awscli 1.37.4__py3-none-any.whl → 1.37.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/examples/cloudtrail/create-subscription.rst +29 -26
- awscli/examples/cloudtrail/create-trail.rst +13 -11
- awscli/examples/cloudtrail/describe-trails.rst +30 -29
- awscli/examples/cloudtrail/put-event-selectors.rst +8 -8
- awscli/examples/cloudtrail/update-subscription.rst +25 -22
- awscli/examples/cloudtrail/update-trail.rst +12 -10
- awscli/examples/codebuild/create-report-group.rst +2 -2
- awscli/examples/datapipeline/get-pipeline-definition.rst +1 -1
- awscli/examples/ds-data/add-group-member.rst +12 -0
- awscli/examples/ds-data/create-group.rst +17 -0
- awscli/examples/ds-data/create-user.rst +17 -0
- awscli/examples/ds-data/delete-group.rst +11 -0
- awscli/examples/ds-data/delete-user.rst +11 -0
- awscli/examples/ds-data/describe-group.rst +21 -0
- awscli/examples/ds-data/describe-user.rst +21 -0
- awscli/examples/ds-data/disable-directory-data-access.rst +10 -0
- awscli/examples/ds-data/disable-user.rst +11 -0
- awscli/examples/ds-data/enable-directory-data-access.rst +10 -0
- awscli/examples/ds-data/list-group-members.rst +29 -0
- awscli/examples/ds-data/list-groups-for-member.rst +25 -0
- awscli/examples/ds-data/list-groups.rst +503 -0
- awscli/examples/ds-data/list-users.rst +57 -0
- awscli/examples/ds-data/remove-group-member.rst +12 -0
- awscli/examples/ds-data/reset-user-password.rst +12 -0
- awscli/examples/ds-data/search-groups.rst +25 -0
- awscli/examples/ds-data/search-users.rst +24 -0
- awscli/examples/ds-data/update-group.rst +13 -0
- awscli/examples/ds-data/update-user.rst +13 -0
- awscli/examples/ec2/describe-capacity-reservations.rst +46 -31
- awscli/examples/ec2/describe-instance-image-metadata.rst +186 -0
- awscli/examples/ec2/describe-spot-datafeed-subscription.rst +1 -1
- awscli/examples/ec2/register-image.rst +32 -32
- awscli/examples/ecr-public/get-registry-catalog-data.rst +14 -0
- awscli/examples/ecr-public/get-repository-catalog-data.rst +29 -0
- awscli/examples/ecr-public/list-tags-for-resource.rst +28 -0
- awscli/examples/ecr-public/put-registry-catalog-data.rst +15 -0
- awscli/examples/ecr-public/put-repository-catalog-data.rst +5 -4
- awscli/examples/ecr-public/tag-resource.rst +21 -0
- awscli/examples/ecr-public/untag-resource.rst +12 -0
- awscli/examples/ecs/describe-service-deployments.rst +54 -0
- awscli/examples/ecs/describe-service-revisions.rst +60 -0
- awscli/examples/ecs/list-service-deployments.rst +25 -0
- awscli/examples/ivs-realtime/create-storage-configuration.rst +20 -20
- awscli/examples/ivs-realtime/get-storage-configuration.rst +20 -20
- awscli/examples/ivs-realtime/list-storage-configurations.rst +29 -29
- awscli/examples/kendra/create-data-source.rst +23 -23
- awscli/examples/kendra/describe-data-source.rst +83 -83
- awscli/examples/kendra/update-data-source.rst +18 -18
- awscli/examples/macie2/describe-buckets.rst +13 -11
- awscli/examples/oam/create-link.rst +24 -0
- awscli/examples/oam/create-sink.rst +17 -0
- awscli/examples/oam/delete-link.rst +10 -0
- awscli/examples/oam/delete-sink.rst +10 -0
- awscli/examples/oam/get-link.rst +22 -0
- awscli/examples/oam/get-sink-policy.rst +16 -0
- awscli/examples/oam/get-sink.rst +17 -0
- awscli/examples/oam/list-attached-links.rst +23 -0
- awscli/examples/oam/list-links.rst +21 -0
- awscli/examples/oam/list-sinks.rst +19 -0
- awscli/examples/oam/list-tags-for-resource.rst +16 -0
- awscli/examples/oam/put-sink-policy.rst +17 -0
- awscli/examples/oam/tag-resource.rst +11 -0
- awscli/examples/oam/untag-resource.rst +11 -0
- awscli/examples/oam/update-link.rst +24 -0
- awscli/examples/polly/get-speech-synthesis-task.rst +23 -23
