text
stringlengths
16
11.1k
You can administer your WorkSpaces using the Amazon WorkSpaces console\. **Topics** + [Manage the WorkSpace Running Mode](running-mode.md) + [Modify a WorkSpace](modify-workspaces.md) + [Tag WorkSpaces Resources](tag-workspaces-resources.md) + [WorkSpace Maintenance](workspace-maintenance.md) + [Encrypted WorkSpaces](encrypt-workspaces.md) + [Restart a WorkSpace](reboot-workspaces.md) + [Rebuild a WorkSpace](rebuild-workspace.md) + [Restore a WorkSpace](restore-workspace.md) + [Upgrade Windows 10 BYOL WorkSpaces](upgrade-windows-10-byol-workspaces.md) + [Migrate a WorkSpace](migrate-workspaces.md) + [Delete a WorkSpace](delete-workspaces.md)
The Amazon Athena AWS CMDB connector enables Amazon Athena to communicate with various AWS services so that you can query them with SQL\. For information about supported services, parameters, permissions, deployment, performance, and licensing, see [Amazon Athena AWS CMDB Connector](https://github.com/awslabs/aws-athena-query-federation/tree/master/athena-aws-cmdb) on GitHub\.
1. \(Optional\) For **Task execution role**, choose an IAM role that provides permissions for containers in your task to make calls to AWS APIs on your behalf\. For tasks that use the EC2 launch type, these permissions are usually granted by the Amazon ECS Container Instance IAM role, which is specified earlier as the **Task Role**\. There is no need to specify a task execution role\. For more information, see[Amazon ECS task execution IAM role](task_execution_IAM_role.md)\. 1. \(Optional\) For **Task size**, choose a value for **Task memory \(GB\)** and **Task CPU \(vCPU\)**\. Supported `Task CPU (vCPU)` values are between 128 CPU units \(0\.125 vCPUs\) and 10240 CPU units \(10 vCPUs\)\. **Note** Task\-level CPU and memory parameters are ignored for Windows containers\. We recommend specifying container\-level resources for Windows containers\. 1. For each container in your task definition, complete the following steps\. 1. Choose **Add container**\. 1. Fill out each required field and any optional fields to use in your container definitions \(more container definition parameters are available in the **Advanced container configuration** menu\)\. For more information, see [Task definition parameters](task_definition_parameters.md)\. 1. Choose **Add** to add your container to the task definition\.
+ [AWS CloudFormation StackSets sample templates](stacksets-sampletemplates.md) + [Troubleshooting AWS CloudFormation StackSets](stacksets-troubleshooting.md)
The SDK provides methods that decrypt the [encrypted message](concepts.md#message) and return plaintext strings, byte arrays, or byte streams\. For code examples in each supported programming languages, see the examples in the [Programming languages](programming-languages.md) section\. You must use the same master key provider and keyring to decrypt that you used to encrypt, or a compatible one\. 1. Your application passes an [encrypted message](concepts.md#message) to a decryption method\. To indicate the source of the [data keys](concepts.md#DEK) that were used to encrypt your data, your request specifies a cryptographic materials manager \(CMM\), or a master key provider or keyring\. If you specify a master key provider or keyring, the AWS Encryption SDK creates a default CMM for you\. 1. The decryption method asks the CMM for cryptographic materials to decrypt the encrypted message\. It passes in information from the encrypted message, including the encrypted data keys\. 1. In Java and Python, to get decryption materials, the Default CMM asks its master key provider for a master key that can decrypt one of the encrypted data keys\. Other CMMs might use different techniques to get the decryption materials\. In C and JavaScript, the CMM asks the keyring for decryption materials\. The keyring uses its wrapping keys to decrypt one of the encrypted data keys\. The response includes the decryption materials, including the plaintext data key\.
In the following topics, *K* clusters refer to *k \* x*, where you specify *k* and *x* when creating a model training job\. 1. It iterates over input training data and recalculates cluster centers\. 1. It reduces resulting clusters to *k* \(if the data scientist specified the creation of *k\*x* clusters in the request\)\. The following sections also explain some of the parameters that a data scientist might specify to configure a model training job as part of the `HyperParameters` string map\. **Topics** + [Step 1: Determine the Initial Cluster Centers](#kmeans-step1) + [Step 2: Iterate over the Training Dataset and Calculate Cluster Centers](#kmeans-step2) + [Step 3: Reduce the Clusters from *K* to *k*](#kmeans-step3)
A crypto user \(CU\) can perform the following key management and cryptographic operations\. + **Key management** – Create, delete, share, import, and export cryptographic keys\. + **Cryptographic operations** – Use cryptographic keys for encryption, decryption, signing, verifying, and more\. For more information, see the [HSM User Permissions Table](#user-permissions-table)\.
ID for the AWS Key Management Service \(KMS\) key that Amazon Comprehend uses to encrypt data on the storage volume attached to the ML compute instance\(s\) that process the analysis job\. The VolumeKmsKeyId can be either of the following formats: + KMS Key ID: `"1234abcd-12ab-34cd-56ef-1234567890ab"` + Amazon Resource Name \(ARN\) of a KMS Key: `"arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab"` Type: String Length Constraints: Maximum length of 2048\. Required: No **VpcConfig** <a name="comprehend-Type-SentimentDetectionJobProperties-VpcConfig"></a> Configuration parameters for a private Virtual Private Cloud \(VPC\) containing the resources you are using for your sentiment detection job\. For more information, see [Amazon VPC](https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html)\. Type: [VpcConfig](API_VpcConfig.md) object Required: No
**Create robust endpoints when hosting your model\.** SageMaker endpoints can help protect your application from [Availability Zone](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/using-regions-availability-zones.html) outages and instance failures\. If an outage occurs or an instance fails, SageMaker automatically attempts to distribute your instances across Availability Zones\. For this reason, we strongly recommended that you deploy multiple instances for each production endpoint\. If you are using an [Amazon Virtual Private Cloud \(VPC\)](https://docs.aws.amazon.com/vpc/latest/userguide/what-is-amazon-vpc.html), configure the VPC with at least two [ `Subnets`](https://docs.aws.amazon.com/sagemaker/latest/APIReference/API_VpcConfig.html#SageMaker-Type-VpcConfig-Subnets .html), each in a different Availability Zone\. If an outage occurs or an instance fails, Amazon SageMaker automatically attempts to distribute your instances across Availability Zones\. In general, to achieve more reliable performance, use more small [Instance Types](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/instance-types.html) in different Availability Zones to host your endpoints\.
Linux clients do not support automatic DNS\-based failover\. Therefore, they don't automatically connect to the standby file server during a failover\. They will automatically resume file system operations after the Multi\-AZ file system has failed back to the file server in the preferred subnet\.
To download the software, choose the tab for your preferred operating system, then choose the link to each software package\. ------
``` [MonitoringInputs](#cfn-sagemaker-monitoringschedule-monitoringinputs-monitoringinputs): - MonitoringInput ```
+ To see the compliance state for each AWS resource of a specific type, use the [DescribeComplianceByResource](https://docs.aws.amazon.com/config/latest/APIReference/API_DescribeComplianceByResource.html) action\. + To see the compliance details of an individual AWS resource, use the [GetComplianceDetailsByResource](https://docs.aws.amazon.com/config/latest/APIReference/API_GetComplianceDetailsByResource.html) action\. The details include which AWS Config rules evaluated the resource, when each rule last evaluated it, and whether the resource complies with each rule\.
The following snippet creates an AWS OpsWorks PHP layer that is associated with the `myStack` AWS OpsWorks stack\. The layer is dependent on the `myApp` AWS OpsWorks application\.
**Severity:** High **AWS Config rule:** [https://docs.aws.amazon.com/config/latest/developerguide/restricted-ssh.html](https://docs.aws.amazon.com/config/latest/developerguide/restricted-ssh.html) Security groups provide stateful filtering of ingress and egress network traffic to AWS resources\. Security Hub recommends that no security group allow unrestricted ingress access to port 22\. Removing unfettered connectivity to remote console services, such as SSH, reduces a server's exposure to risk\. **Note** This control is not supported in Africa \(Cape Town\) or Europe \(Milan\)\.
See the following topics: + To configure health checks for your Application Load Balancer, see [Health checks for your target groups](https://docs.aws.amazon.com/elasticloadbalancing/latest/application/target-group-health-checks.html) in the *User Guide for Application Load Balancers*\. + To configure health checks for your Network Load Balancer, see [Health checks for your target groups](https://docs.aws.amazon.com/elasticloadbalancing/latest/network/target-group-health-checks.html) in the *User Guide for Network Load Balancers*\. + To configure health checks for your Classic Load Balancer, see [Configure health checks for your Classic Load Balancer](https://docs.aws.amazon.com/elasticloadbalancing/latest/classic/elb-healthchecks.html) in the *User Guide for Classic Load Balancers*\. + For more information about Amazon EC2 Auto Scaling health checks, see [Health checks for Auto Scaling instances](healthcheck.md)\. The following procedures show how to add `ELB` health checks to your Auto Scaling group\. **Topics** + [Adding health checks \(console\)](#as-add-elb-healthcheck-console) + [Adding health checks \(AWS CLI\)](#as-add-elb-healthcheck-aws-cli)
Creates a Lambda LayerVersion that contains library or runtime code needed by a Lambda Function\. The [AWS::Serverless::LayerVersion](#sam-resource-layerversion) resource also supports the `Metadata` resource attribute, so you can instruct AWS SAM to build layers included in your application\. For more information about building layers, see [Building Layers](building-layers.md)\. **Important Note**: Since the release of the [UpdateReplacePolicy](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-attribute-updatereplacepolicy.html) resource attribute in AWS CloudFormation, [AWS::Lambda::LayerVersion](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-lambda-layerversion.html) \(recommended\) offers the same benefits as [AWS::Serverless::LayerVersion](#sam-resource-layerversion)\. When a Serverless LayerVersion is transformed, SAM also transforms the logical id of the resource so that old LayerVersions are not automatically deleted by CloudFormation when the resource is updated\.
