awscli 1.37.4__py3-none-any.whl → 1.37.6__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Potentially problematic release.
This version of awscli might be problematic. Click here for more details.
- awscli/__init__.py +1 -1
- awscli/examples/cloudtrail/create-subscription.rst +29 -26
- awscli/examples/cloudtrail/create-trail.rst +13 -11
- awscli/examples/cloudtrail/describe-trails.rst +30 -29
- awscli/examples/cloudtrail/put-event-selectors.rst +8 -8
- awscli/examples/cloudtrail/update-subscription.rst +25 -22
- awscli/examples/cloudtrail/update-trail.rst +12 -10
- awscli/examples/codebuild/create-report-group.rst +2 -2
- awscli/examples/datapipeline/get-pipeline-definition.rst +1 -1
- awscli/examples/ds-data/add-group-member.rst +12 -0
- awscli/examples/ds-data/create-group.rst +17 -0
- awscli/examples/ds-data/create-user.rst +17 -0
- awscli/examples/ds-data/delete-group.rst +11 -0
- awscli/examples/ds-data/delete-user.rst +11 -0
- awscli/examples/ds-data/describe-group.rst +21 -0
- awscli/examples/ds-data/describe-user.rst +21 -0
- awscli/examples/ds-data/disable-directory-data-access.rst +10 -0
- awscli/examples/ds-data/disable-user.rst +11 -0
- awscli/examples/ds-data/enable-directory-data-access.rst +10 -0
- awscli/examples/ds-data/list-group-members.rst +29 -0
- awscli/examples/ds-data/list-groups-for-member.rst +25 -0
- awscli/examples/ds-data/list-groups.rst +503 -0
- awscli/examples/ds-data/list-users.rst +57 -0
- awscli/examples/ds-data/remove-group-member.rst +12 -0
- awscli/examples/ds-data/reset-user-password.rst +12 -0
- awscli/examples/ds-data/search-groups.rst +25 -0
- awscli/examples/ds-data/search-users.rst +24 -0
- awscli/examples/ds-data/update-group.rst +13 -0
- awscli/examples/ds-data/update-user.rst +13 -0
- awscli/examples/ec2/describe-capacity-reservations.rst +46 -31
- awscli/examples/ec2/describe-instance-image-metadata.rst +186 -0
- awscli/examples/ec2/describe-spot-datafeed-subscription.rst +1 -1
- awscli/examples/ec2/register-image.rst +32 -32
- awscli/examples/ecr-public/get-registry-catalog-data.rst +14 -0
- awscli/examples/ecr-public/get-repository-catalog-data.rst +29 -0
- awscli/examples/ecr-public/list-tags-for-resource.rst +28 -0
- awscli/examples/ecr-public/put-registry-catalog-data.rst +15 -0
- awscli/examples/ecr-public/put-repository-catalog-data.rst +5 -4
- awscli/examples/ecr-public/tag-resource.rst +21 -0
- awscli/examples/ecr-public/untag-resource.rst +12 -0
- awscli/examples/ecs/describe-service-deployments.rst +54 -0
- awscli/examples/ecs/describe-service-revisions.rst +60 -0
- awscli/examples/ecs/list-service-deployments.rst +25 -0
- awscli/examples/ivs-realtime/create-storage-configuration.rst +20 -20
- awscli/examples/ivs-realtime/get-storage-configuration.rst +20 -20
- awscli/examples/ivs-realtime/list-storage-configurations.rst +29 -29
- awscli/examples/kendra/create-data-source.rst +23 -23
- awscli/examples/kendra/describe-data-source.rst +83 -83
- awscli/examples/kendra/update-data-source.rst +18 -18
- awscli/examples/macie2/describe-buckets.rst +13 -11
- awscli/examples/oam/create-link.rst +24 -0
- awscli/examples/oam/create-sink.rst +17 -0
- awscli/examples/oam/delete-link.rst +10 -0
- awscli/examples/oam/delete-sink.rst +10 -0
- awscli/examples/oam/get-link.rst +22 -0
- awscli/examples/oam/get-sink-policy.rst +16 -0
- awscli/examples/oam/get-sink.rst +17 -0
- awscli/examples/oam/list-attached-links.rst +23 -0
- awscli/examples/oam/list-links.rst +21 -0
- awscli/examples/oam/list-sinks.rst +19 -0
- awscli/examples/oam/list-tags-for-resource.rst +16 -0
- awscli/examples/oam/put-sink-policy.rst +17 -0
- awscli/examples/oam/tag-resource.rst +11 -0
- awscli/examples/oam/untag-resource.rst +11 -0
- awscli/examples/oam/update-link.rst +24 -0
- awscli/examples/polly/get-speech-synthesis-task.rst +23 -23
- awscli/examples/polly/list-speech-synthesis-tasks.rst +25 -25
- awscli/examples/polly/start-speech-synthesis-task.rst +27 -27
- awscli/examples/qldb/describe-journal-s3-export.rst +1 -1
- awscli/examples/qldb/export-journal-to-s3.rst +1 -1
- awscli/examples/qldb/list-journal-s3-exports-for-ledger.rst +1 -1
- awscli/examples/qldb/list-journal-s3-exports.rst +2 -2
- awscli/examples/s3api/put-bucket-acl.rst +1 -1
- awscli/examples/s3api/put-bucket-cors.rst +1 -1
- awscli/examples/s3api/put-bucket-logging.rst +10 -10
- awscli/examples/s3api/put-bucket-policy.rst +5 -5
- awscli/examples/s3api/put-object-acl.rst +1 -1
- awscli/examples/synthetics/associate-resource.rst +11 -0