- awscli/examples/polly/list-speech-synthesis-tasks.rst +25 -25
- awscli/examples/polly/start-speech-synthesis-task.rst +27 -27
- awscli/examples/qldb/describe-journal-s3-export.rst +1 -1
- awscli/examples/qldb/export-journal-to-s3.rst +1 -1
- awscli/examples/qldb/list-journal-s3-exports-for-ledger.rst +1 -1
- awscli/examples/qldb/list-journal-s3-exports.rst +2 -2
- awscli/examples/s3api/put-bucket-acl.rst +1 -1
- awscli/examples/s3api/put-bucket-cors.rst +1 -1
- awscli/examples/s3api/put-bucket-logging.rst +10 -10
- awscli/examples/s3api/put-bucket-policy.rst +5 -5
- awscli/examples/s3api/put-object-acl.rst +1 -1
- awscli/examples/synthetics/associate-resource.rst +11 -0
- awscli/examples/synthetics/create-canary.rst +48 -0
- awscli/examples/synthetics/create-group.rst +21 -0
- awscli/examples/synthetics/delete-canary.rst +10 -0
- awscli/examples/synthetics/delete-group.rst +10 -0
- awscli/examples/synthetics/describe-canaries-last-run.rst +31 -0
- awscli/examples/synthetics/describe-canaries.rst +48 -0
- awscli/examples/synthetics/describe-runtime-versions.rst +74 -0
- awscli/examples/synthetics/disassociate-resource.rst +11 -0
- awscli/examples/synthetics/get-canary-runs.rst +29 -0
- awscli/examples/synthetics/get-canary.rst +47 -0
- awscli/examples/synthetics/get-group.rst +21 -0
- awscli/examples/synthetics/list-associated-groups.rst +20 -0
- awscli/examples/synthetics/list-group-resources.rst +16 -0
- awscli/examples/synthetics/list-groups.rst +19 -0
- awscli/examples/synthetics/list-tags-for-resource.rst +31 -0
- awscli/examples/synthetics/start-canary.rst +10 -0
- awscli/examples/synthetics/stop-canary.rst +10 -0
- awscli/examples/synthetics/tag-resource.rst +21 -0
- awscli/examples/synthetics/untag-resource.rst +21 -0
- awscli/examples/synthetics/update-canary.rst +11 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/METADATA +2 -2
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/RECORD +108 -42
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws.cmd +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_completer +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/LICENSE.txt +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/WHEEL +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/top_level.txt +0 -0
awscli/__init__.py
CHANGED
|
@@ -1,32 +1,35 @@
|
|
|
1
1
|
**To create and configure AWS resources for a trail**
|
|
2
2
|
|
|
3
|
-
The following ``create-subscription`` command creates a new S3 bucket and SNS topic for ``Trail1
|
|
3
|
+
The following ``create-subscription`` command creates a new S3 bucket and SNS topic for ``Trail1``. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cloudtrail create-subscription \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-new-bucket amzn-s3-demo-bucket \
|
|
8
|
+
--sns-new-topic my-topic
|
|
6
9
|
|
|
7
10
|
Output::
|
|
8
11
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
12
|
+
Setting up new S3 bucket amzn-s3-demo-bucket...
|
|
13
|
+
Setting up new SNS topic my-topic...
|
|
14
|
+
Creating/updating CloudTrail configuration...
|
|
15
|
+
CloudTrail configuration:
|
|
16
|
+
{
|
|
17
|
+
"trailList": [
|
|
18
|
+
{
|
|
19
|
+
"IncludeGlobalServiceEvents": true,
|
|
20
|
+
"Name": "Trail1",
|
|
21
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
22
|
+
"LogFileValidationEnabled": false,
|
|
23
|
+
"IsMultiRegionTrail": false,
|
|
24
|
+
"S3BucketName": "amzn-s3-demo-bucket",
|
|
25
|
+
"SnsTopicName": "my-topic",
|
|
26
|
+
"HomeRegion": "us-east-1"
|
|
27
|
+
}
|
|
28
|
+
],
|
|
29
|
+
"ResponseMetadata": {
|
|
30
|
+
"HTTPStatusCode": 200,
|
|
31
|
+
"RequestId": "f39e51f6-c615-11e5-85bd-d35ca21ee3e2"
|
|
32
|
+
}
|
|
33
|
+
}
|
|
34
|
+
Starting CloudTrail service...
