AIOps ***** Client ====== class AIOps.Client A low-level client representing AWS AI Ops The CloudWatch investigations feature is a generative AI-powered assistant that can help you respond to incidents in your system. It uses generative AI to scan your system's telemetry and quickly surface suggestions that might be related to your issue. These suggestions include metrics, logs, deployment events, and root- cause hypotheses. You can use API actions to create, manage, and delete investigation groups and investigation group policies. To start and manage investigations, you must use the CloudWatch console. import boto3 client = boto3.client('aiops') These are the available methods: * can_paginate * close * create_investigation_group * delete_investigation_group * delete_investigation_group_policy * get_investigation_group * get_investigation_group_policy * get_paginator * get_waiter * list_investigation_groups * list_tags_for_resource * put_investigation_group_policy * tag_resource * untag_resource * update_investigation_group Paginators ========== Paginators are available on a client instance via the "get_paginator" method. For more detailed instructions and examples on the usage of paginators, see the paginators user guide. The available paginators are: * ListInvestigationGroups AIOps / Paginator / ListInvestigationGroups ListInvestigationGroups *********************** class AIOps.Paginator.ListInvestigationGroups paginator = client.get_paginator('list_investigation_groups') paginate(**kwargs) Creates an iterator that will paginate through responses from "AIOps.Client.list_investigation_groups()". See also: AWS API Documentation **Request Syntax** response_iterator = paginator.paginate( PaginationConfig={ 'MaxItems': 123, 'PageSize': 123, 'StartingToken': 'string' } ) Parameters: **PaginationConfig** (*dict*) -- A dictionary that provides parameters to control pagination. * **MaxItems** *(integer) --* The total number of items to return. If the total number of items available is more than the value specified in max- items then a "NextToken" will be provided in the output that you can use to resume pagination. * **PageSize** *(integer) --* The size of each page. * **StartingToken** *(string) --* A token to specify where to start paginating. This is the "NextToken" from a previous response. Return type: dict Returns: **Response Syntax** { 'investigationGroups': [ { 'arn': 'string', 'name': 'string' }, ], 'NextToken': 'string' } **Response Structure** * *(dict) --* * **investigationGroups** *(list) --* An array of structures, where each structure contains the information about one investigation group in the account. * *(dict) --* This structure contains information about one investigation group in the account. * **arn** *(string) --* The Amazon Resource Name (ARN) of the investigation group. * **name** *(string) --* The name of the investigation group. * **NextToken** *(string) --* A token to resume pagination. AIOps / Client / get_paginator get_paginator ************* AIOps.Client.get_paginator(operation_name) Create a paginator for an operation. Parameters: **operation_name** (*string*) -- The operation name. This is the same name as the method name on the client. For example, if the method name is "create_foo", and you'd normally invoke the operation as "client.create_foo(**kwargs)", if the "create_foo" operation can be paginated, you can use the call "client.get_paginator("create_foo")". Raises: **OperationNotPageableError** -- Raised if the operation is not pageable. You can use the "client.can_paginate" method to check if an operation is pageable. Return type: "botocore.paginate.Paginator" Returns: A paginator object. AIOps / Client / get_investigation_group_policy get_investigation_group_policy ****************************** AIOps.Client.get_investigation_group_policy(**kwargs) Returns the JSON of the IAM resource policy associated with the specified investigation group in a string. For example, "{\"Versio n\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principa l\":{\"Service\":\"aiops.alarms.cloudwatch.amazonaws.com\"},\"Acti on\":[\"aiops:CreateInvestigation\",\"aiops:CreateInvestigationEve nt\"],\"Resource\":\"*\",\"Condition\":{\"StringEquals\":{\"aws:So urceAccount\":\"111122223333\"},\"ArnLike\":{\"aws:SourceArn\":\"a rn:aws:cloudwatch:us-east-1:111122223333:alarm:*\"}}}]}". See also: AWS API Documentation **Request Syntax** response = client.get_investigation_group_policy( identifier='string' ) Parameters: **identifier** (*string*) -- **[REQUIRED]** Specify either the name or the ARN of the investigation group that you want to view the policy of. Return type: dict Returns: **Response Syntax** { 