- awscli/examples/synthetics/create-canary.rst +48 -0
- awscli/examples/synthetics/create-group.rst +21 -0
- awscli/examples/synthetics/delete-canary.rst +10 -0
- awscli/examples/synthetics/delete-group.rst +10 -0
- awscli/examples/synthetics/describe-canaries-last-run.rst +31 -0
- awscli/examples/synthetics/describe-canaries.rst +48 -0
- awscli/examples/synthetics/describe-runtime-versions.rst +74 -0
- awscli/examples/synthetics/disassociate-resource.rst +11 -0
- awscli/examples/synthetics/get-canary-runs.rst +29 -0
- awscli/examples/synthetics/get-canary.rst +47 -0
- awscli/examples/synthetics/get-group.rst +21 -0
- awscli/examples/synthetics/list-associated-groups.rst +20 -0
- awscli/examples/synthetics/list-group-resources.rst +16 -0
- awscli/examples/synthetics/list-groups.rst +19 -0
- awscli/examples/synthetics/list-tags-for-resource.rst +31 -0
- awscli/examples/synthetics/start-canary.rst +10 -0
- awscli/examples/synthetics/stop-canary.rst +10 -0
- awscli/examples/synthetics/tag-resource.rst +21 -0
- awscli/examples/synthetics/untag-resource.rst +21 -0
- awscli/examples/synthetics/update-canary.rst +11 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/METADATA +2 -2
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/RECORD +108 -42
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws.cmd +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_bash_completer +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_completer +0 -0
- {awscli-1.37.4.data → awscli-1.37.6.data}/scripts/aws_zsh_completer.sh +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/LICENSE.txt +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/WHEEL +0 -0
- {awscli-1.37.4.dist-info → awscli-1.37.6.dist-info}/top_level.txt +0 -0
|
@@ -0,0 +1,23 @@
|
|
|
1
|
+
**To return a list of source account links that are linked to this monitoring account sink**
|
|
2
|
+
|
|
3
|
+
The following ``list-attached-links`` example returns a list of source account links that are linked to this monitoring account sink. ::
|
|
4
|
+
|
|
5
|
+
aws oam list-attached-links \
|
|
6
|
+
--sink-identifier arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"Items": [{
|
|
12
|
+
"Label": "Monitoring account",
|
|
13
|
+
"LinkArn": "arn:aws:oam:us-east-2:123456789111:link/a1b2c3d4-5678-90ab-cdef-example11111",
|
|
14
|
+
"ResourceTypes": [
|
|
15
|
+
"AWS::ApplicationInsights::Application",
|
|
16
|
+
"AWS::Logs::LogGroup",
|
|
17
|
+
"AWS::CloudWatch::Metric",
|
|
18
|
+
"AWS::XRay::Trace"
|
|
19
|
+
]
|
|
20
|
+
}]
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
**To return a list of links for one monitoring account sink**
|
|
2
|
+
|
|
3
|
+
The following ``list-links`` example returns a list of links for one monitoring account sink. Run this operation in a source account to return a list of links to monitoring account sinks that this source account has. ::
|
|
4
|
+
|
|
5
|
+
aws oam list-links
|
|
6
|
+
|
|
7
|
+
Output::
|
|
8
|
+
|
|
9
|
+
{
|
|
10
|
+
"Items": [{
|
|
11
|
+
"Arn": "arn:aws:oam:us-east-2:123456789111:link/a1b2c3d4-5678-90ab-cdef-example11111",
|
|
12
|
+
"Id": "a1b2c3d4-5678-90ab-cdef-example11111",
|
|
13
|
+
"Label": "sourceAccount",
|
|
14
|
+
"ResourceTypes": [
|
|
15
|
+
"AWS::CloudWatch::Metric"
|
|
16
|
+
],
|
|
17
|
+
"SinkArn": "arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345"
|
|
18
|
+
}]
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,19 @@
|
|
|
1
|
+
**To return the list of sinks created in the monitoring account**
|
|
2
|
+
|
|
3
|
+
The following ``list-sinks`` example returns a list of sinks created in the monitoring account. Run this operation in a monitoring account. ::
|
|
4
|
+
|
|
5
|
+
aws oam list-sinks
|
|
6
|
+
|
|
7
|
+
Output::
|
|
8
|
+
|
|
9
|
+
{
|
|
10
|
+
"Items": [
|
|
11
|
+
{
|
|
12
|
+
"Arn": "arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345",
|
|
13
|
+
"Id": "a1b2c3d4-5678-90ab-cdef-example12345",
|
|
14
|
+
"Name": "DemoSink"
|
|
15
|
+
}
|
|
16
|
+
]
|
|
17
|
+
}
|
|
18
|
+
|
|
19
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,16 @@
|
|
|
1
|
+
**To display the tags associated with a resource**
|
|
2
|
+
|
|
3
|
+
The following ``list-tags-for-resource`` example displays the tags associated with a sink. ::
|
|
4
|
+
|
|
5
|
+
aws oam list-tags-for-resource \
|
|
6
|
+
--resource-arn arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"Tags": {
|
|
12
|
+
"Team": "Devops"
|
|
13
|
+
}
|
|
14
|
+
}
|
|
15
|
+
|
|
16
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,17 @@
|
|
|