|
|
35
|
+
Logs will be delivered to my-bucket
|
|
@@ -1,17 +1,19 @@
|
|
|
1
1
|
**To create a trail**
|
|
2
2
|
|
|
3
|
-
The following ``create-trail``
|
|
3
|
+
The following ``create-trail`` example creates a multi-region trail named ``Trail1`` and specifies an S3 bucket. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cloudtrail create-trail \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-bucket-name amzn-s3-demo-bucket \
|
|
8
|
+
--is-multi-region-trail
|
|
6
9
|
|
|
7
10
|
Output::
|
|
8
11
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
12
|
+
{
|
|
13
|
+
"IncludeGlobalServiceEvents": true,
|
|
14
|
+
"Name": "Trail1",
|
|
15
|
+
"TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
|
|
16
|
+
"LogFileValidationEnabled": false,
|
|
17
|
+
"IsMultiRegionTrail": true,
|
|
18
|
+
"S3BucketName": "amzn-s3-demo-bucket"
|
|
19
|
+
}
|
|
@@ -1,35 +1,36 @@
|
|
|
1
1
|
**To describe a trail**
|
|
2
2
|
|
|
3
|
-
The following ``describe-trails``
|
|
3
|
+
The following ``describe-trails`` example returns the settings for ``Trail1`` and ``Trail2``. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cloudtrail describe-trails \
|
|
6
|
+
--trail-name-list Trail1 Trail2
|
|
6
7
|
|
|
7
8
|
Output::
|
|
8
9
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
24
|
-
|
|
25
|
-
|
|
26
|
-
|
|
27
|
-
|
|
28
|
-
|
|
29
|
-
|
|
30
|
-
|
|
31
|
-
|
|
32
|
-
|
|
33
|
-
|
|
34
|
-
|
|
35
|
-
|
|
10
|
+
{
|
|
11
|
+
"trailList": [
|
|
12
|
+
{
|
|
13
|
+
"IncludeGlobalServiceEvents": true,
|
|
14
|
+
"Name": "Trail1",
|
|
15
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
16
|
+
"LogFileValidationEnabled": false,
|
|
17
|
+
"IsMultiRegionTrail": false,
|
|
18
|
+
"S3BucketName": "amzn-s3-demo-bucket",
|
|
19
|
+
"CloudWatchLogsRoleArn": "arn:aws:iam::123456789012:role/CloudTrail_CloudWatchLogs_Role",
|
|
20
|
+
"CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:123456789012:log-group:CloudTrail:*",
|
|
21
|
+
"SnsTopicName": "my-topic",
|
|
22
|
+
"HomeRegion": "us-east-1"
|
|
23
|
+
},
|
|
24
|
+
{
|
|
25
|
+
"IncludeGlobalServiceEvents": true,
|
|
26
|
+
"Name": "Trail2",
|
|
27
|
+
"S3KeyPrefix": "my-prefix",
|
|
28
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail2",
|
|
29
|
+
"LogFileValidationEnabled": false,
|
|
30
|
+
"IsMultiRegionTrail": false,
|
|
31
|
+
"S3BucketName": "amzn-s3-demo-bucket2",
|
|
32
|
+
"KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/4c5ae5ac-3c13-421e-8335-c7868ef6a769",
|
|
33
|
+
"HomeRegion": "us-east-1"
|
|
34
|
+
}
|
|
35
|
+
]
|
|
36
|
+
}
|
|
@@ -2,11 +2,11 @@
|
|
|
2
2
|
|
|
3
3
|
You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use advanced event selectors to log all available data event types. You can use either advanced event selectors or basic event selectors, but not both. If you apply advanced event selectors to a trail, any existing basic event selectors are overwritten.