+ [PolicyDetails](https://docs.aws.amazon.com/dlm/latest/APIReference/API_PolicyDetails.html) in the *Amazon Data Lifecycle Manager API Reference*
When you change the desired capacity of your Auto Scaling group, Amazon EC2 Auto Scaling manages the process of launching or terminating instances to maintain the new group size\. The following example assumes that you've created an Auto Scaling group with a minimum size of 1 and a maximum size of 5\. Therefore, the group currently has one running instance\. **To change the size of your Auto Scaling group** 1. Open the Amazon EC2 console at [https://console\.aws\.amazon\.com/ec2/](https://console.aws.amazon.com/ec2/)\. 1. On the navigation pane, under **AUTO SCALING**, choose **Auto Scaling Groups**\. 1. Select the check box next to your Auto Scaling group\. A split pane opens up in the bottom part of the **Auto Scaling groups** page, showing information about the group that's selected\. 1. On the **Details** tab, choose **Group details**, **Edit**\. \(Old console: On the **Details** tab, choose **Edit**\.\) 1. For **Desired capacity**, increase the desired capacity by one\. For example, if the current value is `1`, enter `2`\. The desired capacity must be less than or equal to the maximum size of the group\. If your new value for **Desired capacity** is greater than **Maximum capacity**, you must update **Maximum capacity**\. 1. When you are finished, choose **Update**\.
``` def ignoreErrors( fn : DynamicRecord => DynamicRecord ) : DynamicRecord ```
**Document Steps** 1. aws:assertAwsResourceProperty \- Verifies the input instance is Windows\. 1. aws:assertAwsResourceProperty \- Verifies the input instance is a managed instance\. If so, the online upgrade starts, otherwise the offline upgrade is evaluated\. 1. \(Online upgrade\) If the input instance is a managed instance: 1. aws:createImage \- Creates an AMI backup\. 1. aws:createTags \- Tags the AMI backup\. 1. aws:runCommand \- Installs ENA network driver via AWS\-ConfigureAWSPackage\. 1. aws:runCommand \- Installs NVMe driver via AWS\-ConfigureAWSPackage\. 1. aws:runCommand \- Installs AWS PV driver via AWS\-ConfigureAWSPackage\. 1. \(Offline upgrade\) If the input instance is not a managed instance: 1. aws:assertAwsResourceProperty \- Verifies the AllowOffline flag is set to True\. If so, the offline upgrade starts, otherwise the workflow ends\. 1. aws:changeInstanceState \- Stop the source instance\. 1. aws:changeInstanceState \- Force\-stop the source instance\. 1. aws:createImage \- Create an AMI backup of the source instance\.
*Required*: No *Type*: String *Minimum*: `1` *Maximum*: `512` *Pattern*: `((/[A-Za-z0-9\.,\+@=_-]+)*)/` *Update requires*: [Replacement](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-replacement) `PolicyDocument` <a name="cfn-iam-managedpolicy-policydocument"></a> The JSON policy document that you want to use as the content for the new policy\. You must provide policies in JSON format in IAM\. However, for AWS CloudFormation templates formatted in YAML, you can provide the policy in JSON or YAML format\. AWS CloudFormation always converts a YAML policy to JSON format before submitting it to IAM\. The [regex pattern](http://wikipedia.org/wiki/regex) used to validate this parameter is a string of characters consisting of the following: + Any printable ASCII character ranging from the space character \(`\u0020`\) through the end of the ASCII character range + The printable characters in the Basic Latin and Latin\-1 Supplement character set \(through `\u00FF`\)
``` aws iam attach-role-policy --policy-arn arn:aws:iam::aws:policy/AmazonSSMManagedInstanceCore --role-name CodeDeployDemo-EC2-Instance-Profile ``` 1. Call the create\-instance\-profile command followed by the add\-role\-to\-instance\-profile command to create an IAM instance profile named **CodeDeployDemo\-EC2\-Instance\-Profile**\. The instance profile allows Amazon EC2 to pass the IAM role named **CodeDeployDemo\-EC2\-Instance\-Profile** to an Amazon EC2 instance when the instance is first launched: ``` aws iam create-instance-profile --instance-profile-name CodeDeployDemo-EC2-Instance-Profile aws iam add-role-to-instance-profile --instance-profile-name CodeDeployDemo-EC2-Instance-Profile --role-name CodeDeployDemo-EC2-Instance-Profile ``` If you need to get the name of the IAM instance profile, see [list\-instance\-profiles\-for\-role](https://docs.aws.amazon.com/cli/latest/reference/iam/list-instance-profiles-for-role.html) in the IAM section of the *AWS CLI Reference*\.
**campaignConfig** <a name="personalize-Type-CampaignUpdateSummary-campaignConfig"></a> The configuration details of a campaign\. Type: [CampaignConfig](API_CampaignConfig.md) object Required: No **creationDateTime** <a name="personalize-Type-CampaignUpdateSummary-creationDateTime"></a> The date and time \(in Unix time\) that the campaign update was created\. Type: Timestamp Required: No **failureReason** <a name="personalize-Type-CampaignUpdateSummary-failureReason"></a> If a campaign update fails, the reason behind the failure\. Type: String Required: No **lastUpdatedDateTime** <a name="personalize-Type-CampaignUpdateSummary-lastUpdatedDateTime"></a> The date and time \(in Unix time\) that the campaign update was last updated\. Type: Timestamp Required: No **minProvisionedTPS** <a name="personalize-Type-CampaignUpdateSummary-minProvisionedTPS"></a> Specifies the requested minimum provisioned transactions \(recommendations\) per second that Amazon Personalize will support\. Type: Integer Valid Range: Minimum value of 1\.
Currently, you can't use the AWS Toolkit for JetBrains to change the settings for an AWS CloudFormation stack directly\. However, you can [change \(update\) the settings for an AWS serverless application](#key-tasks-sam-update) that belongs to a stack, or [change \(update\) the configuration for an AWS Lambda function](#key-tasks-lambda-update) that belongs to a stack\. Then you [deploy that serverless application](#key-tasks-sam-deploy) again or deploy that function, as part of the lifecycle of [running \(invoking\) the remote version of that function](#key-tasks-lambda-remote), again\. [Top](#key-tasks)
1. Select **Create function**\. For more information, see [Create a Lambda Function with the Console](https://docs.aws.amazon.com/lambda/latest/dg/getting-started-create-function.html)\. 1. Choose the following options\. + Choose **Author from scratch** + Enter a value for **Function name**\. + For **Runtime** choose **Python 3\.7** or **Python 3\.6**\. + For **Choose or create an execution role**, choose **Create a new role with basic Lambda permissions**\. 1. Choose **Create function** to create the AWS Lambda function\. 1. Open the IAM console at [https://console\.aws\.amazon\.com/iam/](https://console.aws.amazon.com/iam/)\. 1. From the navigation pane choose **Roles**\. 1. From the resources list, choose the IAM role that AWS Lambda created for you\. The role name is prepended with the name of your Lambda function\. 1. In the **Permissions** tab, choose **Attach policies**\. 1. Add the *AmazonTextractFullAccess* and *AmazonS3ReadOnlyAccess* Policies\. 1. Select **Attach Policy**\. **Step 3: Create and add a layer \(console\)**
+ An encrypted EBS root device volume is supported only when using a custom AMI\. For more information, see [Creating a Custom AMI with an Encrypted Amazon EBS Root Device Volume](emr-custom-ami.md#emr-custom-ami-encrypted)\. Encrypted EBS storage volumes are not supported\. + If you apply tags using the Amazon EMR API, those operations are applied to EBS volumes\. + There is a limit of 25 volumes per instance\.
"ref": "InitBackup" }, "stage": "true" }, ``` + Increment the last value in all existing `scriptArgument` values to the number of nodes \(in this example, `"3"`\)\. ``` { "id": "RestorePart1", ... "scriptArgument": ["#{myEfsSource}","#{myEfsBackup}", "#{myInterval}", "#{myBackup}","#{myEfsID}", "1", "3"], ... }, { "id": "RestorePart2", ... "scriptArgument": ["#{myEfsSource}","#{myEfsBackup}", "#{myInterval}", "#{myBackup}","#{myEfsID}", "0", "3"], ... }, ```
| Amazon EMR Release Label | Sqoop Version | Components Installed With Sqoop | | --- | --- | --- | | emr\-5\.27\.0 | Sqoop 1\.4\.7 | emrfs, emr\-ddb, emr\-goodies, hadoop\-client, hadoop\-mapred, hadoop\-hdfs\-datanode, hadoop\-hdfs\-library, hadoop\-hdfs\-namenode, hadoop\-httpfs\-server, hadoop\-kms\-server, hadoop\-yarn\-nodemanager, hadoop\-yarn\-resourcemanager, hadoop\-yarn\-timeline\-server, mysql\-server, sqoop\-client | **Sqoop Version Information for emr\-5\.26\.0** | Amazon EMR Release Label | Sqoop Version | Components Installed With Sqoop | | --- | --- | --- |
Using AWS Lambda as a destination allows you to more easily perform post\-processing of your SQL results before sending them to a final destination\. Common post\-processing tasks include the following: + Aggregating multiple rows into a single record + Combining current results with past results to address late\-arriving data + Delivering to different destinations based on the type of information + Record format translation \(such as translating to Protobuf\) + String manipulation or transformation + Data enrichment after analytical processing + Custom processing for geospatial use cases + Data encryption Lambda functions can deliver analytic information to a variety of AWS services and other destinations, including the following: + [Amazon Simple Storage Service \(Amazon S3\)](https://docs.aws.amazon.com/AmazonS3/latest/dev/) + Custom APIs + [Amazon DynamoDB](https://docs.aws.amazon.com/amazondynamodb/latest/developerguide/) + [Apache Aurora](http://aurora.apache.org/) + [Amazon Redshift](https://docs.aws.amazon.com/redshift/latest/dg/) + [Amazon Simple Notification Service \(Amazon SNS\)](https://docs.aws.amazon.com/sns/latest/dg/)
Following, you can find troubleshooting tips for Snowball Edge jobs with compute instances\. **Topics** + [Virtual Network Interface Has an IP Address of 0\.0\.0\.0](#troubleshoot-vnic-ipaddress) + [Snowball Edge Hangs When Launching a Large Compute Instance](#ec2-edge-launch-stopped) + [My Instance Has One Root Volume](#multiple-root-volume) + [Unprotected Private Key File Error](#pem-key-perms-ec2-edge)
`Action` <a name="cfn-elasticmapreduce-cluster-scalingrule-action"></a> The conditions that trigger an automatic scaling activity\. *Required*: Yes *Type*: [ScalingAction](aws-properties-elasticmapreduce-cluster-scalingaction.md) *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) `Description` <a name="cfn-elasticmapreduce-cluster-scalingrule-description"></a> A friendly, more verbose description of the automatic scaling rule\. *Required*: No *Type*: String *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) `Name` <a name="cfn-elasticmapreduce-cluster-scalingrule-name"></a> The name used to identify an automatic scaling rule\. Rule names must be unique within a scaling policy\. *Required*: Yes *Type*: String
Contains metrics information, such as the number of rows processed, CPU usage, input/output, and disk use, for active queries running in user\-defined query queues \(service classes\)\. To view metrics for queries that have completed, see the [STL\_QUERY\_METRICS](r_STL_QUERY_METRICS.md) system table\. Query metrics are sampled at one second intervals\. As a result, different runs of the same query might return slightly different times\. Also, query segments that run in less than 1 second might not be recorded\. STV\_QUERY\_METRICS tracks and aggregates metrics at the query, segment, and step level\. For information about query segments and steps, see [Query planning and execution workflow](c-query-planning.md)\. Many metrics \(such as `max_rows`, `cpu_time`, and so on\) are summed across node slices\. For more information about node slices, see [Data warehouse system architecture](c_high_level_system_architecture.md)\. To determine the level at which the row reports metrics, examine the `segment` and `step_type` columns: + If both `segment` and `step_type` are `-1`, then the row reports metrics at the query level\. + If `segment` is not `-1` and `step_type` is `-1`, then the row reports metrics at the segment level\. + If both `segment` and `step_type` are not `-1`, then the row reports metrics at the step level\.