1
|
+
**To create or update the resource policy**
|
|
2
|
+
|
|
3
|
+
The following ``put-sink-policy`` example creates the resource policy that grants permissions to source accounts to link to the monitoring account sink. ::
|
|
4
|
+
|
|
5
|
+
aws oam put-sink-policy \
|
|
6
|
+
--policy '{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Principal":{"AWS":"arn:aws:iam::123456789111:root"},"Action":["oam:CreateLink","oam:UpdateLink"],"Resource":"*","Condition":{"ForAllValues:StringEquals":{"oam:ResourceTypes":["AWS::Logs::LogGroup","AWS::CloudWatch::Metric","AWS::XRay::Trace","AWS::ApplicationInsights::Application"]}}}]}' \
|
|
7
|
+
--sink-identifier arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"SinkArn": "arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345",
|
|
13
|
+
"SinkId": "a1b2c3d4-5678-90ab-cdef-example12345",
|
|
14
|
+
"Policy": "{\"Version\":\"2012-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":{\"AWS\":\"arn:aws:iam::123456789111:root\"},\"Action\":[\"oam:CreateLink\",\"oam:UpdateLink\"],\"Resource\":\"*\",\"Condition\":{\"ForAllValues:StringEquals\":{\"oam:ResourceTypes\":[\"AWS::Logs::LogGroup\",\"AWS::CloudWatch::Metric\",\"AWS::XRay::Trace\",\"AWS::ApplicationInsights::Application\"]}}}]}"
|
|
15
|
+
}
|
|
16
|
+
|
|
17
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To assign one or more tags to the specified resource**
|
|
2
|
+
|
|
3
|
+
The following ``tag-resource`` example tags a sink ``arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345``. ::
|
|
4
|
+
|
|
5
|
+
aws oam tag-resource \
|
|
6
|
+
--resource-arn arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345 \
|
|
7
|
+
--tags team=Devops
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To remove one or more tags from the specified resource.**
|
|
2
|
+
|
|
3
|
+
The following ``untag-resource`` example removes a tag with the key ``team`` from sink ``arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345``. ::
|
|
4
|
+
|
|
5
|
+
aws oam untag-resource \
|
|
6
|
+
--resource-arn arn:aws:oam:us-east-2:123456789012:sink/f3f42f60-f0f2-425c-1234-12347bdd821f \
|
|
7
|
+
--tag-keys team
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,24 @@
|
|
|
1
|
+
**To change what types of data are shared from a source account to its linked monitoring account sink**
|
|
2
|
+
|
|
3
|
+
The following ``update-link`` example updates the link ``arn:aws:oam:us-east-2:123456789111:link/0123e691-e7ef-43fa-1234-c57c837fced0`` with resource types ``AWS::CloudWatch::Metric`` and ``AWS::Logs::LogGroup``. ::
|
|
4
|
+
|
|
5
|
+
aws oam update-link \
|
|
6
|
+
--identifier arn:aws:oam:us-east-2:123456789111:link/a1b2c3d4-5678-90ab-cdef-example11111 \
|
|
7
|
+
--resource-types "AWS::CloudWatch::Metric" "AWS::Logs::LogGroup"
|
|
8
|
+
|
|
9
|
+
Output::
|
|
10
|
+
|
|
11
|
+
{
|
|
12
|
+
"Arn": "arn:aws:oam:us-east-2:123456789111:link/a1b2c3d4-5678-90ab-cdef-example11111",
|
|
13
|
+
"Id": "a1b2c3d4-5678-90ab-cdef-example11111",
|
|
14
|
+
"Label": "sourceAccount",
|
|
15
|
+
"LabelTemplate": "sourceAccount",
|
|
16
|
+
"ResourceTypes": [
|
|
17
|
+
"AWS::CloudWatch::Metric",
|
|
18
|
+
"AWS::Logs::LogGroup"
|
|
19
|
+
],
|
|
20
|
+
"SinkArn": "arn:aws:oam:us-east-2:123456789012:sink/a1b2c3d4-5678-90ab-cdef-example12345",
|
|
21
|
+
"Tags": {}
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
For more information, see `CloudWatch cross-account observability <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch-Unified-Cross-Account.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -1,23 +1,23 @@
|
|
|
1
|
-
**To get information about a speech synthesis task**
|
|
2
|
-
|
|
3
|
-
The following ``get-speech-synthesis-task`` example retrieves information about the specified speech synthesis task. ::
|
|
4
|
-
|
|
5
|
-
aws polly get-speech-synthesis-task \
|
|
6
|
-
--task-id 70b61c0f-57ce-4715-a247-cae8729dcce9
|
|
7
|
-
|
|
8
|
-
Output::
|
|
9
|
-
|
|
10
|
-
{
|
|
11
|
-
"SynthesisTask": {
|
|
12
|
-
"TaskId": "70b61c0f-57ce-4715-a247-cae8729dcce9",
|
|
13
|
-
"TaskStatus": "completed",
|
|
14
|
-
"OutputUri": "https://s3.us-west-2.amazonaws.com/
|
|
15
|
-
"CreationTime": 1603911042.689,
|
|
16
|
-
"RequestCharacters": 1311,
|
|
17
|
-
"OutputFormat": "mp3",
|
|
18
|
-
"TextType": "text",
|
|
19
|
-
"VoiceId": "Joanna"
|
|
20
|
-
}
|
|
21
|
-
}
|
|
22
|
-
|
|
23
|
-
For more information, see `Creating long audio files <https://docs.aws.amazon.com/polly/latest/dg/longer-cli.html>`__ in the *Amazon Polly Developer Guide*.
