awscli 1.37.11__py3-none-any.whl → 1.37.13__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/examples/cloudtrail/create-subscription.rst +35 -35
- awscli/examples/cloudtrail/create-trail.rst +19 -19
- awscli/examples/cloudtrail/describe-trails.rst +36 -36
- awscli/examples/cloudtrail/update-subscription.rst +33 -33
- awscli/examples/cloudtrail/update-trail.rst +18 -18
- awscli/examples/codepipeline/list-action-executions.rst +114 -114
- awscli/examples/ec2/create-spot-datafeed-subscription.rst +24 -24
- awscli/examples/elasticbeanstalk/create-application-version.rst +3 -3
- awscli/examples/kendra/describe-data-source.rst +1 -1
- awscli/examples/networkflowmonitor/create-monitor.rst +19 -0
- awscli/examples/networkflowmonitor/create-scope.rst +16 -0
- awscli/examples/networkflowmonitor/delete-monitor.rst +10 -0
- awscli/examples/networkflowmonitor/delete-scope.rst +10 -0
- awscli/examples/networkflowmonitor/get-monitor.rst +26 -0
- awscli/examples/networkflowmonitor/get-query-results-workload-insights-top-contributors-data.rst +30 -0
- awscli/examples/networkflowmonitor/get-query-results-workload-insights-top-contributors.rst +27 -0
- awscli/examples/networkflowmonitor/get-query-status-monitor-top-contributors.rst +15 -0
- awscli/examples/networkflowmonitor/get-query-status-workload-insights-top-contributors-data.rst +15 -0
- awscli/examples/networkflowmonitor/get-query-status-workload-insights-top-contributors.rst +15 -0
- awscli/examples/networkflowmonitor/get-scope.rst +28 -0
- awscli/examples/networkflowmonitor/list-monitors.rst +19 -0
- awscli/examples/networkflowmonitor/list-scopes.rst +19 -0
- awscli/examples/networkflowmonitor/list-tags-for-resource.rst +17 -0
- awscli/examples/networkflowmonitor/start-query-monitor-top-contributors.rst +18 -0
- awscli/examples/networkflowmonitor/start-query-workload-insights-top-contributors-data.rst +18 -0
- awscli/examples/networkflowmonitor/start-query-workload-insights-top-contributors.rst +18 -0
- awscli/examples/networkflowmonitor/stop-query-monitor-top-contributors.rst +11 -0
- awscli/examples/networkflowmonitor/stop-query-workload-insights-top-contributors-data.rst +11 -0
- awscli/examples/networkflowmonitor/stop-query-workload-insights-top-contributors.rst +11 -0
- awscli/examples/networkflowmonitor/tag-resource.rst +11 -0
- awscli/examples/networkflowmonitor/untag-resource.rst +11 -0
- awscli/examples/networkflowmonitor/update-monitor.rst +21 -0
- awscli/examples/networkmanager/delete-bucket-analytics-configuration.rst +1 -1
- awscli/examples/networkmanager/delete-bucket-metrics-configuration.rst +1 -1
- awscli/examples/networkmanager/delete-public-access-block.rst +1 -1
- awscli/examples/networkmanager/get-bucket-analytics-configuration.rst +1 -1
- awscli/examples/networkmanager/get-bucket-metrics-configuration.rst +1 -1
- awscli/examples/networkmanager/get-object-retention.rst +1 -1
- awscli/examples/networkmanager/get-public-access-block.rst +1 -1
- awscli/examples/networkmanager/list-bucket-analytics-configurations.rst +1 -1
- awscli/examples/networkmanager/list-bucket-metrics-configurations.rst +1 -1
- awscli/examples/networkmanager/put-bucket-metrics-configuration.rst +1 -1
- awscli/examples/networkmanager/put-object-retention.rst +1 -1
- awscli/examples/networkmanager/put-public-access-block.rst +1 -1
- awscli/examples/robomaker/create-robot-application-version.rst +1 -1
- awscli/examples/robomaker/create-robot-application.rst +2 -2
- awscli/examples/robomaker/create-simulation-application-version.rst +1 -1
- awscli/examples/robomaker/create-simulation-application.rst +2 -2
- awscli/examples/robomaker/describe-robot-application.rst +1 -1
- awscli/examples/robomaker/describe-simulation-application.rst +1 -1
- awscli/examples/robomaker/update-robot-application.rst +2 -2
- awscli/examples/robomaker/update-simulation-application.rst +2 -2
- awscli/examples/s3/website.rst +2 -2
- awscli/examples/s3api/abort-multipart-upload.rst +2 -2
- awscli/examples/s3api/complete-multipart-upload.rst +4 -4
- awscli/examples/s3api/create-bucket.rst +9 -9
- awscli/examples/s3api/create-multipart-upload.rst +4 -4
- awscli/examples/s3api/delete-bucket-analytics-configuration.rst +1 -1
- awscli/examples/s3api/delete-bucket-cors.rst +2 -2
- awscli/examples/s3api/delete-bucket-encryption.rst +1 -1
- awscli/examples/s3api/delete-bucket-inventory-configuration.rst +1 -1
- awscli/examples/s3api/delete-bucket-lifecycle.rst +2 -2
- awscli/examples/s3api/delete-bucket-metrics-configuration.rst +1 -1
- awscli/examples/s3api/delete-bucket-policy.rst +2 -2
- awscli/examples/s3api/delete-bucket-replication.rst +2 -2
- awscli/examples/s3api/delete-bucket-tagging.rst +2 -2
- awscli/examples/s3api/delete-bucket-website.rst +2 -2
- awscli/examples/s3api/delete-bucket.rst +2 -2
- awscli/examples/s3api/delete-object-tagging.rst +1 -1
- awscli/examples/s3api/delete-object.rst +2 -2
- awscli/examples/s3api/delete-objects.rst +2 -2
