aws_sdk_aiops/client/
update_investigation_group.rs

1// Code generated by software.amazon.smithy.rust.codegen.smithy-rs. DO NOT EDIT.
2impl super::Client {
3    /// Constructs a fluent builder for the [`UpdateInvestigationGroup`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder) operation.
4    ///
5    /// - The fluent builder is configurable:
6    ///   - [`identifier(impl Into<String>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::identifier) / [`set_identifier(Option<String>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_identifier):<br>required: **true**<br><p>Specify either the name or the ARN of the investigation group that you want to modify.</p><br>
7    ///   - [`role_arn(impl Into<String>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::role_arn) / [`set_role_arn(Option<String>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_role_arn):<br>required: **false**<br><p>Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role.</p> <p>The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.</p> <p>For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-Security-Data">EHow to control what data Amazon Q has access to during investigations</a>.</p><br>
8    ///   - [`encryption_configuration(EncryptionConfiguration)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::encryption_configuration) / [`set_encryption_configuration(Option<EncryptionConfiguration>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_encryption_configuration):<br>required: **false**<br><p>Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see <a href="https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/Investigations-Security.html#Investigations-KMS">Encryption of investigation data</a>.</p><br>
9    ///   - [`tag_key_boundaries(impl Into<String>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::tag_key_boundaries) / [`set_tag_key_boundaries(Option<Vec::<String>>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_tag_key_boundaries):<br>required: **false**<br><p>Enter the existing custom tag keys for custom applications in your system. Resource tags help Amazon Q narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, Amazon Q can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, Amazon Q will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by Amazon Q in these cases.</p> <p>You don't need to enter tags created by myApplications or CloudFormation, because Amazon Q can automatically detect those tags.</p><br>
10    ///   - [`chatbot_notification_channel(impl Into<String>, Vec::<String>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::chatbot_notification_channel) / [`set_chatbot_notification_channel(Option<HashMap::<String, Vec::<String>>>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_chatbot_notification_channel):<br>required: **false**<br><p>Use this structure to integrate CloudWatch investigations with Amazon Q in chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more Amazon Q in chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see <a href="https://docs.aws.amazon.com/chatbot/latest/adminguide/getting-started.html">Getting started with Amazon Q in chat applications</a> and <a href="https://docs.aws.amazon.com/service-authorization/latest/reference/list_awschatbot.html#awschatbot-resources-for-iam-policies">Resource type defined by Amazon Web Services Chatbot</a>.</p><br>
11    ///   - [`is_cloud_trail_event_history_enabled(bool)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::is_cloud_trail_event_history_enabled) / [`set_is_cloud_trail_event_history_enabled(Option<bool>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_is_cloud_trail_event_history_enabled):<br>required: **false**<br><p>Specify <code>true</code> to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is <code>true</code>.</p><br>
12    ///   - [`cross_account_configurations(CrossAccountConfiguration)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::cross_account_configurations) / [`set_cross_account_configurations(Option<Vec::<CrossAccountConfiguration>>)`](crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::set_cross_account_configurations):<br>required: **false**<br><p>Used to configure cross-account access for an investigation group. It allows the investigation group to access resources in other accounts.</p><br>
13    /// - On success, responds with [`UpdateInvestigationGroupOutput`](crate::operation::update_investigation_group::UpdateInvestigationGroupOutput)
14    /// - On failure, responds with [`SdkError<UpdateInvestigationGroupError>`](crate::operation::update_investigation_group::UpdateInvestigationGroupError)
15    pub fn update_investigation_group(&self) -> crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder {
16        crate::operation::update_investigation_group::builders::UpdateInvestigationGroupFluentBuilder::new(self.handle.clone())
17    }
18}