Skip to content

Commit a6bfd35

Browse files
Adding support for RDS on Dedicated Local Zones, including local backup target, snapshot availability zone and snapshot target
This Feature Adds Support for the "et-EE" Locale for Batch Operations Add support for iterative DNS queries through the new INBOUND_DELEGATION endpoint. Add delegation support through the Outbound Endpoints with DELEGATE rules. Adds support for cross account investigations for CloudWatch investigations AI Operations (AIOps). Add Paginator for DescribeAccountLimits, and fix Paginators for DescribeTrustStoreAssociations, DescribeTrustStoreRevocations, and DescribeTrustStores This release allows you to create and register AMIs while maintaining their underlying EBS snapshots within Local Zones. We are making ListFoundationModelAgreementOffers, DeleteFoundationModelAgreement, CreateFoundationModelAgreement, GetFoundationModelAvailability, PutUseCaseForModelAccess and GetUseCaseForModelAccess APIs public, previously they were console. Add support for UDP ping beacons to ListLocations API, including new PingBeacon and UDPEndpoint data types within its Locations return value. Use UDP ping beacon endpoints to help measure real-time network latency for multiplayer games. AWS License Manager now supports license type conversions for AWS Marketplace products. Customers can provide Marketplace codes in the source license context or destination license context in the CreateLicenseConversionTaskForResource requests. Add userdataType to LaunchTemplateSpecification and LaunchTemplateSpecificationOverride.
1 parent c68bdcf commit a6bfd35

File tree

259 files changed

+8048
-2997
lines changed

Some content is hidden

Large Commits have some content hidden by default. Use the searchbox below for content that may be hidden.

259 files changed

+8048
-2997
lines changed

VERSION

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -1 +1 @@
1-
1.11.594
1+
1.11.595

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/AIOpsClient.h

Lines changed: 18 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -16,14 +16,13 @@ namespace Aws
1616
namespace AIOps
1717
{
1818
/**
19-
* <p>The Amazon Q Developer operational investigations feature is a generative
20-
* AI-powered assistant that can help you respond to incidents in your system. It
21-
* uses generative AI to scan your system's telemetry and quickly surface
22-
* suggestions that might be related to your issue. These suggestions include
23-
* metrics, logs, deployment events, and root-cause hypotheses. </p> <p>You can use
24-
* API actions to create, manage, and delete investigation groups and investigation
25-
* group policies. To start and manage investigations, you must use the CloudWatch
26-
* console.</p>
19+
* <p>The CloudWatch investigations feature is a generative AI-powered assistant
20+
* that can help you respond to incidents in your system. It uses generative AI to
21+
* scan your system's telemetry and quickly surface suggestions that might be
22+
* related to your issue. These suggestions include metrics, logs, deployment
23+
* events, and root-cause hypotheses. </p> <p>You can use API actions to create,
24+
* manage, and delete investigation groups and investigation group policies. To
25+
* start and manage investigations, you must use the CloudWatch console.</p>
2726
*/
2827
class AWS_AIOPS_API AIOpsClient : public Aws::Client::AWSJsonClient, public Aws::Client::ClientWithAsyncTemplateMethods<AIOpsClient>
2928
{
@@ -94,19 +93,18 @@ namespace AIOps
9493
* investigations and their data are retained by default.</p> </li> </ul>
9594
* <p>Currently, you can have one investigation group in each Region in your
9695
* account. Each investigation in a Region is a part of the investigation group in
97-
* that Region</p> <p>To create an investigation group and set up Amazon Q
98-
* Developer operational investigations, you must be signed in to an IAM principal
99-
* that has the either the <code>AIOpsConsoleAdminPolicy</code> or the
100-
* <code>AdministratorAccess</code> IAM policy attached, or to an account that has
101-
* similar permissions.</p> <p>You can configure CloudWatch alarms to
102-
* start investigations and add events to investigations. If you create your
103-
* investigation group with <code>CreateInvestigationGroup</code> and you want to
104-
* enable alarms to do this, you must use <a
96+
* that Region</p> <p>To create an investigation group and set up CloudWatch
97+
* investigations, you must be signed in to an IAM principal that has the either
98+
* the <code>AIOpsConsoleAdminPolicy</code> or the <code>AdministratorAccess</code>
99+
* IAM policy attached, or to an account that has similar permissions.</p>
100+
* <p>You can configure CloudWatch alarms to start investigations and
101+
* add events to investigations. If you create your investigation group with
102+
* <code>CreateInvestigationGroup</code> and you want to enable alarms to do this,
103+
* you must use <a
105104
* href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_PutInvestigationGroupPolicy.html">PutInvestigationGroupPolicy</a>
106105
* to create a resource policy that grants this permission to CloudWatch alarms.
107106
* </p> <p>For more information about configuring CloudWatch alarms to work with
108-
* Amazon Q Developer operational investigations, see </p> <p><h3>See
109-
* Also:</h3> <a
107+
* CloudWatch investigations, see </p> <p><h3>See Also:</h3> <a
110108
* href="http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/CreateInvestigationGroup">AWS
111109
* API Reference</a></p>
112110
*/
@@ -263,9 +261,8 @@ namespace AIOps
263261
}
264262

