From 8e275e0a72f1f30a9f14019262d07d8a34c4502f Mon Sep 17 00:00:00 2001
From: awstools This exception is thrown when the specified value of This exception is thrown when CloudTrail cannot find the specified channel.ChannelARN
is not
+ * valid.
The specified event data store ARN is not valid or does not map to an event data store + * in your account.
+ * * @throws {@link EventDataStoreNotFoundException} (client fault) *The specified event data store was not found.
* diff --git a/clients/client-cloudtrail/src/commands/CreateEventDataStoreCommand.ts b/clients/client-cloudtrail/src/commands/CreateEventDataStoreCommand.ts index f32d59e55eff..640a607f1774 100644 --- a/clients/client-cloudtrail/src/commands/CreateEventDataStoreCommand.ts +++ b/clients/client-cloudtrail/src/commands/CreateEventDataStoreCommand.ts @@ -150,7 +150,7 @@ export interface CreateEventDataStoreCommandOutput extends CreateEventDataStoreR *Your account has used the maximum number of event data stores.
* * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/CreateTrailCommand.ts b/clients/client-cloudtrail/src/commands/CreateTrailCommand.ts index f7fb3d519a2c..dc51c88e7499 100644 --- a/clients/client-cloudtrail/src/commands/CreateTrailCommand.ts +++ b/clients/client-cloudtrail/src/commands/CreateTrailCommand.ts @@ -103,7 +103,7 @@ export interface CreateTrailCommandOutput extends CreateTrailResponse, __Metadat * operation again. * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/DeleteEventDataStoreCommand.ts b/clients/client-cloudtrail/src/commands/DeleteEventDataStoreCommand.ts index 16205f5d2a16..b81ea0c099fb 100644 --- a/clients/client-cloudtrail/src/commands/DeleteEventDataStoreCommand.ts +++ b/clients/client-cloudtrail/src/commands/DeleteEventDataStoreCommand.ts @@ -86,7 +86,7 @@ export interface DeleteEventDataStoreCommandOutput extends DeleteEventDataStoreR *The event data store is inactive.
* * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/DeleteTrailCommand.ts b/clients/client-cloudtrail/src/commands/DeleteTrailCommand.ts index 7b90b0d71338..a27d59f8495d 100644 --- a/clients/client-cloudtrail/src/commands/DeleteTrailCommand.ts +++ b/clients/client-cloudtrail/src/commands/DeleteTrailCommand.ts @@ -77,7 +77,7 @@ export interface DeleteTrailCommandOutput extends DeleteTrailResponse, __Metadat * operation again. * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/DeregisterOrganizationDelegatedAdminCommand.ts b/clients/client-cloudtrail/src/commands/DeregisterOrganizationDelegatedAdminCommand.ts index ab316232d8e1..2ab4a56cd7f7 100644 --- a/clients/client-cloudtrail/src/commands/DeregisterOrganizationDelegatedAdminCommand.ts +++ b/clients/client-cloudtrail/src/commands/DeregisterOrganizationDelegatedAdminCommand.ts @@ -80,7 +80,7 @@ export interface DeregisterOrganizationDelegatedAdminCommandOutput * operation again. * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/GetEventSelectorsCommand.ts b/clients/client-cloudtrail/src/commands/GetEventSelectorsCommand.ts index 84e6d08faf06..f2606891726f 100644 --- a/clients/client-cloudtrail/src/commands/GetEventSelectorsCommand.ts +++ b/clients/client-cloudtrail/src/commands/GetEventSelectorsCommand.ts @@ -52,12 +52,12 @@ export interface GetEventSelectorsCommandOutput extends GetEventSelectorsRespons *- * Logging management events for trails + * Logging management events *
*- * Logging data events for trails + * Logging data events *
*This exception is thrown when the specified value of ChannelARN
is not
+ * valid.
This exception is thrown when an operation is called with a trail ARN that is not valid. * The following is the format of a trail ARN.
@@ -84,6 +88,10 @@ export interface ListTagsCommandOutput extends ListTagsResponse, __MetadataBeare *arn:aws:cloudtrail:us-east-2:123456789012:channel/01234567890
*
*
+ * @throws {@link EventDataStoreARNInvalidException} (client fault)
+ * The specified event data store ARN is not valid or does not map to an event data store + * in your account.
+ * * @throws {@link EventDataStoreNotFoundException} (client fault) *The specified event data store was not found.
* diff --git a/clients/client-cloudtrail/src/commands/PutEventSelectorsCommand.ts b/clients/client-cloudtrail/src/commands/PutEventSelectorsCommand.ts index 947a0ceba9ac..36fd78749822 100644 --- a/clients/client-cloudtrail/src/commands/PutEventSelectorsCommand.ts +++ b/clients/client-cloudtrail/src/commands/PutEventSelectorsCommand.ts @@ -34,7 +34,9 @@ export interface PutEventSelectorsCommandOutput extends PutEventSelectorsRespons * @public *Configures an event selector or advanced event selectors for your trail. Use event * selectors or advanced event selectors to specify management and data event settings for - * your trail. By default, trails created without specific event selectors are configured to + * your trail. If you want your trail to log Insights events, be sure the event selector + * enables logging of the Insights event types you want configured for your trail. For more information about logging Insights events, see Logging Insights events for trails in the CloudTrail User Guide. + * By default, trails created without specific event selectors are configured to * log all read and write management events, and no data events.
*When an event occurs in your account, CloudTrail evaluates the event selectors or
* advanced event selectors in all trails. For each trail, if the event matches any event
@@ -66,15 +68,15 @@ export interface PutEventSelectorsCommandOutput extends PutEventSelectorsRespons
* trail was created; otherwise, an InvalidHomeRegionException
exception is
* thrown.
You can configure up to five event selectors for each trail. For more information, see - * Logging management events for trails , Logging - * data events for trails , and Quotas in CloudTrail in the CloudTrail User + * Logging management events, Logging + * data events, and Quotas in CloudTrail in the CloudTrail User * Guide.