- awscli/examples/s3api/delete-public-access-block.rst +1 -1
- awscli/examples/s3api/get-bucket-accelerate-configuration.rst +1 -1
- awscli/examples/s3api/get-bucket-acl.rst +2 -2
- awscli/examples/s3api/get-bucket-analytics-configuration.rst +1 -1
- awscli/examples/s3api/get-bucket-cors.rst +2 -2
- awscli/examples/s3api/get-bucket-encryption.rst +2 -2
- awscli/examples/s3api/get-bucket-inventory-configuration.rst +2 -2
- awscli/examples/s3api/get-bucket-lifecycle-configuration.rst +2 -2
- awscli/examples/s3api/get-bucket-lifecycle.rst +2 -2
- awscli/examples/s3api/get-bucket-location.rst +2 -2
- awscli/examples/s3api/get-bucket-logging.rst +2 -2
- awscli/examples/s3api/get-bucket-metrics-configuration.rst +1 -1
- awscli/examples/s3api/get-bucket-notification-configuration.rst +2 -2
- awscli/examples/s3api/get-bucket-notification.rst +2 -2
- awscli/examples/s3api/get-bucket-policy-status.rst +2 -2
- awscli/examples/s3api/get-bucket-policy.rst +3 -3
- awscli/examples/s3api/get-bucket-replication.rst +3 -3
- awscli/examples/s3api/get-bucket-request-payment.rst +1 -1
- awscli/examples/s3api/get-bucket-tagging.rst +2 -2
- awscli/examples/s3api/get-bucket-versioning.rst +2 -2
- awscli/examples/s3api/get-bucket-website.rst +2 -2
- awscli/examples/s3api/get-object-acl.rst +2 -2
- awscli/examples/s3api/get-object-attributes.rst +1 -1
- awscli/examples/s3api/get-object-legal-hold.rst +1 -1
- awscli/examples/s3api/get-object-lock-configuration.rst +1 -1
- awscli/examples/s3api/get-object-retention.rst +1 -1
- awscli/examples/s3api/get-object-tagging.rst +3 -3
- awscli/examples/s3api/get-object-torrent.rst +2 -2
- awscli/examples/s3api/get-public-access-block.rst +1 -1
- awscli/examples/s3api/head-bucket.rst +2 -2
- awscli/examples/s3api/head-object.rst +2 -2
- awscli/examples/s3api/list-bucket-analytics-configurations.rst +1 -1
- awscli/examples/s3api/list-bucket-inventory-configurations.rst +3 -3
- awscli/examples/s3api/list-bucket-metrics-configurations.rst +1 -1
- awscli/examples/s3api/list-multipart-uploads.rst +2 -2
- awscli/examples/s3api/list-object-versions.rst +2 -2
- awscli/examples/s3api/list-objects-v2.rst +1 -1
- awscli/examples/s3api/list-parts.rst +2 -2
- awscli/examples/s3api/put-bucket-accelerate-configuration.rst +1 -1
- awscli/examples/s3api/put-bucket-analytics-configuration.rst +1 -1
- awscli/examples/s3api/put-bucket-encryption.rst +1 -1
- awscli/examples/s3api/put-bucket-inventory-configuration.rst +6 -6
- awscli/examples/s3api/put-bucket-lifecycle-configuration.rst +2 -2
- awscli/examples/s3api/put-bucket-lifecycle.rst +2 -2
- awscli/examples/s3api/put-bucket-metrics-configuration.rst +1 -1
- awscli/examples/s3api/put-bucket-notification-configuration.rst +44 -44
- awscli/examples/s3api/put-bucket-notification.rst +4 -4
- awscli/examples/s3api/put-bucket-request-payment.rst +2 -2
- awscli/examples/s3api/put-bucket-tagging.rst +4 -4
- awscli/examples/s3api/put-bucket-versioning.rst +3 -3
- awscli/examples/s3api/put-bucket-website.rst +2 -2
- awscli/examples/s3api/put-object-legal-hold.rst +1 -1
- awscli/examples/s3api/put-object-lock-configuration.rst +1 -1
- awscli/examples/s3api/put-object-retention.rst +1 -1
- awscli/examples/s3api/put-object-tagging.rst +2 -2
- awscli/examples/s3api/put-public-access-block.rst +1 -1
- awscli/examples/s3api/select-object-content.rst +1 -1
- awscli/examples/s3api/upload-part-copy.rst +2 -2
- awscli/examples/s3api/upload-part.rst +1 -1
- awscli/examples/s3api/wait/bucket-exists.rst +1 -1
- awscli/examples/s3api/wait/bucket-not-exists.rst +1 -1
- awscli/examples/s3api/wait/object-exists.rst +1 -1
- awscli/examples/s3api/wait/object-not-exists.rst +1 -1
- {awscli-1.37.11.dist-info → awscli-1.37.13.dist-info}/METADATA +2 -2
- {awscli-1.37.11.dist-info → awscli-1.37.13.dist-info}/RECORD +145 -122
- {awscli-1.37.11.data → awscli-1.37.13.data}/scripts/aws +0 -0
- {awscli-1.37.11.data → awscli-1.37.13.data}/scripts/aws.cmd +0 -0
- {awscli-1.37.11.data → awscli-1.37.13.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.37.11.data → awscli-1.37.13.data}/scripts/aws_completer +0 -0
- {awscli-1.37.11.data → awscli-1.37.13.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.37.11.dist-info → awscli-1.37.13.dist-info}/LICENSE.txt +0 -0
- {awscli-1.37.11.dist-info → awscli-1.37.13.dist-info}/WHEEL +0 -0
- {awscli-1.37.11.dist-info → awscli-1.37.13.dist-info}/top_level.txt +0 -0
awscli/__init__.py
CHANGED
|
@@ -1,35 +1,35 @@
|
|
|
1
|
-
**To create and configure AWS resources for a trail**
|
|
2
|
-
|
|
3
|
-
The following ``create-subscription`` command creates a new S3 bucket and SNS topic for ``Trail1``. ::
|
|
4
|
-
|
|
5
|
-
aws cloudtrail create-subscription \
|
|
6
|
-
--name Trail1 \
|
|
7
|
-
--s3-new-bucket amzn-s3-demo-bucket \
|
|
8
|
-
--sns-new-topic my-topic
|
|
9
|
-
|
|
10
|
-
Output::
|
|
11
|
-
|
|
12
|
-
Setting up new S3 bucket amzn-s3-demo-bucket...
