Skip to main content

account_policies

Creates, updates, deletes or gets an account_policy resource or lists account_policies in a region

Overview

Nameaccount_policies
TypeResource
DescriptionThe AWS::Logs::AccountPolicy resource specifies a CloudWatch Logs AccountPolicy.
Idawscc.logs.account_policies

Fields

NameDatatypeDescription
account_idstringUser account id
policy_namestringThe name of the account policy
policy_documentstring
The body of the policy document you want to use for this topic.You can only add one policy per PolicyType.
The policy must be in JSON string format.
Length Constraints: Maximum length of 30720
policy_typestringType of the policy.
scopestringScope for policy application
selection_criteriastringLog group selection criteria to apply policy only to a subset of log groups. SelectionCriteria string can be up to 25KB and cloudwatchlogs determines the length of selectionCriteria by using its UTF-8 bytes
regionstringAWS region.

For more information, see AWS::Logs::AccountPolicy.

Methods

NameResourceAccessible byRequired Params
create_resourceaccount_policiesINSERTPolicyName, PolicyType, PolicyDocument, region
delete_resourceaccount_policiesDELETEIdentifier, region
update_resourceaccount_policiesUPDATEIdentifier, PatchDocument, region
list_resourcesaccount_policies_list_onlySELECTregion
get_resourceaccount_policiesSELECTIdentifier, region

SELECT examples

Gets all properties from an individual account_policy.

SELECT
region,
account_id,
policy_name,
policy_document,
policy_type,
scope,
selection_criteria
FROM awscc.logs.account_policies
WHERE
region = '{{ region }}' AND
Identifier = '{{ account_id }}|{{ policy_type }}|{{ policy_name }}';

INSERT example

Use the following StackQL query and manifest file to create a new account_policy resource, using stack-deploy.

/*+ create */
INSERT INTO awscc.logs.account_policies (
PolicyName,
PolicyDocument,
PolicyType,
region
)
SELECT
'{{ policy_name }}',
'{{ policy_document }}',
'{{ policy_type }}',
'{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

UPDATE example

Use the following StackQL query and manifest file to update a account_policy resource, using stack-deploy.

/*+ update */
UPDATE awscc.logs.account_policies
SET PatchDocument = string('{{ {
"PolicyDocument": policy_document,
"Scope": scope,
"SelectionCriteria": selection_criteria
} | generate_patch_document }}')
WHERE
region = '{{ region }}' AND
Identifier = '{{ account_id }}|{{ policy_type }}|{{ policy_name }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

DELETE example

/*+ delete */
DELETE FROM awscc.logs.account_policies
WHERE
Identifier = '{{ account_id }}|{{ policy_type }}|{{ policy_name }}' AND
region = '{{ region }}'
RETURNING
ErrorCode,
EventTime,
Identifier,
Operation,
OperationStatus,
RequestToken,
ResourceModel,
RetryAfter,
StatusMessage,
TypeName
;

Additional Parameters

Mutable resources in the Cloud Control provider support additional optional parameters which can be supplied with INSERT, UPDATE, or DELETE operations. These include:

ParameterDescription
ClientToken
A unique identifier to ensure the idempotency of the resource request.This allows the provider to accurately distinguish between retries and new requests.
A client token is valid for 36 hours once used.
After that, a resource request with the same client token is treated as a new request.
If you do not specify a client token, one is generated for inclusion in the request.
RoleArn
The ARN of the IAM role used to perform this resource operation.The role specified must have the permissions required for this operation.
If you do not specify a role, a temporary session is created using your AWS user credentials.
TypeVersionId
For private resource types, the type version to use in this resource operation.If you do not specify a resource version, the default version is used.

Permissions

To operate on the account_policies resource, the following permissions are required:

logs:PutAccountPolicy,
logs:PutIndexPolicy,
logs:PutDataProtectionPolicy,
logs:DescribeAccountPolicies,
logs:CreateLogDelivery,
s3:REST.PUT.OBJECT,
firehose:TagDeliveryStream,
logs:PutSubscriptionFilter,
logs:DeleteSubscriptionFilter,
logs:PutTransformer,
logs:PutMetricExtractionPolicy,
iam:PassRole