*You can add advanced event selectors, and conditions for your advanced event selectors,
* up to a maximum of 500 values for all conditions and selectors on a trail. You can use
* either AdvancedEventSelectors
or EventSelectors
, but not both. If
* you apply AdvancedEventSelectors
to a trail, any existing
* EventSelectors
are overwritten. For more information about advanced event
- * selectors, see Logging data events for trails in the CloudTrail User Guide.
arn:aws:cloudtrail:us-east-2:123456789012:channel/01234567890
*
*
+ * @throws {@link ConflictException} (client fault)
+ * This exception is thrown when the specified resource is not ready for an operation. This + * can occur when you try to run an operation on a resource before CloudTrail has time + * to fully load the resource, or because another operation is modifying the resource. If this exception occurs, wait a few minutes, and then try the + * operation again.
+ * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/PutInsightSelectorsCommand.ts b/clients/client-cloudtrail/src/commands/PutInsightSelectorsCommand.ts index 387577f1ca6d..a21947700b75 100644 --- a/clients/client-cloudtrail/src/commands/PutInsightSelectorsCommand.ts +++ b/clients/client-cloudtrail/src/commands/PutInsightSelectorsCommand.ts @@ -37,6 +37,11 @@ export interface PutInsightSelectorsCommandOutput extends PutInsightSelectorsRes * off Insights event logging, by passing an empty list of insight types. The valid Insights * event types in this release areApiErrorRateInsight
and
* ApiCallRateInsight
.
+ * To log CloudTrail Insights events on API call volume, the trail
+ * must log write
management events. To log CloudTrail
+ * Insights events on API error rate, the trail must log read
or
+ * write
management events. You can call GetEventSelectors
on a trail
+ * to check whether the trail logs management events.
This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/RemoveTagsCommand.ts b/clients/client-cloudtrail/src/commands/RemoveTagsCommand.ts index 86a57072be32..937ec41fc62a 100644 --- a/clients/client-cloudtrail/src/commands/RemoveTagsCommand.ts +++ b/clients/client-cloudtrail/src/commands/RemoveTagsCommand.ts @@ -60,6 +60,10 @@ export interface RemoveTagsCommandOutput extends RemoveTagsResponse, __MetadataB * @see {@link RemoveTagsCommandOutput} for command's `response` shape. * @see {@link CloudTrailClientResolvedConfig | config} for CloudTrailClient's `config` shape. * + * @throws {@link ChannelARNInvalidException} (client fault) + *This exception is thrown when the specified value of ChannelARN
is not
+ * valid.
This exception is thrown when CloudTrail cannot find the specified channel.
* @@ -77,6 +81,10 @@ export interface RemoveTagsCommandOutput extends RemoveTagsResponse, __MetadataB *arn:aws:cloudtrail:us-east-2:123456789012:channel/01234567890
*
*
+ * @throws {@link EventDataStoreARNInvalidException} (client fault)
+ * The specified event data store ARN is not valid or does not map to an event data store + * in your account.
+ * * @throws {@link EventDataStoreNotFoundException} (client fault) *The specified event data store was not found.
* diff --git a/clients/client-cloudtrail/src/commands/RestoreEventDataStoreCommand.ts b/clients/client-cloudtrail/src/commands/RestoreEventDataStoreCommand.ts index 7bf7b6c1a437..0c61a352e07e 100644 --- a/clients/client-cloudtrail/src/commands/RestoreEventDataStoreCommand.ts +++ b/clients/client-cloudtrail/src/commands/RestoreEventDataStoreCommand.ts @@ -108,7 +108,7 @@ export interface RestoreEventDataStoreCommandOutput extends RestoreEventDataStor *The specified event data store was not found.
* * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/StartLoggingCommand.ts b/clients/client-cloudtrail/src/commands/StartLoggingCommand.ts index 5d6e33da151d..b1717588d258 100644 --- a/clients/client-cloudtrail/src/commands/StartLoggingCommand.ts +++ b/clients/client-cloudtrail/src/commands/StartLoggingCommand.ts @@ -78,7 +78,7 @@ export interface StartLoggingCommandOutput extends StartLoggingResponse, __Metad * operation again. * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/StopLoggingCommand.ts b/clients/client-cloudtrail/src/commands/StopLoggingCommand.ts index e140e171f006..de0ee6c838c3 100644 --- a/clients/client-cloudtrail/src/commands/StopLoggingCommand.ts +++ b/clients/client-cloudtrail/src/commands/StopLoggingCommand.ts @@ -81,7 +81,7 @@ export interface StopLoggingCommandOutput extends StopLoggingResponse, __Metadat * operation again. * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/UpdateEventDataStoreCommand.ts b/clients/client-cloudtrail/src/commands/UpdateEventDataStoreCommand.ts index 2711538dc8bf..1166c64114a7 100644 --- a/clients/client-cloudtrail/src/commands/UpdateEventDataStoreCommand.ts +++ b/clients/client-cloudtrail/src/commands/UpdateEventDataStoreCommand.ts @@ -41,8 +41,7 @@ export interface UpdateEventDataStoreCommandOutput extends UpdateEventDataStoreR * includes or excludes management and data events in your event data store. For more * information aboutAdvancedEventSelectors
, see PutEventSelectorsRequest$AdvancedEventSelectors.
* For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events,
- * AdvancedEventSelectors
includes events of that type in your event data
- * store.
AdvancedEventSelectors
includes events of that type in your event data store.
* @example
* Use a bare-bones client and the command you need to make an API call.
* ```javascript
@@ -151,7 +150,7 @@ export interface UpdateEventDataStoreCommandOutput extends UpdateEventDataStoreR
* The event data store is inactive.
* * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/commands/UpdateTrailCommand.ts b/clients/client-cloudtrail/src/commands/UpdateTrailCommand.ts index 98c17c884992..184b56dba0ec 100644 --- a/clients/client-cloudtrail/src/commands/UpdateTrailCommand.ts +++ b/clients/client-cloudtrail/src/commands/UpdateTrailCommand.ts @@ -115,7 +115,7 @@ export interface UpdateTrailCommandOutput extends UpdateTrailResponse, __Metadat * operation again. * * @throws {@link InsufficientDependencyServiceAccessPermissionException} (client fault) - *This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
* diff --git a/clients/client-cloudtrail/src/models/models_0.ts b/clients/client-cloudtrail/src/models/models_0.ts index b9a40b0d9bee..b3f0a5e6dd9d 100644 --- a/clients/client-cloudtrail/src/models/models_0.ts +++ b/clients/client-cloudtrail/src/models/models_0.ts @@ -157,6 +157,32 @@ export interface AddTagsRequest { */ export interface AddTagsResponse {} +/** + * @public + *This exception is thrown when the specified value of ChannelARN
is not
+ * valid.
Brief description of the exception returned by the request.
+ */ + Message?: string; + /** + * @internal + */ + constructor(opts: __ExceptionOptionTypeThis exception is thrown when CloudTrail cannot find the specified channel.
@@ -246,6 +272,32 @@ export class ConflictException extends __BaseException { } } +/** + * @public + *The specified event data store ARN is not valid or does not map to an event data store + * in your account.
+ */ +export class EventDataStoreARNInvalidException extends __BaseException { + readonly name: "EventDataStoreARNInvalidException" = "EventDataStoreARNInvalidException"; + readonly $fault: "client" = "client"; + /** + *Brief description of the exception returned by the request.
+ */ + Message?: string; + /** + * @internal + */ + constructor(opts: __ExceptionOptionTypeThe specified event data store was not found.
@@ -632,62 +684,62 @@ export interface AdvancedFieldSelector { *
- * AWS::CloudTrail::Channel
+ * AWS::DynamoDB::Table
*
- * AWS::S3::Object
+ * AWS::Lambda::Function
*
- * AWS::Lambda::Function
+ * AWS::S3::Object
*
- * AWS::DynamoDB::Table
+ * AWS::CloudTrail::Channel
*
- * AWS::S3Outposts::Object
+ * AWS::Cognito::IdentityPool
*
- * AWS::ManagedBlockchain::Node
+ * AWS::DynamoDB::Stream
*
- * AWS::S3ObjectLambda::AccessPoint
+ * AWS::EC2::Snapshot
*
- * AWS::EC2::Snapshot
+ * AWS::FinSpace::Environment
*
- * AWS::S3::AccessPoint
+ * AWS::Glue::Table
*
- * AWS::DynamoDB::Stream
+ * AWS::GuardDuty::Detector
*
- * AWS::Glue::Table
+ * AWS::KendraRanking::ExecutionPlan
*
- * AWS::FinSpace::Environment
+ * AWS::ManagedBlockchain::Node
*
AWS::SageMaker::FeatureGroup
*
*
+ * AWS::S3::AccessPoint
+ *
+ * AWS::S3ObjectLambda::AccessPoint
+ *
+ * AWS::S3Outposts::Object
+ *
You can have only one resources.type
field per selector. To log data
* events on more than one resource type, add another selector.
When resources.type
equals AWS::S3::AccessPoint
, and the
- * operator is set to Equals
or NotEquals
, the ARN must be in
- * one of the following formats. To log events on all objects in an S3 access point, we
- * recommend that you use only the access point ARN, don’t include the object path, and
- * use the StartsWith
or NotStartsWith
operators.
When resources.type equals AWS::DynamoDB::Table
, and the operator is
+ * set to Equals
or NotEquals
, the ARN must be in the
+ * following format:
- * arn:
- *
- * arn:
+ * arn:
*
When resources.type equals AWS::DynamoDB::Table
, and the operator is
+ *
When resources.type equals AWS::CloudTrail::Channel
, and the operator is
* set to Equals
or NotEquals
, the ARN must be in the
* following format:
- * arn:
+ * arn:
*
When resources.type equals AWS::CloudTrail::Channel
, and the operator is
+ *
When resources.type equals AWS::Cognito::IdentityPool
, and the operator is
* set to Equals
or NotEquals
, the ARN must be in the
* following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::S3Outposts::Object
, and
+ *
When resources.type
equals AWS::DynamoDB::Stream
, and
* the operator is set to Equals
or NotEquals
, the ARN must be
* in the following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::ManagedBlockchain::Node
,
- * and the operator is set to Equals
or NotEquals
, the ARN
- * must be in the following format:
When resources.type
equals AWS::EC2::Snapshot
, and the
+ * operator is set to Equals
or NotEquals
, the ARN must be in
+ * the following format:
- * arn:
+ * arn:
*
When resources.type
equals
- * AWS::S3ObjectLambda::AccessPoint
, and the operator is set to
- * Equals
or NotEquals
, the ARN must be in the following
- * format:
When resources.type
equals AWS::FinSpace::Environment
,
+ * and the operator is set to Equals
or NotEquals
, the ARN
+ * must be in the following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::EC2::Snapshot
, and the
+ *
When resources.type
equals AWS::Glue::Table
, and the
* operator is set to Equals
or NotEquals
, the ARN must be in
* the following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::DynamoDB::Stream
, and
- * the operator is set to Equals
or NotEquals
, the ARN must be
- * in the following format:
When resources.type
equals AWS::GuardDuty::Detector
, and the
+ * operator is set to Equals
or NotEquals
, the ARN must be in
+ * the following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::Glue::Table
, and the
+ *
When resources.type
equals AWS::KendraRanking::ExecutionPlan
, and the
* operator is set to Equals
or NotEquals
, the ARN must be in
* the following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::FinSpace::Environment
,
+ *
When resources.type
equals AWS::ManagedBlockchain::Node
,
* and the operator is set to Equals
or NotEquals
, the ARN
* must be in the following format:
- * arn:
+ * arn:
*
When resources.type
equals AWS::S3::AccessPoint
, and the
+ * operator is set to Equals
or NotEquals
, the ARN must be in
+ * one of the following formats. To log events on all objects in an S3 access point, we
+ * recommend that you use only the access point ARN, don’t include the object path, and
+ * use the StartsWith
or NotStartsWith
operators.
