You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* or the <code>resourceIdentifier</code> parameter. You can't specify both of those parameters in the same operation.</p>
35
35
* <ul>
36
36
* <li>
37
-
* <p>Specify the <code>logGroupName</code> parameter to cause all log events stored in the log group to
37
+
* <p>Specify the <code>logGroupName</code> parameter to cause log events ingested into that log group to
38
38
* be encrypted with that key. Only the log events ingested after the key is associated are encrypted with that key.</p>
39
39
* <p>Associating a KMS key with a log group overrides any existing
40
40
* associations between the log group and a KMS key. After a KMS key is associated with a log group, all newly ingested data for the log group is encrypted
* bucket. To separate log data for each export task, specify a prefix to be used as the Amazon
46
46
* S3 key prefix for all exported objects.</p>
47
47
* <note>
48
+
* <p>We recommend that you don't regularly export to Amazon S3 as a way to continuously archive your logs. For that use case, we instaed recommend that
49
+
* you use subscriptions. For more information about subscriptions, see
50
+
* <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/Subscriptions.html">Real-time processing of log data with subscriptions</a>.</p>
51
+
* </note>
52
+
* <note>
48
53
* <p>Time-based sorting on chunks of log data inside an exported file is not guaranteed. You can
49
54
* sort the exported log field data by using Linux utilities.</p>
* <p>Returns a list of all CloudWatch Logs account policies in the account.</p>
32
+
* <p>To use this operation, you must be signed on with the correct permissions depending on the type of policy that you are retrieving information for.</p>
33
+
* <ul>
34
+
* <li>
35
+
* <p>To see data protection policies, you must have the <code>logs:GetDataProtectionPolicy</code> and
* information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_PutDeliverySource.html">PutDeliverySource</a>.</p>
40
40
* </li>
41
41
* <li>
42
-
* <p>Use <code>PutDeliveryDestination</code> to create a <i>delivery destination</i>, which is a logical object that represents the actual
42
+
* <p>Use <code>PutDeliveryDestination</code> to create a <i>delivery destination</i> in the same account of the actual delivery destination.
43
+
* The delivery destination that you create is a logical object that represents the actual
* <p>This string allows re-configuring the S3 object prefix to contain either static or variable sections. The valid variables
679
-
* to use in the suffix path will vary by each log source. See ConfigurationTemplate$allowedSuffixPathFields for
680
-
* more info on what values are supported in the suffix path for each log source.</p>
679
+
* to use in the suffix path will vary by each log source. To find the values supported for the suffix path for each log source,
680
+
* use the <a href="https://docs.aws.amazon.com/AmazonCloudWatchLogs/latest/APIReference/API_DescribeConfigurationTemplates.html">DescribeConfigurationTemplates</a> operation and check the
681
+
* <code>allowedSuffixPathFields</code> field in the response.</p>
* <p>Specify the ARN of an IAM role that CloudWatch Logs will use to create the integration. This role must have the permissions necessary to access the OpenSearch Service
6462
-
* collection to be able to create the dashboards. For more information about the permissions needed, see <a href="https://docs.aws.amazon.com/OpenSearch-Dashboards-CreateRole">Create an IAM role to access the OpenSearch Service collection</a> in the CloudWatch Logs User Guide.</p>
6484
+
* collection to be able to create the dashboards. For more information about the permissions needed, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/OpenSearch-Dashboards-CreateRole.html">Permissions that the integration needs</a> in the CloudWatch Logs User Guide.</p>
6463
6485
* @public
6464
6486
*/
6465
6487
dataSourceRoleArn: string|undefined;
6466
6488
6467
6489
/**
6468
6490
* <p>Specify the ARNs of IAM roles and IAM users who you want to grant permission to for viewing the dashboards.</p>
6469
6491
* <important>
6470
-
* <p>In addition to specifying these users here, you must also grant them the <b>CloudWatchOpenSearchDashboardsAccess</b>
6471
-
* IAM policy. For more information, see </p>
6492
+
* <p>In addition to specifying these users here, you must also grant them the <b>CloudWatchOpenSearchDashboardAccess</b>
6493
+
* IAM policy. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/OpenSearch-Dashboards-UserRoles.html">IAM policies for users</a>.</p>
0 commit comments