'2.0', 'service' => '

The CloudTrail Data Service lets you ingest events into CloudTrail from any source in your hybrid environments, such as in-house or SaaS applications hosted on-premises or in the cloud, virtual machines, or containers. You can store, access, analyze, troubleshoot and take action on this data without maintaining multiple log aggregators and reporting tools. After you run PutAuditEvents to ingest your application activity into CloudTrail, you can use CloudTrail Lake to search, query, and analyze the data that is logged from your applications.

', 'operations' => [ 'PutAuditEvents' => '

Ingests your application events into CloudTrail Lake. A required parameter, auditEvents, accepts the JSON records (also called payload) of events that you want CloudTrail to ingest. You can add up to 100 of these events (or up to 1 MB) per PutAuditEvents request.

', ], 'shapes' => [ 'AuditEvent' => [ 'base' => '

An event from a source outside of Amazon Web Services that you want CloudTrail to log.

', 'refs' => [ 'AuditEvents$member' => NULL, ], ], 'AuditEventResultEntries' => [ 'base' => NULL, 'refs' => [ 'PutAuditEventsResponse$successful' => '

Lists events in the provided event payload that were successfully ingested into CloudTrail.

', ], ], 'AuditEventResultEntry' => [ 'base' => '

A response that includes successful and failed event results.

', 'refs' => [ 'AuditEventResultEntries$member' => NULL, ], ], 'AuditEvents' => [ 'base' => NULL, 'refs' => [ 'PutAuditEventsRequest$auditEvents' => '

The JSON payload of events that you want to ingest. You can also point to the JSON event payload in a file.

', ], ], 'ChannelArn' => [ 'base' => NULL, 'refs' => [ 'PutAuditEventsRequest$channelArn' => '

The ARN or ID (the ARN suffix) of a channel.

', ], ], 'ChannelInsufficientPermission' => [ 'base' => '

The caller\'s account ID must be the same as the channel owner\'s account ID.

', 'refs' => [], ], 'ChannelNotFound' => [ 'base' => '

The channel could not be found.

', 'refs' => [], ], 'ChannelUnsupportedSchema' => [ 'base' => '

The schema type of the event is not supported.

', 'refs' => [], ], 'DuplicatedAuditEventId' => [ 'base' => '

Two or more entries in the request have the same event ID.

', 'refs' => [], ], 'ErrorCode' => [ 'base' => NULL, 'refs' => [ 'ResultErrorEntry$errorCode' => '

The error code for events that could not be ingested by CloudTrail. Possible error codes include: FieldTooLong, FieldNotFound, InvalidChecksum, InvalidData, InvalidRecipient, InvalidEventSource, AccountNotSubscribed, Throttling, and InternalFailure.

', ], ], 'ErrorMessage' => [ 'base' => NULL, 'refs' => [ 'ResultErrorEntry$errorMessage' => '

The message that describes the error for events that could not be ingested by CloudTrail.

', ], ], 'ExternalId' => [ 'base' => NULL, 'refs' => [ 'PutAuditEventsRequest$externalId' => '

A unique identifier that is conditionally required when the channel\'s resource policy includes an external ID. This value can be any string, such as a passphrase or account number.

', ], ], 'InvalidChannelARN' => [ 'base' => '

The specified channel ARN is not a valid channel ARN.

', 'refs' => [], ], 'PutAuditEventsRequest' => [ 'base' => NULL, 'refs' => [], ], 'PutAuditEventsResponse' => [ 'base' => NULL, 'refs' => [], ], 'ResultErrorEntries' => [ 'base' => NULL, 'refs' => [ 'PutAuditEventsResponse$failed' => '

Lists events in the provided event payload that could not be ingested into CloudTrail, and includes the error code and error message returned for events that could not be ingested.

', ], ], 'ResultErrorEntry' => [ 'base' => '

Includes the error code and error message for events that could not be ingested by CloudTrail.

', 'refs' => [ 'ResultErrorEntries$member' => NULL, ], ], 'String' => [ 'base' => NULL, 'refs' => [ 'AuditEvent$eventData' => '

The content of an audit event that comes from the event, such as userIdentity, userAgent, and eventSource.

', 'AuditEvent$eventDataChecksum' => '

A checksum is a base64-SHA256 algorithm that helps you verify that CloudTrail receives the event that matches with the checksum. Calculate the checksum by running a command like the following:

printf %s $eventdata | openssl dgst -binary -sha256 | base64

', 'ChannelInsufficientPermission$message' => NULL, 'ChannelNotFound$message' => NULL, 'ChannelUnsupportedSchema$message' => NULL, 'DuplicatedAuditEventId$message' => NULL, 'InvalidChannelARN$message' => NULL, 'UnsupportedOperationException$message' => NULL, ], ], 'UnsupportedOperationException' => [ 'base' => '

The operation requested is not supported in this region or account.

', 'refs' => [], ], 'Uuid' => [ 'base' => NULL, 'refs' => [ 'AuditEvent$id' => '

The original event ID from the source event.

', 'AuditEventResultEntry$eventID' => '

The event ID assigned by CloudTrail.

', 'AuditEventResultEntry$id' => '

The original event ID from the source event.

', 'ResultErrorEntry$id' => '

The original event ID from the source event that could not be ingested by CloudTrail.

', ], ], ],];