Package-level declarations
Types
You do not have sufficient access to perform this action. Access denied errors appear when Amazon Security Lake explicitly or implicitly denies an authorization request. An explicit denial occurs when a policy contains a Deny statement for the specific Amazon Web Services action. An implicit denial occurs when there is no applicable Deny statement and also no applicable Allow statement.
The Amazon Web Services identity.
To add a natively-supported Amazon Web Services service as a log source, use these parameters to specify the configuration settings for the log source.
Amazon Security Lake can collect logs and events from natively-supported Amazon Web Services services.
The request is malformed or contains an error such as an invalid parameter value or a missing required parameter.
Occurs when a conflict with a previous successful write is detected. This generally occurs when the previous write did not have time to propagate to the host serving the current request. A retry (with appropriate backoff logic) is the recommended response to this exception.
The attributes of a third-party custom source.
The configuration used for the third-party custom source.
The configuration used for the Glue Crawler for a third-party custom source.
The details of the log provider for a third-party custom source.
Amazon Security Lake can collect logs and events from third-party custom sources.
Automatically enable new organization accounts as member accounts from an Amazon Security Lake administrator account.
Provides details of Amazon Security Lake object.
Provides encryption details of Amazon Security Lake object.
The details for an Amazon Security Lake exception.
Provides lifecycle details of Amazon Security Lake object.
Provide expiration lifecycle details of Amazon Security Lake object.
Provide transition lifecycle details of Amazon Security Lake object.
Provides replication details for objects stored in the Amazon Security Lake data lake.
Provides details of Amazon Security Lake object.
Amazon Security Lake collects logs and events from supported Amazon Web Services services and custom sources. For the list of supported Amazon Web Services services, see the Amazon Security Lake User Guide.
Retrieves the Logs status for the Amazon Security Lake account.
The details of the last UpdateDataLake
or DeleteDataLake
API request which failed.
The status of the last UpdateDataLake
or DeleteDataLake
API request. This is set to Completed after the configuration is updated, or removed if deletion of the data lake is successful.
The configurations used for HTTPS subscriber notification.
Internal service exceptions are sometimes caused by transient issues. Before you start troubleshooting, perform the operation again.
The supported source types from which logs and events are collected in Amazon Security Lake. For a list of supported Amazon Web Services services, see the Amazon Security Lake User Guide.
Specify the configurations you want to use for subscriber notification to notify the subscriber when new data is written to the data lake for sources that the subscriber consumes in Security Lake.
The resource could not be found.
Base class for all service related exceptions thrown by the SecurityLake client
The configurations used for EventBridge subscriber notification.
Provides details about the Amazon Security Lake account subscription. Subscribers are notified of new objects for a source as the data is written to your Amazon S3 bucket for Security Lake.
A tag is a label that you can define and associate with Amazon Web Services resources, including certain types of Amazon Security Lake resources. Tags can help you identify, categorize, and manage resources in different ways, such as by owner, environment, or other criteria. You can associate tags with the following types of Security Lake resources: subscribers, and the data lake configuration for your Amazon Web Services account in individual Amazon Web Services Regions.
The limit on the number of requests per second was exceeded.