awscli 1.37.4__py3-none-any.whl → 1.37.6__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of awscli might be problematic. Click here for more details.

Files changed (108) hide show
  1. awscli/__init__.py +1 -1
  2. awscli/examples/cloudtrail/create-subscription.rst +29 -26
  3. awscli/examples/cloudtrail/create-trail.rst +13 -11
  4. awscli/examples/cloudtrail/describe-trails.rst +30 -29
  5. awscli/examples/cloudtrail/put-event-selectors.rst +8 -8
  6. awscli/examples/cloudtrail/update-subscription.rst +25 -22
  7. awscli/examples/cloudtrail/update-trail.rst +12 -10
  8. awscli/examples/codebuild/create-report-group.rst +2 -2
  9. awscli/examples/datapipeline/get-pipeline-definition.rst +1 -1
  10. awscli/examples/ds-data/add-group-member.rst +12 -0
  11. awscli/examples/ds-data/create-group.rst +17 -0
  12. awscli/examples/ds-data/create-user.rst +17 -0
  13. awscli/examples/ds-data/delete-group.rst +11 -0
  14. awscli/examples/ds-data/delete-user.rst +11 -0
  15. awscli/examples/ds-data/describe-group.rst +21 -0
  16. awscli/examples/ds-data/describe-user.rst +21 -0
  17. awscli/examples/ds-data/disable-directory-data-access.rst +10 -0
  18. awscli/examples/ds-data/disable-user.rst +11 -0
  19. awscli/examples/ds-data/enable-directory-data-access.rst +10 -0
  20. awscli/examples/ds-data/list-group-members.rst +29 -0
  21. awscli/examples/ds-data/list-groups-for-member.rst +25 -0
  22. awscli/examples/ds-data/list-groups.rst +503 -0
  23. awscli/examples/ds-data/list-users.rst +57 -0
  24. awscli/examples/ds-data/remove-group-member.rst +12 -0
  25. awscli/examples/ds-data/reset-user-password.rst +12 -0
  26. awscli/examples/ds-data/search-groups.rst +25 -0
  27. awscli/examples/ds-data/search-users.rst +24 -0
  28. awscli/examples/ds-data/update-group.rst +13 -0
  29. awscli/examples/ds-data/update-user.rst +13 -0
  30. awscli/examples/ec2/describe-capacity-reservations.rst +46 -31
  31. awscli/examples/ec2/describe-instance-image-metadata.rst +186 -0
  32. awscli/examples/ec2/describe-spot-datafeed-subscription.rst +1 -1
  33. awscli/examples/ec2/register-image.rst +32 -32
  34. awscli/examples/ecr-public/get-registry-catalog-data.rst +14 -0
  35. awscli/examples/ecr-public/get-repository-catalog-data.rst +29 -0
  36. awscli/examples/ecr-public/list-tags-for-resource.rst +28 -0
  37. awscli/examples/ecr-public/put-registry-catalog-data.rst +15 -0
  38. awscli/examples/ecr-public/put-repository-catalog-data.rst +5 -4
  39. awscli/examples/ecr-public/tag-resource.rst +21 -0
  40. awscli/examples/ecr-public/untag-resource.rst +12 -0
  41. awscli/examples/ecs/describe-service-deployments.rst +54 -0
  42. awscli/examples/ecs/describe-service-revisions.rst +60 -0
  43. awscli/examples/ecs/list-service-deployments.rst +25 -0
  44. awscli/examples/ivs-realtime/create-storage-configuration.rst +20 -20
  45. awscli/examples/ivs-realtime/get-storage-configuration.rst +20 -20
  46. awscli/examples/ivs-realtime/list-storage-configurations.rst +29 -29
  47. awscli/examples/kendra/create-data-source.rst +23 -23
  48. awscli/examples/kendra/describe-data-source.rst +83 -83
  49. awscli/examples/kendra/update-data-source.rst +18 -18
  50. awscli/examples/macie2/describe-buckets.rst +13 -11
  51. awscli/examples/oam/create-link.rst +24 -0
  52. awscli/examples/oam/create-sink.rst +17 -0
  53. awscli/examples/oam/delete-link.rst +10 -0
  54. awscli/examples/oam/delete-sink.rst +10 -0
