id
stringlengths 14
16
| text
stringlengths 1
2.43k
| source
stringlengths 99
229
|
---|---|---|
0f5e6a205b79-2 | | **Simple JSON** | <pre>{<br /> "instance" : <instance>,<br /> "state": <state><br />}</pre> | <pre>{<br /> "instance" : "i-0123456789",<br /> "state": "RUNNING"<br />}</pre> |
| **JSON with a mix of variables and static information** | <pre>{<br /> "instance" : <instance>,<br /> "state": [ 9, <state>, true ],<br /> "Transformed" : "Yes"<br />}<br /></pre> | <pre>{<br /> "instance" : "i-0123456789",<br /> "state": [<br /> 9,<br /> "RUNNING",<br /> true<br /> ],<br /> "Transformed" : "Yes"<br />}</pre> | | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/transform-input.md |
0f5e6a205b79-3 | | **Including reserved variables in JSON** | <pre>{<br /> "instance" : <instance>,<br /> "state": <state>,<br /> "ruleArn" : <aws.events.rule-arn>,<br /> "ruleName" : <aws.events.rule-name>,<br /> "originalEvent" : <aws.events.event><br />}</pre> | <pre>{<br /> "instance" : "i-0123456789",<br /> "state": "RUNNING",<br /> "ruleArn" : "arn:aws:events:us-east-2:123456789012:rule/example",<br /> "ruleName" : "example",<br /> "originalEvent" : {<br /> ... // commented for brevity<br /> }<br />}</pre> |
| **Including reserved variables in a string** | <pre>"<aws.events.rule-name> triggered"</pre> | <pre>"example triggered"</pre> | | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/transform-input.md |
b76f1dec29bb-0 | For information and examples on using input transformations with EventBridge API, see [Use Input Transformer to extract data from an event and input that data to the target](https://docs.aws.amazon.com/eventbridge/latest/APIReference/API_PutTargets.html#API_PutTargets_Example_2)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/transform-input.md |
7a5a54036c40-0 | These are some common issues when transforming input in EventBridge\.
+ For Strings, quotes are required\.
+ There is no validation when creating JSON path for your template\.
+ If you specify a variable to match a JSON path that doesn't exist in the event, that variable isn't created and will not appear in the output\.
+ The JSON that is passed to the target is minified and escaped\.
+ EventBridge does not escape values extracted by *Input Path*, when populating the *Input Template* for a target\.
+ EventBridge does not support variables inside of quotes within JSON, such as: \{"value" : "instance <instance> is in <state>"\}\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/transform-input.md |
e66698cf57fb-0 | You can use Amazon EventBridge to invoke AWS Systems Manager Run Command and perform actions on Amazon EC2 instances when certain events happen\. In this tutorial, set up Systems Manager Run Command to run shell commands and configure each new instance that is launched in an Amazon EC2 Auto Scaling group\. This tutorial assumes that you have already assigned a tag to the Amazon EC2 Auto Scaling group, with `environment` as the key and `production` as the value\.
**To create the EventBridge rule**
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
1. Choose **Create rule**\.
1. Enter a name and description for the rule\.
1. For **Define pattern**, do the following:
1. Choose **Event pattern**\.
1. Choose **Pre\-defined pattern by service**\.
1. For **Service provider**, choose **AWS**\.
1. For **Service Name**, choose **Auto Scaling**\.
1. For **Event type**, choose **Instance Launch and Terminate**\.
1. Choose **Specific instance event\(s\)**, **EC2 Instance\-launch Lifecycle Action**\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/ec2-run-command.md |
e66698cf57fb-1 | 1. Choose **Specific instance event\(s\)**, **EC2 Instance\-launch Lifecycle Action**\.
1. By default, the rule matches any Amazon EC2 Auto Scaling group in the Region\. To make the rule match a specific group, choose **Specific group name\(s\)** and select one or more groups\.
1. For **Select event bus**, choose **AWS default event bus**\. When an AWS service in your account emits an event, it always goes to your account’s default event bus\.
1. For **Target**, select **SSM Run Command** \.
1. For **Document**, choose **AWS\-RunShellScript**\.
For **Target key**, type **tag:environment**\. For **Target value\(s\)**, enter **production** and choose **Add**\.
1. Under **Configure automation parameter\(s\)**, do the following:
1. Choose **Constant**\.
1. For **Commands**, enter a shell command and choose **Add**\. Repeat this step for all commands to run when an instance launches\.