The following release notes include information for Amazon EMR release version 5\.24\.1\. Changes are relative to 5\.24\.0\. Initial release date: June 26, 2019 **Changes, Enhancements, and Resolved Issues** + Updated the default Amazon Linux AMI for EMR to include important Linux kernel security updates, including the TCP SACK Denial of Service Issue \([AWS\-2019\-005](http://aws.amazon.com/security/security-bulletins/AWS-2019-005/)\)\.
``` aws ssm start-automation-execution ^ --document-name "AWS-RestartEC2Instance" ^ --mode Interactive ^ --parameters "InstanceId=i-1234567890abcdef0" ``` ------
**Algorithms**: Factorization Machines, IP Insights, k\-means, k\-nearest\-neighbor, Linear Learner, Object2Vec, Neural Topic Model,PCA, and Random Cut Forest | AWS Region | Training image and inference image registry path | | --- | --- | | us\-west\-1 | 632365934929\.dkr\.ecr\.us\-west\-1\.amazonaws\.com | | us\-west\-2 | 174872318107\.dkr\.ecr\.us\-west\-2\.amazonaws\.com | | us\-east\-1 | 382416733822\.dkr\.ecr\.us\-east\-1\.amazonaws\.com | | us\-east\-2 | 404615174143\.dkr\.ecr\.us\-east\-2\.amazonaws\.com | | ap\-east\-1 | 286214385809\.dkr\.ecr\.ap\-east\-1\.amazonaws\.com | | ap\-northeast\-1 | 351501993468\.dkr\.ecr\.ap\-northeast\-1\.amazonaws\.com | | ap\-northeast\-2 | 835164637446\.dkr\.ecr\.ap\-northeast\-2\.amazonaws\.com |
``` EventInvokeConfig: MaximumEventAgeInSeconds: 60 MaximumRetryAttempts: 2 DestinationConfig: OnSuccess: Type: SQS Destination: arn:aws:sqs:us-west-2:012345678901:my-queue OnFailure: Type: Lambda Destination: !GetAtt DestinationLambda.Arn ```
+ [After your Reserved Instance is sold](#ri-market-concepts-sold) + [Getting paid](#ri-market-sold-gettingpaid) + [Information shared with the buyer](#ri-market-seller-disclosure)
For general information about AWS Cloud compliance, see the following: + [Self\-Service Security Updates for Compliance](#elasticache-compliance-self-service) + [Self\-Service Updates in Amazon ElastiCache](Self-Service-Updates.md) + [AWS Cloud Compliance](https://aws.amazon.com/compliance/) + [Shared Responsibility Model](https://aws.amazon.com/compliance/shared-responsibility-model/) + [AWS Services in Scope by Compliance Program](https://aws.amazon.com/compliance/services-in-scope/) + [AWS HIPAA Compliance Program](https://aws.amazon.com/compliance/hipaa-compliance/) + [Architecting for HIPAA Security and Compliance on Amazon Web Services](https://d0.awsstatic.com/whitepapers/compliance/AWS_HIPAA_Compliance_Whitepaper.pdf) + [AWS PCI DSS Compliance Program](https://aws.amazon.com/compliance/pci-dss-level-1-faqs/)
For more information, see [Document Text Analysis](https://docs.aws.amazon.com/textract/latest/dg/how-it-works-analyzing.html)\.
| [Active AWS X\-Ray integration](#history) | You can now use AWS X\-Ray to trace and analyze latencies in user requests as they travel through your APIs to the underlying services\. For more information, see [Trace API Gateway API Execution with AWS X\-Ray](https://docs.aws.amazon.com/apigateway/latest/developerguide/apigateway-xray.html)\. | September 6, 2018 | | [Caching improvements](#history) | Only `GET` methods will have caching enabled by default when you enable caching for an API stage\. This helps to ensure the safety of your API\. You can enable caching for other methods by overriding method settings\. For more information, see [Enable API Caching to Enhance Responsiveness](https://docs.aws.amazon.com/apigateway/latest/developerguide/api-gateway-caching.html)\. | August 20, 2018 | | [Service limits revised](#history) | Several limits have been revised: Increased number of APIs per account\. Increased API rate limits for Create/Import/Deploy APIs\. Corrected some rates from per minute to per second\. For more information, see [Limits](https://docs.aws.amazon.com/apigateway/latest/developerguide/limits.html)\. | July 13, 2018 |
"transcribe:StartTranscriptionJob", ], "Resource": "*", "Condition": { "StringEquals": { "transcribe:OutputBucketName": "AWSDOC-EXAMPLE-BUCKET" } } } ] } ``` If you want users to always use a AWS Key Management Service \(KMS\) key when they use the [StartTranscriptionJob](API_StartTranscriptionJob.md) operation, you can use the following policy\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "VisualEditor0", "Effect": "Allow", "Action": [ "transcribe:StartTranscriptionJob", ], "Resource": "*", "Condition": { "Null": { "transcribe:OutputEncryptionKMSKeyId": "false" } } } ] } ``` For information on AWS KMS keys, see [Key Management](key-management.md)\.
``` $ python get-pip.py --user ``` or ``` $ python3 get-pip.py --user ``` When you include the `--user` switch, the script installs `pip` to the path `~/.local/bin`\. 1. To ensure that the folder that contains `pip` is part of your `PATH` variable, do the following: 1. Find your shell's profile script in your user folder\. If you're not sure which shell you have, run `basename $SHELL`\. ``` $ ls -a ~ . .. .bash_logout .bash_profile .bashrc Desktop Documents Downloads ``` + **Bash** – `.bash_profile`, `.profile`, or `.bash_login` + **Zsh** – `.zshrc` + **Tcsh** – `.tcshrc`, `.cshrc` or `.login` 1. Add an export command at the end of your profile script that's similar to the following example\. ``` export PATH=~/.local/bin:$PATH ``` The export command inserts the path, which is `~/.local/bin` in this example, at the front of the existing `PATH` variable\.
"[DefaultOs](#cfn-opsworks-stack-defaultos)" : String, "[DefaultRootDeviceType](#cfn-opsworks-stack-defaultrootdevicetype)" : String, "[DefaultSshKeyName](#cfn-opsworks-stack-defaultsshkeyname)" : String, "[DefaultSubnetId](#defaultsubnet)" : String, "[EcsClusterArn](#cfn-opsworks-stack-ecsclusterarn)" : String, "[ElasticIps](#cfn-opsworks-stack-elasticips)" : [ ElasticIp, ... ], "[HostnameTheme](#cfn-opsworks-stack-hostnametheme)" : String, "[Name](#cfn-opsworks-stack-name)" : String, "[RdsDbInstances](#cfn-opsworks-stack-rdsdbinstances)" : [ RdsDbInstance, ... ], "[ServiceRoleArn](#cfn-opsworks-stack-servicerolearn)" : String, "[SourceStackId](#cfn-opsworks-stack-sourcestackid)" : String,
| Updated resources | March 31, 2016 | AWS CloudFormation updated the following resources: [\[See the AWS documentation website for more details\]](http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/ReleaseHistory.html) | 2010\-05\-15 | | Change sets | March 29, 2016 | Before updating stacks, use change sets to see how your changes might affect your running resources\. For more information, see [Updating Stacks Using Change Sets](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-changesets.html)\. | 2010\-05\-15 | | New resources | March 15, 2016 | Use the [AWS::GameLift::Alias](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-gamelift-alias.html), [AWS::GameLift::Build](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-gamelift-build.html), and [AWS::GameLift::Fleet](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-gamelift-fleet.html) resources to deploy multiplayer game servers in AWS\. | 2010\-05\-15 |
You can unload data in delimited format or fixed\-width format\. The default output is pipe\-delimited \(using the '\|' character\)\. The following example specifies a comma as the delimiter: ``` unload ('select * from venue') to 's3://mybucket/tickit/venue/comma' iam_role 'arn:aws:iam::0123456789012:role/MyRedshiftRole' delimiter ','; ``` The resulting output files look like this: ``` 20,Air Canada Centre,Toronto,ON,0 60,Rexall Place,Edmonton,AB,0 100,U.S. Cellular Field,Chicago,IL,40615 200,Al Hirschfeld Theatre,New York City,NY,0 240,San Jose Repertory Theatre,San Jose,CA,0 300,Kennedy Center Opera House,Washington,DC,0 ... ``` To unload the same result set to a tab\-delimited file, issue the following command: ``` unload ('select * from venue') to 's3://mybucket/tickit/venue/tab' iam_role 'arn:aws:iam::0123456789012:role/MyRedshiftRole'
"Sid": "DynamoDBAccessStmt", "Effect": "Allow", "Action": [ "dynamodb:GetItem", "dynamodb:BatchGetItem", "dynamodb:Query", "dynamodb:Scan", "dynamodb:PutItem", "dynamodb:UpdateItem", "dynamodb:DeleteItem", "dynamodb:BatchWriteItem", "dynamodb:DescribeTable", "dynamodb:ConditionCheckItem" ], "Resource": "arn:aws:dynamodb:us-west-2:123456789012:table/Books" } ] } ``` In addition, `DAXServiceRole` would require an IAM policy that allows `DAXCluster01` to perform read/write actions on the `Books` table\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "DynamoDBAccessStmt", "Effect": "Allow", "Action": [ "dynamodb:GetItem", "dynamodb:BatchGetItem", "dynamodb:Query",
] } ] }, "Roles": [{"Ref": "deliveryRole"}] } } } } ```
AWS IoT Device Tester for FreeRTOS is a test automation tool to validate and [qualify](https://aws.amazon.com/partners/dqp/) your FreeRTOS devices for inclusion in the [AWS Partner Device Catalog](https://devices.amazonaws.com)\. We recommend that you use the most recent version of FreeRTOS and AWS IoT Device Tester to test or qualify your devices\. We support AWS IoT Device Tester for the most recent version of FreeRTOS and for FreeRTOS versions released within the previous six months\. The latest version of FreeRTOS is available on [GitHub](https://github.com/aws/amazon-freertos)\. For supported versions of AWS IoT Device Tester, see [Supported versions of AWS IoT Device Tester for FreeRTOS](dev-test-versions-afr.md)\. For each version of the IDT framework, three versions of the test suite will be supported for qualification of devices\. You can also use any of the supported versions of AWS IoT Device Tester with the corresponding version of FreeRTOS to test or qualify your devices\. Although you can continue to use [Unsupported IDT versions for FreeRTOS](idt-unsupported-versions-afr.md), these will not receive bug fixes or updates\. If you have questions about the support policy, contact [AWS Customer Support](https://aws.amazon.com/contact-us/)\.
