UNPKG

57.8 kBTypeScriptView Raw
1import {Request} from '../lib/request';
2import {Response} from '../lib/response';
3import {AWSError} from '../lib/error';
4import {Service} from '../lib/service';
5import {ServiceConfigurationOptions} from '../lib/service';
6import {ConfigBase as Config} from '../lib/config';
7interface Blob {}
8declare class CloudWatchEvents extends Service {
9 /**
10 * Constructs a service object. This object has one method for each API operation.
11 */
12 constructor(options?: CloudWatchEvents.Types.ClientConfiguration)
13 config: Config & CloudWatchEvents.Types.ClientConfiguration;
14 /**
15 * Deletes the specified rule. Before you can delete the rule, you must remove all targets, using RemoveTargets. When you delete a rule, incoming events might continue to match to the deleted rule. Allow a short period of time for changes to take effect. Managed rules are rules created and managed by another AWS service on your behalf. These rules are created by those other AWS services to support functionality in those services. You can delete these rules using the Force option, but you should do so only if you are sure the other service is not still using that rule.
16 */
17 deleteRule(params: CloudWatchEvents.Types.DeleteRuleRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
18 /**
19 * Deletes the specified rule. Before you can delete the rule, you must remove all targets, using RemoveTargets. When you delete a rule, incoming events might continue to match to the deleted rule. Allow a short period of time for changes to take effect. Managed rules are rules created and managed by another AWS service on your behalf. These rules are created by those other AWS services to support functionality in those services. You can delete these rules using the Force option, but you should do so only if you are sure the other service is not still using that rule.
20 */
21 deleteRule(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
22 /**
23 * Displays the external AWS accounts that are permitted to write events to your account using your account's event bus, and the associated policy. To enable your account to receive events from other accounts, use PutPermission.
24 */
25 describeEventBus(params: CloudWatchEvents.Types.DescribeEventBusRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.DescribeEventBusResponse) => void): Request<CloudWatchEvents.Types.DescribeEventBusResponse, AWSError>;
26 /**
27 * Displays the external AWS accounts that are permitted to write events to your account using your account's event bus, and the associated policy. To enable your account to receive events from other accounts, use PutPermission.
28 */
29 describeEventBus(callback?: (err: AWSError, data: CloudWatchEvents.Types.DescribeEventBusResponse) => void): Request<CloudWatchEvents.Types.DescribeEventBusResponse, AWSError>;
30 /**
31 * Describes the specified rule. DescribeRule does not list the targets of a rule. To see the targets associated with a rule, use ListTargetsByRule.
32 */
33 describeRule(params: CloudWatchEvents.Types.DescribeRuleRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.DescribeRuleResponse) => void): Request<CloudWatchEvents.Types.DescribeRuleResponse, AWSError>;
34 /**
35 * Describes the specified rule. DescribeRule does not list the targets of a rule. To see the targets associated with a rule, use ListTargetsByRule.
36 */
37 describeRule(callback?: (err: AWSError, data: CloudWatchEvents.Types.DescribeRuleResponse) => void): Request<CloudWatchEvents.Types.DescribeRuleResponse, AWSError>;
38 /**
39 * Disables the specified rule. A disabled rule won't match any events, and won't self-trigger if it has a schedule expression. When you disable a rule, incoming events might continue to match to the disabled rule. Allow a short period of time for changes to take effect.
40 */
41 disableRule(params: CloudWatchEvents.Types.DisableRuleRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
42 /**
43 * Disables the specified rule. A disabled rule won't match any events, and won't self-trigger if it has a schedule expression. When you disable a rule, incoming events might continue to match to the disabled rule. Allow a short period of time for changes to take effect.
44 */
45 disableRule(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
46 /**
47 * Enables the specified rule. If the rule does not exist, the operation fails. When you enable a rule, incoming events might not immediately start matching to a newly enabled rule. Allow a short period of time for changes to take effect.
48 */
49 enableRule(params: CloudWatchEvents.Types.EnableRuleRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
50 /**
51 * Enables the specified rule. If the rule does not exist, the operation fails. When you enable a rule, incoming events might not immediately start matching to a newly enabled rule. Allow a short period of time for changes to take effect.
52 */
53 enableRule(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
54 /**
55 * Lists the rules for the specified target. You can see which of the rules in Amazon CloudWatch Events can invoke a specific target in your account.
56 */
57 listRuleNamesByTarget(params: CloudWatchEvents.Types.ListRuleNamesByTargetRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.ListRuleNamesByTargetResponse) => void): Request<CloudWatchEvents.Types.ListRuleNamesByTargetResponse, AWSError>;
58 /**
59 * Lists the rules for the specified target. You can see which of the rules in Amazon CloudWatch Events can invoke a specific target in your account.
60 */
61 listRuleNamesByTarget(callback?: (err: AWSError, data: CloudWatchEvents.Types.ListRuleNamesByTargetResponse) => void): Request<CloudWatchEvents.Types.ListRuleNamesByTargetResponse, AWSError>;
62 /**
63 * Lists your Amazon CloudWatch Events rules. You can either list all the rules or you can provide a prefix to match to the rule names. ListRules does not list the targets of a rule. To see the targets associated with a rule, use ListTargetsByRule.
64 */
65 listRules(params: CloudWatchEvents.Types.ListRulesRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.ListRulesResponse) => void): Request<CloudWatchEvents.Types.ListRulesResponse, AWSError>;
66 /**
67 * Lists your Amazon CloudWatch Events rules. You can either list all the rules or you can provide a prefix to match to the rule names. ListRules does not list the targets of a rule. To see the targets associated with a rule, use ListTargetsByRule.
68 */
69 listRules(callback?: (err: AWSError, data: CloudWatchEvents.Types.ListRulesResponse) => void): Request<CloudWatchEvents.Types.ListRulesResponse, AWSError>;
70 /**
71 * Displays the tags associated with a CloudWatch Events resource. In CloudWatch Events, rules can be tagged.