1. If necessary, enter the appropriate information in **WorkingDirectory** and **ExecutionTimeout**\.
1. EventBridge can create the IAM role needed for your event to run: | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/ec2-run-command.md |
e66698cf57fb-2 | 1. EventBridge can create the IAM role needed for your event to run:
+ To create an IAM role automatically, choose **Create a new role for this specific resource**
+ To use an IAM role that you created before, choose **Use existing role**
1. Choose **Create rule**\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/ec2-run-command.md |
54ed87b1052c-0 | You can relay AWSAWS API call events in EventBridge to a stream in Amazon Kinesis\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
5265c0a93f10-0 | Install the AWS CLI\. For more information, see the [AWS Command Line Interface User Guide](https://docs.aws.amazon.com/cli/latest/userguide/)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
a40e7329a230-0 | To create a stream, use the following [create\-stream](https://docs.aws.amazon.com/cli/latest/reference/kinesis/create-stream.html) command\.
```
aws kinesis create-stream --stream-name test --shard-count 1
```
When the stream status is `ACTIVE`, the stream is ready\. To check the stream status, use the following [describe\-stream](https://docs.aws.amazon.com/cli/latest/reference/kinesis/describe-stream.html) command\.
```
aws kinesis describe-stream --stream-name test
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
d3332f96b668-0 | As an example, create a rule to send events to your stream when you stop an Amazon EC2 instance\.
**To create a rule**
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
1. Choose **Create rule**\.
1. Enter a name and description for the rule\.
1. For **Define pattern**, do the following:
1. Choose **Event pattern**\.
1. Choose **Pre\-defined pattern by service**\.
1. For **Service provider**, choose **AWS**\.
1. For **Service Name**, choose **EC2**\.
1. For **Event type**, choose **Instance State\-change Notification**\.
1. Choose **Specific state\(s\)**, **running**\.
1. For **Select event bus**, choose **AWS default event bus**\. When an AWS service in your account emits an event, it always goes to your account’s default event bus\.
1. For **Targets**, choose **Kinesis stream**\.
1. For **Stream**, select the stream that you created\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
d3332f96b668-1 | 1. For **Stream**, select the stream that you created\.
1. Choose **Create a new role for this specific resource**\.
1. Choose **Create**\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
e798a8043c87-0 | To test your rule, stop an Amazon EC2 instance\. After waiting a few minutes for the instance to stop, check your CloudWatch metrics to verify that your function was invoked\.
**To test your rule by stopping an instance**
1. Open the Amazon EC2 console at [https://console\.aws\.amazon\.com/ec2/](https://console.aws.amazon.com/ec2/)\.
1. Launch an instance\. For more information, see [Launch Your Instance](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/LaunchingAndUsingInstances.html) in the *Amazon EC2 User Guide for Linux Instances*\.
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
Choose the name of the rule that you created and choose **Metrics for the rule**\.
1. \(Optional\) When you're finished, terminate the instance\. For more information, see [Terminate Your Instance](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/terminating-instances.html) in the *Amazon EC2 User Guide for Linux Instances*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
edac78590d4b-0 | You can get the record from the stream to verify that the event was relayed\.
**To get the record**
1. To start reading from your Kinesis stream, use the following [get\-shard\-iterator](https://docs.aws.amazon.com/cli/latest/reference/kinesis/get-shard-iterator.html) command\.
```
aws kinesis get-shard-iterator --shard-id shardId-000000000000 --shard-iterator-type TRIM_HORIZON --stream-name test
```
The following is example output\.
```
{
"ShardIterator": "AAAAAAAAAAHSywljv0zEgPX4NyKdZ5wryMzP9yALs8NeKbUjp1IxtZs1Sp+KEd9I6AJ9ZG4lNR1EMi+9Md/nHvtLyxpfhEzYvkTZ4D9DQVz/mBYWRO6OTZRKnW9gd+efGN2aHFdkH1rJl4BL9Wyrk+ghYG22D2T1Da2EyNSH1+LAbK33gQweTJADBdyMwlo5r6PqcP2dzhg="
}
```
1. To get the record, use the following `get-records` command\. The shard iterator is the one that you got in the previous step\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
edac78590d4b-1 | 1. To get the record, use the following `get-records` command\. The shard iterator is the one that you got in the previous step\.
```
aws kinesis get-records --shard-iterator AAAAAAAAAAHSywljv0zEgPX4NyKdZ5wryMzP9yALs8NeKbUjp1IxtZs1Sp+KEd9I6AJ9ZG4lNR1EMi+9Md/nHvtLyxpfhEzYvkTZ4D9DQVz/mBYWRO6OTZRKnW9gd+efGN2aHFdkH1rJl4BL9Wyrk+ghYG22D2T1Da2EyNSH1+LAbK33gQweTJADBdyMwlo5r6PqcP2dzhg=
```
If the command is successful, it requests records from your stream for the specified shard\. You can receive zero or more records\. Any records returned might not represent all records in your stream\. If you don't receive the data that you expect, keep calling `get-records`\.
Records in Kinesis are Base64\-encoded\. However, the streams support in the AWS CLI doesn't provide Base64 decoding\. If you use a Base64 decoder to manually decode the data, you see that it's the event relayed to the stream in JSON form\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/relay-events-kinesis-stream.md |
4dd081097f6e-0 | Use the following steps to delete or disable an EventBridge rule\.