'investigationGroupArn': 'string', 'policy': 'string' } **Response Structure** * *(dict) --* * **investigationGroupArn** *(string) --* The Amazon Resource Name (ARN) of the investigation group that you want to view the policy of. * **policy** *(string) --* The policy, in JSON format. **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / can_paginate can_paginate ************ AIOps.Client.can_paginate(operation_name) Check if an operation can be paginated. Parameters: **operation_name** (*string*) -- The operation name. This is the same name as the method name on the client. For example, if the method name is "create_foo", and you'd normally invoke the operation as "client.create_foo(**kwargs)", if the "create_foo" operation can be paginated, you can use the call "client.get_paginator("create_foo")". Returns: "True" if the operation can be paginated, "False" otherwise. AIOps / Client / put_investigation_group_policy put_investigation_group_policy ****************************** AIOps.Client.put_investigation_group_policy(**kwargs) Creates an IAM resource policy and assigns it to the specified investigation group. If you create your investigation group with "CreateInvestigationGroup" and you want to enable CloudWatch alarms to create investigations and add events to investigations, you must use this operation to create a policy similar to this example. "{ "Version": "2008-10-17", "Statement": [ { "Effect": "Allow", "Principal": { "Service": "aiops.alarms.cloudwatch.amazonaws.com" }, "Action": [ "aiops:CreateInvestigation", "aiops:CreateInvestigationEvent" ], "Resource": "*", "Condition": { "StringEquals": { "aws:SourceAccount": "account-id" }, "ArnLike": { "aws:SourceArn": "arn:aws:cloudwatch:region:account-id:alarm:*" } } } ] }" See also: AWS API Documentation **Request Syntax** response = client.put_investigation_group_policy( identifier='string', policy='string' ) Parameters: * **identifier** (*string*) -- **[REQUIRED]** Specify either the name or the ARN of the investigation group that you want to assign the policy to. * **policy** (*string*) -- **[REQUIRED]** The policy, in JSON format. Return type: dict Returns: **Response Syntax** { 'investigationGroupArn': 'string' } **Response Structure** * *(dict) --* * **investigationGroupArn** *(string) --* The ARN of the investigation group that will use this policy. **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / list_tags_for_resource list_tags_for_resource ********************** AIOps.Client.list_tags_for_resource(**kwargs) Displays the tags associated with a CloudWatch investigations resource. Currently, investigation groups support tagging. See also: AWS API Documentation **Request Syntax** response = client.list_tags_for_resource( resourceArn='string' ) Parameters: **resourceArn** (*string*) -- **[REQUIRED]** The ARN of the CloudWatch investigations resource that you want to view tags for. You can use the "ListInvestigationGroups" operation to find the ARNs of investigation groups. The ARN format for an investigation group is >>``<>``<<. Return type: dict Returns: **Response Syntax** { 'tags': { 'string': 'string' } } **Response Structure** * *(dict) --* * **tags** *(dict) --* The list of tag keys and values associated with the resource you specified. * *(string) --* * *(string) --* **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / get_investigation_group get_investigation_group *********************** AIOps.Client.get_investigation_group(**kwargs) Returns the configuration information for the specified investigation group. See also: AWS API Documentation **Request Syntax** response = client.get_investigation_group( identifier='string' ) Parameters: **identifier** (*string*) -- **[REQUIRED]** Specify either the name or the ARN of the investigation group that you want to view. This is used to set the name of the investigation group. Return type: dict Returns: **Response Syntax** { 'createdBy': 'string', 'createdAt': 123, 'lastModifiedBy': 'string', 'lastModifiedAt': 123, 'name': 'string', 'arn': 'string', 'roleArn': 'string', 'encryptionConfiguration': { 'type': 'AWS_OWNED_KEY'|'CUSTOMER_MANAGED_KMS_KEY', 'kmsKeyId': 'string' }, 'retentionInDays': 123, 'chatbotNotificationChannel': { 'string': [ 'string', ] }, 'tagKeyBoundaries': [ 'string', ], 'isCloudTrailEventHistoryEnabled': True|False, 'crossAccountConfigurations': [ { 'sourceRoleArn': 'string' }, ] } **Response Structure** * *(dict) --* * **createdBy** *(string) --* The name of the user who created the investigation group. * **createdAt** *(integer) --* The date and time that the investigation group was created. * **lastModifiedBy** *(string) --* The name of the user who created the investigation