|
|
1
|
+
**To get information about a speech synthesis task**
|
|
2
|
+
|
|
3
|
+
The following ``get-speech-synthesis-task`` example retrieves information about the specified speech synthesis task. ::
|
|
4
|
+
|
|
5
|
+
aws polly get-speech-synthesis-task \
|
|
6
|
+
--task-id 70b61c0f-57ce-4715-a247-cae8729dcce9
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"SynthesisTask": {
|
|
12
|
+
"TaskId": "70b61c0f-57ce-4715-a247-cae8729dcce9",
|
|
13
|
+
"TaskStatus": "completed",
|
|
14
|
+
"OutputUri": "https://s3.us-west-2.amazonaws.com/amzn-s3-demo-bucket/70b61c0f-57ce-4715-a247-cae8729dcce9.mp3",
|
|
15
|
+
"CreationTime": 1603911042.689,
|
|
16
|
+
"RequestCharacters": 1311,
|
|
17
|
+
"OutputFormat": "mp3",
|
|
18
|
+
"TextType": "text",
|
|
19
|
+
"VoiceId": "Joanna"
|
|
20
|
+
}
|
|
21
|
+
}
|
|
22
|
+
|
|
23
|
+
For more information, see `Creating long audio files <https://docs.aws.amazon.com/polly/latest/dg/longer-cli.html>`__ in the *Amazon Polly Developer Guide*.
|
|
@@ -1,25 +1,25 @@
|
|
|
1
|
-
**To list your speech synthesis tasks**
|
|
2
|
-
|
|
3
|
-
The following ``list-speech-synthesis-tasks`` example lists your speech synthesis tasks. ::
|
|
4
|
-
|
|
5
|
-
aws polly list-speech-synthesis-tasks
|
|
6
|
-
|
|
7
|
-
Output::
|
|
8
|
-
|
|
9
|
-
{
|
|
10
|
-
"SynthesisTasks": [
|
|
11
|
-
{
|
|
12
|
-
"TaskId": "70b61c0f-57ce-4715-a247-cae8729dcce9",
|
|
13
|
-
"TaskStatus": "completed",
|
|
14
|
-
"OutputUri": "https://s3.us-west-2.amazonaws.com/
|
|
15
|
-
"CreationTime": 1603911042.689,
|
|
16
|
-
"RequestCharacters": 1311,
|
|
17
|
-
"OutputFormat": "mp3",
|
|
18
|
-
"TextType": "text",
|
|
19
|
-
"VoiceId": "Joanna"
|
|
20
|
-
}
|
|
21
|
-
]
|
|
22
|
-
}
|
|
23
|
-
|
|
24
|
-
For more information, see `Creating long audio files <https://docs.aws.amazon.com/polly/latest/dg/longer-cli.html>`__ in the *Amazon Polly Developer Guide*.
|
|
25
|
-
|
|
1
|
+
**To list your speech synthesis tasks**
|
|
2
|
+
|
|
3
|
+
The following ``list-speech-synthesis-tasks`` example lists your speech synthesis tasks. ::
|
|
4
|
+
|
|
5
|
+
aws polly list-speech-synthesis-tasks
|
|
6
|
+
|
|
7
|
+
Output::
|
|
8
|
+
|
|
9
|
+
{
|
|
10
|
+
"SynthesisTasks": [
|
|
11
|
+
{
|
|
12
|
+
"TaskId": "70b61c0f-57ce-4715-a247-cae8729dcce9",
|
|
13
|
+
"TaskStatus": "completed",
|
|
14
|
+
"OutputUri": "https://s3.us-west-2.amazonaws.com/amzn-s3-demo-bucket/70b61c0f-57ce-4715-a247-cae8729dcce9.mp3",
|
|
15
|
+
"CreationTime": 1603911042.689,
|
|
16
|
+
"RequestCharacters": 1311,
|
|
17
|
+
"OutputFormat": "mp3",
|
|
18
|
+
"TextType": "text",
|
|
19
|
+
"VoiceId": "Joanna"
|
|
20
|
+
}
|
|
21
|
+
]
|
|
22
|
+
}
|
|
23
|
+
|
|
24
|
+
For more information, see `Creating long audio files <https://docs.aws.amazon.com/polly/latest/dg/longer-cli.html>`__ in the *Amazon Polly Developer Guide*.
