diff --git a/.changes/next-release/feature-AmazonSimpleSystemsManagerSSM-dbc926e.json b/.changes/next-release/feature-AmazonSimpleSystemsManagerSSM-dbc926e.json new file mode 100644 index 000000000000..096b5320e978 --- /dev/null +++ b/.changes/next-release/feature-AmazonSimpleSystemsManagerSSM-dbc926e.json @@ -0,0 +1,6 @@ +{ + "type": "feature", + "category": "Amazon Simple Systems Manager (SSM)", + "contributor": "", + "description": "This release allows SSM Explorer customers to enable OpsData sources across their organization when creating a resource data sync." +} diff --git a/services/ssm/src/main/resources/codegen-resources/service-2.json b/services/ssm/src/main/resources/codegen-resources/service-2.json index 69383bb9181c..d7d7ea95eb32 100644 --- a/services/ssm/src/main/resources/codegen-resources/service-2.json +++ b/services/ssm/src/main/resources/codegen-resources/service-2.json @@ -3320,7 +3320,7 @@ "AutomationParameterValueList":{ "type":"list", "member":{"shape":"AutomationParameterValue"}, - "max":10, + "max":50, "min":0 }, "AutomationStepNotFoundException":{ @@ -4116,7 +4116,7 @@ }, "ExpirationDate":{ "shape":"ExpirationDate", - "documentation":"

The date by which this activation request should expire. The default value is 24 hours.

" + "documentation":"

The date by which this activation request should expire, in timestamp format, such as \"2021-07-07T00:00:00\". You can specify a date up to 30 days in advance. If you don't provide an expiration date, the activation code expires in 24 hours.

" }, "Tags":{ "shape":"TagList", @@ -13166,6 +13166,7 @@ "max":64, "min":1 }, + "ResourceDataSyncEnableAllOpsDataSources":{"type":"boolean"}, "ResourceDataSyncIncludeFutureRegions":{"type":"boolean"}, "ResourceDataSyncInvalidConfigurationException":{ "type":"structure", @@ -13344,6 +13345,10 @@ "IncludeFutureRegions":{ "shape":"ResourceDataSyncIncludeFutureRegions", "documentation":"

Whether to automatically synchronize and aggregate data from new AWS Regions when those Regions come online.

" + }, + "EnableAllOpsDataSources":{ + "shape":"ResourceDataSyncEnableAllOpsDataSources", + "documentation":"

When you create a resource data sync, if you choose one of the AWS Organizations options, then Systems Manager automatically enables all OpsData sources in the selected AWS Regions for all AWS accounts in your organization (or in the selected organization units). For more information, see About multiple account and Region resource data syncs in the AWS Systems Manager User Guide.

" } }, "documentation":"

Information about the source of the data included in the resource data sync.

" @@ -13384,6 +13389,10 @@ "State":{ "shape":"ResourceDataSyncState", "documentation":"

The data type name for including resource data sync state. There are four sync states:

OrganizationNotExists: Your organization doesn't exist.

NoPermissions: The system can't locate the service-linked role. This role is automatically created when a user creates a resource data sync in Explorer.

InvalidOrganizationalUnit: You specified or selected an invalid unit in the resource data sync configuration.

TrustedAccessDisabled: You disabled Systems Manager access in the organization in AWS Organizations.

" + }, + "EnableAllOpsDataSources":{ + "shape":"ResourceDataSyncEnableAllOpsDataSources", + "documentation":"

When you create a resource data sync, if you choose one of the AWS Organizations options, then Systems Manager automatically enables all OpsData sources in the selected AWS Regions for all AWS accounts in your organization (or in the selected organization units). For more information, see About multiple account and Region resource data syncs in the AWS Systems Manager User Guide.

" } }, "documentation":"

The data type name for including resource data sync state. There are four sync states:

OrganizationNotExists (Your organization doesn't exist)

NoPermissions (The system can't locate the service-linked role. This role is automatically created when a user creates a resource data sync in Explorer.)

InvalidOrganizationalUnit (You specified or selected an invalid unit in the resource data sync configuration.)

TrustedAccessDisabled (You disabled Systems Manager access in the organization in AWS Organizations.)

" @@ -14452,7 +14461,7 @@ }, "Values":{ "shape":"TargetValues", - "documentation":"

User-defined criteria that maps to Key. For example, if you specified tag:ServerRole, you could specify value:WebServer to run a command on instances that include EC2 tags of ServerRole,WebServer.

" + "documentation":"

User-defined criteria that maps to Key. For example, if you specified tag:ServerRole, you could specify value:WebServer to run a command on instances that include EC2 tags of ServerRole,WebServer.

Depending on the type of Target, the maximum number of values for a Key might be lower than the global maximum of 50.

" } }, "documentation":"

An array of search criteria that targets instances using a Key,Value combination that you specify.

One or more targets must be specified for maintenance window Run Command-type tasks. Depending on the task, targets are optional for other maintenance window task types (Automation, AWS Lambda, and AWS Step Functions). For more information about running tasks that do not specify targets, see Registering maintenance window tasks without targets in the AWS Systems Manager User Guide.

Supported formats include the following.

For example:

For more information about how to send commands that target instances using Key,Value parameters, see Targeting multiple instances in the AWS Systems Manager User Guide.

"