+ * arn:
+ *
+ * arn:
+ *
When resources.type
equals
+ * AWS::S3ObjectLambda::AccessPoint
, and the operator is set to
+ * Equals
or NotEquals
, the ARN must be in the following
+ * format:
+ * arn:
+ *
When resources.type
equals AWS::S3Outposts::Object
, and
+ * the operator is set to Equals
or NotEquals
, the ARN must be
+ * in the following format:
+ * arn:
+ *
Advanced event selectors let you create fine-grained selectors for the following CloudTrail event record fields. They help you control costs by logging only those * events that are important to you. For more information about advanced event selectors, see - * Logging data events for trails in the CloudTrail User Guide.
+ * Logging data events in the CloudTrail User Guide. *@@ -1015,32 +1112,6 @@ export interface CancelQueryResponse { QueryStatus: QueryStatus | string | undefined; } -/** - * @public - *
The specified event data store ARN is not valid or does not map to an event data store - * in your account.
- */ -export class EventDataStoreARNInvalidException extends __BaseException { - readonly name: "EventDataStoreARNInvalidException" = "EventDataStoreARNInvalidException"; - readonly $fault: "client" = "client"; - /** - *Brief description of the exception returned by the request.
- */ - Message?: string; - /** - * @internal - */ - constructor(opts: __ExceptionOptionTypeThe specified query cannot be canceled because it is in the FINISHED
,
@@ -1190,32 +1261,6 @@ export class ChannelAlreadyExistsException extends __BaseException {
}
}
-/**
- * @public
- *
This exception is thrown when the specified value of ChannelARN
is not
- * valid.
Brief description of the exception returned by the request.
- */ - Message?: string; - /** - * @internal - */ - constructor(opts: __ExceptionOptionTypeThis exception is thrown when the specified event data store cannot yet be deleted because it @@ -1671,7 +1716,7 @@ export class EventDataStoreMaxLimitExceededException extends __BaseException { /** * @public - *
This exception is thrown when the IAM user or role that is used to create + *
This exception is thrown when the IAM identity that is used to create * the organization resource lacks one or more required permissions for creating an * organization resource in a required service.
*/ @@ -2935,8 +2980,9 @@ export interface DescribeTrailsRequest { *If one or more trail names are specified, information is returned only if the names - * match the names of trails belonging only to the current region and current account. To return information - * about a trail in another region, you must specify its trail ARN.
+ * match the names of trails belonging only to the current region and current account. To + * return information about a trail in another region, you must specify its trail + * ARN. *
- * AWS::S3::Object
+ * AWS::DynamoDB::Table
*
- * AWS::DynamoDB::Table
+ * AWS::S3::Object
*
- * AWS::S3Outposts::Object
+ * AWS::Cognito::IdentityPool
*
- * AWS::ManagedBlockchain::Node
+ * AWS::DynamoDB::Stream
*
- * AWS::S3ObjectLambda::AccessPoint
+ * AWS::EC2::Snapshot
*
- * AWS::EC2::Snapshot
+ * AWS::FinSpace::Environment
*
- * AWS::S3::AccessPoint
+ * AWS::Glue::Table
*
- * AWS::DynamoDB::Stream
+ * AWS::GuardDuty::Detector
*
- * AWS::Glue::Table
+ * AWS::KendraRanking::ExecutionPlan
*
- * AWS::FinSpace::Environment
+ * AWS::ManagedBlockchain::Node
*
AWS::SageMaker::FeatureGroup
*
*
+ * AWS::S3::AccessPoint
+ *
+ * AWS::S3ObjectLambda::AccessPoint
+ *
+ * AWS::S3Outposts::Object
+ *
A JSON string that contains a list of insight types that are logged on a trail.
+ *A JSON string that contains a list of Insights types that are logged on a trail.
*/ export interface InsightSelector { /** - *The type of insights to log on a trail. ApiCallRateInsight
and
- * ApiErrorRateInsight
are valid insight types.
The type of Insights events to log on a trail. ApiCallRateInsight
and
+ * ApiErrorRateInsight
are valid Insight types.
The ApiCallRateInsight
Insights type analyzes write-only
+ * management API calls that are aggregated per minute against a baseline API call volume.
The ApiErrorRateInsight
Insights type analyzes management
+ * API calls that result in error codes. The error is shown if the API call is
+ * unsuccessful.
AdvancedEventSelectors
or EventSelectors
, but not both. If you
* apply AdvancedEventSelectors
to a trail, any existing
* EventSelectors
are overwritten. For more information about advanced event
- * selectors, see Logging data events for trails in the CloudTrail User Guide.
+ * selectors, see Logging data events in the CloudTrail User Guide.
*/
AdvancedEventSelectors?: AdvancedEventSelector[];
}
@@ -5200,8 +5266,13 @@ export interface PutInsightSelectorsRequest {
/**
* A JSON string that contains the insight types you want to log on a trail.
- * ApiCallRateInsight
and ApiErrorRateInsight
are valid insight
+ * ApiCallRateInsight
and ApiErrorRateInsight
are valid Insight
* types.
The ApiCallRateInsight
Insights type analyzes write-only
+ * management API calls that are aggregated per minute against a baseline API call volume.
The ApiErrorRateInsight
Insights type analyzes management
+ * API calls that result in error codes. The error is shown if the API call is
+ * unsuccessful.
Advanced event selectors let you create fine-grained selectors for the following CloudTrail event record fields. They help you control costs by logging only those\n events that are important to you. For more information about advanced event selectors, see\n Logging data events for trails in the CloudTrail User Guide.
\n\n readOnly
\n
\n eventSource
\n
\n eventName
\n
\n eventCategory
\n
\n resources.type
\n
\n resources.ARN
\n
You cannot apply both event selectors and advanced event selectors to a trail.
