class Aws::CloudWatchLogs::Types::PutDestinationPolicyRequest


@see docs.aws.amazon.com/goto/WebAPI/logs-2014-03-28/PutDestinationPolicyRequest AWS API Documentation
@return [Boolean]<br>: docs.aws.amazon.com/AmazonCloudWatch/latest/logs/Cross-Account-Log_Subscription-Update.html<br><br><br><br>If you omit this parameter, the default of ‘false` is used.

subscription][1]
information, see [ Updating an existing cross-account
that you have already updated the subscription filters. For more
working. By specifying `true` for `forceUpdate`, you are affirming
destination. If you do not, the subscription filters might stop
subscription filters in the accounts that send logs to this
update a destination policy this way, you must first update the
permission to individual Amazon Web Services accounts. Before you
grant permission to an organization ID instead of granting
Specify true if you are updating an existing destination policy to
@!attribute [rw] force_update
@return [String]
up to 5120 bytes.
deliver their log events to the associated destination. This can be
An IAM policy document that authorizes cross-account users to
@!attribute [rw] access_policy
@return [String]
A name for an existing destination.
@!attribute [rw] destination_name