  55. awscli/examples/oam/get-link.rst +22 -0
  56. awscli/examples/oam/get-sink-policy.rst +16 -0
  57. awscli/examples/oam/get-sink.rst +17 -0
  58. awscli/examples/oam/list-attached-links.rst +23 -0
  59. awscli/examples/oam/list-links.rst +21 -0
  60. awscli/examples/oam/list-sinks.rst +19 -0
  61. awscli/examples/oam/list-tags-for-resource.rst +16 -0
  62. awscli/examples/oam/put-sink-policy.rst +17 -0
  63. awscli/examples/oam/tag-resource.rst +11 -0
  64. awscli/examples/oam/untag-resource.rst +11 -0
  65. awscli/examples/oam/update-link.rst +24 -0
  66. awscli/examples/polly/get-speech-synthesis-task.rst +23 -23
  67. awscli/examples/polly/list-speech-synthesis-tasks.rst +25 -25
  68. awscli/examples/polly/start-speech-synthesis-task.rst +27 -27
  69. awscli/examples/qldb/describe-journal-s3-export.rst +1 -1
  70. awscli/examples/qldb/export-journal-to-s3.rst +1 -1
  71. awscli/examples/qldb/list-journal-s3-exports-for-ledger.rst +1 -1
  72. awscli/examples/qldb/list-journal-s3-exports.rst +2 -2
  73. awscli/examples/s3api/put-bucket-acl.rst +1 -1
  74. awscli/examples/s3api/put-bucket-cors.rst +1 -1
  75. awscli/examples/s3api/put-bucket-logging.rst +10 -10
  76. awscli/examples/s3api/put-bucket-policy.rst +5 -5
  77. awscli/examples/s3api/put-object-acl.rst +1 -1
  78. awscli/examples/synthetics/associate-resource.rst +11 -0
  79. awscli/examples/synthetics/create-canary.rst +48 -0
  80. awscli/examples/synthetics/create-group.rst +21 -0
  81. awscli/examples/synthetics/delete-canary.rst +10 -0
  82. awscli/examples/synthetics/delete-group.rst +10 -0
  83. awscli/examples/synthetics/describe-canaries-last-run.rst +31 -0
  84. awscli/examples/synthetics/describe-canaries.rst +48 -0
  85. awscli/examples/synthetics/describe-runtime-versions.rst +74 -0
  86. awscli/examples/synthetics/disassociate-resource.rst +11 -0
  87. awscli/examples/synthetics/get-canary-runs.rst +29 -0
  88. awscli/examples/synthetics/get-canary.rst +47 -0
  89. awscli/examples/synthetics/get-group.rst +21 -0
  90. awscli/examples/synthetics/list-associated-groups.rst +20 -0
  91. awscli/examples/synthetics/list-group-resources.rst +16 -0
  92. awscli/examples/synthetics/list-groups.rst +19 -0
  93. awscli/examples/synthetics/list-tags-for-resource.rst +31 -0
  94. awscli/examples/synthetics/start-canary.rst +10 -0
  95. awscli/examples/synthetics/stop-canary.rst +10 -0
  96. awscli/examples/synthetics/tag-resource.rst +21 -0
  97. awscli/examples/synthetics/untag-resource.rst +21 -0
  98. awscli/examples/synthetics/update-canary.rst +11 -0
  99. {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/METADATA +2 -2
  100. {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/RECORD +108 -42
  101. {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws +0 -0
  102. {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws.cmd +0 -0
  103. {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_bash_completer +0 -0
  104. {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_completer +0 -0
  105. {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_zsh_completer.sh +0 -0
  106. {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/LICENSE.txt +0 -0
  107. {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/WHEEL +0 -0
  108. {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/top_level.txt +0 -0
awscli/__init__.py CHANGED
@@ -18,7 +18,7 @@ A Universal Command Line Environment for Amazon Web Services.
18
18
 