" + "smithy.api#documentation": "Advanced event selectors let you create fine-grained selectors for the following CloudTrail event record fields. They help you control costs by logging only those\n events that are important to you. For more information about advanced event selectors, see\n Logging data events in the CloudTrail User Guide.
\n\n readOnly
\n
\n eventSource
\n
\n eventName
\n
\n eventCategory
\n
\n resources.type
\n
\n resources.ARN
\n
You cannot apply both event selectors and advanced event selectors to a trail.
" } }, "com.amazonaws.cloudtrail#AdvancedEventSelectors": { @@ -240,7 +246,7 @@ "Field": { "target": "com.amazonaws.cloudtrail#SelectorField", "traits": { - "smithy.api#documentation": "A field in a CloudTrail event record on which to filter events to be logged. For\n event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for\n selecting events as filtering is not supported.
\n For CloudTrail event records, supported fields include readOnly
,\n eventCategory
, eventSource
(for management events),\n eventName
, resources.type
, and resources.ARN
.
For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is\n eventCategory
.
\n \n readOnly
\n - Optional. Can be set to\n Equals
a value of true
or false
. If you do\n not add this field, CloudTrail logs both read
and\n write
events. A value of true
logs only\n read
events. A value of false
logs only\n write
events.
\n \n eventSource
\n - For filtering\n management events only. This can be set only to NotEquals
\n kms.amazonaws.com
.
\n \n eventName
\n - Can use any operator.\n You can use it to filter in or filter out any data event logged to CloudTrail,\n such as PutBucket
or GetSnapshotBlock
. You can have\n multiple values for this field, separated by commas.
\n \n eventCategory
\n - This is required and\n must be set to Equals
. \n
\n For CloudTrail event records, the value\n must be Management
or Data
. \n
\n For Config\n configuration items, the value must be ConfigurationItem
.\n
\n For Audit Manager evidence, the value must be Evidence
.\n
\n For non-Amazon Web Services events, the value must be ActivityAuditLog
.\n
\n \n resources.type
\n - This field is\n required for CloudTrail data events. resources.type
can only\n use the Equals
operator, and the value can be one of the\n following:
\n AWS::CloudTrail::Channel
\n
\n AWS::S3::Object
\n
\n AWS::Lambda::Function
\n
\n AWS::DynamoDB::Table
\n
\n AWS::S3Outposts::Object
\n
\n AWS::ManagedBlockchain::Node
\n
\n AWS::S3ObjectLambda::AccessPoint
\n
\n AWS::EC2::Snapshot
\n
\n AWS::S3::AccessPoint
\n
\n AWS::DynamoDB::Stream
\n
\n AWS::Glue::Table
\n
\n AWS::FinSpace::Environment
\n
\n AWS::SageMaker::ExperimentTrialComponent
\n
\n AWS::SageMaker::FeatureGroup
\n
You can have only one resources.type
field per selector. To log data\n events on more than one resource type, add another selector.
\n \n resources.ARN
\n - You can use any\n operator with resources.ARN
, but if you use Equals
or\n NotEquals
, the value must exactly match the ARN of a valid resource\n of the type you've specified in the template as the value of resources.type. For\n example, if resources.type equals AWS::S3::Object
, the ARN must be in\n one of the following formats. To log all data events for all objects in a specific S3\n bucket, use the StartsWith
operator, and include only the bucket ARN as\n the matching value.
The trailing slash is intentional; do not exclude it. Replace the text between\n less than and greater than symbols (<>) with resource-specific information.
\n\n arn:
\n
\n arn:
\n
When resources.type
equals AWS::S3::AccessPoint
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n one of the following formats. To log events on all objects in an S3 access point, we\n recommend that you use only the access point ARN, don’t include the object path, and\n use the StartsWith
or NotStartsWith
operators.
\n arn:
\n
\n arn:
\n
When resources.type equals AWS::Lambda::Function
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type equals AWS::DynamoDB::Table
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type equals AWS::CloudTrail::Channel
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type
equals AWS::S3Outposts::Object
, and\n the operator is set to Equals
or NotEquals
, the ARN must be\n in the following format:
\n arn:
\n
When resources.type
equals AWS::ManagedBlockchain::Node
,\n and the operator is set to Equals
or NotEquals
, the ARN\n must be in the following format:
\n arn:
\n
When resources.type
equals\n AWS::S3ObjectLambda::AccessPoint
, and the operator is set to\n Equals
or NotEquals
, the ARN must be in the following\n format:
\n arn:
\n
When resources.type
equals AWS::EC2::Snapshot
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n the following format:
\n arn:
\n
When resources.type
equals AWS::DynamoDB::Stream
, and\n the operator is set to Equals
or NotEquals
, the ARN must be\n in the following format:
\n arn:
\n
When resources.type
equals AWS::Glue::Table
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n the following format:
\n arn:
\n
When resources.type
equals AWS::FinSpace::Environment
,\n and the operator is set to Equals
or NotEquals
, the ARN\n must be in the following format:
\n arn:
\n
When resources.type
equals AWS::SageMaker::ExperimentTrialComponent
, and the operator is set to\n Equals
or NotEquals
, the ARN must be in the following format:
\n arn:
\n
When resources.type
equals AWS::SageMaker::FeatureGroup
, and the operator is set to\n Equals
or NotEquals
, the ARN must be in the following format:
\n arn:
\n
A field in a CloudTrail event record on which to filter events to be logged. For\n event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the field is used only for\n selecting events as filtering is not supported.
\n For CloudTrail event records, supported fields include readOnly
,\n eventCategory
, eventSource
(for management events),\n eventName
, resources.type
, and resources.ARN
.
For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events, the only supported field is\n eventCategory
.
\n \n readOnly
\n - Optional. Can be set to\n Equals
a value of true
or false
. If you do\n not add this field, CloudTrail logs both read
and\n write
events. A value of true
logs only\n read
events. A value of false
logs only\n write
events.
\n \n eventSource
\n - For filtering\n management events only. This can be set only to NotEquals
\n kms.amazonaws.com
.