72 */
73 listTagsForResource(params: CloudWatchEvents.Types.ListTagsForResourceRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.ListTagsForResourceResponse) => void): Request<CloudWatchEvents.Types.ListTagsForResourceResponse, AWSError>;
74 /**
75 * Displays the tags associated with a CloudWatch Events resource. In CloudWatch Events, rules can be tagged.
76 */
77 listTagsForResource(callback?: (err: AWSError, data: CloudWatchEvents.Types.ListTagsForResourceResponse) => void): Request<CloudWatchEvents.Types.ListTagsForResourceResponse, AWSError>;
78 /**
79 * Lists the targets assigned to the specified rule.
80 */
81 listTargetsByRule(params: CloudWatchEvents.Types.ListTargetsByRuleRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.ListTargetsByRuleResponse) => void): Request<CloudWatchEvents.Types.ListTargetsByRuleResponse, AWSError>;
82 /**
83 * Lists the targets assigned to the specified rule.
84 */
85 listTargetsByRule(callback?: (err: AWSError, data: CloudWatchEvents.Types.ListTargetsByRuleResponse) => void): Request<CloudWatchEvents.Types.ListTargetsByRuleResponse, AWSError>;
86 /**
87 * Sends custom events to Amazon CloudWatch Events so that they can be matched to rules.
88 */
89 putEvents(params: CloudWatchEvents.Types.PutEventsRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.PutEventsResponse) => void): Request<CloudWatchEvents.Types.PutEventsResponse, AWSError>;
90 /**
91 * Sends custom events to Amazon CloudWatch Events so that they can be matched to rules.
92 */
93 putEvents(callback?: (err: AWSError, data: CloudWatchEvents.Types.PutEventsResponse) => void): Request<CloudWatchEvents.Types.PutEventsResponse, AWSError>;
94 /**
95 * Running PutPermission permits the specified AWS account or AWS organization to put events to your account's default event bus. CloudWatch Events rules in your account are triggered by these events arriving to your default event bus. For another account to send events to your account, that external account must have a CloudWatch Events rule with your account's default event bus as a target. To enable multiple AWS accounts to put events to your default event bus, run PutPermission once for each of these accounts. Or, if all the accounts are members of the same AWS organization, you can run PutPermission once specifying Principal as "*" and specifying the AWS organization ID in Condition, to grant permissions to all accounts in that organization. If you grant permissions using an organization, then accounts in that organization must specify a RoleArn with proper permissions when they use PutTarget to add your account's event bus as a target. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon CloudWatch Events User Guide. The permission policy on the default event bus cannot exceed 10 KB in size.
96 */
97 putPermission(params: CloudWatchEvents.Types.PutPermissionRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
98 /**
99 * Running PutPermission permits the specified AWS account or AWS organization to put events to your account's default event bus. CloudWatch Events rules in your account are triggered by these events arriving to your default event bus. For another account to send events to your account, that external account must have a CloudWatch Events rule with your account's default event bus as a target. To enable multiple AWS accounts to put events to your default event bus, run PutPermission once for each of these accounts. Or, if all the accounts are members of the same AWS organization, you can run PutPermission once specifying Principal as "*" and specifying the AWS organization ID in Condition, to grant permissions to all accounts in that organization. If you grant permissions using an organization, then accounts in that organization must specify a RoleArn with proper permissions when they use PutTarget to add your account's event bus as a target. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon CloudWatch Events User Guide. The permission policy on the default event bus cannot exceed 10 KB in size.
100 */
101 putPermission(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
102 /**
103 * Creates or updates the specified rule. Rules are enabled by default, or based on value of the state. You can disable a rule using DisableRule. If you are updating an existing rule, the rule is replaced with what you specify in this PutRule command. If you omit arguments in PutRule, the old values for those arguments are not kept. Instead, they are replaced with null values. When you create or update a rule, incoming events might not immediately start matching to new or updated rules. Allow a short period of time for changes to take effect. A rule must contain at least an EventPattern or ScheduleExpression. Rules with EventPatterns are triggered when a matching event is observed. Rules with ScheduleExpressions self-trigger based on the given schedule. A rule can have both an EventPattern and a ScheduleExpression, in which case the rule triggers on matching events as well as on a schedule. When you initially create a rule, you can optionally assign one or more tags to the rule. Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only rules with certain tag values. To use the PutRule operation and assign tags, you must have both the events:PutRule and events:TagResource permissions. If you are updating an existing rule, any tags you specify in the PutRule operation are ignored. To update the tags of an existing rule, use TagResource and UntagResource. Most services in AWS treat : or / as the same character in Amazon Resource Names (ARNs). However, CloudWatch Events uses an exact match in event patterns and rules. Be sure to use the correct ARN characters when creating event patterns so that they match the ARN syntax in the event you want to match. In CloudWatch Events, it is possible to create rules that lead to infinite loops, where a rule is fired repeatedly. For example, a rule might detect that ACLs have changed on an S3 bucket, and trigger software to change them to the desired state. If the rule is not written carefully, the subsequent change to the ACLs fires the rule again, creating an infinite loop. To prevent this, write the rules so that the triggered actions do not re-fire the same rule. For example, your rule could fire only if ACLs are found to be in a bad state, instead of after any change. An infinite loop can quickly cause higher than expected charges. We recommend that you use budgeting, which alerts you when charges exceed your specified limit. For more information, see Managing Your Costs with Budgets.