|
|
25
|
+
|
|
@@ -1,27 +1,27 @@
|
|
|
1
|
-
**To synthesize text**
|
|
2
|
-
|
|
3
|
-
The following ``start-speech-synthesis-task`` example synthesizes the text in ``text_file.txt`` and stores the resulting MP3 file in the specified bucket. ::
|
|
4
|
-
|
|
5
|
-
aws polly start-speech-synthesis-task \
|
|
6
|
-
--output-format mp3 \
|
|
7
|
-
--output-s3-bucket-name
|
|
8
|
-
--text file://text_file.txt \
|
|
9
|
-
--voice-id Joanna
|
|
10
|
-
|
|
11
|
-
Output::
|
|
12
|
-
|
|
13
|
-
{
|
|
14
|
-
"SynthesisTask": {
|
|
15
|
-
"TaskId": "70b61c0f-57ce-4715-a247-cae8729dcce9",
|
|
16
|
-
"TaskStatus": "scheduled",
|
|
17
|
-
"OutputUri": "https://s3.us-east-2.amazonaws.com/
|
|
18
|
-
"CreationTime": 1603911042.689,
|
|
19
|
-
"RequestCharacters": 1311,
|
|
20
|
-
"OutputFormat": "mp3",
|
|
21
|
-
"TextType": "text",
|
|
22
|
-
"VoiceId": "Joanna"
|
|
23
|
-
}
|
|
24
|
-
}
|
|
25
|
-
|
|
26
|
-
For more information, see `Creating long audio files <https://docs.aws.amazon.com/polly/latest/dg/longer-cli.html>`__ in the *Amazon Polly Developer Guide*.
|
|
27
|
-
|
|
1
|
+
**To synthesize text**
|
|
2
|
+
|
|
3
|
+
The following ``start-speech-synthesis-task`` example synthesizes the text in ``text_file.txt`` and stores the resulting MP3 file in the specified bucket. ::
|
|
4
|
+
|
|
5
|
+
aws polly start-speech-synthesis-task \
|
|
6
|
+
--output-format mp3 \
|
|
7
|
+
--output-s3-bucket-name amzn-s3-demo-bucket \
|
|
8
|
+
--text file://text_file.txt \
|
|
9
|
+
--voice-id Joanna
|
|
10
|
+
|
|
11
|
+
Output::
|
|
12
|
+
|
|
13
|
+
{
|
|
14
|
+
"SynthesisTask": {
|
|
15
|
+
"TaskId": "70b61c0f-57ce-4715-a247-cae8729dcce9",
|
|
16
|
+
"TaskStatus": "scheduled",
|
|
17
|
+
"OutputUri": "https://s3.us-east-2.amazonaws.com/amzn-s3-demo-bucket/70b61c0f-57ce-4715-a247-cae8729dcce9.mp3",
|
|
18
|
+
"CreationTime": 1603911042.689,
|
|
19
|
+
"RequestCharacters": 1311,
|
|
20
|
+
"OutputFormat": "mp3",
|
|
21
|
+
"TextType": "text",
|
|
22
|
+
"VoiceId": "Joanna"
|
|
23
|
+
}
|
|
24
|
+
}
|
|
25
|
+
|
|
26
|
+
For more information, see `Creating long audio files <https://docs.aws.amazon.com/polly/latest/dg/longer-cli.html>`__ in the *Amazon Polly Developer Guide*.
|
|
27
|
+
|
|
@@ -12,7 +12,7 @@ The following ``export-journal-to-s3`` example creates an export job for journal
|
|
|
12
12
|
Contents of ``my-s3-export-config.json``::
|
|
13
13
|
|
|
14
14
|
{
|
|
15
|
-
"Bucket": "
|
|
15
|
+
"Bucket": "amzn-s3-demo-bucket",
|
|
16
16
|
"Prefix": "ledgerexport1/",
|
|
17
17
|
"EncryptionConfiguration": {
|
|
18
18
|
"ObjectEncryptionType": "SSE_S3"
|
|
@@ -14,7 +14,7 @@ Output::
|
|
|
14
14
|
"ExclusiveEndTime": 1568847599.0,
|
|
15
15
|
"ExportCreationTime": 1568847801.418,
|
|
16
16
|
"S3ExportConfiguration": {
|
|
17
|
-
"Bucket": "
|
|
17
|
+
"Bucket": "amzn-s3-demo-bucket",
|
|
18
18
|
"Prefix": "ledgerexport1/",
|
|
19
19
|
"EncryptionConfiguration": {
|
|
20
20
|
"ObjectEncryptionType": "SSE_S3"
|
|
@@ -15,7 +15,7 @@ Output::
|
|
|
15
15
|
"EncryptionConfiguration": {
|
|
16
16
|
"ObjectEncryptionType": "SSE_S3"
|
|
17
17
|
},
|
|
18
|
-
"Bucket": "
|
|
18
|
+
"Bucket": "amzn-s3-demo-bucket",
|
|
19
19
|
"Prefix": "ledgerexport1/"
|
|
20
20
|
},
|
|
21
21
|
"RoleArn": "arn:aws:iam::123456789012:role/my-s3-export-role",
|
|
@@ -31,7 +31,7 @@ Output::
|
|
|
31
31
|
"EncryptionConfiguration": {
|
|
32
32
|
"ObjectEncryptionType": "SSE_S3"
|
|
33
33
|
},
|
|
34
|
-
"Bucket": "
|
|
34
|
+
"Bucket": "amzn-s3-demo-bucket",
|
|
35
35
|
"Prefix": "ledgerexport1/"
|
|
36
36
|
},
|
|
37
37
|
"RoleArn": "arn:aws:iam::123456789012:role/my-s3-export-role",
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
This example grants ``full control`` to two AWS users (*user1@example.com* and *user2@example.com*) and ``read``
|
|
2
2
|
permission to everyone::
|
|
3
3
|
|
|
4
|
-
aws s3api put-bucket-acl --bucket
|
|
4
|
+
aws s3api put-bucket-acl --bucket amzn-s3-demo-bucket --grant-full-control emailaddress=user1@example.com,emailaddress=user2@example.com --grant-read uri=http://acs.amazonaws.com/groups/global/AllUsers
|
|
5
5
|
|
|
6
6
|
See http://docs.aws.amazon.com/AmazonS3/latest/API/RESTBucketPUTacl.html for details on custom ACLs (the s3api ACL
|
|
7
7
|
commands, such as ``put-bucket-acl``, use the same shorthand argument notation).