|
|
13
|
-
Setting up new SNS topic my-topic...
|
|
14
|
-
Creating/updating CloudTrail configuration...
|
|
15
|
-
CloudTrail configuration:
|
|
16
|
-
{
|
|
17
|
-
"trailList": [
|
|
18
|
-
{
|
|
19
|
-
"IncludeGlobalServiceEvents": true,
|
|
20
|
-
"Name": "Trail1",
|
|
21
|
-
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
22
|
-
"LogFileValidationEnabled": false,
|
|
23
|
-
"IsMultiRegionTrail": false,
|
|
24
|
-
"S3BucketName": "amzn-s3-demo-bucket",
|
|
25
|
-
"SnsTopicName": "my-topic",
|
|
26
|
-
"HomeRegion": "us-east-1"
|
|
27
|
-
}
|
|
28
|
-
],
|
|
29
|
-
"ResponseMetadata": {
|
|
30
|
-
"HTTPStatusCode": 200,
|
|
31
|
-
"RequestId": "f39e51f6-c615-11e5-85bd-d35ca21ee3e2"
|
|
32
|
-
}
|
|
33
|
-
}
|
|
34
|
-
Starting CloudTrail service...
|
|
35
|
-
Logs will be delivered to my-bucket
|
|
1
|
+
**To create and configure AWS resources for a trail**
|
|
2
|
+
|
|
3
|
+
The following ``create-subscription`` command creates a new S3 bucket and SNS topic for ``Trail1``. ::
|
|
4
|
+
|
|
5
|
+
aws cloudtrail create-subscription \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-new-bucket amzn-s3-demo-bucket \
|
|
8
|
+
--sns-new-topic my-topic
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
Setting up new S3 bucket amzn-s3-demo-bucket...
|
|
13
|
+
Setting up new SNS topic my-topic...
|
|
14
|
+
Creating/updating CloudTrail configuration...
|
|
15
|
+
CloudTrail configuration:
|
|
16
|
+
{
|
|
17
|
+
"trailList": [
|
|
18
|
+
{
|
|
19
|
+
"IncludeGlobalServiceEvents": true,
|
|
20
|
+
"Name": "Trail1",
|
|
21
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
22
|
+
"LogFileValidationEnabled": false,
|
|
23
|
+
"IsMultiRegionTrail": false,
|
|
24
|
+
"S3BucketName": "amzn-s3-demo-bucket",
|
|
25
|
+
"SnsTopicName": "my-topic",
|
|
26
|
+
"HomeRegion": "us-east-1"
|
|
27
|
+
}
|
|
28
|
+
],
|
|
29
|
+
"ResponseMetadata": {
|
|
30
|
+
"HTTPStatusCode": 200,
|
|
31
|
+
"RequestId": "f39e51f6-c615-11e5-85bd-d35ca21ee3e2"
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
Starting CloudTrail service...