\n \n eventName
\n - Can use any operator.\n You can use it to filter in or filter out any data event logged to CloudTrail,\n such as PutBucket
or GetSnapshotBlock
. You can have\n multiple values for this field, separated by commas.
\n \n eventCategory
\n - This is required and\n must be set to Equals
. \n
\n For CloudTrail event records, the value\n must be Management
or Data
. \n
\n For Config\n configuration items, the value must be ConfigurationItem
.\n
\n For Audit Manager evidence, the value must be Evidence
.\n
\n For non-Amazon Web Services events, the value must be ActivityAuditLog
.\n
\n \n resources.type
\n - This field is\n required for CloudTrail data events. resources.type
can only\n use the Equals
operator, and the value can be one of the\n following:
\n AWS::DynamoDB::Table
\n
\n AWS::Lambda::Function
\n
\n AWS::S3::Object
\n
\n AWS::CloudTrail::Channel
\n
\n AWS::Cognito::IdentityPool
\n
\n AWS::DynamoDB::Stream
\n
\n AWS::EC2::Snapshot
\n
\n AWS::FinSpace::Environment
\n
\n AWS::Glue::Table
\n
\n AWS::GuardDuty::Detector
\n
\n AWS::KendraRanking::ExecutionPlan
\n
\n AWS::ManagedBlockchain::Node
\n
\n AWS::SageMaker::ExperimentTrialComponent
\n
\n AWS::SageMaker::FeatureGroup
\n
\n AWS::S3::AccessPoint
\n
\n AWS::S3ObjectLambda::AccessPoint
\n
\n AWS::S3Outposts::Object
\n
You can have only one resources.type
field per selector. To log data\n events on more than one resource type, add another selector.
\n \n resources.ARN
\n - You can use any\n operator with resources.ARN
, but if you use Equals
or\n NotEquals
, the value must exactly match the ARN of a valid resource\n of the type you've specified in the template as the value of resources.type. For\n example, if resources.type equals AWS::S3::Object
, the ARN must be in\n one of the following formats. To log all data events for all objects in a specific S3\n bucket, use the StartsWith
operator, and include only the bucket ARN as\n the matching value.
The trailing slash is intentional; do not exclude it. Replace the text between\n less than and greater than symbols (<>) with resource-specific information.
\n\n arn:
\n
\n arn:
\n
When resources.type equals AWS::DynamoDB::Table
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type equals AWS::Lambda::Function
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type equals AWS::CloudTrail::Channel
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type equals AWS::Cognito::IdentityPool
, and the operator is\n set to Equals
or NotEquals
, the ARN must be in the\n following format:
\n arn:
\n
When resources.type
equals AWS::DynamoDB::Stream
, and\n the operator is set to Equals
or NotEquals
, the ARN must be\n in the following format:
\n arn:
\n
When resources.type
equals AWS::EC2::Snapshot
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n the following format:
\n arn:
\n
When resources.type
equals AWS::FinSpace::Environment
,\n and the operator is set to Equals
or NotEquals
, the ARN\n must be in the following format:
\n arn:
\n
When resources.type
equals AWS::Glue::Table
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n the following format:
\n arn:
\n
When resources.type
equals AWS::GuardDuty::Detector
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n the following format:
\n arn:
\n
When resources.type
equals AWS::KendraRanking::ExecutionPlan
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n the following format:
\n arn:
\n
When resources.type
equals AWS::ManagedBlockchain::Node
,\n and the operator is set to Equals
or NotEquals
, the ARN\n must be in the following format:
\n arn:
\n
When resources.type
equals AWS::SageMaker::ExperimentTrialComponent
, and the operator is set to\n Equals
or NotEquals
, the ARN must be in the following format:
\n arn:
\n
When resources.type
equals AWS::SageMaker::FeatureGroup
, and the operator is set to\n Equals
or NotEquals
, the ARN must be in the following format:
\n arn:
\n
When resources.type
equals AWS::S3::AccessPoint
, and the\n operator is set to Equals
or NotEquals
, the ARN must be in\n one of the following formats. To log events on all objects in an S3 access point, we\n recommend that you use only the access point ARN, don’t include the object path, and\n use the StartsWith
or NotStartsWith
operators.
\n arn:
\n
\n arn:
\n
When resources.type
equals\n AWS::S3ObjectLambda::AccessPoint
, and the operator is set to\n Equals
or NotEquals
, the ARN must be in the following\n format:
\n arn:
\n
When resources.type
equals AWS::S3Outposts::Object
, and\n the operator is set to Equals
or NotEquals
, the ARN must be\n in the following format:
\n arn:
\n
The resource type in which you want to log data events. You can specify the following\n basic event selector resource types:
\n\n AWS::S3::Object
\n
\n AWS::Lambda::Function
\n
\n AWS::DynamoDB::Table
\n
The following resource types are also available through advanced\n event selectors. Basic event selector resource types are valid in advanced event selectors,\n but advanced event selector resource types are not valid in basic event selectors. For more\n information, see AdvancedFieldSelector$Field.
\n\n AWS::CloudTrail::Channel
\n
\n AWS::S3Outposts::Object
\n
\n AWS::ManagedBlockchain::Node
\n
\n AWS::S3ObjectLambda::AccessPoint
\n
\n AWS::EC2::Snapshot
\n
\n AWS::S3::AccessPoint
\n
\n AWS::DynamoDB::Stream
\n
\n AWS::Glue::Table
\n
\n AWS::FinSpace::Environment
\n
\n AWS::SageMaker::ExperimentTrialComponent
\n
\n AWS::SageMaker::FeatureGroup
\n
The resource type in which you want to log data events. You can specify the following\n basic event selector resource types:
\n\n AWS::DynamoDB::Table
\n
\n AWS::Lambda::Function
\n
\n AWS::S3::Object
\n
The following resource types are also available through advanced\n event selectors. Basic event selector resource types are valid in advanced event selectors,\n but advanced event selector resource types are not valid in basic event selectors. For more\n information, see AdvancedFieldSelector$Field.