19
19
  import os
20
20
 
21
- __version__ = '1.37.4'
21
+ __version__ = '1.37.6'
22
22
 
23
23
  #
24
24
  # Get our data path to be added to botocore's search path
@@ -1,32 +1,35 @@
1
1
  **To create and configure AWS resources for a trail**
2
2
 
3
- The following ``create-subscription`` command creates a new S3 bucket and SNS topic for ``Trail1``::
3
+ The following ``create-subscription`` command creates a new S3 bucket and SNS topic for ``Trail1``. ::
4
4
 
5
- aws cloudtrail create-subscription --name Trail1 --s3-new-bucket my-bucket --sns-new-topic my-topic
5
+ aws cloudtrail create-subscription \
6
+ --name Trail1 \
7
+ --s3-new-bucket amzn-s3-demo-bucket \
8
+ --sns-new-topic my-topic
6
9
 
7
10
  Output::
8
11
 
9
- Setting up new S3 bucket my-bucket...
10
- Setting up new SNS topic my-topic...
11
- Creating/updating CloudTrail configuration...
12
- CloudTrail configuration:
13
- {
14
- "trailList": [
15
- {
16
- "IncludeGlobalServiceEvents": true,
17
- "Name": "Trail1",
18
- "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
19
- "LogFileValidationEnabled": false,
20
- "IsMultiRegionTrail": false,
21
- "S3BucketName": "my-bucket",
22
- "SnsTopicName": "my-topic",
23
- "HomeRegion": "us-east-1"
24
- }
25
- ],
26
- "ResponseMetadata": {
27
- "HTTPStatusCode": 200,
28
- "RequestId": "f39e51f6-c615-11e5-85bd-d35ca21ee3e2"
29
- }
30
- }
31
- Starting CloudTrail service...
32
- Logs will be delivered to my-bucket
12
+ Setting up new S3 bucket amzn-s3-demo-bucket...
13
+ Setting up new SNS topic my-topic...
14
+ Creating/updating CloudTrail configuration...
15
+ CloudTrail configuration:
16
+ {
17
+ "trailList": [
18
+ {
19
+ "IncludeGlobalServiceEvents": true,
20
+ "Name": "Trail1",
21
+ "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
22
+ "LogFileValidationEnabled": false,
23
+ "IsMultiRegionTrail": false,
24
+ "S3BucketName": "amzn-s3-demo-bucket",
25
+ "SnsTopicName": "my-topic",
26
+ "HomeRegion": "us-east-1"
27
+ }
28
+ ],
29
+ "ResponseMetadata": {
30
+ "HTTPStatusCode": 200,
31
+ "RequestId": "f39e51f6-c615-11e5-85bd-d35ca21ee3e2"
32
+ }
33
+ }
34
+ Starting CloudTrail service...
35
+ Logs will be delivered to my-bucket
@@ -1,17 +1,19 @@
1
1
  **To create a trail**
2
2
 
3
- The following ``create-trail`` command creates a multi-region trail named ``Trail1`` and specifies an S3 bucket::
3
+ The following ``create-trail`` example creates a multi-region trail named ``Trail1`` and specifies an S3 bucket. ::
4
4
 
5
- aws cloudtrail create-trail --name Trail1 --s3-bucket-name my-bucket --is-multi-region-trail
5
+ aws cloudtrail create-trail \
6
+ --name Trail1 \
7
+ --s3-bucket-name amzn-s3-demo-bucket \
8
+ --is-multi-region-trail
6
9
 
7
10
  Output::
8
11
 
9
- {
10
- "IncludeGlobalServiceEvents": true,
11
- "Name": "Trail1",
12
- "TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
13
- "LogFileValidationEnabled": false,
14
- "IsMultiRegionTrail": true,
15
- "S3BucketName": "my-bucket"
16
- }
17
-
12
+ {
13
+ "IncludeGlobalServiceEvents": true,
14
+ "Name": "Trail1",
15
+ "TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
16
+ "LogFileValidationEnabled": false,
17
+ "IsMultiRegionTrail": true,
18
+ "S3BucketName": "amzn-s3-demo-bucket"
19
+ }
@@ -1,35 +1,36 @@
1
1
  **To describe a trail**
2
2
 
3
- The following ``describe-trails`` command returns the settings for ``Trail1`` and ``Trail2``::
3
+ The following ``describe-trails`` example returns the settings for ``Trail1`` and ``Trail2``. ::
4
4
 
5
- aws cloudtrail describe-trails --trail-name-list Trail1 Trail2
5
+ aws cloudtrail describe-trails \
6
+ --trail-name-list Trail1 Trail2
6
7
 