The following example adds text to an index by calling the [BatchPutDocument](API_BatchPutDocument.md) operation\. You can use the `BatchPutDocument` operation to add documents in the following formats: + DOC + HTML + PDF + Plain text + PPT Files added to the index must be in a UTF\-8 encoded byte stream\. The following example adds UTF\-8 encoded text to the index\. ------
+ Optionally, a set of on\-premises instance tags \(with the `--tags` option\) that CodeDeploy will use to identify the set of Amazon EC2 instances to which to deploy\. Specify each tag with `Key=tag-key,Value=tag-value` \(for example, `Key=Name,Value=Beta Key=Name,Value=WestRegion`\)\. If this option is not specified, no tags will be registered\. To register tags later, call the [add\-tags\-to\-on\-premises\-instances](https://docs.aws.amazon.com/cli/latest/reference/deploy/add-tags-to-on-premises-instances.html) command\. + Optionally, the AWS region where the on\-premises instance will be registered with CodeDeploy \(with the `--region` option\)\. This must be one of the supported regions listed in [Region and endpoints](https://docs.aws.amazon.com/general/latest/gr/rande.html#codedeploy_region) in *AWS General Reference* \(for example, `us-west-2`\)\. If this option is not specified, the default AWS region associated with the calling IAM user will be used\. For example: ```
Human Knowledge: Foundations and Limits http://humanknowledge.net ©Brian Holtz 2005-07-09 This text is memeware: if you find your copy useful, please propagate it. See 0.7 Copyright. Outline 0. Prologue This living hypertext is a systematic summary of the knowledge attained by human civilization. For each subdivision of human knowledge, the text identifies its fundamental concepts, principles, mysteries, and misunderstandings. Status. This draft contains a complete section on philosophy; a complete section on futurology; partially complete sections on logic and physics; a complete section on economics; some notes and tables on astronomy, biology, political science, linguistics, and history; over 1500 internal hypertext links. Copyright. This text is the copyrighted property of the author. Certain forms of copying are permitted and even encouraged; see the Copyright section for details. Positions This text aims to assert humanity's analyses and theories that are most valid (i.e. convincing and defensible, as opposed to merely logically well-formed). These analyses and theories are not necessarily the most widely-believed or well-known. Potentially contentious assertions are biological evolutionism, and technological optimism. Relatively uncontentious assertions appear as normal text. Potentially contentious assertions appear like this. Denials of widely-held beliefs appear like this. Questions whose answers lie outside human knowledge appear like this. Innovations Almost all of the facts and analyses asserted in this text have of course been asserted before by other humans. Nevertheless, there are some things in this text that the author believes may be novel or at least independently original. Arrangements. The text places various unoriginal pieces of information into some arrangements that might not have been presented elsewhere before. Among these are a list of humanity's most important questions; a list of humanity's most important unanswered questions; a taxonomy of paranormal phenomena; a summary of arguments against Christianity; a synopsis of where and how fast Earth is heading in space; lists of major biological and historical advances; summaries of the platforms of the major American political parties; and an extension of the classical Libertarian 2D map of political space. Analyses. The text gives certain analyses and definitions that, while not wildly original, are nevertheless believed by the author to be improvements on any he had seen before. Among these are Inventions. The text presents a few notions that may be wholly new. They are the idea of memeware; the idea that without quantum indeterminacy one could in principle store unlimited amounts of information within a finite medium; the idea that the question "why is there something rather than nothing?" might be answered by a combination of anthropic reasoning and the observation that it is not possible for nothing to be possible. Predictions. The section on Futurology collects, filters, and refines many predictions by other humans, but also makes predictions that the author has never seen clearly stated by anyone else. They are predictions of Judgments. The author naturally hopes that the most significant innovation of this text is the judgments it makes and the worldview it synthesizes them into. The text asserts a worldview it calls autocosmology that includes by endorsement the positions of positivism, empiricism, functionalism, atheism, capitalism, federalism, evolutionism, and evolutionary psychology. The text also advances as part of autocosmology some slightly customized versions of other positions. They are a materialist ontology that attempts to build from logic to events to causality to existence; an extropian axiology that values life and intelligence and the autonomy needed to increase them; a libertarian ethics that recognizes all persons' right to life and liberty, and all beings' right not to suffer torture or extinction; a libertarian political philosophy that sharply defines the duties, powers, and limits of the state; and a futuristic optimism that predicts increasing liberty and prosperity and decreasing ignorance and superstition. This text aims to survey the foundations and limits of the knowledge attained by humanity since the dawn of civilization. It the time when it was attained; the place where it was attained; the techniques with which it was attained; the domain to which it applies; the purposes for which it is used; the names of its topics; the thinkers who created it; the writings that first recorded it. Science is about truth that is not necessary but rather contingent, because it is based on actual observations and inductions about regular or pattern-following phenomena in the universe. The truths of science should be agreed upon by any thinkers in the universe that observe the same regular phenomena. The most interesting known phenomena in the universe are those concerning persons, and so science is divided accordingly. Natural science studies regular phenomena that do not necessarily involve persons and thus are likely to be universal (although many details of terrestrial life science are inevitably parochial). Technology applies mathematics and science toward accomplishing goals. Technological principles are likely to coincide wherever in the universe there are thinkers dealing with similar phenomena and desiring similar goals. Social sciences strive to induce truths that would apply to any kind of person anywhere in the universe, but this is not always possible because humans know of only one kind of person: humans. Most parochial of all would be topics relating to human arts and leisure, which this text excludes as not involving fundamental knowledge. 0.5. Prologue / Questions Asked Students could use it to gauge how much they have left to learn, and how a given piece of knowledge fits in with all the rest. Teachers could use it to show the relationships among the various parts of human knowledge. It could also help them audit how well their course plans cover fundamentals, and help them prepare tests for achievement of basic understanding. Colleges could use it as a model report required to be written by graduating students. Educated people could use it to help correct any areas of forgetfulness, incompleteness, or obsolescence in their education. People building systems of knowledge or opinion could use it as an example of how to address the important and fundamental areas of human knowledge. Investigators could use its compilation of mysteries to choose a research area available for important contribution. Present-day futurists could consider it as a worldview toward which humanity might be moving. Future historians could use it to understand what was known and believed in these times. Humans from outside of Western culture could use it to help understand Western thinking. Engineers could upload it to help populate the knowledge base for a potential artificial intelligence. Archivists could store it to help safeguard human knowledge against catastrophes that might threaten human civilization. Persons from outside human civilization -- such as extraterrestrials -- could use it to evaluate the state of human knowledge and ignorance. Persons (such as psychics, spiritualists, and alien abductees) allegedly in contact with non-human intelligence could authenticate their claims by answering some of humanity's unanswered questions listed in it. This text is memeware. You may reproduce or distribute this text only in complete and unmodified copies, only for non-commercial purposes, and only if you agree to the following memeware license. If you find this text useless, you owe the author nothing. If you find it useful, you should do one or both of: Propagate copies of it (complete with this memeware license) to at least two people who find it useful and do not yet have a copy, and email the author (brian@holtz.org) some vague indication of who they are. copies of it (complete with this memeware license) to at least two people who find it useful and do not yet have a copy, and email the author (brian@holtz.org) some vague indication of who they are. Pay the author however much the text is worth to you, via the payment link at http://humanknowledge.net. If the amount ($5? 5¢? 0¢?) is much less than the effort of sending it, then add the amount to your next charitable donation and advise the author of the charity and the amount. The number of possible valid human knowledge summaries no longer than this text is immense but finite. This text is certainly far from being the best possible such summary. If the goal of approaching such an optimal summary is worthwhile, then an effective method might be to first produce a suboptimal summary and then to continually correct it or replace it outright with better ones. Thus corrections and replacements of this text are welcome. At the end of this text is a list of some of the references used in writing it. Because this text attempts to say so much, it contains few references for particular statements. The text tries to explain or justify some of its statements, but most it merely asserts, due to space constraints. Words in single-quotes are being mentioned rather than used. ('Ten' is a word, while ten is a number.) Words in double-quotes are being used verbatim from some source. Words in italics are being used with emphasis. Words in bold and used at the beginning of a sentence are being defined. Some will find parts of this compendium uninteresting. The author hopes the text will reawaken their childhood curiosity about the big questions, and tap their adult capacity for marvel at what humanity knows and does not know. Aristotle or Newton would probably each have given his right eye for access to the knowledge that most modern humans choose to ignore. Some will note that while the author is known for his sense of humor, there is no humor in this text. The author believes that humor would be inappropriate in what is essentially a reference work. There are probably funny lexicographers, but you wouldn't know it by reading a dictionary. Some will say this text has too many definitions and reads like a dictionary. A large part of knowledge is indeed analysis: the carving of nature at the joints. Some will say this text has too few definitions, in that it uses too many academic or obscure words. For the sake of brevity, this text indeed takes full advantage of the vocabulary of English.