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
The following example enables ``PUT``, ``POST``, and ``DELETE`` requests from *www.example.com*, and enables ``GET``
|
|
2
2
|
requests from any domain::
|
|
3
3
|
|
|
4
|
-
aws s3api put-bucket-cors --bucket
|
|
4
|
+
aws s3api put-bucket-cors --bucket amzn-s3-demo-bucket --cors-configuration file://cors.json
|
|
5
5
|
|
|
6
6
|
cors.json:
|
|
7
7
|
{
|
|
@@ -1,9 +1,9 @@
|
|
|
1
1
|
**Example 1: To set bucket policy logging**
|
|
2
2
|
|
|
3
|
-
The following ``put-bucket-logging`` example sets the logging policy for *
|
|
3
|
+
The following ``put-bucket-logging`` example sets the logging policy for *amzn-s3-demo-bucket*. First, grant the logging service principal permission in your bucket policy using the ``put-bucket-policy`` command. ::
|
|
4
4
|
|
|
5
5
|
aws s3api put-bucket-policy \
|
|
6
|
-
--bucket
|
|
6
|
+
--bucket amzn-s3-demo-bucket \
|
|
7
7
|
--policy file://policy.json
|
|
8
8
|
|
|
9
9
|
Contents of ``policy.json``::
|
|
@@ -16,7 +16,7 @@ Contents of ``policy.json``::
|
|
|
16
16
|
"Effect": "Allow",
|
|
17
17
|
"Principal": {"Service": "logging.s3.amazonaws.com"},
|
|
18
18
|
"Action": "s3:PutObject",
|
|
19
|
-
"Resource": "arn:aws:s3:::
|
|
19
|
+
"Resource": "arn:aws:s3:::amzn-s3-demo-bucket/Logs/*",
|
|
20
20
|
"Condition": {
|
|
21
21
|
"ArnLike": {"aws:SourceARN": "arn:aws:s3:::SOURCE-BUCKET-NAME"},
|
|
22
22
|
"StringEquals": {"aws:SourceAccount": "SOURCE-AWS-ACCOUNT-ID"}
|
|
@@ -28,14 +28,14 @@ Contents of ``policy.json``::
|
|
|
28
28
|
To apply the logging policy, use ``put-bucket-logging``. ::
|
|
29
29
|
|
|
30
30
|
aws s3api put-bucket-logging \
|
|
31
|
-
--bucket
|
|
31
|
+
--bucket amzn-s3-demo-bucket \
|
|
32
32
|
--bucket-logging-status file://logging.json
|
|
33
33
|
|
|
34
34
|
Contents of ``logging.json``::
|
|
35
35
|
|
|
36
36
|
{
|
|
37
37
|
"LoggingEnabled": {
|
|
38
|
-
"TargetBucket": "
|
|
38
|
+
"TargetBucket": "amzn-s3-demo-bucket",
|
|
39
39
|
"TargetPrefix": "Logs/"
|
|
40
40
|
}
|
|
41
41
|
}
|
|
@@ -46,26 +46,26 @@ For more information, see `Amazon S3 Server Access Logging <https://docs.aws.ama
|
|
|
46
46
|
|
|
47
47
|
**Example 2: To set a bucket policy for logging access to only a single user**
|
|
48
48
|
|
|
49
|
-
The following ``put-bucket-logging`` example sets the logging policy for *
|
|
49
|
+
The following ``put-bucket-logging`` example sets the logging policy for *amzn-s3-demo-bucket*. The AWS user *bob@example.com* will have full control over
|
|
50
50
|
the log files, and no one else has any access. First, grant S3 permission with ``put-bucket-acl``. ::
|
|
51
51
|
|
|
52
52
|
aws s3api put-bucket-acl \
|
|
53
|
-
--bucket
|
|
53
|
+
--bucket amzn-s3-demo-bucket \
|
|
54
54
|
--grant-write URI=http://acs.amazonaws.com/groups/s3/LogDelivery \
|
|
55
55
|
--grant-read-acp URI=http://acs.amazonaws.com/groups/s3/LogDelivery
|
|
56
56
|
|
|
57
57
|
Then apply the logging policy using ``put-bucket-logging``. ::
|
|
58
58
|
|
|
59
59
|
aws s3api put-bucket-logging \
|
|