7
8
  Output::
8
9
 
9
- {
10
- "trailList": [
11
- {
12
- "IncludeGlobalServiceEvents": true,
13
- "Name": "Trail1",
14
- "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
15
- "LogFileValidationEnabled": false,
16
- "IsMultiRegionTrail": false,
17
- "S3BucketName": "my-bucket",
18
- "CloudWatchLogsRoleArn": "arn:aws:iam::123456789012:role/CloudTrail_CloudWatchLogs_Role",
19
- "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:123456789012:log-group:CloudTrail:*",
20
- "SnsTopicName": "my-topic",
21
- "HomeRegion": "us-east-1"
22
- },
23
- {
24
- "IncludeGlobalServiceEvents": true,
25
- "Name": "Trail2",
26
- "S3KeyPrefix": "my-prefix",
27
- "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail2",
28
- "LogFileValidationEnabled": false,
29
- "IsMultiRegionTrail": false,
30
- "S3BucketName": "my-bucket",
31
- "KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/4c5ae5ac-3c13-421e-8335-c7868ef6a769",
32
- "HomeRegion": "us-east-1"
33
- }
34
- ]
35
- }
10
+ {
11
+ "trailList": [
12
+ {
13
+ "IncludeGlobalServiceEvents": true,
14
+ "Name": "Trail1",
15
+ "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
16
+ "LogFileValidationEnabled": false,
17
+ "IsMultiRegionTrail": false,
18
+ "S3BucketName": "amzn-s3-demo-bucket",
19
+ "CloudWatchLogsRoleArn": "arn:aws:iam::123456789012:role/CloudTrail_CloudWatchLogs_Role",
20
+ "CloudWatchLogsLogGroupArn": "arn:aws:logs:us-east-1:123456789012:log-group:CloudTrail:*",
21
+ "SnsTopicName": "my-topic",
22
+ "HomeRegion": "us-east-1"
23
+ },
24
+ {
25
+ "IncludeGlobalServiceEvents": true,
26
+ "Name": "Trail2",
27
+ "S3KeyPrefix": "my-prefix",
28
+ "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail2",
29
+ "LogFileValidationEnabled": false,
30
+ "IsMultiRegionTrail": false,
31
+ "S3BucketName": "amzn-s3-demo-bucket2",
32
+ "KmsKeyId": "arn:aws:kms:us-east-1:123456789012:key/4c5ae5ac-3c13-421e-8335-c7868ef6a769",
33
+ "HomeRegion": "us-east-1"
34
+ }
35
+ ]
36
+ }
@@ -2,11 +2,11 @@
2
2
 
3
3
  You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use advanced event selectors to log all available data event types. You can use either advanced event selectors or basic event selectors, but not both. If you apply advanced event selectors to a trail, any existing basic event selectors are overwritten.
4
4
 
5
- The following example creates an advanced event selector for a trail named ``myTrail`` to log all management events, log S3 PutObject and DeleteObject API calls for all but one S3 bucket, log data API calls for a Lambda function named ``myFunction``, and log Publish API calls on an SNS topic named ``myTopic``. ::
5
+ The following ``put-event-selectors`` example creates an advanced event selector for a trail named ``myTrail`` to log all management events, log S3 PutObject and DeleteObject API calls for all but one S3 bucket, log data API calls for a Lambda function named ``myFunction``, and log Publish API calls on an SNS topic named ``myTopic``. ::
6
6
 