|
|
35
|
+
Logs will be delivered to my-bucket
|
|
@@ -1,19 +1,19 @@
|
|
|
1
|
-
**To create a trail**
|
|
2
|
-
|
|
3
|
-
The following ``create-trail`` example creates a multi-region trail named ``Trail1`` and specifies an S3 bucket. ::
|
|
4
|
-
|
|
5
|
-
aws cloudtrail create-trail \
|
|
6
|
-
--name Trail1 \
|
|
7
|
-
--s3-bucket-name amzn-s3-demo-bucket \
|
|
8
|
-
--is-multi-region-trail
|
|
9
|
-
|
|
10
|
-
Output::
|
|
11
|
-
|
|
12
|
-
{
|
|
13
|
-
"IncludeGlobalServiceEvents": true,
|
|
14
|
-
"Name": "Trail1",
|
|
15
|
-
"TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
|
|
16
|
-
"LogFileValidationEnabled": false,
|
|
17
|
-
"IsMultiRegionTrail": true,
|
|
18
|
-
"S3BucketName": "amzn-s3-demo-bucket"
|
|
19
|
-
}
|
|
1
|
+
**To create a trail**
|
|
2
|
+
|
|
3
|
+
The following ``create-trail`` example creates a multi-region trail named ``Trail1`` and specifies an S3 bucket. ::
|
|
4
|
+
|
|
5
|
+
aws cloudtrail create-trail \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-bucket-name amzn-s3-demo-bucket \
|
|
8
|
+
--is-multi-region-trail
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"IncludeGlobalServiceEvents": true,
|
|
14
|
+
"Name": "Trail1",
|
|
15
|
+
"TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
|
|
16
|
+
"LogFileValidationEnabled": false,
|
|
17
|
+
"IsMultiRegionTrail": true,
|
|
18
|
+
"S3BucketName": "amzn-s3-demo-bucket"
|
|
19
|
+
}
|
|
@@ -1,36 +1,36 @@
|
|
|
1
|
-
**To describe a trail**
|
|
2
|
-
|
|
3
|
-
The following ``describe-trails`` example returns the settings for ``Trail1`` and ``Trail2``. ::
|
|
4
|
-
|
|
5
|
-
aws cloudtrail describe-trails \
|
|
6
|
-
--trail-name-list Trail1 Trail2
|
|
7
|
-
|
|
8
|
-
Output::
|
|
9
|
-
|
|
10
|
-
{
|
|
11
|
-
"trailList": [
|
|
12
|
-
{
|
|
13
|
-
"IncludeGlobalServiceEvents": true,
|
|
14
|
-
"Name": "Trail1",
|
|
15
|
-
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
16
|
-
"LogFileValidationEnabled": false,
|
|
17
|
-
"IsMultiRegionTrail": false,
|
|
18
|
-
"S3BucketName": "amzn-s3-demo-bucket",
|
|
19
|
-
"CloudWatchLogsRoleArn": "arn:aws:iam::123456789012:role/CloudTrail_CloudWatchLogs_Role",
|
|
20
|
-
"CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:123456789012:log-group:CloudTrail:*",
|
|
21
|
-
"SnsTopicName": "my-topic",
|
|
22
|
-
"HomeRegion": "us-east-1"
|
|
23
|
-
},
|
|
24
|
-
{
|
|
25
|
-
"IncludeGlobalServiceEvents": true,
|
|
26
|
-
"Name": "Trail2",
|
|
27
|
-
"S3KeyPrefix": "my-prefix",
|
|
28
|
-
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail2",
|
|
29
|
-
"LogFileValidationEnabled": false,
|
|
30
|
-
"IsMultiRegionTrail": false,
|
|
31
|
-
"S3BucketName": "amzn-s3-demo-bucket2",
|
|
32
|
-
"KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/4c5ae5ac-3c13-421e-8335-c7868ef6a769",
|
|
33
|
-
"HomeRegion": "us-east-1"
|
|
34
|
-
}
|
|
35
|
-
]
|
|
36
|
-
}
|
|
1
|
+
**To describe a trail**
|
|
2
|
+
|
|
3
|
+
The following ``describe-trails`` example returns the settings for ``Trail1`` and ``Trail2``. ::
|
|
4
|
+
|
|
5
|
+
aws cloudtrail describe-trails \
|
|
6
|
+
--trail-name-list Trail1 Trail2
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"trailList": [
|
|
12
|
+
{
|
|
13
|
+
"IncludeGlobalServiceEvents": true,
|
|
14
|
+
"Name": "Trail1",
|
|
15
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
16
|
+
"LogFileValidationEnabled": false,
|
|
17
|
+
"IsMultiRegionTrail": false,
|
|
18
|
+
"S3BucketName": "amzn-s3-demo-bucket",
|
|
19
|
+
"CloudWatchLogsRoleArn": "arn:aws:iam::123456789012:role/CloudTrail_CloudWatchLogs_Role",
|
|
20
|
+
"CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:123456789012:log-group:CloudTrail:*",
|
|
21
|
+
"SnsTopicName": "my-topic",
|
|
22
|
+
"HomeRegion": "us-east-1"
|
|
23
|
+
},
|
|
24
|
+
{
|
|
25
|
+
"IncludeGlobalServiceEvents": true,
|
|
26
|
+
"Name": "Trail2",
|
|
27
|
+
"S3KeyPrefix": "my-prefix",
|
|
28
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail2",
|
|
29
|
+
"LogFileValidationEnabled": false,
|
|
30
|
+
"IsMultiRegionTrail": false,
|
|
31
|
+
"S3BucketName": "amzn-s3-demo-bucket2",
|
|
32
|
+
"KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/4c5ae5ac-3c13-421e-8335-c7868ef6a769",
|
|
33
|
+
"HomeRegion": "us-east-1"
|
|
34
|
+
}
|
|
35
|
+
]
|
|
36
|
+
}
|
|
@@ -1,33 +1,33 @@
|
|
|
1
|
-
**To update the configuration settings for a trail**
|
|
2
|
-
|
|
3
|
-
The following ``update-subscription`` example updates the trail to specify a new S3 bucket and SNS topic. ::
|
|
4
|
-
|
|
5
|
-
aws cloudtrail update-subscription \
|
|
6
|
-
--name Trail1 \
|
|
7
|
-
--s3-new-bucket amzn-s3-demo-bucket \
|
|
8
|
-
--sns-new-topic my-topic-new
|
|
9
|
-
|
|
10
|
-
Output::
|
|
11
|
-
|
|
12
|
-
Setting up new S3 bucket amzn-s3-demo-bucket...
|
|
13
|
-
Setting up new SNS topic my-topic-new...
|
|
14
|
-
Creating/updating CloudTrail configuration...