|
|
4
4
|
|
|
5
|
-
The following example creates an advanced event selector for a trail named ``myTrail`` to log all management events, log S3 PutObject and DeleteObject API calls for all but one S3 bucket, log data API calls for a Lambda function named ``myFunction``, and log Publish API calls on an SNS topic named ``myTopic``. ::
|
|
5
|
+
The following ``put-event-selectors`` example creates an advanced event selector for a trail named ``myTrail`` to log all management events, log S3 PutObject and DeleteObject API calls for all but one S3 bucket, log data API calls for a Lambda function named ``myFunction``, and log Publish API calls on an SNS topic named ``myTopic``. ::
|
|
6
6
|
|
|
7
7
|
aws cloudtrail put-event-selectors \
|
|
8
8
|
--trail-name myTrail \
|
|
9
|
-
--advanced-event-selectors '[{"Name": "Log all management events", "FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Management"] }] },{"Name": "Log PutObject and DeleteObject events for all but one bucket","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::S3::Object"] },{ "Field": "eventName", "Equals": ["PutObject","DeleteObject"] },{ "Field": "resources.ARN", "NotStartsWith": ["arn:aws:s3:::
|
|
9
|
+
--advanced-event-selectors '[{"Name": "Log all management events", "FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Management"] }] },{"Name": "Log PutObject and DeleteObject events for all but one bucket","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::S3::Object"] },{ "Field": "eventName", "Equals": ["PutObject","DeleteObject"] },{ "Field": "resources.ARN", "NotStartsWith": ["arn:aws:s3:::amzn-s3-demo-bucket/"] }]},{"Name": "Log data events for a specific Lambda function","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::Lambda::Function"] },{ "Field": "resources.ARN", "Equals": ["arn:aws:lambda:us-east-1:123456789012:function:myFunction"] }]},{"Name": "Log all Publish API calls on a specific SNS topic","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::SNS::Topic"] },{ "Field": "eventName", "Equals": ["Publish"] },{ "Field": "resources.ARN", "Equals": ["arn:aws:sns:us-east-1:123456789012:myTopic.fifo"] }]}]'
|
|
10
10
|
|
|
11
11
|
Output::
|
|
12
12
|
|
|
@@ -49,7 +49,7 @@ Output::
|
|
|
49
49
|
{
|
|
50
50
|
"Field": "resources.ARN",
|
|
51
51
|
"NotStartsWith": [
|
|
52
|
-
"arn:aws:s3:::
|
|
52
|
+
"arn:aws:s3:::amzn-s3-demo-bucket/"
|
|
53
53
|
]
|
|
54
54
|
}
|
|
55
55
|
]
|
|
@@ -115,11 +115,11 @@ For more information, see `Log events by using advanced event selectors <https:/
|
|
|
115
115
|
|
|
116
116
|
You can configure up to 5 event selectors for a trail and up to 250 data resources for a trail. Event selectors are also referred to as basic event selectors. You can use event selectors to log management events and data events for S3 objects, Lambda functions, and DynnamoDB tables. To log data events for other resource types, you must use advanced event selectors.
|
|
117
117
|
|
|
118
|
-
The following example creates an event selector for a trail named ``TrailName`` to include all management events, data events for two Amazon S3 bucket/prefix combinations, and data events for a single AWS Lambda function named ``hello-world-python-function``. ::
|
|
118
|
+