7
7
  aws cloudtrail put-event-selectors \
8
8
  --trail-name myTrail \
9
- --advanced-event-selectors '[{"Name": "Log all management events", "FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Management"] }] },{"Name": "Log PutObject and DeleteObject events for all but one bucket","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::S3::Object"] },{ "Field": "eventName", "Equals": ["PutObject","DeleteObject"] },{ "Field": "resources.ARN", "NotStartsWith": ["arn:aws:s3:::sample_bucket_name/"] }]},{"Name": "Log data events for a specific Lambda function","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::Lambda::Function"] },{ "Field": "resources.ARN", "Equals": ["arn:aws:lambda:us-east-1:123456789012:function:myFunction"] }]},{"Name": "Log all Publish API calls on a specific SNS topic","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::SNS::Topic"] },{ "Field": "eventName", "Equals": ["Publish"] },{ "Field": "resources.ARN", "Equals": ["arn:aws:sns:us-east-1:123456789012:myTopic.fifo"] }]}]'
9
+ --advanced-event-selectors '[{"Name": "Log all management events", "FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Management"] }] },{"Name": "Log PutObject and DeleteObject events for all but one bucket","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::S3::Object"] },{ "Field": "eventName", "Equals": ["PutObject","DeleteObject"] },{ "Field": "resources.ARN", "NotStartsWith": ["arn:aws:s3:::amzn-s3-demo-bucket/"] }]},{"Name": "Log data events for a specific Lambda function","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::Lambda::Function"] },{ "Field": "resources.ARN", "Equals": ["arn:aws:lambda:us-east-1:123456789012:function:myFunction"] }]},{"Name": "Log all Publish API calls on a specific SNS topic","FieldSelectors": [{ "Field": "eventCategory", "Equals": ["Data"] },{ "Field": "resources.type", "Equals": ["AWS::SNS::Topic"] },{ "Field": "eventName", "Equals": ["Publish"] },{ "Field": "resources.ARN", "Equals": ["arn:aws:sns:us-east-1:123456789012:myTopic.fifo"] }]}]'
10
10
 
11
11
  Output::
12
12
 
@@ -49,7 +49,7 @@ Output::
49
49
  {
50
50
  "Field": "resources.ARN",
51
51
  "NotStartsWith": [
52
- "arn:aws:s3:::sample_bucket_name/"
52
+ "arn:aws:s3:::amzn-s3-demo-bucket/"
53
53
  ]
54
54
  }
55
55
  ]
@@ -115,11 +115,11 @@ For more information, see `Log events by using advanced event selectors <https:/
115
115
 
116
116
  You can configure up to 5 event selectors for a trail and up to 250 data resources for a trail. Event selectors are also referred to as basic event selectors. You can use event selectors to log management events and data events for S3 objects, Lambda functions, and DynnamoDB tables. To log data events for other resource types, you must use advanced event selectors.
117
117
 
118
- The following example creates an event selector for a trail named ``TrailName`` to include all management events, data events for two Amazon S3 bucket/prefix combinations, and data events for a single AWS Lambda function named ``hello-world-python-function``. ::
118
+ The following ``put-event-selectors`` example creates an event selector for a trail named ``TrailName`` to include all management events, data events for two Amazon S3 bucket/prefix combinations, and data events for a single AWS Lambda function named ``hello-world-python-function``. ::
119
119
 
120
120
  aws cloudtrail put-event-selectors \
121
121
  --trail-name TrailName \
122
- --event-selectors '[{"ReadWriteType": "All","IncludeManagementEvents": true,"DataResources": [{"Type":"AWS::S3::Object", "Values": ["arn:aws:s3:::mybucket/prefix","arn:aws:s3:::amzn-s3-demo-bucket2/prefix2"]},{"Type": "AWS::Lambda::Function","Values": ["arn:aws:lambda:us-west-2:999999999999:function:hello-world-python-function"]}]}]'
122
+ --event-selectors '[{"ReadWriteType": "All","IncludeManagementEvents": true,"DataResources": [{"Type":"AWS::S3::Object", "Values": ["arn:aws:s3:::amzn-s3-demo-bucket/prefix","arn:aws:s3:::amzn-s3-demo-bucket2/prefix2"]},{"Type": "AWS::Lambda::Function","Values": ["arn:aws:lambda:us-west-2:999999999999:function:hello-world-python-function"]}]}]'
123
123
 
124
124
  Output::
125
125
 
@@ -130,7 +130,7 @@ Output::
130
130
  "DataResources": [
131
131
  {
132
132
  "Values": [
133
- "arn:aws:s3:::mybucket/prefix",
133
+ "arn:aws:s3:::amzn-s3-demo-bucket/prefix",
134
134
  "arn:aws:s3:::amzn-s3-demo-bucket2/prefix2"
135
135
  ],
136
136
  "Type": "AWS::S3::Object"
@@ -152,7 +152,7 @@ For more information, see `Log events by using basic event selectors <https://do
152
152
 
153
153
  **Example 3: Configure event selectors for a trail to log management events, all S3 data events on S3 objects, and all Lambda data events on functions in your account**
154
154
 