|
|
15
|
-
CloudTrail configuration:
|
|
16
|
-
{
|
|
17
|
-
"trailList": [
|
|
18
|
-
{
|
|
19
|
-
"IncludeGlobalServiceEvents": true,
|
|
20
|
-
"Name": "Trail1",
|
|
21
|
-
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
22
|
-
"LogFileValidationEnabled": false,
|
|
23
|
-
"IsMultiRegionTrail": false,
|
|
24
|
-
"S3BucketName": "amzn-s3-demo-bucket",
|
|
25
|
-
"SnsTopicName": "my-topic-new",
|
|
26
|
-
"HomeRegion": "us-east-1"
|
|
27
|
-
}
|
|
28
|
-
],
|
|
29
|
-
"ResponseMetadata": {
|
|
30
|
-
"HTTPStatusCode": 200,
|
|
31
|
-
"RequestId": "31126f8a-c616-11e5-9cc6-2fd637936879"
|
|
32
|
-
}
|
|
33
|
-
}
|
|
1
|
+
**To update the configuration settings for a trail**
|
|
2
|
+
|
|
3
|
+
The following ``update-subscription`` example updates the trail to specify a new S3 bucket and SNS topic. ::
|
|
4
|
+
|
|
5
|
+
aws cloudtrail update-subscription \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-new-bucket amzn-s3-demo-bucket \
|
|
8
|
+
--sns-new-topic my-topic-new
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
Setting up new S3 bucket amzn-s3-demo-bucket...
|
|
13
|
+
Setting up new SNS topic my-topic-new...
|
|
14
|
+
Creating/updating CloudTrail configuration...
|
|
15
|
+
CloudTrail configuration:
|
|
16
|
+
{
|
|
17
|
+
"trailList": [
|
|
18
|
+
{
|
|
19
|
+
"IncludeGlobalServiceEvents": true,
|
|
20
|
+
"Name": "Trail1",
|
|
21
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
22
|
+
"LogFileValidationEnabled": false,
|
|
23
|
+
"IsMultiRegionTrail": false,
|
|
24
|
+
"S3BucketName": "amzn-s3-demo-bucket",
|
|
25
|
+
"SnsTopicName": "my-topic-new",
|
|
26
|
+
"HomeRegion": "us-east-1"
|
|
27
|
+
}
|
|
28
|
+
],
|
|
29
|
+
"ResponseMetadata": {
|
|
30
|
+
"HTTPStatusCode": 200,
|
|
31
|
+
"RequestId": "31126f8a-c616-11e5-9cc6-2fd637936879"
|
|
32
|
+
}
|
|
33
|
+
}
|
|
@@ -1,18 +1,18 @@
|
|
|
1
|
-
**To update a trail**
|
|
2
|
-
|
|
3
|
-
The following ``update-trail`` example updates a trail to use an existing bucket for log delivery. ::
|
|
4
|
-
|
|
5
|
-
aws cloudtrail update-trail \
|
|
6
|
-
--name Trail1 \
|
|
7
|
-
--s3-bucket-name amzn-s3-demo-bucket
|
|
8
|
-
|
|
9
|
-
Output::
|
|
10
|
-
|
|
11
|
-
{
|
|
12
|
-
"IncludeGlobalServiceEvents": true,
|
|
13
|
-
"Name": "Trail1",
|
|
14
|
-
"TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
|
|
15
|
-
"LogFileValidationEnabled": false,
|
|
16
|
-
"IsMultiRegionTrail": true,
|
|
17
|
-
"S3BucketName": "amzn-s3-demo-bucket"
|
|
18
|
-
}
|
|
1
|
+
**To update a trail**
|
|
2
|
+
|
|
3
|
+
The following ``update-trail`` example updates a trail to use an existing bucket for log delivery. ::
|
|
4
|
+
|
|
5
|
+
aws cloudtrail update-trail \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-bucket-name amzn-s3-demo-bucket
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"IncludeGlobalServiceEvents": true,
|
|
13
|
+
"Name": "Trail1",
|
|
14
|
+
"TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
|
|
15
|
+
"LogFileValidationEnabled": false,
|
|
16
|
+
"IsMultiRegionTrail": true,
|
|
17
|
+
"S3BucketName": "amzn-s3-demo-bucket"
|
|
18
|
+
}
|
|
@@ -1,115 +1,115 @@
|
|
|
1
|
-
**To list action executions**
|
|
2
|
-
|
|
3
|
-
The following ``list-action-executions`` example views action execution details for a pipeline, such as action execution ID, input artifacts, output artifacts, execution result, and status. ::
|
|
4
|
-
|
|
5
|
-
aws codepipeline list-action-executions \
|
|
6
|
-
--pipeline-name myPipeline
|
|
7
|
-
|
|
8
|
-
Output::
|
|