Returns a binary representation of the geometrically symmetric difference between left geometry and right geometry\. Example: ``` SELECT ST_GEOMETRY_TO_TEXT(ST_SYMMETRIC_DIFFERENCE(ST_LINE('linestring(0 2, 2 2)'), ST_LINE('linestring(1 2, 3 2)'))) ```
AWS Control Tower uses Amazon S3 buckets and Amazon DynamoDB databases that are encrypted at rest by using Amazon S3\-Managed Keys \(SSE\-S3\) in support of your landing zone\. This encryption is configured by default when you set up your landing zone\. You can also establish encryption at rest for the services you use in your landing zone for the services that support it\. For more information, see the security chapter of that service's online
Context values are key\-value pairs that can be associated with a stack or construct\. The AWS CDK uses context to cache information from your AWS account, such as the Availability Zones in your account or the Amazon Machine Image \(AMI\) IDs used to start your instances\. [Feature flags](featureflags.md) are also context values\. You can create your own context values for use by your apps or constructs\.
`Name` <a name="cfn-cognito-userpooluser-attributetype-name"></a> The name of the attribute\. *Required*: No *Type*: String *Minimum*: `1` *Maximum*: `32` *Pattern*: `[\p{L}\p{M}\p{S}\p{N}\p{P}]+` *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) `Value` <a name="cfn-cognito-userpooluser-attributetype-value"></a> The value of the attribute\. *Required*: No *Type*: String *Maximum*: `2048` *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)
**** | Resource | Default | | --- | --- | | Maximum number of builds you can request information about at one time using the AWS CLI or AWS SDKs | 100 | | Maximum number of concurrent running builds\* | 60 | | Maximum time the history of a build is retained | 1 year | | Number of minutes you can specify for the build timeout of a single build | 5 to 480 \(8 hours\) | \* Quotas for the maximum number of concurrent running builds vary, depending on the compute type\. For some platforms and compute types, the default is 20\. For a new account, the quota can be 1—5\. To request a higher concurrent build quota or if you get a "Cannot have more than X active builds for the account" error, contact AWS Support\.
Source: Owner: AWS SourceIdentifier: EC2_SECURITY_GROUP_ATTACHED_TO_ENI Type: AWS::Config::ConfigRule EfsEncryptedCheck: Controls: - '3.4' Properties: ConfigRuleName: efs-encrypted-check Description: Checks whether Amazon EFS are configured to encrypt file data using AWS KMS. The rule is NON_COMPLIANT if the Encrypted key is set to False on DescribeFileSystems or, if specified, KmsKeyId key on DescribeFileSystems is not matching KmsKeyId parameter. MaximumExecutionFrequency: TwentyFour_Hours Scope: {} Source: Owner: AWS SourceIdentifier: EFS_ENCRYPTED_CHECK Type: AWS::Config::ConfigRule EipAttached: Controls: - '2.2' Properties: ConfigRuleName: eip-attached Description: Checks whether all EIP addresses allocated to a VPC are attached to EC2 instances or in-use ENIs. Scope: ComplianceResourceTypes: - AWS::EC2::EIP Source: Owner: AWS
You can decline an invitation to be a member account\. When you decline an invitation, your account is marked as **Resigned** on the master account's list of member accounts\. **To decline an invitation to be a member account** 1. Open the AWS Security Hub console at [https://console\.aws\.amazon\.com/securityhub/](https://console.aws.amazon.com/securityhub/)\. 1. In the navigation pane, choose **Settings**, and then choose **Accounts**\. 1. Under **Master account**, choose **Decline invitation**\.
A container for object key name prefix and suffix filtering rules\. **Note** The same type of filter rule cannot be used more than once\. For example, you cannot specify two prefix rules\.
"aws:RequestTag/env" : "prod" } } }, { "Effect" : "Deny", "Action" : "iotthingsgraph:*", "Resource" : "*", "Condition" : { "StringEquals" : { "aws:ResourceTag/env" : "prod" } } }, { "Effect": "Allow", "Action": [ "iotthingsgraph:*" ], "Resource": "*" } ] } ``` You can also specify multiple tag values for a given tag key by enclosing them in a list, as shown\. ``` "StringEquals" : { "aws:ResourceTag/env" : ["dev", "test"] } ``` **Note** If you use tags to allow or deny users access to resources, you must consider explicitly denying users the ability to add those tags to or remove them from the same resources\. Otherwise, a user could circumvent your restrictions and gain access to a resource by modifying its tags\.
The following example creates a scaling plan named `myScalingPlan` for an existing Auto Scaling group \([AWS::AutoScaling::AutoScalingGroup](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-as-group.html)\) whose name you specify when launching the stack using this template\. It specifies the `TagFilters` property as the application source\. You can specify any tag key and tag value you want without affecting the stack, as long as the key\-pair is unique for each scaling plan\. This can be any value you choose that helps you identify your scaling plan configuration\. However, if you also want to use the AWS Auto Scaling console to edit the scaling plan, then the tag must match the tag you chose for the Auto Scaling group\. The [ScalingInstructions](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-properties-autoscalingplans-scalingplan-scalinginstruction.html) property includes information that's required to enable predictive scaling and dynamic scaling\. In this example, the predictive scaling mode specifies `ForecastOnly`\. In which case, AWS Auto Scaling generates forecasts with traffic predictions for the two days ahead, but does not schedule scaling actions to match the forecast\.
If the action is successful, the service sends back an HTTP 200 response\. The following data is returned in JSON format by the service\. ** [campaignArn](#API_CreateCampaign_ResponseSyntax) ** <a name="personalize-CreateCampaign-response-campaignArn"></a> The Amazon Resource Name \(ARN\) of the campaign\. Type: String Length Constraints: Maximum length of 256\. Pattern: `arn:([a-z\d-]+):personalize:.*:.*:.+`
1. On the **Configure network** and **Set Auto Scaling \(optional\)** pages, choose **Next step**\. 1. Choose **Update Service** to finish and update your service\. **To update a running service \(AWS CLI\)** 1. Obtain the ARN for the service\. ``` aws ecs list-services --cluster cluster_name --region region ``` Output: ``` { "serviceArns": [ "arn:aws:ecs:region:aws_account_id:service/MyService" ] } ``` 1. Update your service, forcing a new deployment that deploys new tasks\. ``` aws ecs update-service --service serviceArn --force-new-deployment --cluster cluster_name --region region ``` If you are using standalone tasks, then you can start a new task to replace it\. For more information, see [Running tasks](ecs_run_task.md)\.
The hierarchy is as follows: `CATALOG` is an ancestor of all `DATABASES` in each account, and each `DATABASE` is an ancestor for all of its `TABLES` and `FUNCTIONS`\. For example, for a table named `table_test` that belongs to a database `db` in the catalog in your account, its ancestors are `db` and the catalog in your account\. For the `db` database, its ancestor is the catalog in your account, and its descendants are tables and functions\. For more information about the hierarchical structure of resources, see [List of ARNs in Data Catalog](https://docs.aws.amazon.com/glue/latest/dg/glue-specifying-resource-arns.html#data-catalog-resource-arns) in the *AWS Glue Developer Guide*\. + For any non\-delete Athena action on a resource, such as `CREATE DATABASE`, `CREATE TABLE`, `SHOW DATABASE`, `SHOW TABLE`, or `ALTER TABLE`, you need permissions to call this action on the resource \(table or database\) and all ancestors of the resource in the Data Catalog\. For example, for a table, its ancestors are the database to which it belongs, and the catalog for the account\. For a database, its ancestor is the catalog for the account\. See [Fine\-Grained Policy Examples](#examples-fine-grained-table-database-policies)\.
V\-72037, V\-72039, V\-72041, V\-72049, V\-72059, V\-72061, V\-72063, V\-72067, V\-72069, V\-72071, V\-72073, V\-72075, V\-72081, V\-72083, V\-72085, V\-72087, V\-72089, V\-72091, V\-72093, V\-72209, V\-72211, V\-72213, V\-72219, V\-72221, V\-72225, V\-72253, V\-72255, V\-72257, V\-72265, V\-72269, V\-72273, V\-72275, V\-72281, V\-72315, V\-72417, V\-72427, V\-72433,
**Relevant metrics:** + `GetMedia.OutgoingBytes` + `GetMedia.OutgoingFragments` + `GetMedia.OutgoingFrames` + `GetMediaForFragmentList.OutgoingBytes` + `GetMediaForFragmentList.OutgoingFragments` + `GetMediaForFragmentList.OutgoingFrames` **Action items:** + These metrics indicate what rate real\-time and archived data is being read\.
] } ] } ``` This policy grants read\-only permission to a table named `books` in the database named `db1`\. Notice that to grant `Get` permission to a table that permission to the catalog and database resources is also required\. To deny access to a table, requires that you create a policy to deny a user access to the table, or its parent database or catalog\. This allows you to easily deny access to a specific resource that cannot be circumvented with a subsequent allow permission\. For example, if you deny access to table `books` in database `db1`, then if you grant access to database `db1`, access to table `books` is still denied\. The following is an example identity\-based policy that denies permissions for AWS Glue actions \(`glue:GetTables` and `GetTable`\) to database `db1` and all of the tables within it\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "DenyGetTablesToDb1", "Effect": "Deny", "Action": [ "glue:GetTables", "glue:GetTable" ], "Resource": [ "arn:aws:glue:us-west-2:123456789012:database/db1" ] } ] }
The following example demonstrates how to create a basic lifecycle policy\.
