class Aws::CloudWatchLogs::Types::PutResourcePolicyRequest

@note When making an API call, you may pass PutResourcePolicyRequest

data as a hash:

    {
      policy_name: "PolicyName",
      policy_document: "PolicyDocument",
    }

@!attribute [rw] policy_name

Name of the new policy. This parameter is required.
@return [String]

@!attribute [rw] policy_document

Details of the new policy, including the identity of the principal
that is enabled to put logs to this account. This is formatted as a
JSON string. This parameter is required.

The following example creates a resource policy enabling the Route
53 service to put DNS query logs in to the specified log group.
Replace `"logArn"` with the ARN of your CloudWatch Logs resource,
such as a log group or log stream.

CloudWatch Logs also supports [aws:SourceArn][1] and
[aws:SourceAccount][2] condition context keys.

In the example resource policy, you would replace the value of
`SourceArn` with the resource making the call from Route 53 to
CloudWatch Logs and replace the value of `SourceAccount` with the
Amazon Web Services account ID making that call.

`\{ "Version": "2012-10-17", "Statement": [ \{ "Sid":
"Route53LogsToCloudWatchLogs", "Effect": "Allow", "Principal": \{
"Service": [ "route53.amazonaws.com" ] \}, "Action":
"logs:PutLogEvents", "Resource": "logArn", "Condition": \{
"ArnLike": \{ "aws:SourceArn": "myRoute53ResourceArn" \},
"StringEquals": \{ "aws:SourceAccount": "myAwsAccountId" \} \} \} ]
\}`

[1]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourcearn
[2]: https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_condition-keys.html#condition-keys-sourceaccount
@return [String]

@see docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/PutResourcePolicyRequest AWS API Documentation

Constants

SENSITIVE