155
- The following example creates an event selector for a trail named ``TrailName2`` that includes all management events, and all data events for all Amazon S3 buckets and AWS Lambda functions in the AWS account. ::
155
+ The following ``put-event-selectors`` example creates an event selector for a trail named ``TrailName2`` that includes all management events, and all data events for all Amazon S3 buckets and AWS Lambda functions in the AWS account. ::
156
156
 
157
157
  aws cloudtrail put-event-selectors \
158
158
  --trail-name TrailName2 \
@@ -184,4 +184,4 @@ Output::
184
184
  "TrailARN": "arn:aws:cloudtrail:us-east-2:123456789012:trail/TrailName2"
185
185
  }
186
186
 
187
- For more information, see `Log events by using basic event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-basic>`__ in the *AWS CloudTrail User Guide*.
187
+ For more information, see `Log events by using basic event selectors <https://docs.aws.amazon.com/awscloudtrail/latest/userguide/logging-data-events-with-cloudtrail.html#creating-data-event-selectors-basic>`__ in the *AWS CloudTrail User Guide*.
@@ -1,30 +1,33 @@
1
1
  **To update the configuration settings for a trail**
2
2
 
3
- The following ``update-subscription`` command updates the trail to specify a new S3 bucket and SNS topic::
3
+ The following ``update-subscription`` example updates the trail to specify a new S3 bucket and SNS topic. ::
4
4
 
5
- aws cloudtrail update-subscription --name Trail1 --s3-new-bucket my-bucket-new --sns-new-topic my-topic-new
5
+ aws cloudtrail update-subscription \
6
+ --name Trail1 \
7
+ --s3-new-bucket amzn-s3-demo-bucket \
8
+ --sns-new-topic my-topic-new
6
9
 
7
10
  Output::
8
11
 
9
- Setting up new S3 bucket my-bucket-new...
10
- Setting up new SNS topic my-topic-new...
11
- Creating/updating CloudTrail configuration...
12
- CloudTrail configuration:
13
- {
14
- "trailList": [
12
+ Setting up new S3 bucket amzn-s3-demo-bucket...
13
+ Setting up new SNS topic my-topic-new...
14
+ Creating/updating CloudTrail configuration...
15
+ CloudTrail configuration:
15
16
  {
16
- "IncludeGlobalServiceEvents": true,
17
- "Name": "Trail1",
18
- "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
19
- "LogFileValidationEnabled": false,
20
- "IsMultiRegionTrail": false,
21
- "S3BucketName": "my-bucket-new",
22
- "SnsTopicName": "my-topic-new",
23
- "HomeRegion": "us-east-1"
17
+ "trailList": [
18
+ {
19
+ "IncludeGlobalServiceEvents": true,
20
+ "Name": "Trail1",
21
+ "TrailARN": "arn:aws:cloudtrail:us-east-1:123456789012:trail/Trail1",
22
+ "LogFileValidationEnabled": false,
23
+ "IsMultiRegionTrail": false,
24
+ "S3BucketName": "amzn-s3-demo-bucket",
25
+ "SnsTopicName": "my-topic-new",
26
+ "HomeRegion": "us-east-1"
27
+ }
28
+ ],
29
+ "ResponseMetadata": {
30
+ "HTTPStatusCode": 200,
31
+ "RequestId": "31126f8a-c616-11e5-9cc6-2fd637936879"
32
+ }
24
33
  }
25
- ],
26
- "ResponseMetadata": {
27
- "HTTPStatusCode": 200,
28
- "RequestId": "31126f8a-c616-11e5-9cc6-2fd637936879"
29
- }
30
- }
@@ -1,16 +1,18 @@
1
1
  **To update a trail**
2
2
 
3
- The following ``update-trail`` command updates a trail to use an existing bucket for log delivery::
3
+ The following ``update-trail`` example updates a trail to use an existing bucket for log delivery. ::
4
4
 
5
- aws cloudtrail update-trail --name Trail1 --s3-bucket-name my-bucket
5
+ aws cloudtrail update-trail \
6
+ --name Trail1 \
7
+ --s3-bucket-name amzn-s3-demo-bucket
6
8
 