``` { "[PercentTraffic](#cfn-apigateway-deployment-deploymentcanarysettings-percenttraffic)" : Double, "[StageVariableOverrides](#cfn-apigateway-deployment-deploymentcanarysettings-stagevariableoverrides)" : {Key : Value, ...}, "[UseStageCache](#cfn-apigateway-deployment-deploymentcanarysettings-usestagecache)" : Boolean } ```
+ [Configuring Amazon SNS notifications for CloudTrail](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/getting_notifications_top_level.html) + [Receiving CloudTrail log files from multiple Regions](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/receive-cloudtrail-log-files-from-multiple-regions.html) and [Receiving CloudTrail log files from multiple accounts](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-receive-logs-from-multiple-accounts.html) All Amazon Chime actions are logged by CloudTrail and are documented in the [https://docs.aws.amazon.com/chime/latest/APIReference/Welcome.html](https://docs.aws.amazon.com/chime/latest/APIReference/Welcome.html)\. For example, calls to the `CreateAccount`, `InviteUsers` and `ResetPersonalPIN` sections generate entries in the CloudTrail log files\. Every event or log entry contains information about who generated the request\. The identity information helps you determine the following: + Whether the request was made with root or IAM user credentials\. + Whether the request was made with temporary security credentials for a role or federated user\. + Whether the request was made by another AWS service\.
| | | | --- |--- | | Maximum number of applications associated with an AWS account in a single region | 1000 | | Maximum number of characters in an application name | 100 | | Characters allowed in an application name | Letters \(a\-z, A\-Z\), numbers \(0\-9\), periods \(\.\), underscores \(\_\), `+` \(plus signs\), `=` \(equals signs\), `,` \(commas\), `@` \(at signs\), `-` \(minus signs\)\. | | Maximum number of applications that can be passed to the [BatchGetApplications](https://docs.aws.amazon.com/codedeploy/latest/APIReference/API_BatchGetApplications.html) API action | 100 | | Maximum number of GitHub connection tokens for a single AWS account | 25 |
The following procedure creates a Redis \(cluster mode enabled\) replication group using the ElastiCache API\. When you create a Redis \(cluster mode enabled\) replication group from scratch, you create the replication group and all its nodes with a single call to the ElastiCache API `CreateReplicationGroup` operation\. Include the following parameters\. **ReplicationGroupId** The name of the replication group you are creating\. Redis \(cluster mode enabled\) replication group naming constraints are as follows: + Must contain 1–40 alphanumeric characters or hyphens\. + Must begin with a letter\. + Can't contain two consecutive hyphens\. + Can't end with a hyphen\. **ReplicationGroupDescription** Description of the replication group\. **NumNodeGroups** The number of node groups you want created with this replication group\. Valid values are 1 to 90\. **ReplicasPerNodeGroup** The number of replica nodes in each node group\. Valid values are 1 to 5\. **NodeGroupConfiguration** The configuration for each node group\. The `NodeGroupConfiguration` parameter consists of the following fields\. + `PrimaryAvailabilityZone` – The Availability Zone where the primary node of this node group is located\. If this parameter is omitted, ElastiCache chooses the Availability Zone for the primary node\.
You write data to a tape gateway virtual tape by using the same procedure and backup policies that you do with physical tapes\. Create the necessary configuration for backup and restore jobs\. For detailed information, see the [IBM Spectrum Protect Administrator's Guide](https://www.ibm.com/support/knowledgecenter/SSTG2D_7.1.0/com.ibm.itsm.srv.doc/b_srv_admin_guide_windows.pdf)\.
"Down poured the wine like oil on blazing fire. And still the riot went on - the debauchery gained its height - glasses were dashed upon the floor by hands that could not carry them to lips, oaths were shouted out by lips which could scarcely form the words to vent them in; drunken losers cursed and roared; some mounted on the tables, waving bottles above their heads and bidding defiance to the rest; some danced, some sang, some tore the cards and raved. Tumult and frenzy reigned supreme ..." Nicholas Nickleby, by Charles Dickens, 1839. All politicians who seek to justify repressive legislation claim that they are responding to an unprecedented threat to public order. And all politicians who cite such a threat draft measures in response which can just as easily be used against democratic protest. No act has been passed over the past 20 years with the aim of preventing antisocial behaviour, disorderly conduct, trespass, harassment and terrorism that has not also been deployed to criminalise a peaceful public engagement in politics. When Walter Wolfgang was briefly detained by the police after heckling the foreign secretary last week, the public caught a glimpse of something that a few of us have been vainly banging on about for years. On Friday, six students and graduates of Lancaster University were convicted of aggravated trespass. Their crime was to have entered a lecture theatre and handed out leaflets to the audience. Staff at the university were meeting people from BAE Systems, Rolls-Royce, Shell, the Carlyle Group, GlaxoSmithKline, DuPont, Unilever and Diageo, to learn how to "commercialise university research". The students were hoping to persuade the researchers not to sell their work. They were in the theatre for three minutes. As the judge conceded, they tried neither to intimidate anyone nor to stop the conference from proceeding. They were prosecuted under the 1994 Criminal Justice Act, passed when Michael Howard was the Conservative home secretary. But the university was able to use it only because Labour amended the act in 2003 to ensure that it could be applied anywhere, rather than just "in the open air". Had Mr Wolfgang said "nonsense" twice during the foreign secretary's speech, the police could have charged him under the Protection from Harassment Act 1997. Harassment, the act says, "must involve conduct on at least two occasions ... conduct includes speech". Parliament was told that its purpose was to protect women from stalkers, but the first people to be arrested were three peaceful protesters. Since then it has been used by the arms manufacturer EDO to keep demonstrators away from its factory gates, and by Kent police to arrest a woman who sent an executive at a drugs company two polite emails, begging him not to test his products on animals. In 2001 the peace campaigners Lindis Percy and Anni Rainbow were prosecuted for causing "harassment, alarm or distress" to American servicemen at the Menwith Hill military intelligence base in Yorkshire, by standing at the gate holding the Stars and Stripes and a placard reading "George W Bush? Oh dear!" In Hull a protester was arrested under the act for "staring at a building". Had Mr Wolfgang said "nonsense" to one of the goons who dragged him out of the conference, he could have been charged under section 125 of the Serious Organised Crime and Police Act 2005, which came into force in August. Section 125 added a new definition of harassment to the 1997 act, "a course of conduct ... which involves harassment of two or more persons". What this means is that you need only address someone once to be considered to be harassing them, as long as you have also addressed someone else in the same manner. This provision, in other words, can be used to criminalise any protest anywhere. But when the bill passed through the Commons and the Lords, no member contested or even noticed it. Section 125 hasn't yet been exercised, but section 132 of the act is already becoming an effective weapon against democracy. This bans people from demonstrating in an area "designated" by the government. One of these areas is the square kilometre around parliament. Since the act came into force, democracy campaigners have been holding a picnic in Parliament Square every Sunday afternoon (see www1.atwiki.com/picnic/). Seventeen people have been arrested so far. But the law that has proved most useful to the police is the one under which Mr Wolfgang was held: section 44 of the Terrorism Act 2000. This allows them to stop and search people without the need to show that they have "reasonable suspicion" that a criminal offence is being committed. They have used it to put peaceful protesters through hell. At the beginning of 2003, demonstrators against the impending war with Iraq set up a peace camp outside the military base at Fairford in Gloucestershire, from which US B52s would launch their bombing raids. Every day - sometimes several times a day - the protesters were stopped and searched under section 44. The police, according to a parliamentary answer, used the act 995 times, though they knew that no one at the camp was a terrorist. The constant harassment and detention pretty well broke the protesters' resolve. Since then the police have used the same section to pin down demonstrators outside the bomb depot at Welford in Berkshire, at the Atomic Weapons Establishment at Aldermaston, at Menwith Hill and at the annual arms fair in London's Docklands. The police are also rediscovering the benefits of some of our more venerable instruments. On September 10, Keith Richardson, one of the six students convicted of aggravated trespass on Friday, had his stall in Lancaster city centre confiscated under the 1824 Vagrancy Act. "Every Person wandering abroad and endeavouring by the Exposure of Wounds and Deformities to obtain or gather Alms ... shall be deemed a Rogue and Vagabond... " The act was intended to prevent the veterans of the Napoleonic wars from begging, but the police decided that pictures of the wounds on this man's anti-vivisection leaflets put him on the wrong side of the law. In two recent cases, protesters have been arrested under the 1361 Justices of the Peace Act. So much for Mr Blair's 21st century methods. What is most remarkable is that until Mr Wolfgang was held, neither parliamentarians nor the press were interested. The pressure group Liberty, the Green party, a couple of alternative comedians, the Indymedia network and the alternative magazine Schnews have been left to defend our civil liberties almost unassisted. Even after "Wolfie" was thrown out of the conference, public criticism concentrated on the suppression of dissent within the Labour party, rather than the suppression of dissent throughout the country. As the parliamentary opposition falls apart, the extra-parliamentary one is being closed down with hardly a rumble of protest from the huffers and puffers who insist that civil liberties are Britain's gift to the world. Perhaps they're afraid they'll be arrested. www.monbiot.com
This example creates a similar Fargate service in AWS CDK code\. The Amazon ECS construct used in this tutorial helps you use AWS services by providing the following benefits: + Automatically configures a load balancer\. + Automatically opens a security group for load balancers\. This enables load balancers to communicate with instances without you explicitly creating a security group\. + Automatically orders dependency between the service and the load balancer attaching to a target group, where the AWS CDK enforces the correct order of creating the listener before an instance is created\. + Automatically configures user data on automatically scaling groups\. This creates the correct configuration to associate a cluster to AMIs\. + Validates parameter combinations early\. This exposes AWS CloudFormation issues earlier, thus saving you deployment time\. For example, depending on the task, it's easy to misconfigure the memory settings\. Previously, you would not encounter an error until you deployed your app\. But now the AWS CDK can detect a misconfiguration and emit an error when you synthesize your app\. + Automatically adds permissions for Amazon Elastic Container Registry \(Amazon ECR\) if you use an image from Amazon ECR\. + Automatically scales\. The AWS CDK supplies a method so you can autoscalinginstances when you use an Amazon EC2 cluster\. This happens automatically when you use an instance in a Fargate cluster\. In addition, the AWS CDK prevents an instance from being deleted when automatic scaling tries to kill an instance, but either a task is running or is scheduled on that instance\.