104 */
105 putRule(params: CloudWatchEvents.Types.PutRuleRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.PutRuleResponse) => void): Request<CloudWatchEvents.Types.PutRuleResponse, AWSError>;
106 /**
107 * Creates or updates the specified rule. Rules are enabled by default, or based on value of the state. You can disable a rule using DisableRule. If you are updating an existing rule, the rule is replaced with what you specify in this PutRule command. If you omit arguments in PutRule, the old values for those arguments are not kept. Instead, they are replaced with null values. When you create or update a rule, incoming events might not immediately start matching to new or updated rules. Allow a short period of time for changes to take effect. A rule must contain at least an EventPattern or ScheduleExpression. Rules with EventPatterns are triggered when a matching event is observed. Rules with ScheduleExpressions self-trigger based on the given schedule. A rule can have both an EventPattern and a ScheduleExpression, in which case the rule triggers on matching events as well as on a schedule. When you initially create a rule, you can optionally assign one or more tags to the rule. Tags can help you organize and categorize your resources. You can also use them to scope user permissions, by granting a user permission to access or change only rules with certain tag values. To use the PutRule operation and assign tags, you must have both the events:PutRule and events:TagResource permissions. If you are updating an existing rule, any tags you specify in the PutRule operation are ignored. To update the tags of an existing rule, use TagResource and UntagResource. Most services in AWS treat : or / as the same character in Amazon Resource Names (ARNs). However, CloudWatch Events uses an exact match in event patterns and rules. Be sure to use the correct ARN characters when creating event patterns so that they match the ARN syntax in the event you want to match. In CloudWatch Events, it is possible to create rules that lead to infinite loops, where a rule is fired repeatedly. For example, a rule might detect that ACLs have changed on an S3 bucket, and trigger software to change them to the desired state. If the rule is not written carefully, the subsequent change to the ACLs fires the rule again, creating an infinite loop. To prevent this, write the rules so that the triggered actions do not re-fire the same rule. For example, your rule could fire only if ACLs are found to be in a bad state, instead of after any change. An infinite loop can quickly cause higher than expected charges. We recommend that you use budgeting, which alerts you when charges exceed your specified limit. For more information, see Managing Your Costs with Budgets.
108 */
109 putRule(callback?: (err: AWSError, data: CloudWatchEvents.Types.PutRuleResponse) => void): Request<CloudWatchEvents.Types.PutRuleResponse, AWSError>;
110 /**
111 * Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for CloudWatch Events: EC2 instances SSM Run Command SSM Automation AWS Lambda functions Data streams in Amazon Kinesis Data Streams Data delivery streams in Amazon Kinesis Data Firehose Amazon ECS tasks AWS Step Functions state machines AWS Batch jobs AWS CodeBuild projects Pipelines in AWS CodePipeline Amazon Inspector assessment templates Amazon SNS topics Amazon SQS queues, including FIFO queues The default event bus of another AWS account Creating rules with built-in targets is supported only in the AWS Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon CloudWatch Events needs the appropriate permissions. For AWS Lambda and Amazon SNS resources, CloudWatch Events relies on resource-based policies. For EC2 instances, Kinesis data streams, and AWS Step Functions state machines, CloudWatch Events relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon CloudWatch Events User Guide. If another AWS account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon CloudWatch Pricing. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon CloudWatch Events User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
112 */
113 putTargets(params: CloudWatchEvents.Types.PutTargetsRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.PutTargetsResponse) => void): Request<CloudWatchEvents.Types.PutTargetsResponse, AWSError>;
114 /**
115 * Adds the specified targets to the specified rule, or updates the targets if they are already associated with the rule. Targets are the resources that are invoked when a rule is triggered. You can configure the following as targets for CloudWatch Events: EC2 instances SSM Run Command SSM Automation AWS Lambda functions Data streams in Amazon Kinesis Data Streams Data delivery streams in Amazon Kinesis Data Firehose Amazon ECS tasks AWS Step Functions state machines AWS Batch jobs AWS CodeBuild projects Pipelines in AWS CodePipeline Amazon Inspector assessment templates Amazon SNS topics Amazon SQS queues, including FIFO queues The default event bus of another AWS account Creating rules with built-in targets is supported only in the AWS Management Console. The built-in targets are EC2 CreateSnapshot API call, EC2 RebootInstances API call, EC2 StopInstances API call, and EC2 TerminateInstances API call. For some target types, PutTargets provides target-specific parameters. If the target is a Kinesis data stream, you can optionally specify which shard the event goes to by using the KinesisParameters argument. To invoke a command on multiple EC2 instances with one rule, you can use the RunCommandParameters field. To be able to make API calls against the resources that you own, Amazon CloudWatch Events needs the appropriate permissions. For AWS Lambda and Amazon SNS resources, CloudWatch Events relies on resource-based policies. For EC2 instances, Kinesis data streams, and AWS Step Functions state machines, CloudWatch Events relies on IAM roles that you specify in the RoleARN argument in PutTargets. For more information, see Authentication and Access Control in the Amazon CloudWatch Events User Guide. If another AWS account is in the same region and has granted you permission (using PutPermission), you can send events to that account. Set that account's event bus as a target of the rules in your account. To send the matched events to the other account, specify that account's event bus as the Arn value when you run PutTargets. If your account sends events to another account, your account is charged for each sent event. Each event sent to another account is charged as a custom event. The account receiving the event is not charged. For more information, see Amazon CloudWatch Pricing. If you are setting the event bus of another account as the target, and that account granted permission to your account through an organization instead of directly by the account ID, then you must specify a RoleArn with proper permissions in the Target structure. For more information, see Sending and Receiving Events Between AWS Accounts in the Amazon CloudWatch Events User Guide. For more information about enabling cross-account events, see PutPermission. Input, InputPath, and InputTransformer are mutually exclusive and optional parameters of a target. When a rule is triggered due to a matched event: If none of the following arguments are specified for a target, then the entire event is passed to the target in JSON format (unless the target is Amazon EC2 Run Command or Amazon ECS task, in which case nothing from the event is passed to the target). If Input is specified in the form of valid JSON, then the matched event is overridden with this constant. If InputPath is specified in the form of JSONPath (for example, $.detail), then only the part of the event specified in the path is passed to the target (for example, only the detail part of the event is passed). If InputTransformer is specified, then one or more specified JSONPaths are extracted from the event and used as values in a template that you specify as the input to the target. When you specify InputPath or InputTransformer, you must use JSON dot notation, not bracket notation. When you add targets to a rule and the associated rule triggers soon after, new or updated targets might not be immediately invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
116 */
117 putTargets(callback?: (err: AWSError, data: CloudWatchEvents.Types.PutTargetsResponse) => void): Request<CloudWatchEvents.Types.PutTargetsResponse, AWSError>;
118 /**
119 * Revokes the permission of another AWS account to be able to put events to your default event bus. Specify the account to revoke by the StatementId value that you associated with the account when you granted it permission with PutPermission. You can find the StatementId by using DescribeEventBus.