The following ``put-event-selectors`` example creates an event selector for a trail named ``TrailName`` to include all management events, data events for two Amazon S3 bucket/prefix combinations, and data events for a single AWS Lambda function named ``hello-world-python-function``. ::
|
|
119
119
|
|
|
120
120
|
aws cloudtrail put-event-selectors \
|
|
121
121
|
--trail-name TrailName \
|
|
122
|
-
--event-selectors '[{"ReadWriteType": "All","IncludeManagementEvents": true,"DataResources": [{"Type":"AWS::S3::Object", "Values": ["arn:aws:s3:::
|
|
122
|
+
--event-selectors '[{"ReadWriteType": "All","IncludeManagementEvents": true,"DataResources": [{"Type":"AWS::S3::Object", "Values": ["arn:aws:s3:::amzn-s3-demo-bucket/prefix","arn:aws:s3:::amzn-s3-demo-bucket2/prefix2"]},{"Type": "AWS::Lambda::Function","Values": ["arn:aws:lambda:us-west-2:999999999999:function:hello-world-python-function"]}]}]'
|
|
123
123
|
|
|
124
124
|
Output::
|
|
125
125
|
|
|
@@ -130,7 +130,7 @@ Output::
|
|
|
130
130
|
"DataResources": [
|
|
131
131
|
{
|
|
132
132
|
"Values": [
|
|
133
|
-
"arn:aws:s3:::
|
|
133
|
+
"arn:aws:s3:::amzn-s3-demo-bucket/prefix",
|
|
134
134
|
"arn:aws:s3:::amzn-s3-demo-bucket2/prefix2"
|
|
135
135
|
],
|
|
136
136
|
"Type": "AWS::S3::Object"
|
|
@@ -152,7 +152,7 @@ For more information, see `Log events by using basic event selectors <https://do
|
|
|
152
152
|
|
|
153
153
|
**Example 3: Configure event selectors for a trail to log management events, all S3 data events on S3 objects, and all Lambda data events on functions in your account**
|
|
154
154
|
|
|
155
|
-
The following example creates an event selector for a trail named ``TrailName2`` that includes all management events, and all data events for all Amazon S3 buckets and AWS Lambda functions in the AWS account. ::
|
|
155
|
+
The following ``put-event-selectors`` example creates an event selector for a trail named ``TrailName2`` that includes all management events, and all data events for all Amazon S3 buckets and AWS Lambda functions in the AWS account. ::
|
|
156
156
|
|
|
157
157
|
aws cloudtrail put-event-selectors \
|
|
158
158
|
--trail-name TrailName2 \
|
|
@@ -184,4 +184,4 @@ Output::
|
|
|
184
184
|
"TrailARN": "arn:aws:cloudtrail:us-east-2:123456789012:trail/TrailName2"
|
|
185
185
|
}
|
|
186
186
|
|
|
187
|
-
For more information, see `Log events by using basic event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-basic>`__ in the *AWS CloudTrail User Guide*.
|
|
187
|
+
For more information, see `Log events by using basic event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-basic>`__ in the *AWS CloudTrail User Guide*.
|
|
@@ -1,30 +1,33 @@
|
|
|
1
1
|
**To update the configuration settings for a trail**
|
|
2
2
|
|
|
3
|
-
The following ``update-subscription``
|
|
3
|
+
The following ``update-subscription`` example updates the trail to specify a new S3 bucket and SNS topic. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cloudtrail update-subscription \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-new-bucket amzn-s3-demo-bucket \
|
|
8
|
+
--sns-new-topic my-topic-new
|
|
6
9
|
|
|
7
10
|
Output::
|
|
8
11
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
{
|
|
14
|
-
"trailList": [
|
|
12
|
+
Setting up new S3 bucket amzn-s3-demo-bucket...