Ford Pinto, Ford Corcel Updated! 2004-1-12 Everyone, get out your web erasers! This popular story is debunked. Marcelo de Castro Bastos informs us (and confirmed elsewhere): Ford Pinto (under any name) wasn't ever sold in Brazil, except maybe as a low-volume import. The Ford Corcel was a totally unrelated product, the result of a joint project by the Brazilian subsidiary of Willys Overland and French automaker Renault (Willys used to make Renault cars, like the Dauphine and Gordini, under license in Brazil.) When Ford acquired Willys's Brazilian operation, they inherited the almost-finished project and decided to launch it under their own brand. They MAY have considered to use the "Pinto" brand on it, but saner heads prevailed and decided on the "Corcel" name in order to keep to the "horse" theme Ford seemed to like at the time. The "Pinto" name was never used in Brazil. "Corcel" was a huge success, and remained in production for more than a decade, spawning a station wagon version called "Belina", a second-generation "Corcel II", a luxury version called "Del Rey" and a light pick-up version called "Pampa". In the early eighties, almost the entire production of Ford Brazil's automobile division was comprised of Corcel-related vehicles. DEBUNKED! Ford's Pinto didn't do well in Brazil. Pinto is Brazilian slang for "male genitals". Ford renamed the car the Corcel, which means horse or steed. Note 1: If it were my translation marketing department I would have renamed the car " Dear God, I hope my gas tank doesn't explode! " Note 2: "Pinto" is reported all over the web, along with this story, as meaning "tiny male genitals" or a "man with small genitals". According to Luiz Pryzant, it just refers to "male genitals". SEPR Ersol 2004-1-11 Bill Leahy sends this gem: Saint-Gobain is a large French glass and ceramics company. Their subsidiary, SEPR, invented a material used in the bottom of furnaces that melt glass. The product was named "Ersol" which comes from "Electro Refractaire Sol". Sol is the French word for bottom (of the furnace). Electro Refractaire refers to it being refractory (resists softening at high temperature) and so is made by electrically melting it. A sensible name, until they introduced the product into the United Kingdom. Ersol sounds too close to arsehole! However, when alerted to the language problem the company decided not to change it. Combine the name with the product's bottom position, and you can see why some product descriptions might read inappropriate to the British: "contraction which occur during the solidification process must be carefully controlled, as it affects the homogeneity of the piece, the volume and location of the shrinkage cavity, and the residual stress." That said, I noted several companies named Ersol on the web. Aussie Nads 2004-1-10 Boxes labeled Aussie Nads caught my attention in the local Walgreens. In my limited vocabulary "Aussie" means Australian and "Nads" is colloquial for gonads, in particular testicles. So my first thought was that the box contained the international version of "Rocky Mountain Oysters" or "Prairie Oysters". (Here are some testicle recipes.) But I wasn't in the food aisle. My second thought was that these were replacement parts... After all, I get an e-mail every 15 minutes offering me either viagara or organ extensions, so it's not such an unreasonable conclusion. But the idea that some very macho Australians, no doubt from the Outback, decided they were man enough to sell one of their parts and still have enough left over to make out ok (pun intended) was implausible. Closer inspection of the box reveals that Aussie Nads is a hair removal product. Another well-named product is "Nad's for Men" and don't forget to order "Nad's Wand" the "facial applicator wand". Seems like they are penetrating many new markets and so very soon they will be in a store barely a stone's throw away from you. Glen Thomas points out that there is a well-known greyhound named "nads" in Australia, frequently spurred on by the crowd yelling "Go Nads". Intimidate Dating Service 2004-1-10 Israeli radio and press ran ads for the Intimidate Dating Service. Now you might think that Intimidate tries to match up sadists with masochists. However, Hagit Rozanes informs us that "Intimi" is the Hebrew word for intimate. (Hmmm. Better hope your date speaks Hebrew or you are in for a rough night...) Liebfraumilch Wine 2004-1-10 Several people wrote me about Germany's most exported wine: Liebfraumilch. "Lieb" means "dear" or "beloved" sometimes a reference to "God" or "holy". "Frau" is "woman", and "Milch" is "milk". Hence "beloved woman's milk", also translated as "Milk of the Virgin" or "Milk of Our Lady". E-mails also offered translations of "women love milk", and "loves woman milk". The name comes from its origins in about the 16th century in the vineyards of the Liebfrauenkirche ("Church of Our Lady") in Worms, Germany. (Worms Wine would also have been a Marketing Mistake!) (Read more in the Food Dictionary.) It would probably be a Marketing Mistake for Liebfraumilch to produce a variation of the Got Milk? ads with paintings of a woman's breast and the milk mustache on it, next to their wine bottle. (Maybe pencil in a mustache in this El Greco...) Götzen 2004-1-10 The european hardware store chain "Götzen" opened a mall in Istanbul. "Göt" means "ass" in Turkish. They changed the name to "Tekzen". Thanks to Hakan Turan! Wang Cares 2004-1-10 In the late '70s, the American computer company Wang was puzzled why its British branch refused to use its latest motto "Wang Cares". However, to British ears the motto sounds too close to "wankers". (masturbaters) Thanks to Malcolm Howlett! Opel Ascona 2004-1-10 General motors made a car named "Opel Ascona". This model sold poorly in Galicia, the northwestern region of Spain. In the galician and also portuguese languages, the term is similar to the term for female genitalia. Thanks to Anjo. Inferno Undertaker 2004-1-4 The 1990's saw the emergence of private-owned companies and the re-introduction of cremation in Estonia. Kai Redone reports that during that period an undertaker in Tallinn, Estonia named itself Inferno, causing several raised eyebrows. I didn't see the problem right away. I thought inferno's meaning is "a very intense and uncontrolled fire" or conflagration. However, although that is one sense for the word, inferno's major usage is "hell", "purgatory" or "perdition". I can imagine the advertisement for Inferno: "I am sorry about the loss of your loved one. Where is the funeral, so I can say goodbye to him?" "He's going to burn in the Inferno!" Mitsubishi Starion 2003-12-30 Andrew Harris of Australia writes: "Mitsubishi had a very successful small car called the Colt. They brought out a slightly larger model, but right up to the last minute, couldn't decide on a name for it. The people here were in a last minute conference call to the Japanese execs trying to make a decision when the final word came through that 'Stallion' would be a suitable 'horsey' name to follow Colt. Trouble was, the name wasn't written, but spoken with a thick Japanese accent and the Aussie end were mystified, but duly wrote down 'Starion'. By the time the mistake was realised the badging and ads had been started and it was too late to stop it." It's a great story and Snopes categorizes it as a definite maybe. With so many car names on this page, you have to wonder if these marketing mistakes aren't intentional, owing to the theory that even bad press is allegedly good marketing... I like that Andrew's version attributes the choice of the name to Mitsubishi's "Aussie" management. Many of the reports I receive have a local or localized coloring. The car is of course sold internationally and othe reports (such as in Snopes) attribute the problem due to American (mis-)management. There is probably a U.K. version as well... Nintendo Donkey Kong 2003-12-30 Snopes (and Nintendo) refutes the notion that Nintendo Donkey Kong was originally to be known as Monkey Kong, or that either a smudged fax or a typographic error resulted in the product's actual name. Yamaha Electric Grand Keyboard 2003-12-27 Yamaha had a mistranslation in their assembly instructions for their Electric Grand Keyboard, circa 1993. They should have written "screw" and ended up instead
**Known Issues** + Hue \(Fixed in Amazon EMR release version 5\.24\.0\) + Hue running on Amazon EMR does not support Solr\. Beginning with Amazon EMR release version 5\.20\.0, a misconfiguration issue causes Solr to be enabled and a harmless error message to appear similar to the following: `Solr server could not be contacted properly: HTTPConnectionPool('host=ip-xx-xx-xx-xx.ec2.internal', port=1978): Max retries exceeded with url: /solr/admin/info/system?user.name=hue&doAs=administrator&wt=json (Caused by NewConnectionError(': Failed to establish a new connection: [Errno 111] Connection refused',))` **To prevent the Solr error message from appearing:** 1. Connect to the master node command line using SSH\. 1. Use a text editor to open the `hue.ini` file\. For example: `sudo vim /etc/hue/conf/hue.ini` 1. Search for the term "appblacklist" and modify the line to the following: ``` appblacklist = search ``` 1. Save your changes and restart Hue as shown in the following example: ``` sudo stop hue; sudo start hue ``` **5\.22\.0 Component Versions**
``` mySubnet: Type: AWS::EC2::Subnet Properties: VpcId: Ref: myVPC CidrBlock: 10.0.0.0/24 AvailabilityZone: "us-east-1a" Tags: - Key: foo Value: bar ```
Amazon EC2 Auto Scaling provides specific and descriptive errors to help you troubleshoot issues\. You can find the error messages in the description of the scaling activities\. **Topics** + [General troubleshooting issues](#troubleshooting-general) + [Retrieving an error message](#RetrievingErrors) + [Troubleshooting Amazon EC2 Auto Scaling: EC2 Instance launch failures](ts-as-instancelaunchfailure.md) + [Troubleshooting Amazon EC2 Auto Scaling: AMI issues](ts-as-ami.md) + [Troubleshooting Amazon EC2 Auto Scaling: Load balancer issues](ts-as-loadbalancer.md) + [Troubleshooting Auto Scaling: Capacity limits](ts-as-capacity.md)
The following diagram shows a high\-level view of a pipeline that includes a custom build action: ![\[A high-level view of a pipeline that includes a custom build action.\]](http://docs.aws.amazon.com/codepipeline/latest/userguide/images/PipelineCustomActionCS.png)![\[A high-level view of a pipeline that includes a custom build action.\]](http://docs.aws.amazon.com/codepipeline/latest/userguide/)![\[A high-level view of a pipeline that includes a custom build action.\]](http://docs.aws.amazon.com/codepipeline/latest/userguide/) When a pipeline includes a custom action as part of a stage, the pipeline will create a job request\. A custom job worker detects that request and performs that job \(in this example, a custom process using third\-party build software\)\. When the action is complete, the job worker returns either a success result or a failure result\. If a success result is received, the pipeline will transition the revision and its artifacts to the next action\. If a failure is returned, the pipeline will not transition the revision to the next action in the pipeline\. **Note** These instructions assume that you have already completed the steps in [Getting started with CodePipeline](getting-started-codepipeline.md)\. **Topics** + [Create a custom action](#actions-create-custom-action-cli)
Similar to tags, you can query parameters by using labels\. You can view a list of specific parameter versions that all use the same label if you query your parameter set by using the [GetParametersByPath](https://docs.aws.amazon.com/systems-manager/latest/APIReference/API_GetParametersByPath.html) API action, as described later in this section\. **Label Requirements and Restrictions** Parameter labels have the following requirements and restrictions: + A version of a parameter can have a maximum of 10 labels\. + You can't attach the same label to different versions of the same parameter\. For example, if version 1 has the label *Production*, then you can't attach *Production* to version 2\. + You can move a label from one version of a parameter to another\. + You can't create a label when you create a new parameter\. You must attach a label to a specific version of a parameter\. + You can't delete a parameter label\. If you no longer want to use a parameter label, then you must move it to a different version of a parameter\. + A label can have a maximum of 100 characters\. + Labels can contain letters \(case sensitive\), numbers, periods \(\.\), hyphens \(\-\), or underscores \(\_\)\.