120 */
121 removePermission(params: CloudWatchEvents.Types.RemovePermissionRequest, callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
122 /**
123 * Revokes the permission of another AWS account to be able to put events to your default event bus. Specify the account to revoke by the StatementId value that you associated with the account when you granted it permission with PutPermission. You can find the StatementId by using DescribeEventBus.
124 */
125 removePermission(callback?: (err: AWSError, data: {}) => void): Request<{}, AWSError>;
126 /**
127 * Removes the specified targets from the specified rule. When the rule is triggered, those targets are no longer be invoked. When you remove a target, when the associated rule triggers, removed targets might continue to be invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
128 */
129 removeTargets(params: CloudWatchEvents.Types.RemoveTargetsRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.RemoveTargetsResponse) => void): Request<CloudWatchEvents.Types.RemoveTargetsResponse, AWSError>;
130 /**
131 * Removes the specified targets from the specified rule. When the rule is triggered, those targets are no longer be invoked. When you remove a target, when the associated rule triggers, removed targets might continue to be invoked. Allow a short period of time for changes to take effect. This action can partially fail if too many requests are made at the same time. If that happens, FailedEntryCount is non-zero in the response and each entry in FailedEntries provides the ID of the failed target and the error code.
132 */
133 removeTargets(callback?: (err: AWSError, data: CloudWatchEvents.Types.RemoveTargetsResponse) => void): Request<CloudWatchEvents.Types.RemoveTargetsResponse, AWSError>;
134 /**
135 * Assigns one or more tags (key-value pairs) to the specified CloudWatch Events resource. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. In CloudWatch Events, rules can be tagged. Tags don't have any semantic meaning to AWS and are interpreted strictly as strings of characters. You can use the TagResource action with a rule that already has tags. If you specify a new tag key for the rule, this tag is appended to the list of tags associated with the rule. If you specify a tag key that is already associated with the rule, the new tag value that you specify replaces the previous value for that tag. You can associate as many as 50 tags with a resource.
136 */
137 tagResource(params: CloudWatchEvents.Types.TagResourceRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.TagResourceResponse) => void): Request<CloudWatchEvents.Types.TagResourceResponse, AWSError>;
138 /**
139 * Assigns one or more tags (key-value pairs) to the specified CloudWatch Events resource. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. In CloudWatch Events, rules can be tagged. Tags don't have any semantic meaning to AWS and are interpreted strictly as strings of characters. You can use the TagResource action with a rule that already has tags. If you specify a new tag key for the rule, this tag is appended to the list of tags associated with the rule. If you specify a tag key that is already associated with the rule, the new tag value that you specify replaces the previous value for that tag. You can associate as many as 50 tags with a resource.
140 */
141 tagResource(callback?: (err: AWSError, data: CloudWatchEvents.Types.TagResourceResponse) => void): Request<CloudWatchEvents.Types.TagResourceResponse, AWSError>;
142 /**
143 * Tests whether the specified event pattern matches the provided event. Most services in AWS treat : or / as the same character in Amazon Resource Names (ARNs). However, CloudWatch Events uses an exact match in event patterns and rules. Be sure to use the correct ARN characters when creating event patterns so that they match the ARN syntax in the event you want to match.
144 */
145 testEventPattern(params: CloudWatchEvents.Types.TestEventPatternRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.TestEventPatternResponse) => void): Request<CloudWatchEvents.Types.TestEventPatternResponse, AWSError>;
146 /**
147 * Tests whether the specified event pattern matches the provided event. Most services in AWS treat : or / as the same character in Amazon Resource Names (ARNs). However, CloudWatch Events uses an exact match in event patterns and rules. Be sure to use the correct ARN characters when creating event patterns so that they match the ARN syntax in the event you want to match.
148 */
149 testEventPattern(callback?: (err: AWSError, data: CloudWatchEvents.Types.TestEventPatternResponse) => void): Request<CloudWatchEvents.Types.TestEventPatternResponse, AWSError>;
150 /**
151 * Removes one or more tags from the specified CloudWatch Events resource. In CloudWatch Events, rules can be tagged.
152 */
153 untagResource(params: CloudWatchEvents.Types.UntagResourceRequest, callback?: (err: AWSError, data: CloudWatchEvents.Types.UntagResourceResponse) => void): Request<CloudWatchEvents.Types.UntagResourceResponse, AWSError>;
154 /**
155 * Removes one or more tags from the specified CloudWatch Events resource. In CloudWatch Events, rules can be tagged.
156 */
157 untagResource(callback?: (err: AWSError, data: CloudWatchEvents.Types.UntagResourceResponse) => void): Request<CloudWatchEvents.Types.UntagResourceResponse, AWSError>;
158}
159declare namespace CloudWatchEvents {
160 export type Action = string;
161 export type Arn = string;
162 export type AssignPublicIp = "ENABLED"|"DISABLED"|string;
163 export interface AwsVpcConfiguration {
164 /**
165 * Specifies the subnets associated with the task. These subnets must all be in the same VPC. You can specify as many as 16 subnets.
166 */
167 Subnets: StringList;
168 /**
169 * Specifies the security groups associated with the task. These security groups must all be in the same VPC. You can specify as many as five security groups. If you do not specify a security group, the default security group for the VPC is used.
170 */
171 SecurityGroups?: StringList;
172 /**
173 * Specifies whether the task's elastic network interface receives a public IP address. You can specify ENABLED only when LaunchType in EcsParameters is set to FARGATE.
174 */
175 AssignPublicIp?: AssignPublicIp;
176 }
177 export interface BatchArrayProperties {
178 /**
179 * The size of the array, if this is an array batch job. Valid values are integers between 2 and 10,000.
180 */
181 Size?: Integer;
182 }
183 export interface BatchParameters {
184 /**
185 * The ARN or name of the job definition to use if the event target is an AWS Batch job. This job definition must already exist.