9
|
-
|
|
10
|
-
{
|
|
11
|
-
"actionExecutionDetails": [
|
|
12
|
-
{
|
|
13
|
-
"pipelineExecutionId": "EXAMPLE0-adfc-488e-bf4c-1111111720d3",
|
|
14
|
-
"actionExecutionId": "EXAMPLE4-2ee8-4853-bd6a-111111158148",
|
|
15
|
-
"pipelineVersion": 12,
|
|
16
|
-
"stageName": "Deploy",
|
|
17
|
-
"actionName": "Deploy",
|
|
18
|
-
"startTime": 1598572628.6,
|
|
19
|
-
"lastUpdateTime": 1598572661.255,
|
|
20
|
-
"status": "Succeeded",
|
|
21
|
-
"input": {
|
|
22
|
-
"actionTypeId": {
|
|
23
|
-
"category": "Deploy",
|
|
24
|
-
"owner": "AWS",
|
|
25
|
-
"provider": "CodeDeploy",
|
|
26
|
-
"version": "1"
|
|
27
|
-
},
|
|
28
|
-
"configuration": {
|
|
29
|
-
"ApplicationName": "my-application",
|
|
30
|
-
"DeploymentGroupName": "my-deployment-group"
|
|
31
|
-
},
|
|
32
|
-
"resolvedConfiguration": {
|
|
33
|
-
"ApplicationName": "my-application",
|
|
34
|
-
"DeploymentGroupName": "my-deployment-group"
|
|
35
|
-
},
|
|
36
|
-
"region": "us-east-1",
|
|
37
|
-
"inputArtifacts": [
|
|
38
|
-
{
|
|
39
|
-
"name": "SourceArtifact",
|
|
40
|
-
"s3location": {
|
|
41
|
-
"bucket": "artifact-bucket",
|
|
42
|
-
"key": "myPipeline/SourceArti/key"
|
|
43
|
-
}
|
|
44
|
-
}
|
|
45
|
-
],
|
|
46
|
-
"namespace": "DeployVariables"
|
|
47
|
-
},
|
|
48
|
-
"output": {
|
|
49
|
-
"outputArtifacts": [],
|
|
50
|
-
"executionResult": {
|
|
51
|
-
"externalExecutionId": "d-EXAMPLEE5",
|
|
52
|
-
"externalExecutionSummary": "Deployment Succeeded",
|
|
53
|
-
"externalExecutionUrl": "https://myaddress.com"
|
|
54
|
-
},
|
|
55
|
-
"outputVariables": {}
|
|
56
|
-
}
|
|
57
|
-
},
|
|
58
|
-
{
|
|
59
|
-
"pipelineExecutionId": "EXAMPLE0-adfc-488e-bf4c-1111111720d3",
|
|
60
|
-
"actionExecutionId": "EXAMPLE5-abb4-4192-9031-11111113a7b0",
|
|
61
|
-
"pipelineVersion": 12,
|
|
62
|
-
"stageName": "Source",
|
|
63
|
-
"actionName": "Source",
|
|
64
|
-
"startTime": 1598572624.387,
|
|
65
|
-
"lastUpdateTime": 1598572628.16,
|
|
66
|
-
"status": "Succeeded",
|
|
67
|
-
"input": {
|
|
68
|
-
"actionTypeId": {
|
|
69
|
-
"category": "Source",
|
|
70
|
-
"owner": "AWS",
|
|
71
|
-
"provider": "CodeCommit",
|
|
72
|
-
"version": "1"
|
|
73
|
-
},
|
|
74
|
-
"configuration": {
|
|
75
|
-
"BranchName": "production",
|
|
76
|
-
"PollForSourceChanges": "false",
|
|
77
|
-
"RepositoryName": "my-repo"
|
|
78
|
-
},
|
|
79
|
-
"resolvedConfiguration": {
|
|
80
|
-
"BranchName": "production",
|
|
81
|
-
"PollForSourceChanges": "false",
|
|
82
|
-
"RepositoryName": "my-repo"
|
|
83
|
-
},
|
|
84
|
-
"region": "us-east-1",
|
|
85
|
-
"inputArtifacts": [],
|
|
86
|
-
"namespace": "SourceVariables"
|
|
87
|
-
},
|
|
88
|
-
"output": {
|
|
89
|
-
"outputArtifacts": [
|
|
90
|
-
{
|
|
91
|
-
"name": "SourceArtifact",
|
|
92
|
-
"s3location": {
|
|
93
|
-
"bucket": "
|
|
94
|
-
"key": "myPipeline/SourceArti/key"
|
|
95
|
-
}
|
|
96
|
-
}
|
|
97
|
-
],
|
|
98
|
-
"executionResult": {
|
|
99
|
-
"externalExecutionId": "1111111ad99dcd35914c00b7fbea13995EXAMPLE",
|
|
100
|
-
"externalExecutionSummary": "Edited template.yml",
|
|
101
|
-
"externalExecutionUrl": "https://myaddress.com"
|
|
102
|
-
},
|
|
103
|
-
"outputVariables": {
|
|
104
|
-
"AuthorDate": "2020-05-08T17:45:43Z",
|
|
105
|
-
"BranchName": "production",
|
|
106
|
-
"CommitId": "EXAMPLEad99dcd35914c00b7fbea139951111111",
|
|
107
|
-
"CommitMessage": "Edited template.yml",
|
|
108
|
-
"CommitterDate": "2020-05-08T17:45:43Z",
|
|
109
|
-
"RepositoryName": "my-repo"
|
|
110
|
-
}
|
|
111
|
-
}
|
|
112
|
-
},
|
|
113
|
-
. . . .