60
|
-
--bucket
|
|
60
|
+
--bucket amzn-s3-demo-bucket \
|
|
61
61
|
--bucket-logging-status file://logging.json
|
|
62
62
|
|
|
63
63
|
Contents of ``logging.json``::
|
|
64
64
|
|
|
65
65
|
{
|
|
66
66
|
"LoggingEnabled": {
|
|
67
|
-
"TargetBucket": "
|
|
68
|
-
"TargetPrefix": "
|
|
67
|
+
"TargetBucket": "amzn-s3-demo-bucket",
|
|
68
|
+
"TargetPrefix": "amzn-s3-demo-bucket-logs/",
|
|
69
69
|
"TargetGrants": [
|
|
70
70
|
{
|
|
71
71
|
"Grantee": {
|
|
@@ -1,7 +1,7 @@
|
|
|
1
|
-
This example allows all users to retrieve any object in *
|
|
1
|
+
This example allows all users to retrieve any object in *amzn-s3-demo-bucket* except those in the *MySecretFolder*. It also
|
|
2
2
|
grants ``put`` and ``delete`` permission to the root user of the AWS account ``1234-5678-9012``::
|
|
3
3
|
|
|
4
|
-
aws s3api put-bucket-policy --bucket
|
|
4
|
+
aws s3api put-bucket-policy --bucket amzn-s3-demo-bucket --policy file://policy.json
|
|
5
5
|
|
|
6
6
|
policy.json:
|
|
7
7
|
{
|
|
@@ -10,13 +10,13 @@ grants ``put`` and ``delete`` permission to the root user of the AWS account ``1
|
|
|
10
10
|
"Effect": "Allow",
|
|
11
11
|
"Principal": "*",
|
|
12
12
|
"Action": "s3:GetObject",
|
|
13
|
-
"Resource": "arn:aws:s3:::
|
|
13
|
+
"Resource": "arn:aws:s3:::amzn-s3-demo-bucket/*"
|
|
14
14
|
},
|
|
15
15
|
{
|
|
16
16
|
"Effect": "Deny",
|
|
17
17
|
"Principal": "*",
|
|
18
18
|
"Action": "s3:GetObject",
|
|
19
|
-
"Resource": "arn:aws:s3:::
|
|
19
|
+
"Resource": "arn:aws:s3:::amzn-s3-demo-bucket/MySecretFolder/*"
|
|
20
20
|
},
|
|
21
21
|
{
|
|
22
22
|
"Effect": "Allow",
|
|
@@ -27,7 +27,7 @@ grants ``put`` and ``delete`` permission to the root user of the AWS account ``1
|
|
|
27
27
|
"s3:DeleteObject",
|
|
28
28
|
"s3:PutObject"
|
|
29
29
|
],
|
|
30
|
-
"Resource": "arn:aws:s3:::
|
|
30
|
+
"Resource": "arn:aws:s3:::amzn-s3-demo-bucket/*"
|
|
31
31
|
}
|
|
32
32
|
]
|
|
33
33
|
}
|
|
@@ -1,7 +1,7 @@
|
|
|
1
1
|
The following command grants ``full control`` to two AWS users (*user1@example.com* and *user2@example.com*) and ``read``
|
|
2
2
|
permission to everyone::
|
|
3
3
|
|
|
4
|
-
aws s3api put-object-acl --bucket
|
|
4
|
+
aws s3api put-object-acl --bucket amzn-s3-demo-bucket --key file.txt --grant-full-control emailaddress=user1@example.com,emailaddress=user2@example.com --grant-read uri=http://acs.amazonaws.com/groups/global/AllUsers
|
|
5
5
|
|
|
6
6
|
See http://docs.aws.amazon.com/AmazonS3/latest/API/RESTBucketPUTacl.html for details on custom ACLs (the s3api ACL
|
|
7
7
|
commands, such as ``put-object-acl``, use the same shorthand argument notation).
|
|
@@ -0,0 +1,11 @@
|
|
|
1
|
+
**To associate a canary with a group**
|
|
2
|
+
|
|
3
|
+
The following ``associate-resource`` example associates a canary with a group named ``demo_group``. ::
|
|
4
|
+
|
|
5
|
+
aws synthetics associate-resource \
|
|
6
|
+
--group-identifier demo_group \
|
|
7
|
+
--resource-arn arn:aws:synthetics:us-east-1:123456789012:canary:demo_canary
|
|
8
|
+
|
|
9
|
+
This command produces no output.