186 */
187 JobDefinition: String;
188 /**
189 * The name to use for this execution of the job, if the target is an AWS Batch job.
190 */
191 JobName: String;
192 /**
193 * The array properties for the submitted job, such as the size of the array. The array size can be between 2 and 10,000. If you specify array properties for a job, it becomes an array job. This parameter is used only if the target is an AWS Batch job.
194 */
195 ArrayProperties?: BatchArrayProperties;
196 /**
197 * The retry strategy to use for failed jobs, if the target is an AWS Batch job. The retry strategy is the number of times to retry the failed job execution. Valid values are 1–10. When you specify a retry strategy here, it overrides the retry strategy defined in the job definition.
198 */
199 RetryStrategy?: BatchRetryStrategy;
200 }
201 export interface BatchRetryStrategy {
202 /**
203 * The number of times to attempt to retry, if the job fails. Valid values are 1–10.
204 */
205 Attempts?: Integer;
206 }
207 export type Boolean = boolean;
208 export interface Condition {
209 /**
210 * Specifies the type of condition. Currently the only supported value is StringEquals.
211 */
212 Type: String;
213 /**
214 * Specifies the key for the condition. Currently the only supported key is aws:PrincipalOrgID.
215 */
216 Key: String;
217 /**
218 * Specifies the value for the key. Currently, this must be the ID of the organization.
219 */
220 Value: String;
221 }
222 export interface DeleteRuleRequest {
223 /**
224 * The name of the rule.
225 */
226 Name: RuleName;
227 /**
228 * If this is a managed rule, created by an AWS service on your behalf, you must specify Force as True to delete the rule. This parameter is ignored for rules that are not managed rules. You can check whether a rule is a managed rule by using DescribeRule or ListRules and checking the ManagedBy field of the response.
229 */
230 Force?: Boolean;
231 }
232 export interface DescribeEventBusRequest {
233 }
234 export interface DescribeEventBusResponse {
235 /**
236 * The name of the event bus. Currently, this is always default.
237 */
238 Name?: String;
239 /**
240 * The Amazon Resource Name (ARN) of the account permitted to write events to the current account.
241 */
242 Arn?: String;
243 /**
244 * The policy that enables the external account to send events to your account.
245 */
246 Policy?: String;
247 }
248 export interface DescribeRuleRequest {
249 /**
250 * The name of the rule.
251 */
252 Name: RuleName;
253 }
254 export interface DescribeRuleResponse {
255 /**
256 * The name of the rule.
257 */
258 Name?: RuleName;
259 /**
260 * The Amazon Resource Name (ARN) of the rule.
261 */
262 Arn?: RuleArn;
263 /**
264 * The event pattern. For more information, see Events and Event Patterns in the Amazon CloudWatch Events User Guide.
265 */
266 EventPattern?: EventPattern;
267 /**
268 * The scheduling expression. For example, "cron(0 20 * * ? *)", "rate(5 minutes)".
269 */
270 ScheduleExpression?: ScheduleExpression;
271 /**
272 * Specifies whether the rule is enabled or disabled.
273 */
274 State?: RuleState;
275 /**
276 * The description of the rule.
277 */
278 Description?: RuleDescription;
279 /**
280 * The Amazon Resource Name (ARN) of the IAM role associated with the rule.
281 */
282 RoleArn?: RoleArn;
283 /**
284 * If this is a managed rule, created by an AWS service on your behalf, this field displays the principal name of the AWS service that created the rule.
285 */
286 ManagedBy?: ManagedBy;
287 }
288 export interface DisableRuleRequest {
289 /**
290 * The name of the rule.
291 */
292 Name: RuleName;
293 }
294 export interface EcsParameters {
295 /**
296 * The ARN of the task definition to use if the event target is an Amazon ECS task.
297 */
298 TaskDefinitionArn: Arn;
299 /**
300 * The number of tasks to create based on TaskDefinition. The default is 1.
301 */
302 TaskCount?: LimitMin1;
303 /**
304 * Specifies the launch type on which your task is running. The launch type that you specify here must match one of the launch type (compatibilities) of the target task. The FARGATE value is supported only in the Regions where AWS Fargate with Amazon ECS is supported. For more information, see AWS Fargate on Amazon ECS in the Amazon Elastic Container Service Developer Guide.
305 */
306 LaunchType?: LaunchType;
307 /**
308 * Use this structure if the ECS task uses the awsvpc network mode. This structure specifies the VPC subnets and security groups associated with the task, and whether a public IP address is to be used. This structure is required if LaunchType is FARGATE because the awsvpc mode is required for Fargate tasks. If you specify NetworkConfiguration when the target ECS task does not use the awsvpc network mode, the task fails.
309 */
310 NetworkConfiguration?: NetworkConfiguration;
311 /**
312 * Specifies the platform version for the task. Specify only the numeric portion of the platform version, such as 1.1.0. This structure is used only if LaunchType is FARGATE. For more information about valid platform versions, see AWS Fargate Platform Versions in the Amazon Elastic Container Service Developer Guide.
313 */
314 PlatformVersion?: String;
315 /**
316 * Specifies an ECS task group for the task. The maximum length is 255 characters.
317 */
318 Group?: String;
319 }
320 export interface EnableRuleRequest {
321 /**
322 * The name of the rule.
323 */
324 Name: RuleName;
325 }
326 export type ErrorCode = string;
327 export type ErrorMessage = string;
328 export type EventId = string;
329 export type EventPattern = string;
330 export type EventResource = string;
331 export type EventResourceList = EventResource[];
332 export type EventTime = Date;
333 export interface InputTransformer {
334 /**
335 * Map of JSON paths to be extracted from the event. You can then insert these in the template in InputTemplate to produce the output you want to be sent to the target. InputPathsMap is an array key-value pairs, where each value is a valid JSON path. You can have as many as 10 key-value pairs. You must use JSON dot notation, not bracket notation. The keys cannot start with "AWS."