265263
/**
266-
* <p>Displays the tags associated with a Amazon Q Developer operational
267-
* investigations resource. Currently, investigation groups support
268-
* tagging.</p><p><h3>See Also:</h3> <a
264+
* <p>Displays the tags associated with a CloudWatch investigations resource.
265+
* Currently, investigation groups support tagging.</p><p><h3>See Also:</h3> <a
269266
* href="http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/ListTagsForResource">AWS
270267
* API Reference</a></p>
271268
*/

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/model/CreateInvestigationGroupRequest.h

Lines changed: 36 additions & 18 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
#include <aws/aiops/model/EncryptionConfiguration.h>
1111
#include <aws/core/utils/memory/stl/AWSMap.h>
1212
#include <aws/core/utils/memory/stl/AWSVector.h>
13+
#include <aws/aiops/model/CrossAccountConfiguration.h>
1314
#include <utility>
1415

1516
namespace Aws
@@ -37,7 +38,7 @@ namespace Model
3738

3839
///@{
3940
/**
40-
* <p>A name for the investigation group.</p>
41+
* <p>Provides a name for the investigation group.</p>
4142
*/
4243
inline const Aws::String& GetName() const { return m_name; }
4344
inline bool NameHasBeenSet() const { return m_nameHasBeenSet; }
@@ -49,11 +50,10 @@ namespace Model
4950

5051
///@{
5152
/**
52-
* <p>Specify the ARN of the IAM role that Amazon Q Developer operational
53-
* investigations will use when it gathers investigation data. The permissions in
54-
* this role determine which of your resources that Amazon Q Developer operational
55-
* investigations will have access to during investigations.</p> <p>For more
56-
* information, see <a
53+
* <p>Specify the ARN of the IAM role that CloudWatch investigations will use when
54+
* it gathers investigation data. The permissions in this role determine which of
55+
* your resources that CloudWatch investigations will have access to during
56+
* investigations.</p> <p>For more information, see <a
5757
* href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">How
5858
* to control what data Amazon Q has access to during investigations</a>.</p>
5959
*/
@@ -68,9 +68,9 @@ namespace Model
6868
///@{
6969
/**
7070
* <p>Use this structure if you want to use a customer managed KMS key to encrypt
71-
* your investigation data. If you omit this parameter, Amazon Q Developer
72-
* operational investigations will use an Amazon Web Services key to encrypt the
73-
* data. For more information, see <a
71+
* your investigation data. If you omit this parameter, CloudWatch investigations
72+
* will use an Amazon Web Services key to encrypt the data. For more information,
73+
* see <a
7474
* href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption
7575
* of investigation data</a>.</p>
7676
*/
@@ -143,12 +143,12 @@ namespace Model
143143

144144
///@{
145145
/**
146-
* <p>Use this structure to integrate Amazon Q Developer operational investigations
147-
* with Amazon Q in chat applications. This structure is a string array. For the
148-
* first string, specify the ARN of an Amazon SNS topic. For the array of strings,
149-
* specify the ARNs of one or more Amazon Q in chat applications configurations
150-
* that you want to associate with that topic. For more information about these
151-
* configuration ARNs, see <a
146+
* <p>Use this structure to integrate CloudWatch investigations with Amazon Q in
147+
* chat applications. This structure is a string array. For the first string,
148+
* specify the ARN of an Amazon SNS topic. For the array of strings, specify the
149+
* ARNs of one or more Amazon Q in chat applications configurations that you want
150+
* to associate with that topic. For more information about these configuration
151+
* ARNs, see <a
152152
* href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting
153153
* started with Amazon Q in chat applications</a> and <a
154154
* href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource
@@ -168,15 +168,30 @@ namespace Model
168168

