AIOPS
CreateInvestigationGroup
enum_EncryptionConfigurationType := [ "AWS_OWNED_KEY", "CUSTOMER_MANAGED_KMS_KEY" ]
valid {
input.Body.name == STRING
input.Body.roleArn == STRING
input.Body.encryptionConfiguration.type == enum_EncryptionConfigurationType[_]
input.Body.encryptionConfiguration.kmsKeyId == STRING
input.Body.retentionInDays == LONG
input.Body.tags.STRING == STRING
input.Body.tagKeyBoundaries[_] == STRING
input.Body.chatbotNotificationChannel.STRING[_] == STRING
input.Body.isCloudTrailEventHistoryEnabled == BOOLEAN
input.Body.crossAccountConfigurations[_].sourceRoleArn == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}DeleteInvestigationGroup
valid {
input.ReqMap.identifier == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}DeleteInvestigationGroupPolicy
valid {
input.ReqMap.identifier == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}GetInvestigationGroup
valid {
input.ReqMap.identifier == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}GetInvestigationGroupPolicy
valid {
input.ReqMap.identifier == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}ListInvestigationGroups
valid {
input.Qs.nextToken == STRING
input.Qs.maxResults == INTEGER
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}ListTagsForResource
valid {
input.ReqMap.resourceArn == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}PutInvestigationGroupPolicy
valid {
input.Body.policy == STRING
input.ReqMap.identifier == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}TagResource
valid {
input.Body.tags.STRING == STRING
input.ReqMap.resourceArn == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}UntagResource
valid {
input.ReqMap.resourceArn == STRING
input.Qs.tagKeys[_] == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}UpdateInvestigationGroup
enum_EncryptionConfigurationType := [ "AWS_OWNED_KEY", "CUSTOMER_MANAGED_KMS_KEY" ]
valid {
input.Body.roleArn == STRING
input.Body.encryptionConfiguration.type == enum_EncryptionConfigurationType[_]
input.Body.encryptionConfiguration.kmsKeyId == STRING
input.Body.tagKeyBoundaries[_] == STRING
input.Body.chatbotNotificationChannel.STRING[_] == STRING
input.Body.isCloudTrailEventHistoryEnabled == BOOLEAN
input.Body.crossAccountConfigurations[_].sourceRoleArn == STRING
input.ReqMap.identifier == STRING
input.ProviderMetadata.Account == STRING
input.ProviderMetadata.AccessKeyId == STRING
input.ProviderMetadata.Region == STRING
}Updated 5 days ago