Contains information about the configuration of the anomaly detector.
A description of the detector.
The name of the detector.
The ARN of the KMS key to use to encrypt your data.
A list of tags to apply to the anomaly detector.