|
|
10
|
+
|
|
11
|
+
For more information, see `Synthetic monitoring (canaries) <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,48 @@
|
|
|
1
|
+
**To create a canary**
|
|
2
|
+
|
|
3
|
+
The following ``create-canary`` example creates a canary named ``demo_canary``. ::
|
|
4
|
+
|
|
5
|
+
aws synthetics create-canary \
|
|
6
|
+
--name demo_canary \
|
|
7
|
+
--code '{"S3Bucket": "artifacts3bucket", "S3Key":"demo_canary.zip", "Handler": "index.lambda_handler"}' \
|
|
8
|
+
--artifact-s3-location s3://amzn-s3-demo-bucket/demo_canary.zip \
|
|
9
|
+
--execution-role-arn arn:aws:iam::123456789012:role/demo_canary_role \
|
|
10
|
+
--schedule Expression="rate(10 minutes)" \
|
|
11
|
+
--runtime-version syn-nodejs-puppeteer-9.1
|
|
12
|
+
|
|
13
|
+
Output::
|
|
14
|
+
|
|
15
|
+
{
|
|
16
|
+
"Canary": {
|
|
17
|
+
"Id": "a1b2c3d4-5678-90ab-cdef-example11111",
|
|
18
|
+
"Name": "demo_canary",
|
|
19
|
+
"Code": {
|
|
20
|
+
"Handler": "index.lambda_handler"
|
|
21
|
+
},
|
|
22
|
+
"ExecutionRoleArn": "arn:aws:iam::123456789012:role/demo_canary_role",
|
|
23
|
+
"Schedule": {
|
|
24
|
+
"Expression": "rate(10 minutes)",
|
|
25
|
+
"DurationInSeconds": 0
|
|
26
|
+
},
|
|
27
|
+
"RunConfig": {
|
|
28
|
+
"TimeoutInSeconds": 600,
|
|
29
|
+
"MemoryInMB": 1000,
|
|
30
|
+
"ActiveTracing": false
|
|
31
|
+
},
|
|
32
|
+
"SuccessRetentionPeriodInDays": 31,
|
|
33
|
+
"FailureRetentionPeriodInDays": 31,
|
|
34
|
+
"Status": {
|
|
35
|
+
"State": "CREATING",
|
|
36
|
+
"StateReasonCode": "CREATE_PENDING"
|
|
37
|
+
},
|
|
38
|
+
"Timeline": {
|
|
39
|
+
"Created": "2024-10-15T19:03:08.826000+05:30",
|
|
40
|
+
"LastModified": "2024-10-15T19:03:08.826000+05:30"
|
|
41
|
+
},
|
|
42
|
+
"ArtifactS3Location": "amzn-s3-demo-bucket/demo_canary.zip",
|
|
43
|
+
"RuntimeVersion": "syn-nodejs-puppeteer-9.1",
|
|
44
|
+
"Tags": {}
|
|
45
|
+
}
|
|
46
|
+
}
|
|
47
|
+
|
|
48
|
+
For more information, see `Synthetic monitoring (canaries) <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,21 @@
|
|
|
1
|
+
**To create a group**
|
|
2
|
+
|
|
3
|
+
The following ``create-group`` example creates a group named ``demo_group``. ::
|
|
4
|
+
|
|
5
|
+
aws synthetics create-group \
|
|
6
|
+
--name demo_group
|
|
7
|
+
|
|
8
|
+
Output::
|
|
9
|
+
|
|
10
|
+
{
|
|
11
|
+
"Group": {
|
|
12
|
+
"Id": "example123",
|
|
13
|
+
"Name": "demo_group",
|
|
14
|
+
"Arn": "arn:aws:synthetics:us-east-1:123456789012:group:example123",
|
|
15
|
+
"Tags": {},
|
|
16
|
+
"CreatedTime": "2024-10-15T14:47:23.811000+05:30",
|
|
17
|
+
"LastModifiedTime": "2024-10-15T14:47:23.811000+05:30"
|
|
18
|
+
}
|
|
19
|
+
}
|
|
20
|
+
|
|
21
|
+
For more information, see `Synthetic monitoring (canaries) <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
**To permanently delete a canary**
|
|
2
|
+
|
|
3
|
+
The following ``delete-canary`` example deletes a canary named ``demo_canary``. ::
|
|
4
|
+
|
|
5
|
+
aws synthetics delete-canary \
|
|
6
|
+
--name demo_canary
|
|
7
|
+
|
|
8
|
+
This command produces no output.
|
|
9
|
+
|
|
10
|
+
For more information, see `Synthetic monitoring (canaries) <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,10 @@
|
|
|
1
|
+
**To delete a group**
|
|
2
|
+
|
|
3
|
+
The following ``delete-group`` example deletes a group named ``demo_group``. ::
|
|
4
|
+
|
|
5
|
+
aws synthetics delete-group \
|
|
6
|
+
--group-identifier demo_group
|
|
7
|
+
|
|
8
|
+
This command produces no output.
|
|
9
|
+
|
|
10
|
+
For more information, see `Synthetic monitoring (canaries) <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries.html>`__ in the *Amazon CloudWatch User Guide*.
|
|
@@ -0,0 +1,31 @@
|
|
|
1
|
+
**To see information from the most recent run of each canary**
|
|
2
|
+
|
|
3
|
+
The following ``describe-canaries-last-run`` example returns the most recent run of each canary that you have created. ::
|
|
4
|
+
|
|
5
|
+
aws synthetics describe-canaries-last-run
|
|
6
|
+
|
|
7
|
+
Output::
|
|
8
|
+
|
|
9
|
+
{
|
|
10
|
+
"CanariesLastRun": [
|
|
11
|
+
{
|
|
12
|
+
"CanaryName": "demo_canary",
|
|
13
|
+
"LastRun": {
|
|
14
|
+
"Id": "a1b2c3d4-5678-90ab-cdef-example11111",
|
|
15
|
+
"Name": "demo_canary",
|
|
16
|
+
"Status": {
|
|
17
|
+
"State": "PASSED",
|
|
18
|
+
"StateReason": "",
|
|
19
|
+
"StateReasonCode": ""
|
|
20
|
+
},
|
|
21
|
+
"Timeline": {
|
|
22
|
+
"Started": "2024-10-15T19:20:39.691000+05:30",
|
|
23
|
+
"Completed": "2024-10-15T19:20:58.211000+05:30"
|
|
24
|
+
},
|
|
25
|
+
"ArtifactS3Location": "cw-syn-results-123456789012-us-east-1/canary/us-east-1/demo_canary-abc-example1234/2024/10/15/13/50-39-690"
|
|
26
|
+
}
|
|
27
|
+
}
|
|
28
|
+
]
|
|
29
|
+
}
|
|
30
|
+
|
|
31
|
+
For more information, see `Synthetic monitoring (canaries) <https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/CloudWatch_Synthetics_Canaries.html>`__ in the *Amazon CloudWatch User Guide*.
|