336 */
337 InputPathsMap?: TransformerPaths;
338 /**
339 * Input template where you specify placeholders that will be filled with the values of the keys from InputPathsMap to customize the data sent to the target. Enclose each InputPathsMaps value in brackets: &lt;value&gt; The InputTemplate must be valid JSON. If InputTemplate is a JSON object (surrounded by curly braces), the following restrictions apply: The placeholder cannot be used as an object key. Object values cannot include quote marks. The following example shows the syntax for using InputPathsMap and InputTemplate. "InputTransformer": { "InputPathsMap": {"instance": "$.detail.instance","status": "$.detail.status"}, "InputTemplate": "&lt;instance&gt; is in state &lt;status&gt;" } To have the InputTemplate include quote marks within a JSON string, escape each quote marks with a slash, as in the following example: "InputTransformer": { "InputPathsMap": {"instance": "$.detail.instance","status": "$.detail.status"}, "InputTemplate": "&lt;instance&gt; is in state \"&lt;status&gt;\"" }
340 */
341 InputTemplate: TransformerInput;
342 }
343 export type InputTransformerPathKey = string;
344 export type Integer = number;
345 export interface KinesisParameters {
346 /**
347 * The JSON path to be extracted from the event and used as the partition key. For more information, see Amazon Kinesis Streams Key Concepts in the Amazon Kinesis Streams Developer Guide.
348 */
349 PartitionKeyPath: TargetPartitionKeyPath;
350 }
351 export type LaunchType = "EC2"|"FARGATE"|string;
352 export type LimitMax100 = number;
353 export type LimitMin1 = number;
354 export interface ListRuleNamesByTargetRequest {
355 /**
356 * The Amazon Resource Name (ARN) of the target resource.
357 */
358 TargetArn: TargetArn;
359 /**
360 * The token returned by a previous call to retrieve the next set of results.
361 */
362 NextToken?: NextToken;
363 /**
364 * The maximum number of results to return.
365 */
366 Limit?: LimitMax100;
367 }
368 export interface ListRuleNamesByTargetResponse {
369 /**
370 * The names of the rules that can invoke the given target.
371 */
372 RuleNames?: RuleNameList;
373 /**
374 * Indicates whether there are additional results to retrieve. If there are no more results, the value is null.
375 */
376 NextToken?: NextToken;
377 }
378 export interface ListRulesRequest {
379 /**
380 * The prefix matching the rule name.
381 */
382 NamePrefix?: RuleName;
383 /**
384 * The token returned by a previous call to retrieve the next set of results.
385 */
386 NextToken?: NextToken;
387 /**
388 * The maximum number of results to return.
389 */
390 Limit?: LimitMax100;
391 }
392 export interface ListRulesResponse {
393 /**
394 * The rules that match the specified criteria.
395 */
396 Rules?: RuleResponseList;
397 /**
398 * Indicates whether there are additional results to retrieve. If there are no more results, the value is null.
399 */
400 NextToken?: NextToken;
401 }
402 export interface ListTagsForResourceRequest {
403 /**
404 * The ARN of the CloudWatch Events rule for which you want to view tags.
405 */
406 ResourceARN: Arn;
407 }
408 export interface ListTagsForResourceResponse {
409 /**
410 * The list of tag keys and values associated with the rule you specified
411 */
412 Tags?: TagList;
413 }
414 export interface ListTargetsByRuleRequest {
415 /**
416 * The name of the rule.
417 */
418 Rule: RuleName;
419 /**
420 * The token returned by a previous call to retrieve the next set of results.
421 */
422 NextToken?: NextToken;
423 /**
424 * The maximum number of results to return.
425 */
426 Limit?: LimitMax100;
427 }
428 export interface ListTargetsByRuleResponse {
429 /**
430 * The targets assigned to the rule.
431 */
432 Targets?: TargetList;
433 /**
434 * Indicates whether there are additional results to retrieve. If there are no more results, the value is null.
435 */
436 NextToken?: NextToken;
437 }
438 export type ManagedBy = string;
439 export type MessageGroupId = string;
440 export interface NetworkConfiguration {
441 /**
442 * Use this structure to specify the VPC subnets and security groups for the task, and whether a public IP address is to be used. This structure is relevant only for ECS tasks that use the awsvpc network mode.
443 */
444 awsvpcConfiguration?: AwsVpcConfiguration;
445 }
446 export type NextToken = string;
447 export type Principal = string;
448 export interface PutEventsRequest {
449 /**
450 * The entry that defines an event in your system. You can specify several parameters for the entry such as the source and type of the event, resources associated with the event, and so on.
451 */
452 Entries: PutEventsRequestEntryList;
453 }
454 export interface PutEventsRequestEntry {
455 /**
456 * The time stamp of the event, per RFC3339. If no time stamp is provided, the time stamp of the PutEvents call is used.
457 */
458 Time?: EventTime;
459 /**
460 * The source of the event. This field is required.
461 */
462 Source?: String;
463 /**
464 * AWS resources, identified by Amazon Resource Name (ARN), which the event primarily concerns. Any number, including zero, may be present.
465 */
466 Resources?: EventResourceList;
467 /**
468 * Free-form string used to decide what fields to expect in the event detail.
469 */
470 DetailType?: String;
471 /**
472 * A valid JSON string. There is no other schema imposed. The JSON string may contain fields and nested subobjects.
473 */
474 Detail?: String;
475 }
476 export type PutEventsRequestEntryList = PutEventsRequestEntry[];
477 export interface PutEventsResponse {
478 /**
479 * The number of failed entries.
480 */
481 FailedEntryCount?: Integer;
482 /**
483 * The successfully and unsuccessfully ingested events results. If the ingestion was successful, the entry has the event ID in it. Otherwise, you can use the error code and error message to identify the problem with the entry.
484 */
485 Entries?: PutEventsResultEntryList;
486 }
487 export interface PutEventsResultEntry {
488 /**
489 * The ID of the event.
490 */
491 EventId?: EventId;
492 /**
493 * The error code that indicates why the event submission failed.
494 */
495 ErrorCode?: ErrorCode;
496 /**
497 * The error message that explains why the event submission failed.
