aws amscm --profile saml --region us-east-1 create-rfc --change-type-id "ct-0cyqd7laxyhlm" --change-type-version "1.0" --title 'CloudWatch LogGroup' --description "CloudWatch LogGroup" --execution-parameters "{\"Description\":\"My Test LogGroup\",\"VpcId\":\"VPC_ID\",...
CloudWatch Logs supports only symmetric KMS keys. Do not associate an asymmetric KMS key with your log group. For more information, seeUsing Symmetric and Asymmetric Keys. Request Syntax {"kmsKeyId": "string", "logGroupClass": "string", "logGroupName": "string", "tags":{"string" : "st...
cloudwatch_log_group_kms_key_id If a KMS Key ARN is set, this key will be used to encrypt the corresponding log group. Please be sure that the KMS Key has an appropriate key policy (https://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/encrypt-log-data-kms.html) string null no clo...
aws_cloudwatch_log_group.this resource aws_ec2_tag.cluster_primary_security_group resource aws_eks_addon.before_compute resource aws_eks_addon.this resource aws_eks_cluster.this resource aws_eks_identity_provider_config.this resource aws_iam_openid_connect_provider.oidc_provider resource aws_iam_poli...
[ "cloudwatch:PutMetricData", "ecr:BatchCheckLayerAvailability", "ecr:BatchGetImage", "ecr:GetAuthorizationToken", "ecr:GetDownloadUrlForLayer", "logs:CreateLogGroup", "logs:CreateLogStream", "logs:DescribeLogStreams", "logs:PutLogEvents", "sagemaker:*Job*" ], ...
"cloudwatch:PutMetricData", "ecr:BatchCheckLayerAvailability", "ecr:BatchGetImage", "ecr:GetAuthorizationToken", "ecr:GetDownloadUrlForLayer", "logs:CreateLogGroup", "logs:CreateLogStream", "logs:DescribeLogStreams", "logs:PutLogEvents", ...
I also created a third statement to allow access to CloudWatch Logs so that the Lambda function can create a log group. This is required because thelogs:CreateLogGroupaction supports only wildcard element names. I used the same elements as for the DynamoDB statement...
AlertsListByResourceGroupNextOptionalParams AlertsListByResourceGroupNextResponse AlertsListByResourceGroupOptionalParams AlertsListByResourceGroupResponse AlertsListNextOptionalParams AlertsListNextResponse AlertsListOptionalParams AlertsListResourceGroupLevelByRegionNextOptionalParams AlertsListResourceGroupLevelByRegion...
AlertsListByResourceGroupNextOptionalParams AlertsListByResourceGroupNextResponse AlertsListByResourceGroupOptionalParams AlertsListByResourceGroupResponse AlertsListNextOptionalParams AlertsListNextResponse AlertsListOptionalParams AlertsListResourceGroupLevelByRegionNextOptionalParams AlertsListResourceGroupLevelByRegionN...
To view your CloudWatch logs Open the Alexa developer console and log in. In the list of your skills, click the name of the skill that you want to view. Click the Code tab. In the toolbar, click the arrow next to the Logs icon, and then choose your region. The AWS console opens...