7
9
  Output::
8
10
 
9
- {
10
- "IncludeGlobalServiceEvents": true,
11
- "Name": "Trail1",
12
- "TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
13
- "LogFileValidationEnabled": false,
14
- "IsMultiRegionTrail": true,
15
- "S3BucketName": "my-bucket"
16
- }
11
+ {
12
+ "IncludeGlobalServiceEvents": true,
13
+ "Name": "Trail1",
14
+ "TrailARN": "arn:aws:cloudtrail:us-west-2:123456789012:trail/Trail1",
15
+ "LogFileValidationEnabled": false,
16
+ "IsMultiRegionTrail": true,
17
+ "S3BucketName": "amzn-s3-demo-bucket"
18
+ }
@@ -13,7 +13,7 @@ Contents of create-report-group-source.json::
13
13
  "exportConfig": {
14
14
  "exportConfigType": "S3",
15
15
  "s3Destination": {
16
- "bucket": "my-s3-bucket",
16
+ "bucket": "amzn-s3-demo-bucket",
17
17
  "path": "",
18
18
  "packaging": "ZIP",
19
19
  "encryptionDisabled": true
@@ -31,7 +31,7 @@ Output::
31
31
  "exportConfig": {
32
32
  "exportConfigType": "S3",
33
33
  "s3Destination": {
34
- "bucket": "my-s3-bucket",
34
+ "bucket": "amzn-s3-demo-bucket",
35
35
  "path": "",
36
36
  "packaging": "ZIP",
37
37
  "encryptionDisabled": true
@@ -83,7 +83,7 @@ The following is example output::
83
83
  }
84
84
  ],
85
85
  "values": {
86
- "myS3OutputLoc": "s3://my-s3-bucket/",
86
+ "myS3OutputLoc": "s3://amzn-s3-demo-bucket/",
87
87
  "myS3InputLoc": "s3://us-east-1.elasticmapreduce.samples/pig-apache-logs/data",
88
88
  "myShellCmd": "grep -rc \"GET\" ${INPUT1_STAGING_DIR}/* > ${OUTPUT1_STAGING_DIR}/output.txt"
89
89
  }
@@ -0,0 +1,12 @@
1
+ **To add a group member to a directory**
2
+
3
+ The following ``add-group-member`` example adds the specified user to the specified group in the specified directory. ::
4
+
5
+ aws ds-data add-group-member \
6
+ --directory-id d-1234567890 \
7
+ --group-name 'sales' \
8
+ --member-name 'john.doe'
9
+
10
+ This command produces no output.
11
+
12
+ For more information, see `Adding or removing AWS Managed Microsoft AD members to groups and groups to groups <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_add_remove_user_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,17 @@
1
+ **To create a group for a directory**
2
+
3
+ The following ``create-group`` example creates a group in the specified directory. ::
4
+
5
+ aws ds-data create-group \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'sales'
8
+
9
+ Output::
10
+
11
+ {
12
+ "DirectoryId": "d-9067f3da7a",
13
+ "SAMAccountName": "sales",
14
+ "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
15
+ }
16
+
17
+ For more information, see `Creating an AWS Managed Microsoft AD group <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_create_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,17 @@
1
+ **To create a user**
2
+
3
+ The following ``create-user`` example creates a user in the specified directory. ::
4
+
5
+ aws ds-data create-user \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ Output::
10
+
11
+ {
12
+ "DirectoryId": "d-1234567890",
13
+ "SAMAccountName": "john.doe",
14
+ "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
15
+ }
16
+
17
+ For more information, see `Creating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_create_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,11 @@
1
+ **To delete a group**
2
+
3
+ The following ``delete-group`` example deletes the specified group from the specified directory. ::
4
+
5
+ aws ds-data delete-group \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'sales'
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Deleting an AWS Managed Microsoft AD group <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,11 @@
1
+ **To delete a user**
2
+
3
+ The following ``delete-user`` example deletes the specified user from the specified directory. ::
4
+
5
+ aws ds-data delete-user \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Deleting an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_delete_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,21 @@
1
+ **To list details of a group**
2
+
3
+ The following ``describe-group`` example gets information for the specified group in the specified directory. ::
4
+
5
+ aws ds-data describe-group \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'sales'
8
+
9
+ Output::
10
+
11
+ {
12
+ "DirectoryId": "d-1234567890",
13