You can train DeepAR on both GPU and CPU instances and in both single and multi\-machine settings\. We recommend starting with a single CPU instance \(for example, ml\.c4\.2xlarge or ml\.c4\.4xlarge\), and switching to GPU instances and multiple machines only when necessary\. Using GPUs and multiple machines improves throughput only for larger models \(with many cells per layer and many layers\) and for large mini\-batch sizes \(for example, greater than 512\)\. For inference, DeepAR supports only CPU instances\. Specifying large values for `context_length`, `prediction_length`, `num_cells`, `num_layers`, or `mini_batch_size` can create models that are too large for small instances\. In this case, use a larger instance type or reduce the values for these parameters\. This problem also frequently occurs when running hyperparameter tuning jobs\. In that case, use an instance type large enough for the model tuning job and consider limiting the upper values of the critical parameters to avoid job failures\.
After recreating the test data set with the selected sort keys, distribution styles, and compressions encodings, you will retest the system performance\.
1. Open a terminal on your client\. 1. Determine which kernel is currently running on your compute instance by running the following command\. The Lustre client requires Amazon Linux kernel `4.14, version 104` or higher\. ``` uname -r ``` 1. Do one of the following: + If the command returns `4.14.104-78.84.amzn1.x86_64` or a higher version of 4\.14, download and install the Lustre client with the following command\. ``` sudo yum install -y lustre-client ``` + If the command returns a result less than `4.14.104-78.84.amzn1.x86_64`, update the kernel and reboot your Amazon EC2 instance by running the following command\. ``` sudo yum -y update kernel && sudo reboot ``` Confirm that the kernel has been updated using the uname \-r command\. Then download and install the Lustre client as described above\.
``` [EndTime](#cfn-pinpoint-campaign-schedule-endtime): String [EventFilter](#cfn-pinpoint-campaign-schedule-eventfilter): CampaignEventFilter [Frequency](#cfn-pinpoint-campaign-schedule-frequency): String [IsLocalTime](#cfn-pinpoint-campaign-schedule-islocaltime): Boolean [QuietTime](#cfn-pinpoint-campaign-schedule-quiettime): QuietTime [StartTime](#cfn-pinpoint-campaign-schedule-starttime): String [TimeZone](#cfn-pinpoint-campaign-schedule-timezone): String ```
``` wget https://s3.amazonaws.com/cloudhsmv2-software/CloudHsmClient/Xenial/cloudhsm-client_latest_amd64.deb ``` ``` sudo dpkg -i cloudhsm-client_latest_amd64.deb ``` ------
Copying permissions affects the user immediately\.<a name="by-copying-user"></a> **To add permissions to a user by copying permissions from another user** 1. Sign in to the AWS Management Console and open the IAM console at [https://console\.aws\.amazon\.com/iam/](https://console.aws.amazon.com/iam/)\. 1. Choose **Users** in the navigation pane, choose the name of the user whose permissions you want to modify, and then choose the **Permissions** tab\. 1. Choose **Add permissions**, and then choose **Copy permissions from existing user**\. The list displays available users along with their group memberships and attached policies\. If the full list of groups or policies don't fit on one line, you can choose the link for **and *n* more**\. Doing that opens a new browser tab and see the full list of policies \(**Permissions** tab\) and groups \(**Groups** tab\)\. 1. Select the radio button next to the user whose permissions you want to copy\. 1. Choose **Next: Review** to see the list of changes that are to be made to the user\. Then choose **Add permissions**\.
| Amazon EMR Release Label | Zeppelin Version | Components Installed With Zeppelin | | --- | --- | --- | | emr\-5\.11\.1 | Zeppelin 0\.7\.3 | aws\-sagemaker\-spark\-sdk, emrfs, emr\-goodies, hadoop\-client, hadoop\-hdfs\-datanode, hadoop\-hdfs\-library, hadoop\-hdfs\-namenode, hadoop\-httpfs\-server, hadoop\-kms\-server, hadoop\-yarn\-nodemanager, hadoop\-yarn\-resourcemanager, hadoop\-yarn\-timeline\-server, spark\-client, spark\-history\-server, spark\-on\-yarn, spark\-yarn\-slave, zeppelin\-server | **Zeppelin Version Information for emr\-5\.11\.0** | Amazon EMR Release Label | Zeppelin Version | Components Installed With Zeppelin | | --- | --- | --- |
| `tab1` | Go to the first tab | | `tab2` | Go to the second tab | | `tab3` | Go to the third tab | | `tab4` | Go to the fourth tab | | `tab5` | Go to the fifth tab | | `tab6` | Go to the sixth tab | | `tab7` | Go to the seventh tab | | `tab8` | Go to the eighth tab | | `tab9` | Go to the ninth tab | | `term_detach` | Detach clients attached to the **Terminal** pane | | `term_help` | Show help for the **Terminal** pane | | `term_restart` | Restart the **Terminal** pane | | `threeleft` | Create a three\-pane layout with two panes on the left and one pane on the right | | `threeright` | Create a three\-pane layout with two panes on the right and one pane on the left | | `toggle_term_status` | Show **Terminal** pane status, or hide if shown | | `toggleBlockComment` | Surround the selection with block comment characters, or remove them if they are there | | `toggleButtons` | Show tabs, or hide if shown | | `togglecomment` | Add line comment characters at the start of each selected line, or remove them if they are there |
The namespace of the metric\. *Required*: Yes *Type*: String *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) `Statistic` <a name="cfn-autoscalingplans-scalingplan-customizedscalingmetricspecification-statistic"></a> The statistic of the metric\. *Required*: Yes *Type*: String *Allowed values*: `Average | Maximum | Minimum | SampleCount | Sum` *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt) `Unit` <a name="cfn-autoscalingplans-scalingplan-customizedscalingmetricspecification-unit"></a> The unit of the metric\. *Required*: No *Type*: String *Update requires*: [No interruption](https://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/using-cfn-updating-stacks-update-behaviors.html#update-no-interrupt)
"Condition": {"StringEquals": {"s3:x-amz-acl": "bucket-owner-full-control"}} } ] } ```
For Amazon ECS sample events, see [Amazon ECS Events](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/ecs_cwe_events.html) in the *Amazon Elastic Container Service Developer Guide*\.
**Note** Applying a canned ACL overwrites any existing ACL applied to the object\. \(Optional\) In **Cache control**, specify the cache control parameters for requests to download objects from the bucket\. For a list of valid values, see the [http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.9](http://www.w3.org/Protocols/rfc2616/rfc2616-sec14.html#sec14.9) header field for HTTP operations\. To enter multiple values in **Cache control**, use a comma between each value\. You can add a space after each comma \(optional\), as shown in this example\. ![\[Image NOT FOUND\]](http://docs.aws.amazon.com/codepipeline/latest/userguide/images/cache_control_values.png)![\[Image NOT FOUND\]](http://docs.aws.amazon.com/codepipeline/latest/userguide/)![\[Image NOT FOUND\]](http://docs.aws.amazon.com/codepipeline/latest/userguide/) The preceding example entry is displayed in the CLI as follows: ``` "CacheControl": "public, max-age=0, no-transform" ``` Choose **Next**\.
IotNetworkStateChangeEventCallback_t xCallback ); ``` With the following `typedef` statements: ``` typedef void ( *IotNetworkStateChangeEventCallback_t ) ( uint32_t ulNetworkType, AwsIotNetworkState_t xState ); ``` ``` typedef enum AwsIotNetworkState { eNetworkStateUnknown = 0, eNetworkStateDisabled, eNetworkStateEnabled } AwsIotNetworkState_t; ``` For information about porting the Wi\-Fi library, see [Porting the Wi\-Fi Library](https://docs.aws.amazon.com/freertos/latest/portingguide/afr-porting-wifi.html) in the FreeRTOS Porting Guide\.
You can use the AWS CLI to list webhooks in your account\. 1. To list your webhooks, call the list\-webhooks command and include the `--endpoint-url` and `--region` parameters\. The following sample command lists webhooks for the "eu\-central\-1" endpoint URL\. ``` aws codepipeline list-webhooks --endpoint-url "https://codepipeline.eu-central-1.amazonaws.com" --region "eu-central-1" ``` 1. Webhooks are listed, including the name and ARN for each webhook\. ``` { "webhooks": [ { "url": "https://webhooks.domain.com/trigger111111111EXAMPLE11111111111111111": { "authenticationConfiguration": { "SecretToken": "Secret" }, "name": "my-webhook", "authentication": "GITHUB_HMAC", "targetPipeline": "my-Pipeline", "targetAction": "Source", "filters": [ { "jsonPath": "$.ref",
1. Green team has not yet reached minPlayers\. The next 2 players are assigned to the Green team\. 1. All teams have now reached minPlayers\. Red and Blue teams have the most open slots, so the next 8 players are assigned \(4 each\) to the Red and Blue teams\. 1. Once all three teams have 1 open slot available, the remaining 3 player slots are assigned in no particular order\.
+ StartupType Type: String Valid values: Check \| Auto \| Demand \| Disabled \| DelayedAutoStart Default: Check Description: \(Required\) A startup type to apply to the Windows service\. + WindowsServiceName Type: String Description: \(Required\) A valid Windows service name\. **Required IAM Permissions** The `AutomationAssumeRole` requires the following actions to successfully run the Automation document\. It is recommended that the EC2 instance receiving the command has an IAM role with the **AmazonSSMManagedInstanceCore** Amazon managed policy attached\. The user must have at least **ssm:ExecuteAutomation** and **ssm:SendCommand** to run the automation and send the command to the instance, plus **ssm:GetAutomationExecution** to be able to read the automation output\. **Document Steps** aws:runCommand \- Run the PowerShell script to apply the desired configuration to the Windows service on the target instance\. **Outputs** manageWindowsService\.Output
Amazon SNS coordinates use of topics to deliver messages to subscribing endpoints or clients\. Use Amazon SNS to create a notification topic and then subscribe to the topic using your email address\. The Amazon SNS topic will be added as a target to your CloudWatch Events rule\. For more information, see the [Amazon Simple Notification Service Developer Guide](https://docs.aws.amazon.com/sns/latest/dg/) \. Create or identify a topic in Amazon SNS\. CodePipeline will use CloudWatch Events to send notifications to this topic through Amazon SNS\. To create a topic: 1. Open the Amazon SNS console at [https://console\.aws\.amazon\.com/sns](https://console.aws.amazon.com/sns)\. 1. Choose **Create topic**\. 1. In the **Create new topic** dialog box, for **Topic name**, type a name for the topic \(for example, **PipelineNotificationTopic**\)\.
To reduce the likelihood that Athena is unable to read the `SMALLINT` and `TINYINT` data types produced by an AWS Glue ETL job, convert `SMALLINT` and `TINYINT` to `INT` when using the wizard or writing a script for an ETL job\.