group. * **lastModifiedAt** *(integer) --* The date and time that the investigation group was most recently modified. * **name** *(string) --* The name of the investigation group. * **arn** *(string) --* The Amazon Resource Name (ARN) of the investigation group. * **roleArn** *(string) --* The ARN of the IAM role that the investigation group uses for permissions to gather data. * **encryptionConfiguration** *(dict) --* Specifies the customer managed KMS key that the investigation group uses to encrypt data, if there is one. If not, the investigation group uses an Amazon Web Services key to encrypt the data. * **type** *(string) --* Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned key. * **kmsKeyId** *(string) --* If the investigation group uses a customer managed key for encryption, this field displays the ID of that key. * **retentionInDays** *(integer) --* Specifies how long that investigation data is kept. * **chatbotNotificationChannel** *(dict) --* This structure is a string array. The first string is the ARN of a Amazon SNS topic. The array of strings display the ARNs of chat applications configurations that are associated with that topic. For more information about these configuration ARNs, see Getting started with Amazon Q in chat applications and Resource type defined by Amazon Web Services Chatbot. * *(string) --* * *(list) --* * *(string) --* * **tagKeyBoundaries** *(list) --* Displays the custom tag keys for custom applications in your system that you have specified in the investigation group. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. * *(string) --* * **isCloudTrailEventHistoryEnabled** *(boolean) --* Specifies whether CloudWatch investigationshas access to change events that are recorded by CloudTrail. * **crossAccountConfigurations** *(list) --* Lists the "AWSAccountId" of the accounts configured for cross-account access and the results of the last scan performed on each account. * *(dict) --* This structure contains information about the cross- account configuration in the account. * **sourceRoleArn** *(string) --* The ARN of an existing role which will be used to do investigations on your behalf. **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / untag_resource untag_resource ************** AIOps.Client.untag_resource(**kwargs) Removes one or more tags from the specified resource. See also: AWS API Documentation **Request Syntax** response = client.untag_resource( resourceArn='string', tagKeys=[ 'string', ] ) Parameters: * **resourceArn** (*string*) -- **[REQUIRED]** The Amazon Resource Name (ARN) of the resource that you want to remove the tags from. You can use the "ListInvestigationGroups" operation to find the ARNs of investigation groups. * **tagKeys** (*list*) -- **[REQUIRED]** The list of tag keys to remove from the resource. * *(string) --* Return type: dict Returns: **Response Syntax** {} **Response Structure** * *(dict) --* **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / get_waiter get_waiter ********** AIOps.Client.get_waiter(waiter_name) Returns an object that can wait for some condition. Parameters: **waiter_name** (*str*) -- The name of the waiter to get. See the waiters section of the service docs for a list of available waiters. Returns: The specified waiter object. Return type: "botocore.waiter.Waiter" AIOps / Client / delete_investigation_group delete_investigation_group ************************** AIOps.Client.delete_investigation_group(**kwargs) Deletes the specified investigation group from your account. You can currently have one investigation group per Region in your account. After you delete an investigation group, you can later create a new investigation group in the same Region. See also: AWS API Documentation **Request Syntax** response = client.delete_investigation_group( identifier='string' ) Parameters: **identifier** (*string*) -- **[REQUIRED]** Specify either the name or the ARN of the investigation group that you want to delete. Returns: None **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / list_investigation_groups list_investigation_groups ************************* AIOps.Client.list_investigation_groups(**kwargs) Returns the ARN and name of each investigation group in the account. See also: AWS API Documentation **Request Syntax** response = client.list_investigation_groups( nextToken='string', maxResults=123 ) Parameters: * **nextToken** (*string*) -- Include this value, if it was returned by the previous operation, to get the next set of service operations. * **maxResults** (*integer*) -- The maximum number of results to return in one operation. If you omit this parameter, the default of 50 is used. Return type: dict Returns: **Response Syntax** { 