|
|
13
|
+
Setting up new SNS topic my-topic-new...
|
|
14
|
+
Creating/updating CloudTrail configuration...
|
|
15
|
+
CloudTrail configuration:
|
|
15
16
|
{
|
|
16
|
-
|
|
17
|
-
|
|
18
|
-
|
|
19
|
-
|
|
20
|
-
|
|
21
|
-
|
|
22
|
-
|
|
23
|
-
|
|
17
|
+
"trailList": [
|
|
18
|
+
{
|
|
19
|
+
"IncludeGlobalServiceEvents": true,
|
|
20
|
+
"Name": "Trail1",
|
|
21
|
+
"TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
|
|
22
|
+
"LogFileValidationEnabled": false,
|
|
23
|
+
"IsMultiRegionTrail": false,
|
|
24
|
+
"S3BucketName": "amzn-s3-demo-bucket",
|
|
25
|
+
"SnsTopicName": "my-topic-new",
|
|
26
|
+
"HomeRegion": "us-east-1"
|
|
27
|
+
}
|
|
28
|
+
],
|
|
29
|
+
"ResponseMetadata": {
|
|
30
|
+
"HTTPStatusCode": 200,
|
|
31
|
+
"RequestId": "31126f8a-c616-11e5-9cc6-2fd637936879"
|
|
32
|
+
}
|
|
24
33
|
}
|
|
25
|
-
],
|
|
26
|
-
"ResponseMetadata": {
|
|
27
|
-
"HTTPStatusCode": 200,
|
|
28
|
-
"RequestId": "31126f8a-c616-11e5-9cc6-2fd637936879"
|
|
29
|
-
}
|
|
30
|
-
}
|
|
@@ -1,16 +1,18 @@
|
|
|
1
1
|
**To update a trail**
|
|
2
2
|
|
|
3
|
-
The following ``update-trail``
|
|
3
|
+
The following ``update-trail`` example updates a trail to use an existing bucket for log delivery. ::
|
|
4
4
|
|
|
5
|
-
|
|
5
|
+
aws cloudtrail update-trail \
|
|
6
|
+
--name Trail1 \
|
|
7
|
+
--s3-bucket-name amzn-s3-demo-bucket
|
|
6
8
|
|
|
7
9
|
Output::
|
|
8
10
|
|
|
9
|
-
|
|
10
|
-
|
|
11
|
-
|
|
12
|
-
|
|
13
|
-
|
|
14
|
-
|
|
15
|
-
|
|
16
|
-
|
|
11
|
+
{
|
|
12
|
+
"IncludeGlobalServiceEvents": true,
|
|
13
|
+
"Name": "Trail1",
|
|
14
|
+
"TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
|
|
15
|
+
"LogFileValidationEnabled": false,
|
|
16
|
+
"IsMultiRegionTrail": true,
|
|
17
|
+
"S3BucketName": "amzn-s3-demo-bucket"
|
|
18
|
+
}
|
|
@@ -13,7 +13,7 @@ Contents of create-report-group-source.json::
|
|
|
13
13
|
"exportConfig": {
|
|
14
14
|
"exportConfigType": "S3",
|
|
15
15
|
"s3Destination": {
|
|
16
|
-
"bucket": "
|
|
16
|
+
"bucket": "amzn-s3-demo-bucket",
|
|
17
17
|
"path": "",
|
|
18
18
|
"packaging": "ZIP",
|
|
19
19
|
"encryptionDisabled": true
|
|
@@ -31,7 +31,7 @@ Output::
|
|
|
31
31
|
"exportConfig": {
|
|
32
32
|
"exportConfigType": "S3",
|
|
33
33
|
"s3Destination": {
|
|
34
|
-
"bucket": "
|
|
34
|
+
"bucket": "amzn-s3-demo-bucket",
|
|
35
35
|
"path": "",
|
|
36
36
|
"packaging": "ZIP",
|
|
37
37
|
"encryptionDisabled": true
|
|
@@ -83,7 +83,7 @@ The following is example output::
|
|
|
83
83
|
}
|
|
84
84
|
],
|
|
85
85
|
"values": {
|
|
86
|
-
"myS3OutputLoc": "s3://
|
|
86
|
+
"myS3OutputLoc": "s3://amzn-s3-demo-bucket/",
|
|
87
87
|
"myS3InputLoc": "s3://us-east-1.elasticmapreduce.samples/pig-apache-logs/data",
|
|
88
88
|
"myShellCmd": "grep -rc \"GET\" ${INPUT1_STAGING_DIR}/* > ${OUTPUT1_STAGING_DIR}/output.txt"
|
|
89
89
|
}
|
|
@@ -0,0 +1,12 @@
|
|
|
1
|
+
**To add a group member to a directory**
|
|
2
|
+
|
|
3
|
+
The following ``add-group-member`` example adds the specified user to the specified group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data add-group-member \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--group-name 'sales' \
|
|
8
|
+
--member-name 'john.doe'
|
|
9
|
+
|
|
10
|
+
This command produces no output.