\n\n AWS::CloudTrail::Channel
\n
\n AWS::Cognito::IdentityPool
\n
\n AWS::DynamoDB::Stream
\n
\n AWS::EC2::Snapshot
\n
\n AWS::FinSpace::Environment
\n
\n AWS::Glue::Table
\n
\n AWS::GuardDuty::Detector
\n
\n AWS::KendraRanking::ExecutionPlan
\n
\n AWS::ManagedBlockchain::Node
\n
\n AWS::SageMaker::ExperimentTrialComponent
\n
\n AWS::SageMaker::FeatureGroup
\n
\n AWS::S3::AccessPoint
\n
\n AWS::S3ObjectLambda::AccessPoint
\n
\n AWS::S3Outposts::Object
\n
Specifies a list of trail names, trail ARNs, or both, of the trails to describe. The\n format of a trail ARN is:
\n\n arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail
\n
If an empty list is specified, information for the trail in the current region is\n returned.
\nIf an empty list is specified and IncludeShadowTrails
is false, then\n information for all trails in the current region is returned.
If an empty list is specified and IncludeShadowTrails is null or true, then\n information for all trails in the current region and any associated shadow trails in\n other regions is returned.
\nIf one or more trail names are specified, information is returned only if the names\n match the names of trails belonging only to the current region and current account. To return information\n about a trail in another region, you must specify its trail ARN.
\nSpecifies a list of trail names, trail ARNs, or both, of the trails to describe. The\n format of a trail ARN is:
\n\n arn:aws:cloudtrail:us-east-2:123456789012:trail/MyTrail
\n
If an empty list is specified, information for the trail in the current region is\n returned.
\nIf an empty list is specified and IncludeShadowTrails
is false, then\n information for all trails in the current region is returned.
If an empty list is specified and IncludeShadowTrails is null or true, then\n information for all trails in the current region and any associated shadow trails in\n other regions is returned.
\nIf one or more trail names are specified, information is returned only if the names\n match the names of trails belonging only to the current region and current account. To\n return information about a trail in another region, you must specify its trail\n ARN.
\nDescribes the settings for the event selectors that you configured for your trail. The\n information returned for your event selectors includes the following:
\nIf your event selector includes read-only events, write-only events, or all\n events. This applies to both management events and data events.
\nIf your event selector includes management events.
\nIf your event selector includes data events, the resources on which you are\n logging data events.
\nFor more information about logging management and data events, see the following topics\n in the CloudTrail User Guide:
\nDescribes the settings for the event selectors that you configured for your trail. The\n information returned for your event selectors includes the following:
\nIf your event selector includes read-only events, write-only events, or all\n events. This applies to both management events and data events.
\nIf your event selector includes management events.
\nIf your event selector includes data events, the resources on which you are\n logging data events.
\nFor more information about logging management and data events, see the following topics\n in the CloudTrail User Guide:
\n\n Logging data events\n
\nThe type of insights to log on a trail. ApiCallRateInsight
and\n ApiErrorRateInsight
are valid insight types.
The type of Insights events to log on a trail. ApiCallRateInsight
and\n ApiErrorRateInsight
are valid Insight types.
The ApiCallRateInsight
Insights type analyzes write-only\n management API calls that are aggregated per minute against a baseline API call volume.
The ApiErrorRateInsight
Insights type analyzes management\n API calls that result in error codes. The error is shown if the API call is\n unsuccessful.
A JSON string that contains a list of insight types that are logged on a trail.
" + "smithy.api#documentation": "A JSON string that contains a list of Insights types that are logged on a trail.
" } }, "com.amazonaws.cloudtrail#InsightSelectors": { @@ -4737,7 +4793,7 @@ "code": "InsufficientDependencyServiceAccessPermission", "httpResponseCode": 400 }, - "smithy.api#documentation": "This exception is thrown when the IAM user or role that is used to create\n the organization resource lacks one or more required permissions for creating an\n organization resource in a required service.
", + "smithy.api#documentation": "This exception is thrown when the IAM identity that is used to create\n the organization resource lacks one or more required permissions for creating an\n organization resource in a required service.
", "smithy.api#error": "client", "smithy.api#httpError": 400 } @@ -5947,9 +6003,15 @@ "target": "com.amazonaws.cloudtrail#ListTagsResponse" }, "errors": [ + { + "target": "com.amazonaws.cloudtrail#ChannelARNInvalidException" + }, { "target": "com.amazonaws.cloudtrail#CloudTrailARNInvalidException" }, + { + "target": "com.amazonaws.cloudtrail#EventDataStoreARNInvalidException" + }, { "target": "com.amazonaws.cloudtrail#EventDataStoreNotFoundException" }, @@ -6564,6 +6626,9 @@ { "target": "com.amazonaws.cloudtrail#CloudTrailARNInvalidException" }, + { + "target": "com.amazonaws.cloudtrail#ConflictException" + }, { "target": "com.amazonaws.cloudtrail#InsufficientDependencyServiceAccessPermissionException" }, @@ -6593,7 +6658,7 @@ } ], "traits": { - "smithy.api#documentation": "Configures an event selector or advanced event selectors for your trail. Use event\n selectors or advanced event selectors to specify management and data event settings for\n your trail. By default, trails created without specific event selectors are configured to\n log all read and write management events, and no data events.
\nWhen an event occurs in your account, CloudTrail evaluates the event selectors or\n advanced event selectors in all trails. For each trail, if the event matches any event\n selector, the trail processes and logs the event. If the event doesn't match any event\n selector, the trail doesn't log the event.
\nExample
\nYou create an event selector for a trail and specify that you want write-only\n events.
\nThe EC2 GetConsoleOutput
and RunInstances
API operations\n occur in your account.
CloudTrail evaluates whether the events match your event selectors.
\nThe RunInstances
is a write-only event and it matches your event\n selector. The trail logs the event.
The GetConsoleOutput
is a read-only event that doesn't match your\n event selector. The trail doesn't log the event.
The PutEventSelectors
operation must be called from the region in which the\n trail was created; otherwise, an InvalidHomeRegionException
exception is\n thrown.
