Amazon CloudWatch Logs

2021/12/08 - Amazon CloudWatch Logs - 1 updated api methods

Changes  This release adds AWS Organizations support as condition key in destination policy for cross account Subscriptions in CloudWatch Logs.

PutDestinationPolicy (updated) Link ΒΆ
Changes (request)
{'forceUpdate': 'boolean'}

Creates or updates an access policy associated with an existing destination. An access policy is an IAM policy document that is used to authorize claims to register a subscription filter against a given destination.

If multiple Amazon Web Services accounts are sending logs to this destination, each sender account must be listed separately in the policy. The policy does not support specifying * as the Principal or the use of the aws:PrincipalOrgId global key.

See also: AWS API Documentation

Request Syntax

client.put_destination_policy(
    destinationName='string',
    accessPolicy='string',
    forceUpdate=True|False
)
type destinationName:

string

param destinationName:

[REQUIRED]

A name for an existing destination.

type accessPolicy:

string

param accessPolicy:

[REQUIRED]

An IAM policy document that authorizes cross-account users to deliver their log events to the associated destination. This can be up to 5120 bytes.

type forceUpdate:

boolean

param forceUpdate:

Specify true if you are updating an existing destination policy to grant permission to an organization ID instead of granting permission to individual AWS accounts. Before you update a destination policy this way, you must first update the subscription filters in the accounts that send logs to this destination. If you do not, the subscription filters might stop working. By specifying true for forceUpdate, you are affirming that you have already updated the subscription filters. For more information, see Updating an existing cross-account subscription

If you omit this parameter, the default of false is used.

returns:

None