169169
///@{
170170
/**
171-
* <p>Specify <code>true</code> to enable Amazon Q Developer operational
172-
* investigations to have access to change events that are recorded by CloudTrail.
173-
* The default is <code>true</code>.</p>
171+
* <p>Specify <code>true</code> to enable CloudWatch investigations to have access
172+
* to change events that are recorded by CloudTrail. The default is
173+
* <code>true</code>.</p>
174174
*/
175175
inline bool GetIsCloudTrailEventHistoryEnabled() const { return m_isCloudTrailEventHistoryEnabled; }
176176
inline bool IsCloudTrailEventHistoryEnabledHasBeenSet() const { return m_isCloudTrailEventHistoryEnabledHasBeenSet; }
177177
inline void SetIsCloudTrailEventHistoryEnabled(bool value) { m_isCloudTrailEventHistoryEnabledHasBeenSet = true; m_isCloudTrailEventHistoryEnabled = value; }
178178
inline CreateInvestigationGroupRequest& WithIsCloudTrailEventHistoryEnabled(bool value) { SetIsCloudTrailEventHistoryEnabled(value); return *this;}
179179
///@}
180+
181+
///@{
182+
/**
183+
* <p>Number of <code>sourceAccountId</code> values that have been configured for
184+
* cross-account access.</p>
185+
*/
186+
inline const Aws::Vector<CrossAccountConfiguration>& GetCrossAccountConfigurations() const { return m_crossAccountConfigurations; }
187+
inline bool CrossAccountConfigurationsHasBeenSet() const { return m_crossAccountConfigurationsHasBeenSet; }
188+
template<typename CrossAccountConfigurationsT = Aws::Vector<CrossAccountConfiguration>>
189+
void SetCrossAccountConfigurations(CrossAccountConfigurationsT&& value) { m_crossAccountConfigurationsHasBeenSet = true; m_crossAccountConfigurations = std::forward<CrossAccountConfigurationsT>(value); }
190+
template<typename CrossAccountConfigurationsT = Aws::Vector<CrossAccountConfiguration>>
191+
CreateInvestigationGroupRequest& WithCrossAccountConfigurations(CrossAccountConfigurationsT&& value) { SetCrossAccountConfigurations(std::forward<CrossAccountConfigurationsT>(value)); return *this;}
192+
template<typename CrossAccountConfigurationsT = CrossAccountConfiguration>
193+
CreateInvestigationGroupRequest& AddCrossAccountConfigurations(CrossAccountConfigurationsT&& value) { m_crossAccountConfigurationsHasBeenSet = true; m_crossAccountConfigurations.emplace_back(std::forward<CrossAccountConfigurationsT>(value)); return *this; }
194+
///@}
180195
private:
181196

182197
Aws::String m_name;
@@ -202,6 +217,9 @@ namespace Model
202217

203218
bool m_isCloudTrailEventHistoryEnabled{false};
204219
bool m_isCloudTrailEventHistoryEnabledHasBeenSet = false;
220+
221+
Aws::Vector<CrossAccountConfiguration> m_crossAccountConfigurations;
222+
bool m_crossAccountConfigurationsHasBeenSet = false;
205223
};
206224

207225
} // namespace Model
Lines changed: 61 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,61 @@
1+
/**
2+
* Copyright Amazon.com, Inc. or its affiliates. All Rights Reserved.
3+
* SPDX-License-Identifier: Apache-2.0.
4+
*/
5+
6+
#pragma once
7+
#include <aws/aiops/AIOps_EXPORTS.h>
8+
#include <aws/core/utils/memory/stl/AWSString.h>
9+
#include <utility>
10+
11+
namespace Aws
12+
{
13+
namespace Utils
14+
{
15+
namespace Json
16+
{
17+
class JsonValue;
18+
class JsonView;
19+
} // namespace Json
20+
} // namespace Utils
21+
namespace AIOps
22+
{
23+
namespace Model
24+
{
25+
26+
/**
27+
* <p>This structure contains information about the cross-account configuration in
28+
* the account. </p><p><h3>See Also:</h3> <a
29+
* href="http://docs.aws.amazon.com/goto/WebAPI/aiops-2018-05-10/CrossAccountConfiguration">AWS
30+
* API Reference</a></p>
31+
*/
32+
class CrossAccountConfiguration
33+
{
34+
public:
35+
AWS_AIOPS_API CrossAccountConfiguration() = default;
36+
AWS_AIOPS_API CrossAccountConfiguration(Aws::Utils::Json::JsonView jsonValue);
37+
AWS_AIOPS_API CrossAccountConfiguration& operator=(Aws::Utils::Json::JsonView jsonValue);
38+
AWS_AIOPS_API Aws::Utils::Json::JsonValue Jsonize() const;
39+
40+
41+
///@{
42+
/**
43+
* <p>The ARN of an existing role which will be used to do investigations on your
44+
* behalf. </p>
45+
*/
46+
inline const Aws::String& GetSourceRoleArn() const { return m_sourceRoleArn; }
47+
inline bool SourceRoleArnHasBeenSet() const { return m_sourceRoleArnHasBeenSet; }
48+
template<typename SourceRoleArnT = Aws::String>
49+
void SetSourceRoleArn(SourceRoleArnT&& value) { m_sourceRoleArnHasBeenSet = true; m_sourceRoleArn = std::forward<SourceRoleArnT>(value); }
50+
template<typename SourceRoleArnT = Aws::String>
51+
CrossAccountConfiguration& WithSourceRoleArn(SourceRoleArnT&& value) { SetSourceRoleArn(std::forward<SourceRoleArnT>(value)); return *this;}
52+
///@}
53+
private:
54+
55+
Aws::String m_sourceRoleArn;
56+
bool m_sourceRoleArnHasBeenSet = false;
57+
};
58+
59+
} // namespace Model
60+
} // namespace AIOps
61+
} // namespace Aws