|
|
11
|
+
|
|
12
|
+
For more information, see `Adding or removing AWS Managed Microsoft AD members to groups and groups to groups <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_add_remove_user_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
**To create a group for a directory**
|
|
2
|
+
|
|
3
|
+
The following ``create-group`` example creates a group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data create-group \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'sales'
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"DirectoryId": "d-9067f3da7a",
|
|
13
|
+
"SAMAccountName": "sales",
|
|
14
|
+
"SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
For more information, see `Creating an AWS Managed Microsoft AD group <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_create_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
**To create a user**
|
|
2
|
+
|
|
3
|
+
The following ``create-user`` example creates a user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data create-user \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'john.doe'
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"DirectoryId": "d-1234567890",
|
|
13
|
+
"SAMAccountName": "john.doe",
|
|
14
|
+
"SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
For more information, see `Creating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_create_user.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To delete a group**
|
|
2
|
+
|
|
3
|
+
The following ``delete-group`` example deletes the specified group from the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data delete-group \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'sales'
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Deleting an AWS Managed Microsoft AD group <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To delete a user**
|
|
2
|
+
|
|
3
|
+
The following ``delete-user`` example deletes the specified user from the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data delete-user \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'john.doe'
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Deleting an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_user.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
**To list details of a group**
|
|
2
|
+
|
|
3
|
+
The following ``describe-group`` example gets information for the specified group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data describe-group \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'sales'
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"DirectoryId": "d-1234567890",
|
|
13
|
+
"DistinguishedName": "CN=sales,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
|
|
14
|
+
"GroupScope": "Global",
|
|
15
|
+
"GroupType": "Security",
|
|
16
|
+
"Realm": "corp.example.com",
|
|
17
|
+
"SAMAccountName": "sales",
|
|
18
|
+
"SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
**To list information for a user**
|
|
2
|
+
|
|
3
|
+
The following ``describe-user`` example gets information for the specified user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data describe-user command-name \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'john.doe'
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"DirectoryId": "d-1234567890",
|
|
13
|
+
"DistinguishedName": "CN=john.doe,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
|
|
14
|
+
"Enabled": false,
|
|
15
|
+
"Realm": "corp.example.com",
|
|
16
|
+
"SAMAccountName": "john.doe",
|
|
17
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567",
|
|
18
|
+
"UserPrincipalName": "john.doe@CORP.EXAMPLE.COM"
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
**To disable Directory Service Data API for a directory**
|
|
2
|
+
|
|
3
|
+
The following ``disable-directory-data-access`` example disables the Directory Service Data API for the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds disable-directory-data-access \
|
|
6
|
+
--directory-id d-1234567890
|
|
7
|
+
|
|
8
|
+
This command produces no output.
|
|
9
|
+
|
|
10
|
+
For more information, see `Enabling or disabling user and group management or AWS Directory Service Data <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To disable a user**
|
|
2
|
+
|
|
3
|
+
The following ``disable-user`` example disables the specified user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data disable-user \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'john.doe'
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Disabling an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_disable_user.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
**To enable Directory Service Data API for a directory**
|
|
2
|
+
|
|
3
|
+
The following ``enable-directory-data-access`` example enables the Directory Service Data API for the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds enable-directory-data-access \
|
|
6
|
+
--directory-id d-1234567890
|
|
7
|
+
|
|
8
|
+
This command produces no output.
|
|
9
|
+
|
|
10
|
+
For more information, see `Enabling or disabling user and group management or AWS Directory Service Data <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,29 @@
|
|
|
1
|
+
**To list a directory's group members**
|
|
2
|
+
|
|
3
|
+
The following ``list-group-members`` example lists the group members for the specified group in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data list-group-members \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'sales'
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"Members": [
|
|
13
|
+
{
|
|
14
|
+
"MemberType": "USER",
|
|
15
|
+
"SAMAccountName": "Jane Doe",
|
|
16
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
|
|
17
|
+
},
|
|
18
|
+
{
|
|
19
|
+
"MemberType": "USER",
|
|
20
|
+
"SAMAccountName": "John Doe",
|
|
21
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
|
|
22
|
+
}
|
|
23
|
+
],
|
|
24
|
+
"DirectoryId": "d-1234567890",
|
|
25
|
+
"MemberRealm": "corp.example.com",
|
|
26
|
+
"Realm": "corp.example.com"
|
|
27
|
+
}
|
|
28
|
+
|
|
29
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
|
|
@@ -0,0 +1,25 @@
|
|
|
1
|
+
**To list a directory's group membership**
|
|
2
|
+
|
|
3
|
+
The following ``list-groups-for-member`` example lists group membership for the specified user in the specified directory. ::
|
|
4
|
+
|
|
5
|
+
aws ds-data list-groups-for-member \
|
|
6
|
+
--directory-id d-1234567890 \
|
|
7
|
+
--sam-account-name 'john.doe'
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"Groups": [
|
|
13
|
+
{
|
|
14
|
+
"GroupScope": "Global",
|
|
15
|
+
"GroupType": "Security",
|
|
16
|
+
"SAMAccountName": "Domain Users",
|
|
17
|
+
"SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
|
|
18
|
+
}
|
|
19
|
+
],
|
|
20
|
+
"DirectoryId": "d-1234567890",
|
|
21
|
+
"MemberRealm": "corp.example.com",
|
|
22
|
+
"Realm": "corp.example.com"
|
|
23
|
+
}
|
|
24
|
+
|
|
25
|
+
For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
|