|
|
114
|
-
|
|
1
|
+
**To list action executions**
|
|
2
|
+
|
|
3
|
+
The following ``list-action-executions`` example views action execution details for a pipeline, such as action execution ID, input artifacts, output artifacts, execution result, and status. ::
|
|
4
|
+
|
|
5
|
+
aws codepipeline list-action-executions \
|
|
6
|
+
--pipeline-name myPipeline
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"actionExecutionDetails": [
|
|
12
|
+
{
|
|
13
|
+
"pipelineExecutionId": "EXAMPLE0-adfc-488e-bf4c-1111111720d3",
|
|
14
|
+
"actionExecutionId": "EXAMPLE4-2ee8-4853-bd6a-111111158148",
|
|
15
|
+
"pipelineVersion": 12,
|
|
16
|
+
"stageName": "Deploy",
|
|
17
|
+
"actionName": "Deploy",
|
|
18
|
+
"startTime": 1598572628.6,
|
|
19
|
+
"lastUpdateTime": 1598572661.255,
|
|
20
|
+
"status": "Succeeded",
|
|
21
|
+
"input": {
|
|
22
|
+
"actionTypeId": {
|
|
23
|
+
"category": "Deploy",
|
|
24
|
+
"owner": "AWS",
|
|
25
|
+
"provider": "CodeDeploy",
|
|
26
|
+
"version": "1"
|
|
27
|
+
},
|
|
28
|
+
"configuration": {
|
|
29
|
+
"ApplicationName": "my-application",
|
|
30
|
+
"DeploymentGroupName": "my-deployment-group"
|
|
31
|
+
},
|
|
32
|
+
"resolvedConfiguration": {
|
|
33
|
+
"ApplicationName": "my-application",
|
|
34
|
+
"DeploymentGroupName": "my-deployment-group"
|
|
35
|
+
},
|
|
36
|
+
"region": "us-east-1",
|
|
37
|
+
"inputArtifacts": [
|
|
38
|
+
{
|
|
39
|
+
"name": "SourceArtifact",
|
|
40
|
+
"s3location": {
|
|
41
|
+
"bucket": "artifact-bucket",
|
|
42
|
+
"key": "myPipeline/SourceArti/key"
|
|
43
|
+
}
|
|
44
|
+
}
|
|
45
|
+
],
|
|
46
|
+
"namespace": "DeployVariables"
|
|
47
|
+
},
|
|
48
|
+
"output": {
|
|
49
|
+
"outputArtifacts": [],
|
|
50
|
+
"executionResult": {
|
|
51
|
+
"externalExecutionId": "d-EXAMPLEE5",
|
|
52
|
+
"externalExecutionSummary": "Deployment Succeeded",
|
|
53
|
+
"externalExecutionUrl": "https://myaddress.com"
|
|
54
|
+
},
|
|
55
|
+
"outputVariables": {}
|
|
56
|
+
}
|
|
57
|
+
},
|
|
58
|
+
{
|
|
59
|
+
"pipelineExecutionId": "EXAMPLE0-adfc-488e-bf4c-1111111720d3",
|
|
60
|
+
"actionExecutionId": "EXAMPLE5-abb4-4192-9031-11111113a7b0",
|
|
61
|
+
"pipelineVersion": 12,
|
|
62
|
+
"stageName": "Source",
|
|
63
|
+
"actionName": "Source",
|
|
64
|
+
"startTime": 1598572624.387,
|
|
65
|
+
"lastUpdateTime": 1598572628.16,
|
|
66
|
+
"status": "Succeeded",
|
|
67
|
+
"input": {
|
|
68
|
+
"actionTypeId": {
|
|
69
|
+
"category": "Source",
|
|
70
|
+
"owner": "AWS",
|
|
71
|
+
"provider": "CodeCommit",
|
|
72
|
+
"version": "1"
|
|
73
|
+
},
|
|
74
|
+
"configuration": {
|
|
75
|
+
"BranchName": "production",
|
|
76
|
+
"PollForSourceChanges": "false",
|
|
77
|
+
"RepositoryName": "my-repo"
|
|
78
|
+
},
|
|
79
|
+
"resolvedConfiguration": {
|
|
80
|
+
"BranchName": "production",
|
|
81
|
+
"PollForSourceChanges": "false",
|
|
82
|
+
"RepositoryName": "my-repo"
|
|
83
|
+
},
|
|
84
|
+
"region": "us-east-1",
|
|
85
|
+
"inputArtifacts": [],
|
|
86
|
+
"namespace": "SourceVariables"
|
|
87
|
+
},
|
|
88
|
+
"output": {
|
|
89
|
+
"outputArtifacts": [
|
|
90
|
+
{
|
|
91
|
+
"name": "SourceArtifact",
|
|
92
|
+
"s3location": {
|
|
93
|
+
"bucket": "amzn-s3-demo-bucket",
|
|
94
|
+
"key": "myPipeline/SourceArti/key"
|
|
95
|
+
}
|
|
96
|
+
}
|
|
97
|
+
],
|
|
98
|
+
"executionResult": {
|
|
99
|
+
"externalExecutionId": "1111111ad99dcd35914c00b7fbea13995EXAMPLE",
|
|
100
|
+
"externalExecutionSummary": "Edited template.yml",
|
|
101
|
+
"externalExecutionUrl": "https://myaddress.com"
|
|
102
|
+
},
|
|
103
|
+
"outputVariables": {
|
|
104
|
+
"AuthorDate": "2020-05-08T17:45:43Z",
|
|
105
|
+
"BranchName": "production",
|
|
106
|
+
"CommitId": "EXAMPLEad99dcd35914c00b7fbea139951111111",
|
|
107
|
+
"CommitMessage": "Edited template.yml",
|
|
108
|
+
"CommitterDate": "2020-05-08T17:45:43Z",
|
|
109
|
+
"RepositoryName": "my-repo"
|
|
110
|
+
}
|
|
111
|
+
}
|
|
112
|
+
},
|
|
113
|
+
. . . .
|
|
114
|
+
|
|
115
115
|
For more information, see `View action executions (CLI) <https://docs.aws.amazon.com/codepipeline/latest/userguide/pipelines-view-cli.html#pipelines-action-executions-cli>`__ in the *AWS CodePipeline User Guide*.