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/model/GetInvestigationGroupResult.h

Lines changed: 21 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -10,6 +10,7 @@
1010
#include <aws/aiops/model/EncryptionConfiguration.h>
1111
#include <aws/core/utils/memory/stl/AWSMap.h>
1212
#include <aws/core/utils/memory/stl/AWSVector.h>
13+
#include <aws/aiops/model/CrossAccountConfiguration.h>
1314
#include <utility>
1415

1516
namespace Aws
@@ -177,14 +178,29 @@ namespace Model
177178

178179
///@{
179180
/**
180-
* <p>Specifies whether Amazon Q Developer operational investigationshas access to
181-
* change events that are recorded by CloudTrail.</p>
181+
* <p>Specifies whether CloudWatch investigationshas access to change events that
182+
* are recorded by CloudTrail.</p>
182183
*/
183184
inline bool GetIsCloudTrailEventHistoryEnabled() const { return m_isCloudTrailEventHistoryEnabled; }
184185
inline void SetIsCloudTrailEventHistoryEnabled(bool value) { m_isCloudTrailEventHistoryEnabledHasBeenSet = true; m_isCloudTrailEventHistoryEnabled = value; }
185186
inline GetInvestigationGroupResult& WithIsCloudTrailEventHistoryEnabled(bool value) { SetIsCloudTrailEventHistoryEnabled(value); return *this;}
186187
///@}
187188

189+
///@{
190+
/**
191+
* <p>Lists the <code>AWSAccountId</code> of the accounts configured for
192+
* cross-account access and the results of the last scan performed on each
193+
* account.</p>
194+
*/
195+
inline const Aws::Vector<CrossAccountConfiguration>& GetCrossAccountConfigurations() const { return m_crossAccountConfigurations; }
196+
template<typename CrossAccountConfigurationsT = Aws::Vector<CrossAccountConfiguration>>
197+
void SetCrossAccountConfigurations(CrossAccountConfigurationsT&& value) { m_crossAccountConfigurationsHasBeenSet = true; m_crossAccountConfigurations = std::forward<CrossAccountConfigurationsT>(value); }
198+
template<typename CrossAccountConfigurationsT = Aws::Vector<CrossAccountConfiguration>>
199+
GetInvestigationGroupResult& WithCrossAccountConfigurations(CrossAccountConfigurationsT&& value) { SetCrossAccountConfigurations(std::forward<CrossAccountConfigurationsT>(value)); return *this;}
200+
template<typename CrossAccountConfigurationsT = CrossAccountConfiguration>
201+
GetInvestigationGroupResult& AddCrossAccountConfigurations(CrossAccountConfigurationsT&& value) { m_crossAccountConfigurationsHasBeenSet = true; m_crossAccountConfigurations.emplace_back(std::forward<CrossAccountConfigurationsT>(value)); return *this; }
202+
///@}
203+
188204
///@{
189205

190206
inline const Aws::String& GetRequestId() const { return m_requestId; }
@@ -231,6 +247,9 @@ namespace Model
231247
bool m_isCloudTrailEventHistoryEnabled{false};
232248
bool m_isCloudTrailEventHistoryEnabledHasBeenSet = false;
233249

250+
Aws::Vector<CrossAccountConfiguration> m_crossAccountConfigurations;
251+
bool m_crossAccountConfigurationsHasBeenSet = false;
252+
234253
Aws::String m_requestId;
235254
bool m_requestIdHasBeenSet = false;
236255
};

generated/src/aws-cpp-sdk-aiops/include/aws/aiops/model/ListTagsForResourceRequest.h

Lines changed: 2 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -34,8 +34,8 @@ namespace Model
3434

3535
///@{
3636
/**
37-
* <p>The ARN of the Amazon Q Developer operational investigations resource that
38-
* you want to view tags for. You can use the <a
37+
* <p>The ARN of the CloudWatch investigations resource that you want to view tags
38+
* for. You can use the <a
3939
* href="https://docs.aws.amazon.com/operationalinvestigations/latest/AmazonQDeveloperOperationalInvestigationsAPIReference/API_ListInvestigationGroups.html">ListInvestigationGroups</a>
4040
* operation to find the ARNs of investigation groups.</p> <p>The ARN format for an
4141
* investigation group is

0 commit comments

Comments
 (0)