtins.str] = None,
577
575
  kms_key_id: typing.Optional[builtins.str] = None,
578
576
  ) -> None:
579
- '''
580
- :param encryption_configuration_type:
577
+ '''Use this structure if you want to use a customer managed AWS KMS key to encrypt your investigation data.
578
+
579
+ If you omit this parameter, CloudWatch investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
580
+
581
+ :param encryption_configuration_type: Displays whether investigation data is encrypted by a customer managed key or an AWS owned key.
581
582
  :param kms_key_id: If the investigation group uses a customer managed key for encryption, this field displays the ID of that key.
582
583
 
583
584
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html
@@ -606,7 +607,8 @@ class CfnInvestigationGroup(
606
607
 
607
608
  @builtins.property
608
609
  def encryption_configuration_type(self) -> typing.Optional[builtins.str]:
609
- '''
610
+ '''Displays whether investigation data is encrypted by a customer managed key or an AWS owned key.
611
+
610
612
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-aiops-investigationgroup-encryptionconfigmap.html#cfn-aiops-investigationgroup-encryptionconfigmap-encryptionconfigurationtype
611
613
  '''
612
614
  result = self._values.get("encryption_configuration_type")
@@ -666,16 +668,16 @@ class CfnInvestigationGroupProps:
666
668
  ) -> None:
667
669
  '''Properties for defining a ``CfnInvestigationGroup``.
668
670
 
669
- :param name: A name for the investigation group.
670
- :param chatbot_notification_channels: Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
671
- :param cross_account_configurations: An array of cross account configurations.
672
- :param encryption_config: Use this property to specify a customer managed AWS KMS key to encrypt your investigation data. If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
673
- :param investigation_group_policy: Investigation Group policy.
674
- :param is_cloud_trail_event_history_enabled: Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail . The default is ``true`` .
675
- :param retention_in_days: Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ . If you omit this parameter, the default of 90 days is used.
676
- :param role_arn: Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations. For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
677
- :param tag_key_boundaries: Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases. You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
678
- :param tags: A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. Tags can help you organize and categorize your resources.
671
+ :param name: Specify either the name or the ARN of the investigation group that you want to view.
672
+ :param chatbot_notification_channels: Use this property to integrate CloudWatch investigations with chat applications. This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
673
+ :param cross_account_configurations: Number of ``sourceAccountId`` values that have been configured for cross-account access.
674
+ :param encryption_config: Specifies the customer managed AWS KMS key that the investigation group uses to encrypt data, if there is one. If not, the investigation group uses an AWS key to encrypt the data.
675
+ :param investigation_group_policy: Returns the IAM resource policy that is associated with the specified investigation group.
676
+ :param is_cloud_trail_event_history_enabled: Specify ``true`` to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is ``true`` .
677
+ :param retention_in_days: Specifies how long that investigation data is kept.
678
+ :param role_arn: The ARN of the IAM role that the investigation group uses for permissions to gather data.
679
+ :param tag_key_boundaries: Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources.
680
+ :param tags: The list of key-value pairs to associate with the resource.
679
681
 
680
682
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html
681
683
  :exampleMetadata: fixture=_generated
@@ -748,7 +750,7 @@ class CfnInvestigationGroupProps:
748
750
 
749
751
  @builtins.property
750
752
  def name(self) -> builtins.str:
751
- '''A name for the investigation group.
753
+ '''Specify either the name or the ARN of the investigation group that you want to view.
752
754
 
753
755
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-name
754
756
  '''
@@ -760,9 +762,9 @@ class CfnInvestigationGroupProps:
760
762
  def chatbot_notification_channels(
761
763
  self,
762
764
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.ChatbotNotificationChannelProperty]]]]:
763
- '''Use this property to integrate Amazon Q Developer operational investigations with Amazon Q in chat applications.
765
+ '''Use this property to integrate CloudWatch investigations with chat applications.
764
766
 
765
- This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
767
+ This property is an array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see `Getting started with Amazon Q in chat applications <https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html>`_ and `Resource type defined by AWS Chatbot <https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies>`_ .
766
768
 
767
769
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-chatbotnotificationchannels
768
770
  '''
@@ -773,7 +775,7 @@ class CfnInvestigationGroupProps:
773
775
  def cross_account_configurations(
774
776
  self,
775
777
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, typing.List[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.CrossAccountConfigurationProperty]]]]:
776
- '''An array of cross account configurations.
778
+ '''Number of ``sourceAccountId`` values that have been configured for cross-account access.
777
779
 