'nextToken': 'string', 'investigationGroups': [ { 'arn': 'string', 'name': 'string' }, ] } **Response Structure** * *(dict) --* * **nextToken** *(string) --* Include this value in your next use of this operation to get the next set of service operations. * **investigationGroups** *(list) --* An array of structures, where each structure contains the information about one investigation group in the account. * *(dict) --* This structure contains information about one investigation group in the account. * **arn** *(string) --* The Amazon Resource Name (ARN) of the investigation group. * **name** *(string) --* The name of the investigation group. **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / create_investigation_group create_investigation_group ************************** AIOps.Client.create_investigation_group(**kwargs) Creates an *investigation group* in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations. Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following: * Who can access the investigations * Whether investigation data is encrypted with a customer managed Key Management Service key. * How long investigations and their data are retained by default. Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has either the "AIOpsConsoleAdminPolicy" or the "AdministratorAccess" IAM policy attached, or to an account that has similar permissions. Warning: You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with "CreateInvestigationGroup" and you want to enable alarms to do this, you must use "PutInvestigationGroupPolicy" to create a resource policy that grants this permission to CloudWatch alarms.For more information about configuring CloudWatch alarms, see Using Amazon CloudWatch alarms See also: AWS API Documentation **Request Syntax** response = client.create_investigation_group( name='string', roleArn='string', encryptionConfiguration={ 'type': 'AWS_OWNED_KEY'|'CUSTOMER_MANAGED_KMS_KEY', 'kmsKeyId': 'string' }, retentionInDays=123, tags={ 'string': 'string' }, tagKeyBoundaries=[ 'string', ], chatbotNotificationChannel={ 'string': [ 'string', ] }, isCloudTrailEventHistoryEnabled=True|False, crossAccountConfigurations=[ { 'sourceRoleArn': 'string' }, ] ) Parameters: * **name** (*string*) -- **[REQUIRED]** Provides a name for the investigation group. * **roleArn** (*string*) -- **[REQUIRED]** Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations. For more information, see How to control what data CloudWatch investigations has access to during investigations. * **encryptionConfiguration** (*dict*) -- Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see Encryption of investigation data. * **type** *(string) --* Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned key. * **kmsKeyId** *(string) --* If the investigation group uses a customer managed key for encryption, this field displays the ID of that key. * **retentionInDays** (*integer*) -- Specify how long that investigation data is kept. For more information, see Operational investigation data retention. If you omit this parameter, the default of 90 days is used. * **tags** (*dict*) -- A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. To be able to associate tags when you create the investigation group, you must have the "cloudwatch:TagResource" permission. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. * *(string) --* * *(string) --* * **tagKeyBoundaries** (*list*) -- Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases. You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags. * *(string) --* * **chatbotNotificationChannel** (*dict*) -- Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see Getting started with Amazon Q in chat applications and Resource type defined by Amazon Web Services Chatbot. * *(string) --* * *(list) --* * *(string) --* * **isCloudTrailEventHistoryEnabled** (*boolean*) -- Specify "true" to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is "true". * **crossAccountConfigurations** (*list*) -- List of "sourceRoleArn" values that have been configured for cross-account access. * *(dict) --* This structure contains information about the cross-account configuration in the account. * **sourceRoleArn** *(string) --* The ARN of an existing role which will be used to do investigations on your behalf. Return type: dict Returns: **Response Syntax** { 'arn': 'string' } **Response Structure** * *(dict) --* * **arn** *(string) --* The ARN of the investigation group that you just created. **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ServiceQuotaExceededException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / delete_investigation_group_policy delete_investigation_group_policy ********************************* AIOps.Client.delete_investigation_group_policy(**kwargs) Removes the IAM resource policy from being associated with the investigation group that you specify. See also: AWS API Documentation **Request Syntax** response = client.delete_investigation_group_policy( identifier='string' ) Parameters: **identifier** (*string*) -- **[REQUIRED]** Specify either the name or the ARN of the investigation group that you want to remove the policy from. Return type: dict Returns: **Response Syntax** {} **Response Structure** * *(dict) --* **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / close close ***** AIOps.Client.close() Closes underlying endpoint connections. AIOps / Client / tag_resource tag_resource ************ AIOps.Client.tag_resource(**kwargs) Assigns one or more tags (key-value pairs) to the specified resource. Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values. Tags don't have any semantic meaning to Amazon Web Services and are interpreted strictly as strings of characters. You can associate as many as 50 tags with a resource. See also: AWS API Documentation **Request Syntax** response = client.tag_resource( resourceArn='string', tags={ 'string': 'string' } ) Parameters: * **resourceArn** (*string*) -- **[REQUIRED]** The Amazon Resource Name (ARN) of the resource that you want to apply the tags to. You can use the "ListInvestigationGroups" operation to find the ARNs of investigation groups. * **tags** (*dict*) -- **[REQUIRED]** The list of key-value pairs to associate with the resource. * *(string) --* * *(string) --* Return type: dict Returns: **Response Syntax** {} **Response Structure** * *(dict) --* **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException" AIOps / Client / update_investigation_group update_investigation_group ************************** AIOps.Client.update_investigation_group(**kwargs) Updates the configuration of the specified investigation group. See also: AWS API Documentation **Request Syntax** response = client.update_investigation_group( identifier='string', roleArn='string', encryptionConfiguration={ 'type': 'AWS_OWNED_KEY'|'CUSTOMER_MANAGED_KMS_KEY', 'kmsKeyId': 'string' }, tagKeyBoundaries=[ 'string', ], chatbotNotificationChannel={ 'string': [ 'string', ] }, isCloudTrailEventHistoryEnabled=True|False, crossAccountConfigurations=[ { 'sourceRoleArn': 'string' }, ] ) Parameters: * **identifier** (*string*) -- **[REQUIRED]** Specify either the name or the ARN of the investigation group that you want to modify. * **roleArn** (*string*) -- Specify this field if you want to change the IAM role that CloudWatch investigations will use when it gathers investigation data. To do so, specify the ARN of the new role. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations. For more information, see How to control what data CloudWatch investigations has access to during investigations. * **encryptionConfiguration** (*dict*) -- Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see Encryption of investigation data. * **type** *(string) --* Displays whether investigation data is encrypted by a customer managed key or an Amazon Web Services owned key. * **kmsKeyId** *(string) --* If the investigation group uses a customer managed key for encryption, this field displays the ID of that key. * **tagKeyBoundaries** (*list*) -- Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases. You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags. * *(string) --* * **chatbotNotificationChannel** (*dict*) -- Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see Getting started with Amazon Q in chat applications and Resource type defined by Amazon Web Services Chatbot. * *(string) --* * *(list) --* * *(string) --* * **isCloudTrailEventHistoryEnabled** (*boolean*) -- Specify "true" to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is "true". * **crossAccountConfigurations** (*list*) -- Used to configure cross-account access for an investigation group. It allows the investigation group to access resources in other accounts. * *(dict) --* This structure contains information about the cross-account configuration in the account. * **sourceRoleArn** *(string) --* The ARN of an existing role which will be used to do investigations on your behalf. Return type: dict Returns: **Response Syntax** {} **Response Structure** * *(dict) --* **Exceptions** * "AIOps.Client.exceptions.AccessDeniedException" * "AIOps.Client.exceptions.ForbiddenException" * "AIOps.Client.exceptions.ResourceNotFoundException" * "AIOps.Client.exceptions.ThrottlingException" * "AIOps.Client.exceptions.ValidationException" * "AIOps.Client.exceptions.InternalServerException" * "AIOps.Client.exceptions.ConflictException"