Skip to content

/AWS1/IF_AIO=>CREATEINVESTIGATIONGROUP()

About CreateInvestigationGroup

Creates an investigation group in your account. Creating an investigation group is a one-time setup task for each Region in your account. It is a necessary task to be able to perform investigations.

Settings in the investigation group help you centrally manage the common properties of your investigations, such as the following:

  • Who can access the investigations

  • Whether investigation data is encrypted with a customer managed Key Management Service key.

  • How long investigations and their data are retained by default.

Currently, you can have one investigation group in each Region in your account. Each investigation in a Region is a part of the investigation group in that Region

To create an investigation group and set up CloudWatch investigations, you must be signed in to an IAM principal that has either the AIOpsConsoleAdminPolicy or the AdministratorAccess IAM policy attached, or to an account that has similar permissions.

You can configure CloudWatch alarms to start investigations and add events to investigations. If you create your investigation group with CreateInvestigationGroup and you want to enable alarms to do this, you must use PutInvestigationGroupPolicy to create a resource policy that grants this permission to CloudWatch alarms.

For more information about configuring CloudWatch alarms, see Using Amazon CloudWatch alarms

Method Signature

IMPORTING

Required arguments:

iv_name TYPE /AWS1/AIOSTRWPATANDLENGTHLMTS /AWS1/AIOSTRWPATANDLENGTHLMTS

Provides a name for the investigation group.

iv_rolearn TYPE /AWS1/AIOROLEARN /AWS1/AIOROLEARN

Specify the ARN of the IAM role that CloudWatch investigations will use when it gathers investigation data. The permissions in this role determine which of your resources that CloudWatch investigations will have access to during investigations.

For more information, see How to control what data CloudWatch investigations has access to during investigations.

Optional arguments:

io_encryptionconfiguration TYPE REF TO /AWS1/CL_AIOENCRYPTIONCONF /AWS1/CL_AIOENCRYPTIONCONF

Use this structure if you want to use a customer managed KMS key to encrypt your investigation data. If you omit this parameter, CloudWatch investigations will use an Amazon Web Services key to encrypt the data. For more information, see Encryption of investigation data.

iv_retentionindays TYPE /AWS1/AIORETENTION /AWS1/AIORETENTION

Specify how long that investigation data is kept. For more information, see Operational investigation data retention.

If you omit this parameter, the default of 90 days is used.

it_tags TYPE /AWS1/CL_AIOTAGS_W=>TT_TAGS TT_TAGS

A list of key-value pairs to associate with the investigation group. You can associate as many as 50 tags with an investigation group. To be able to associate tags when you create the investigation group, you must have the cloudwatch:TagResource permission.

Tags can help you organize and categorize your resources. You can also use them to scope user permissions by granting a user permission to access or change only resources with certain tag values.

it_tagkeyboundaries TYPE /AWS1/CL_AIOTAGKEYBOUNDARIES_W=>TT_TAGKEYBOUNDARIES TT_TAGKEYBOUNDARIES

Enter the existing custom tag keys for custom applications in your system. Resource tags help CloudWatch investigations narrow the search space when it is unable to discover definite relationships between resources. For example, to discover that an Amazon ECS service depends on an Amazon RDS database, CloudWatch investigations can discover this relationship using data sources such as X-Ray and CloudWatch Application Signals. However, if you haven't deployed these features, CloudWatch investigations will attempt to identify possible relationships. Tag boundaries can be used to narrow the resources that will be discovered by CloudWatch investigations in these cases.

You don't need to enter tags created by myApplications or CloudFormation, because CloudWatch investigations can automatically detect those tags.

it_chatbotnotifchannel TYPE /AWS1/CL_AIOCHATCONFARNS_W=>TT_CHATBOTNOTIFICATIONCHANNEL TT_CHATBOTNOTIFICATIONCHANNEL

Use this structure to integrate CloudWatch investigations with chat applications. This structure is a string array. For the first string, specify the ARN of an Amazon SNS topic. For the array of strings, specify the ARNs of one or more chat applications configurations that you want to associate with that topic. For more information about these configuration ARNs, see Getting started with Amazon Q in chat applications and Resource type defined by Amazon Web Services Chatbot.

iv_iscloudtrailevthistorye00 TYPE /AWS1/AIOBOOLEAN /AWS1/AIOBOOLEAN

Specify true to enable CloudWatch investigations to have access to change events that are recorded by CloudTrail. The default is true.

it_crossaccountconfs TYPE /AWS1/CL_AIOCROSSACCOUNTCONF=>TT_CROSSACCOUNTCONFIGURATIONS TT_CROSSACCOUNTCONFIGURATIONS

List of sourceRoleArn values that have been configured for cross-account access.

RETURNING

oo_output TYPE REF TO /aws1/cl_aiocreinvestigation01 /AWS1/CL_AIOCREINVESTIGATION01

Domain /AWS1/RT_ACCOUNT_ID
Primitive Type NUMC

Examples

Syntax Example

This is an example of the syntax for calling the method. It includes every possible argument and initializes every possible value. The data provided is not necessarily semantically accurate (for example the value "string" may be provided for something that is intended to be an instance ID, or in some cases two arguments may be mutually exclusive). The syntax shows the ABAP syntax for creating the various data structures.

DATA(lo_result) = lo_client->/aws1/if_aio~createinvestigationgroup(
  io_encryptionconfiguration = new /aws1/cl_aioencryptionconf(
    iv_kmskeyid = |string|
    iv_type = |string|
  )
  it_chatbotnotifchannel = VALUE /aws1/cl_aiochatconfarns_w=>tt_chatbotnotificationchannel(
    (
      VALUE /aws1/cl_aiochatconfarns_w=>ts_chatbotnotifchannel_maprow(
        value = VALUE /aws1/cl_aiochatconfarns_w=>tt_chatconfigurationarns(
          ( new /aws1/cl_aiochatconfarns_w( |string| ) )
        )
        key = |string|
      )
    )
  )
  it_crossaccountconfs = VALUE /aws1/cl_aiocrossaccountconf=>tt_crossaccountconfigurations(
    ( new /aws1/cl_aiocrossaccountconf( |string| ) )
  )
  it_tagkeyboundaries = VALUE /aws1/cl_aiotagkeyboundaries_w=>tt_tagkeyboundaries(
    ( new /aws1/cl_aiotagkeyboundaries_w( |string| ) )
  )
  it_tags = VALUE /aws1/cl_aiotags_w=>tt_tags(
    (
      VALUE /aws1/cl_aiotags_w=>ts_tags_maprow(
        key = |string|
        value = new /aws1/cl_aiotags_w( |string| )
      )
    )
  )
  iv_iscloudtrailevthistorye00 = ABAP_TRUE
  iv_name = |string|
  iv_retentionindays = 123
  iv_rolearn = |string|
).

This is an example of reading all possible response values

lo_result = lo_result.
IF lo_result IS NOT INITIAL.
  lv_investigationgrouparn = lo_result->get_arn( ).
ENDIF.