498 */
499 ErrorMessage?: ErrorMessage;
500 }
501 export type PutEventsResultEntryList = PutEventsResultEntry[];
502 export interface PutPermissionRequest {
503 /**
504 * The action that you are enabling the other account to perform. Currently, this must be events:PutEvents.
505 */
506 Action: Action;
507 /**
508 * The 12-digit AWS account ID that you are permitting to put events to your default event bus. Specify "*" to permit any account to put events to your default event bus. If you specify "*" without specifying Condition, avoid creating rules that may match undesirable events. To create more secure rules, make sure that the event pattern for each rule contains an account field with a specific account ID from which to receive events. Rules with an account field do not match any events sent from other accounts.
509 */
510 Principal: Principal;
511 /**
512 * An identifier string for the external account that you are granting permissions to. If you later want to revoke the permission for this external account, specify this StatementId when you run RemovePermission.
513 */
514 StatementId: StatementId;
515 /**
516 * This parameter enables you to limit the permission to accounts that fulfill a certain condition, such as being a member of a certain AWS organization. For more information about AWS Organizations, see What Is AWS Organizations in the AWS Organizations User Guide. If you specify Condition with an AWS organization ID, and specify "*" as the value for Principal, you grant permission to all the accounts in the named organization. The Condition is a JSON string which must contain Type, Key, and Value fields.
517 */
518 Condition?: Condition;
519 }
520 export interface PutRuleRequest {
521 /**
522 * The name of the rule that you are creating or updating.
523 */
524 Name: RuleName;
525 /**
526 * The scheduling expression. For example, "cron(0 20 * * ? *)" or "rate(5 minutes)".
527 */
528 ScheduleExpression?: ScheduleExpression;
529 /**
530 * The event pattern. For more information, see Events and Event Patterns in the Amazon CloudWatch Events User Guide.
531 */
532 EventPattern?: EventPattern;
533 /**
534 * Indicates whether the rule is enabled or disabled.
535 */
536 State?: RuleState;
537 /**
538 * A description of the rule.
539 */
540 Description?: RuleDescription;
541 /**
542 * The Amazon Resource Name (ARN) of the IAM role associated with the rule.
543 */
544 RoleArn?: RoleArn;
545 /**
546 * The list of key-value pairs to associate with the rule.
547 */
548 Tags?: TagList;
549 }
550 export interface PutRuleResponse {
551 /**
552 * The Amazon Resource Name (ARN) of the rule.
553 */
554 RuleArn?: RuleArn;
555 }
556 export interface PutTargetsRequest {
557 /**
558 * The name of the rule.
559 */
560 Rule: RuleName;
561 /**
562 * The targets to update or add to the rule.
563 */
564 Targets: TargetList;
565 }
566 export interface PutTargetsResponse {
567 /**
568 * The number of failed entries.
569 */
570 FailedEntryCount?: Integer;
571 /**
572 * The failed target entries.
573 */
574 FailedEntries?: PutTargetsResultEntryList;
575 }
576 export interface PutTargetsResultEntry {
577 /**
578 * The ID of the target.
579 */
580 TargetId?: TargetId;
581 /**
582 * The error code that indicates why the target addition failed. If the value is ConcurrentModificationException, too many requests were made at the same time.
583 */
584 ErrorCode?: ErrorCode;
585 /**
586 * The error message that explains why the target addition failed.
587 */
588 ErrorMessage?: ErrorMessage;
589 }
590 export type PutTargetsResultEntryList = PutTargetsResultEntry[];
591 export interface RemovePermissionRequest {
592 /**
593 * The statement ID corresponding to the account that is no longer allowed to put events to the default event bus.
594 */
595 StatementId: StatementId;
596 }
597 export interface RemoveTargetsRequest {
598 /**
599 * The name of the rule.
600 */
601 Rule: RuleName;
602 /**
603 * The IDs of the targets to remove from the rule.
604 */
605 Ids: TargetIdList;
606 /**
607 * If this is a managed rule, created by an AWS service on your behalf, you must specify Force as True to remove targets. This parameter is ignored for rules that are not managed rules. You can check whether a rule is a managed rule by using DescribeRule or ListRules and checking the ManagedBy field of the response.
608 */
609 Force?: Boolean;
610 }
611 export interface RemoveTargetsResponse {
612 /**
613 * The number of failed entries.
614 */
615 FailedEntryCount?: Integer;
616 /**
617 * The failed target entries.
618 */
619 FailedEntries?: RemoveTargetsResultEntryList;
620 }
621 export interface RemoveTargetsResultEntry {
622 /**
623 * The ID of the target.
624 */
625 TargetId?: TargetId;
626 /**
627 * The error code that indicates why the target removal failed. If the value is ConcurrentModificationException, too many requests were made at the same time.
628 */
629 ErrorCode?: ErrorCode;
630 /**
631 * The error message that explains why the target removal failed.
632 */
633 ErrorMessage?: ErrorMessage;
634 }
635 export type RemoveTargetsResultEntryList = RemoveTargetsResultEntry[];
636 export type RoleArn = string;
637 export interface Rule {
638 /**
639 * The name of the rule.
640 */
641 Name?: RuleName;
642 /**
643 * The Amazon Resource Name (ARN) of the rule.
644 */
645 Arn?: RuleArn;
646 /**
647 * The event pattern of the rule. For more information, see Events and Event Patterns in the Amazon CloudWatch Events User Guide.
648 */
649 EventPattern?: EventPattern;
650 /**
651 * The state of the rule.
652 */
653 State?: RuleState;
654 /**
655 * The description of the rule.
656 */
657 Description?: RuleDescription;
658 /**
659 * The scheduling expression. For example, "cron(0 20 * * ? *)", "rate(5 minutes)".
660 */
661 ScheduleExpression?: ScheduleExpression;
662 /**
663 * The Amazon Resource Name (ARN) of the role that is used for target invocation.
664 */
665 RoleArn?: RoleArn;
666 /**
667 * If the rule was created on behalf of your account by an AWS service, this field displays the principal name of the service that created the rule.