|
|
@@ -1,24 +1,24 @@
|
|
|
1
|
-
**To create a Spot Instance data feed**
|
|
2
|
-
|
|
3
|
-
The following ``create-spot-datafeed-subscription`` example creates a Spot Instance data feed. ::
|
|
4
|
-
|
|
5
|
-
aws ec2 create-spot-datafeed-subscription \
|
|
6
|
-
--bucket
|
|
7
|
-
--prefix spot-data-feed
|
|
8
|
-
|
|
9
|
-
Output::
|
|
10
|
-
|
|
11
|
-
{
|
|
12
|
-
"SpotDatafeedSubscription": {
|
|
13
|
-
"Bucket": "
|
|
14
|
-
"OwnerId": "123456789012",
|
|
15
|
-
"Prefix": "spot-data-feed",
|
|
16
|
-
"State": "Active"
|
|
17
|
-
}
|
|
18
|
-
}
|
|
19
|
-
|
|
20
|
-
The data feed is stored in the Amazon S3 bucket that you specified. The file names for this data feed have the following format. ::
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
For more information, see `Spot Instance data feed <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/spot-data-feeds.html>`__ in the *Amazon EC2 User Guide*.
|
|
1
|
+
**To create a Spot Instance data feed**
|
|
2
|
+
|
|
3
|
+
The following ``create-spot-datafeed-subscription`` example creates a Spot Instance data feed. ::
|
|
4
|
+
|
|
5
|
+
aws ec2 create-spot-datafeed-subscription \
|
|
6
|
+
--bucket amzn-s3-demo-bucket \
|
|
7
|
+
--prefix spot-data-feed
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"SpotDatafeedSubscription": {
|
|
13
|
+
"Bucket": "amzn-s3-demo-bucket",
|
|
14
|
+
"OwnerId": "123456789012",
|
|
15
|
+
"Prefix": "spot-data-feed",
|
|
16
|
+
"State": "Active"
|
|
17
|
+
}
|
|
18
|
+
}
|
|
19
|
+
|
|
20
|
+
The data feed is stored in the Amazon S3 bucket that you specified. The file names for this data feed have the following format. ::
|
|
21
|
+
|
|
22
|
+
amzn-s3-demo-bucket.s3.amazonaws.com/spot-data-feed/123456789012.YYYY-MM-DD-HH.n.abcd1234.gz
|
|
23
|
+
|
|
24
|
+
For more information, see `Spot Instance data feed <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/spot-data-feeds.html>`__ in the *Amazon EC2 User Guide*.
|
|
@@ -2,9 +2,9 @@
|
|
|
2
2
|
|
|
3
3
|
The following command creates a new version, "v1" of an application named "MyApp"::
|
|
4
4
|
|
|
5
|
-
aws elasticbeanstalk create-application-version --application-name MyApp --version-label v1 --description MyAppv1 --source-bundle S3Bucket="
|
|
5
|
+
aws elasticbeanstalk create-application-version --application-name MyApp --version-label v1 --description MyAppv1 --source-bundle S3Bucket="amzn-s3-demo-bucket",S3Key="sample.war" --auto-create-application
|
|
6
6
|
|
|
7
|
-
The application will be created automatically if it does not already exist, due to the auto-create-application option. The source bundle is a .war file stored in an s3 bucket named "
|
|
7
|
+
The application will be created automatically if it does not already exist, due to the auto-create-application option. The source bundle is a .war file stored in an s3 bucket named "amzn-s3-demo-bucket" that contains the Apache Tomcat sample application.
|
|
8
8
|
|
|
9
9
|
Output::
|
|
10
10
|
|
|
@@ -16,7 +16,7 @@ Output::
|
|
|
16
16
|
"DateCreated": "2015-02-03T23:01:25.412Z",
|
|
17
17
|
"DateUpdated": "2015-02-03T23:01:25.412Z",
|
|
18
18
|
"SourceBundle": {
|
|
19
|
-
"S3Bucket": "
|
|
19
|
+
"S3Bucket": "amzn-s3-demo-bucket",
|
|
20
20
|
"S3Key": "sample.war"
|
|
21
21
|
}
|
|
22
22
|
}
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
**To create a monitor**
|
|
2
|
+
|
|
3
|
+
The following ``create-monitor`` example creates a monitor named ``demo`` in the specified account. ::
|
|
4
|
+
|
|
5
|
+
aws networkflowmonitor create-monitor \
|
|
6
|
+
--monitor-name demo \
|
|
7
|
+
--local-resources type="AWS::EC2::VPC",identifier="arn:aws:ec2:us-east-1:123456789012:vpc/vpc-03ea55eeda25adbb0" \
|
|
8
|
+
--scope-arn arn:aws:networkflowmonitor:us-east-1:123456789012:scope/e21cda79-30a0-4c12-9299-d8629d76d8cf
|
|
9
|
+
|
|
10
|
+
Output::
|
|
11
|
+
|
|
12
|
+
{
|
|
13
|
+
"monitorArn": "arn:aws:networkflowmonitor:us-east-1:123456789012:monitor/demo",
|
|
14
|
+
"monitorName": "demo",
|
|
15
|
+
"monitorStatus": "ACTIVE",
|
|
16
|
+
"tags": {}
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
For more information, see `Create a monitor in Network Flow Monitor <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-NetworkFlowMonitor-configure-monitors-create.html>`__ in the *Amazon CloudWatch User Guide*.
|