Struct aws_sdk_synthetics::input::CreateCanaryInput
source · [−]#[non_exhaustive]pub struct CreateCanaryInput {
pub name: Option<String>,
pub code: Option<CanaryCodeInput>,
pub artifact_s3_location: Option<String>,
pub execution_role_arn: Option<String>,
pub schedule: Option<CanaryScheduleInput>,
pub run_config: Option<CanaryRunConfigInput>,
pub success_retention_period_in_days: Option<i32>,
pub failure_retention_period_in_days: Option<i32>,
pub runtime_version: Option<String>,
pub vpc_config: Option<VpcConfigInput>,
pub tags: Option<HashMap<String, String>>,
pub artifact_config: Option<ArtifactConfigInput>,
}Fields (Non-exhaustive)
This struct is marked as non-exhaustive
Struct { .. } syntax; cannot be matched against without a wildcard ..; and struct update syntax will not work.name: Option<String>The name for this canary. Be sure to give it a descriptive name that distinguishes it from other canaries in your account.
Do not include secrets or proprietary information in your canary names. The canary name makes up part of the canary ARN, and the ARN is included in outbound calls over the internet. For more information, see Security Considerations for Synthetics Canaries.
code: Option<CanaryCodeInput>A structure that includes the entry point from which the canary should start running your script. If the script is stored in an S3 bucket, the bucket name, key, and version are also included.
artifact_s3_location: Option<String>The location in Amazon S3 where Synthetics stores artifacts from the test runs of this canary. Artifacts include the log file, screenshots, and HAR files. The name of the S3 bucket can't include a period (.).
execution_role_arn: Option<String>The ARN of the IAM role to be used to run the canary. This role must already exist, and must include lambda.amazonaws.com as a principal in the trust policy. The role must also have the following permissions:
-
s3:PutObject -
s3:GetBucketLocation -
s3:ListAllMyBuckets -
cloudwatch:PutMetricData -
logs:CreateLogGroup -
logs:CreateLogStream -
logs:PutLogEvents
schedule: Option<CanaryScheduleInput>A structure that contains information about how often the canary is to run and when these test runs are to stop.
run_config: Option<CanaryRunConfigInput>A structure that contains the configuration for individual canary runs, such as timeout value.
success_retention_period_in_days: Option<i32>The number of days to retain data about successful runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
failure_retention_period_in_days: Option<i32>The number of days to retain data about failed runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
runtime_version: Option<String>Specifies the runtime version to use for the canary. For a list of valid runtime versions and more information about runtime versions, see Canary Runtime Versions.
vpc_config: Option<VpcConfigInput>If this canary is to test an endpoint in a VPC, this structure contains information about the subnet and security groups of the VPC endpoint. For more information, see Running a Canary in a VPC.
A list of key-value pairs to associate with the canary. You can associate as many as 50 tags with a canary.
Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only the resources that have certain tag values.
artifact_config: Option<ArtifactConfigInput>A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.
Implementations
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<CreateCanary, AwsErrorRetryPolicy>, BuildError>
pub async fn make_operation(
&self,
_config: &Config
) -> Result<Operation<CreateCanary, AwsErrorRetryPolicy>, BuildError>
Consumes the builder and constructs an Operation<CreateCanary>
Creates a new builder-style object to manufacture CreateCanaryInput
The name for this canary. Be sure to give it a descriptive name that distinguishes it from other canaries in your account.
Do not include secrets or proprietary information in your canary names. The canary name makes up part of the canary ARN, and the ARN is included in outbound calls over the internet. For more information, see Security Considerations for Synthetics Canaries.
A structure that includes the entry point from which the canary should start running your script. If the script is stored in an S3 bucket, the bucket name, key, and version are also included.
The location in Amazon S3 where Synthetics stores artifacts from the test runs of this canary. Artifacts include the log file, screenshots, and HAR files. The name of the S3 bucket can't include a period (.).
The ARN of the IAM role to be used to run the canary. This role must already exist, and must include lambda.amazonaws.com as a principal in the trust policy. The role must also have the following permissions:
-
s3:PutObject -
s3:GetBucketLocation -
s3:ListAllMyBuckets -
cloudwatch:PutMetricData -
logs:CreateLogGroup -
logs:CreateLogStream -
logs:PutLogEvents
A structure that contains information about how often the canary is to run and when these test runs are to stop.
A structure that contains the configuration for individual canary runs, such as timeout value.
The number of days to retain data about successful runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
The number of days to retain data about failed runs of this canary. If you omit this field, the default of 31 days is used. The valid range is 1 to 455 days.
Specifies the runtime version to use for the canary. For a list of valid runtime versions and more information about runtime versions, see Canary Runtime Versions.
If this canary is to test an endpoint in a VPC, this structure contains information about the subnet and security groups of the VPC endpoint. For more information, see Running a Canary in a VPC.
A list of key-value pairs to associate with the canary. You can associate as many as 50 tags with a canary.
Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only the resources that have certain tag values.
A structure that contains the configuration for canary artifacts, including the encryption-at-rest settings for artifacts that the canary uploads to Amazon S3.
Trait Implementations
This method tests for self and other values to be equal, and is used
by ==. Read more
This method tests for !=.
Auto Trait Implementations
impl RefUnwindSafe for CreateCanaryInput
impl Send for CreateCanaryInput
impl Sync for CreateCanaryInput
impl Unpin for CreateCanaryInput
impl UnwindSafe for CreateCanaryInput
Blanket Implementations
Mutably borrows from an owned value. Read more
Attaches the provided Subscriber to this type, returning a
WithDispatch wrapper. Read more
Attaches the current default Subscriber to this type, returning a
WithDispatch wrapper. Read more