668 */
669 ManagedBy?: ManagedBy;
670 }
671 export type RuleArn = string;
672 export type RuleDescription = string;
673 export type RuleName = string;
674 export type RuleNameList = RuleName[];
675 export type RuleResponseList = Rule[];
676 export type RuleState = "ENABLED"|"DISABLED"|string;
677 export interface RunCommandParameters {
678 /**
679 * Currently, we support including only one RunCommandTarget block, which specifies either an array of InstanceIds or a tag.
680 */
681 RunCommandTargets: RunCommandTargets;
682 }
683 export interface RunCommandTarget {
684 /**
685 * Can be either tag: tag-key or InstanceIds.
686 */
687 Key: RunCommandTargetKey;
688 /**
689 * If Key is tag: tag-key, Values is a list of tag values. If Key is InstanceIds, Values is a list of Amazon EC2 instance IDs.
690 */
691 Values: RunCommandTargetValues;
692 }
693 export type RunCommandTargetKey = string;
694 export type RunCommandTargetValue = string;
695 export type RunCommandTargetValues = RunCommandTargetValue[];
696 export type RunCommandTargets = RunCommandTarget[];
697 export type ScheduleExpression = string;
698 export interface SqsParameters {
699 /**
700 * The FIFO message group ID to use as the target.
701 */
702 MessageGroupId?: MessageGroupId;
703 }
704 export type StatementId = string;
705 export type String = string;
706 export type StringList = String[];
707 export interface Tag {
708 /**
709 * A string you can use to assign a value. The combination of tag keys and values can help you organize and categorize your resources.
710 */
711 Key: TagKey;
712 /**
713 * The value for the specified tag key.
714 */
715 Value: TagValue;
716 }
717 export type TagKey = string;
718 export type TagKeyList = TagKey[];
719 export type TagList = Tag[];
720 export interface TagResourceRequest {
721 /**
722 * The ARN of the CloudWatch Events rule that you're adding tags to.
723 */
724 ResourceARN: Arn;
725 /**
726 * The list of key-value pairs to associate with the rule.
727 */
728 Tags: TagList;
729 }
730 export interface TagResourceResponse {
731 }
732 export type TagValue = string;
733 export interface Target {
734 /**
735 * The ID of the target.
736 */
737 Id: TargetId;
738 /**
739 * The Amazon Resource Name (ARN) of the target.
740 */
741 Arn: TargetArn;
742 /**
743 * The Amazon Resource Name (ARN) of the IAM role to be used for this target when the rule is triggered. If one rule triggers multiple targets, you can use a different IAM role for each target.
744 */
745 RoleArn?: RoleArn;
746 /**
747 * Valid JSON text passed to the target. In this case, nothing from the event itself is passed to the target. For more information, see The JavaScript Object Notation (JSON) Data Interchange Format.
748 */
749 Input?: TargetInput;
750 /**
751 * The value of the JSONPath that is used for extracting part of the matched event when passing it to the target. You must use JSON dot notation, not bracket notation. For more information about JSON paths, see JSONPath.
752 */
753 InputPath?: TargetInputPath;
754 /**
755 * Settings to enable you to provide custom input to a target based on certain event data. You can extract one or more key-value pairs from the event and then use that data to send customized input to the target.
756 */
757 InputTransformer?: InputTransformer;
758 /**
759 * The custom parameter you can use to control the shard assignment, when the target is a Kinesis data stream. If you do not include this parameter, the default is to use the eventId as the partition key.
760 */
761 KinesisParameters?: KinesisParameters;
762 /**
763 * Parameters used when you are using the rule to invoke Amazon EC2 Run Command.
764 */
765 RunCommandParameters?: RunCommandParameters;
766 /**
767 * Contains the Amazon ECS task definition and task count to be used, if the event target is an Amazon ECS task. For more information about Amazon ECS tasks, see Task Definitions in the Amazon EC2 Container Service Developer Guide.
768 */
769 EcsParameters?: EcsParameters;
770 /**
771 * If the event target is an AWS Batch job, this contains the job definition, job name, and other parameters. For more information, see Jobs in the AWS Batch User Guide.
772 */
773 BatchParameters?: BatchParameters;
774 /**
775 * Contains the message group ID to use when the target is a FIFO queue. If you specify an SQS FIFO queue as a target, the queue must have content-based deduplication enabled.
776 */
777 SqsParameters?: SqsParameters;
778 }
779 export type TargetArn = string;
780 export type TargetId = string;
781 export type TargetIdList = TargetId[];
782 export type TargetInput = string;
783 export type TargetInputPath = string;
784 export type TargetList = Target[];
785 export type TargetPartitionKeyPath = string;
786 export interface TestEventPatternRequest {
787 /**
788 * The event pattern. For more information, see Events and Event Patterns in the Amazon CloudWatch Events User Guide.
789 */
790 EventPattern: EventPattern;
791 /**
792 * The event, in JSON format, to test against the event pattern.
793 */
794 Event: String;
795 }
796 export interface TestEventPatternResponse {
797 /**
798 * Indicates whether the event matches the event pattern.
799 */
800 Result?: Boolean;
801 }
802 export type TransformerInput = string;
803 export type TransformerPaths = {[key: string]: TargetInputPath};
804 export interface UntagResourceRequest {
805 /**
806 * The ARN of the CloudWatch Events rule from which you are removing tags.
807 */
808 ResourceARN: Arn;
809 /**
810 * The list of tag keys to remove from the resource.
811 */
812 TagKeys: TagKeyList;
813 }
814 export interface UntagResourceResponse {
815 }
816 /**
817 * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
818 */
819 export type apiVersion = "2014-02-03"|"2015-10-07"|"latest"|string;
820 export interface ClientApiVersions {
821 /**
822 * A string in YYYY-MM-DD format that represents the latest possible API version that can be used in this service. Specify 'latest' to use the latest possible version.
823 */
824 apiVersion?: apiVersion;
825 }
826 export type ClientConfiguration = ServiceConfigurationOptions & ClientApiVersions;
827 /**
828 * Contains interfaces for use with the CloudWatchEvents client.
829 */
830 export import Types = CloudWatchEvents;
831}
832export = CloudWatchEvents;