+ "DistinguishedName": "CN=sales,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
14
+ "GroupScope": "Global",
15
+ "GroupType": "Security",
16
+ "Realm": "corp.example.com",
17
+ "SAMAccountName": "sales",
18
+ "SID": "S-1-2-34-5567891234-5678912345-67891234567-8912"
19
+ }
20
+
21
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,21 @@
1
+ **To list information for a user**
2
+
3
+ The following ``describe-user`` example gets information for the specified user in the specified directory. ::
4
+
5
+ aws ds-data describe-user command-name \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ Output::
10
+
11
+ {
12
+ "DirectoryId": "d-1234567890",
13
+ "DistinguishedName": "CN=john.doe,OU=Users,OU=CORP,DC=corp,DC=example,DC=com",
14
+ "Enabled": false,
15
+ "Realm": "corp.example.com",
16
+ "SAMAccountName": "john.doe",
17
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567",
18
+ "UserPrincipalName": "john.doe@CORP.EXAMPLE.COM"
19
+ }
20
+
21
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,10 @@
1
+ **To disable Directory Service Data API for a directory**
2
+
3
+ The following ``disable-directory-data-access`` example disables the Directory Service Data API for the specified directory. ::
4
+
5
+ aws ds disable-directory-data-access \
6
+ --directory-id d-1234567890
7
+
8
+ This command produces no output.
9
+
10
+ For more information, see `Enabling or disabling user and group management or AWS Directory Service Data <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,11 @@
1
+ **To disable a user**
2
+
3
+ The following ``disable-user`` example disables the specified user in the specified directory. ::
4
+
5
+ aws ds-data disable-user \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ This command produces no output.
10
+
11
+ For more information, see `Disabling an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_disable_user.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,10 @@
1
+ **To enable Directory Service Data API for a directory**
2
+
3
+ The following ``enable-directory-data-access`` example enables the Directory Service Data API for the specified directory. ::
4
+
5
+ aws ds enable-directory-data-access \
6
+ --directory-id d-1234567890
7
+
8
+ This command produces no output.
9
+
10
+ For more information, see `Enabling or disabling user and group management or AWS Directory Service Data <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_users_groups_mgmt_enable_disable.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,29 @@
1
+ **To list a directory's group members**
2
+
3
+ The following ``list-group-members`` example lists the group members for the specified group in the specified directory. ::
4
+
5
+ aws ds-data list-group-members \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'sales'
8
+
9
+ Output::
10
+
11
+ {
12
+ "Members": [
13
+ {
14
+ "MemberType": "USER",
15
+ "SAMAccountName": "Jane Doe",
16
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4568"
17
+ },
18
+ {
19
+ "MemberType": "USER",
20
+ "SAMAccountName": "John Doe",
21
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4569"
22
+ }
23
+ ],
24
+ "DirectoryId": "d-1234567890",
25
+ "MemberRealm": "corp.example.com",
26
+ "Realm": "corp.example.com"
27
+ }
28
+
29
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD group's details <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_group.html>`__ in the *AWS Directory Service Administration Guide*.
@@ -0,0 +1,25 @@
1
+ **To list a directory's group membership**
2
+
3
+ The following ``list-groups-for-member`` example lists group membership for the specified user in the specified directory. ::
4
+
5
+ aws ds-data list-groups-for-member \
6
+ --directory-id d-1234567890 \
7
+ --sam-account-name 'john.doe'
8
+
9
+ Output::
10
+
11
+ {
12
+ "Groups": [
13
+ {
14
+ "GroupScope": "Global",
15
+ "GroupType": "Security",
16
+ "SAMAccountName": "Domain Users",
17
+ "SID": "S-1-2-34-5678901234-5678901234-5678910123-4567"
18
+ }
19
+ ],
20
+ "DirectoryId": "d-1234567890",
21
+ "MemberRealm": "corp.example.com",
22
+ "Realm": "corp.example.com"
23
+ }
24
+
25
+ For more information, see `Viewing and updating an AWS Managed Microsoft AD user <https://docs.aws.amazon.com/directoryservice/latest/admin-guide/ms_ad_view_update_user.html>`__ in the *AWS Directory Service Administration Guide*.