778
780
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-crossaccountconfigurations
779
781
  '''
@@ -784,9 +786,9 @@ class CfnInvestigationGroupProps:
784
786
  def encryption_config(
785
787
  self,
786
788
  ) -> typing.Optional[typing.Union[_IResolvable_da3f097b, CfnInvestigationGroup.EncryptionConfigMapProperty]]:
787
- '''Use this property to specify a customer managed AWS KMS key to encrypt your investigation data.
789
+ '''Specifies the customer managed AWS KMS key that the investigation group uses to encrypt data, if there is one.
788
790
 
789
- If you omit this property, Amazon Q Developer operational investigations will use an AWS key to encrypt the data. For more information, see `Encryption of investigation data <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS>`_ .
791
+ If not, the investigation group uses an AWS key to encrypt the data.
790
792
 
791
793
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-encryptionconfig
792
794
  '''
@@ -795,7 +797,7 @@ class CfnInvestigationGroupProps:
795
797
 
796
798
  @builtins.property
797
799
  def investigation_group_policy(self) -> typing.Optional[builtins.str]:
798
- '''Investigation Group policy.
800
+ '''Returns the IAM resource policy that is associated with the specified investigation group.
799
801
 
800
802
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-investigationgrouppolicy
801
803
  '''
@@ -806,7 +808,7 @@ class CfnInvestigationGroupProps:
806
808
  def is_cloud_trail_event_history_enabled(
807
809
  self,
808
810
  ) -> typing.Optional[typing.Union[builtins.bool, _IResolvable_da3f097b]]:
809
- '''Specify ``true`` to enable Amazon Q Developer operational investigations to have access to change events that are recorded by CloudTrail .
811
+ '''Specify ``true`` to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail.
810
812
 
811
813
  The default is ``true`` .
812
814
 
@@ -817,9 +819,7 @@ class CfnInvestigationGroupProps:
817
819
 
818
820
  @builtins.property
819
821
  def retention_in_days(self) -> typing.Optional[jsii.Number]:
820
- '''Specify how long that investigation data is kept. For more information, see `Operational investigation data retention <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Retention.html>`_ .
821
-
822
- If you omit this parameter, the default of 90 days is used.
822
+ '''Specifies how long that investigation data is kept.
823
823
 
824
824
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-retentionindays
825
825
  '''
@@ -828,11 +828,7 @@ class CfnInvestigationGroupProps:
828
828
 
829
829
  @builtins.property
830
830
  def role_arn(self) -> typing.Optional[builtins.str]:
831
- '''Specify the ARN of the IAM role that Amazon Q Developer operational investigations will use when it gathers investigation data.
832
-
833
- The permissions in this role determine which of your resources that Amazon Q Developer operational investigations will have access to during investigations.
834
-
835
- For more information, see `How to control what data Amazon Q has access to during investigations <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data>`_ .
831
+ '''The ARN of the IAM role that the investigation group uses for permissions to gather data.
836
832
 
837
833
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-rolearn
838
834
  '''
@@ -841,11 +837,9 @@ class CfnInvestigationGroupProps:
841
837
 
842
838
  @builtins.property
843
839
  def tag_key_boundaries(self) -> typing.Optional[typing.List[builtins.str]]:
844
- '''Enter the existing custom tag keys for custom applications in your system.
845
-
846
- Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.
840
+ '''Displays the custom tag keys for custom applications in your system that you have specified in the investigation group.
847
841
 
848
- You don't need to enter tags created by myApplications or AWS CloudFormation , because Amazon Q can automatically detect those tags.
842
+ Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources.
849
843
 
850
844
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tagkeyboundaries
851
845
  '''
@@ -854,11 +848,7 @@ class CfnInvestigationGroupProps:
854
848
 
855
849
  @builtins.property
856
850
  def tags(self) -> typing.Optional[typing.List[_CfnTag_f6864754]]:
857
- '''A list of key-value pairs to associate with the investigation group.
858
-
859
- You can associate as many as 50 tags with an investigation group.
860
-
861
- Tags can help you organize and categorize your resources.
851
+ '''The list of key-value pairs to associate with the resource.
862
852
 
863
853
  :see: http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-aiops-investigationgroup.html#cfn-aiops-investigationgroup-tags
864
854
  '''