You can configure up to five event selectors for each trail. For more information, see\n Logging management events for trails , Logging\n data events for trails , and Quotas in CloudTrail in the CloudTrail User\n Guide.
\nYou can add advanced event selectors, and conditions for your advanced event selectors,\n up to a maximum of 500 values for all conditions and selectors on a trail. You can use\n either AdvancedEventSelectors
or EventSelectors
, but not both. If\n you apply AdvancedEventSelectors
to a trail, any existing\n EventSelectors
are overwritten. For more information about advanced event\n selectors, see Logging data events for trails in the CloudTrail User Guide.
Configures an event selector or advanced event selectors for your trail. Use event\n selectors or advanced event selectors to specify management and data event settings for\n your trail. If you want your trail to log Insights events, be sure the event selector \n enables logging of the Insights event types you want configured for your trail. For more information about logging Insights events, see Logging Insights events for trails in the CloudTrail User Guide.\n By default, trails created without specific event selectors are configured to\n log all read and write management events, and no data events.
\nWhen an event occurs in your account, CloudTrail evaluates the event selectors or\n advanced event selectors in all trails. For each trail, if the event matches any event\n selector, the trail processes and logs the event. If the event doesn't match any event\n selector, the trail doesn't log the event.
\nExample
\nYou create an event selector for a trail and specify that you want write-only\n events.
\nThe EC2 GetConsoleOutput
and RunInstances
API operations\n occur in your account.
CloudTrail evaluates whether the events match your event selectors.
\nThe RunInstances
is a write-only event and it matches your event\n selector. The trail logs the event.
The GetConsoleOutput
is a read-only event that doesn't match your\n event selector. The trail doesn't log the event.
The PutEventSelectors
operation must be called from the region in which the\n trail was created; otherwise, an InvalidHomeRegionException
exception is\n thrown.
You can configure up to five event selectors for each trail. For more information, see\n Logging management events, Logging\n data events, and Quotas in CloudTrail in the CloudTrail User\n Guide.
\nYou can add advanced event selectors, and conditions for your advanced event selectors,\n up to a maximum of 500 values for all conditions and selectors on a trail. You can use\n either AdvancedEventSelectors
or EventSelectors
, but not both. If\n you apply AdvancedEventSelectors
to a trail, any existing\n EventSelectors
are overwritten. For more information about advanced event\n selectors, see Logging data events in the CloudTrail User Guide.
Specifies the settings for advanced event selectors. You can add advanced event\n selectors, and conditions for your advanced event selectors, up to a maximum of 500 values\n for all conditions and selectors on a trail. You can use either\n AdvancedEventSelectors
or EventSelectors
, but not both. If you\n apply AdvancedEventSelectors
to a trail, any existing\n EventSelectors
are overwritten. For more information about advanced event\n selectors, see Logging data events for trails in the CloudTrail User Guide.
Specifies the settings for advanced event selectors. You can add advanced event\n selectors, and conditions for your advanced event selectors, up to a maximum of 500 values\n for all conditions and selectors on a trail. You can use either\n AdvancedEventSelectors
or EventSelectors
, but not both. If you\n apply AdvancedEventSelectors
to a trail, any existing\n EventSelectors
are overwritten. For more information about advanced event\n selectors, see Logging data events in the CloudTrail User Guide.
Lets you enable Insights event logging by specifying the Insights selectors that you\n want to enable on an existing trail. You also use PutInsightSelectors
to turn\n off Insights event logging, by passing an empty list of insight types. The valid Insights\n event types in this release are ApiErrorRateInsight
and\n ApiCallRateInsight
.
Lets you enable Insights event logging by specifying the Insights selectors that you\n want to enable on an existing trail. You also use PutInsightSelectors
to turn\n off Insights event logging, by passing an empty list of insight types. The valid Insights\n event types in this release are ApiErrorRateInsight
and\n ApiCallRateInsight
.
To log CloudTrail Insights events on API call volume, the trail\n must log write
management events. To log CloudTrail\n Insights events on API error rate, the trail must log read
or\n write
management events. You can call GetEventSelectors
on a trail \n to check whether the trail logs management events.
A JSON string that contains the insight types you want to log on a trail.\n ApiCallRateInsight
and ApiErrorRateInsight
are valid insight\n types.
A JSON string that contains the insight types you want to log on a trail.\n ApiCallRateInsight
and ApiErrorRateInsight
are valid Insight\n types.
The ApiCallRateInsight
Insights type analyzes write-only\n management API calls that are aggregated per minute against a baseline API call volume.
The ApiErrorRateInsight
Insights type analyzes management\n API calls that result in error codes. The error is shown if the API call is\n unsuccessful.
Updates an event data store. The required EventDataStore
value is an ARN or\n the ID portion of the ARN. Other parameters are optional, but at least one optional\n parameter must be specified, or CloudTrail throws an error.\n RetentionPeriod
is in days, and valid values are integers between 90 and\n 2557. By default, TerminationProtection
is enabled.
For event data stores for CloudTrail events, AdvancedEventSelectors
\n includes or excludes management and data events in your event data store. For more\n information about AdvancedEventSelectors
, see PutEventSelectorsRequest$AdvancedEventSelectors.
For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events,\n AdvancedEventSelectors
includes events of that type in your event data\n store.
Updates an event data store. The required EventDataStore
value is an ARN or\n the ID portion of the ARN. Other parameters are optional, but at least one optional\n parameter must be specified, or CloudTrail throws an error.\n RetentionPeriod
is in days, and valid values are integers between 90 and\n 2557. By default, TerminationProtection
is enabled.
For event data stores for CloudTrail events, AdvancedEventSelectors
\n includes or excludes management and data events in your event data store. For more\n information about AdvancedEventSelectors
, see PutEventSelectorsRequest$AdvancedEventSelectors.
For event data stores for Config configuration items, Audit Manager evidence, or non-Amazon Web Services events,\n AdvancedEventSelectors
includes events of that type in your event data store.