**To delete or disable a rule**
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
Under **Event bus**, select the event bus that is associated with the rule\.
1. Do one of the following:
1. To delete a rule, select the button next to the rule and choose **Actions**, **Delete**, **Delete**\.
If the rule is a managed rule, you must enter the name of the rule to acknowledge that it is a managed rule and that deleting it may stop functionality in the service that created the rule\. To continue, enter the rule name and choose **Force delete**\. For more information, see [Amazon EventBridge Managed Rules](eventbridge-managed-rules.md)\.
1. To temporarily disable a rule, select the button next to the rule and choose **Disable**, **Disable**\.
You can't disable a managed rule\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/delete-or-disable-rule.md |
a5c23fccfb8a-0 | In the example in this tutorial, you create a rule causing state\-change notifications in Amazon EC2 to be logged in Amazon CloudWatch Logs\.
**To create a rule to log Amazon EC2 state\-change notifications in CloudWatch Logs**
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
1. Choose **Create rule**\.
1. Enter a name and description for the rule\.
1. For **Define pattern**, do the following:
1. Choose **Event pattern**\.
1. Choose **Pre\-defined pattern by service**\.
1. For **Service provider**, choose **AWS**\.
1. For **Service Name**, choose **EC2**\.
1. For **Event type**, choose **EC2 Instance State\-change Notification**\.
1. Choose **Any state** and **Any instance**\.
1. For **Target**, select **CloudWatch log group**\.
1. For **Log group**, enter a name for the log group to receive the state\-change notifications\.
1. Choose **Create**\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-tutorial-cloudwatch-logs.md |
82a13103e8a6-0 | If you use Amazon Virtual Private Cloud \(Amazon VPC\) to host your AWS resources, you can establish a private connection between your VPC and EventBridge\. You can use this connection to enable EventBridge to communicate with your resources on your VPC without going through the public internet\.
Amazon VPC is an AWS service that you can use to launch AWS resources in a virtual network that you define\. With a VPC, you have control over your network settings, such the IP address range, subnets, route tables, and network gateways\. To connect your VPC to EventBridge, you define an *interface VPC endpoint* for EventBridge\. This type of endpoint enables you to connect your VPC to AWS services\. The endpoint provides reliable, scalable connectivity to EventBridge without requiring an internet gateway, network address translation \(NAT\) instance, or VPN connection\. For more information, see [What is Amazon VPC](https://docs.aws.amazon.com/vpc/latest/userguide/) in the *Amazon VPC User Guide*\.
Interface VPC endpoints are powered by AWS PrivateLink, an AWS technology that enables private communication between AWS services using an elastic network interface with private IP addresses\. For more information, see [New – AWS PrivateLink for AWS Services](https://aws.amazon.com/blogs/aws/new-aws-privatelink-endpoints-kinesis-ec2-systems-manager-and-elb-apis-in-your-vpc/)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-and-interface-VPC.md |
82a13103e8a6-1 | The following steps are for users of Amazon VPC\. For more information, see [Getting Started](https://docs.aws.amazon.com/vpc/latest/userguide/GetStarted.html) in the *Amazon VPC User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-and-interface-VPC.md |
c5b8abee113b-0 | EventBridge currently supports VPC endpoints in the following Regions:
+ US East \(Ohio\)
+ US East \(N\. Virginia\)
+ US West \(N\. California\)
+ US West \(Oregon\)
+ Asia Pacific \(Mumbai\)
+ Asia Pacific \(Seoul\)
+ Asia Pacific \(Singapore\)
+ Asia Pacific \(Sydney\)
+ Asia Pacific \(Tokyo\)
+ Canada \(Central\)
+ Europe \(Frankfurt\)
+ Europe \(Ireland\)
+ Europe \(London\)
+ Europe \(Paris\)
+ South America \(São Paulo\) | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-and-interface-VPC.md |
7889ac15005f-0 | To start using EventBridge with your VPC, create an interface VPC endpoint for EventBridge\. The service name to choose is **com\.amazonaws\.*Region*\.events**\. For more information, see [Creating an Interface Endpoint](https://docs.aws.amazon.com/vpc/latest/userguide/vpce-interface.html#create-interface-endpoint.html) in the *Amazon VPC User Guide*\.
You do not need to change the settings for EventBridge\. EventBridge calls other AWS services using either public endpoints or private interface VPC endpoints, whichever are in use\. For example, if you create an interface VPC endpoint for EventBridge, and you already have a EventBridge rule that sends notifications to Amazon SNS when it is triggered, the notifications begin to flow through the interface VPC endpoint\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-and-interface-VPC.md |
2225215540ee-0 | Events in Amazon EventBridge are represented as JSON objects\. All events have a similar structure, and the same top\-level fields\.
EventBridge rules use event patterns to match on AWS events on an event bus\. When a pattern matches, the rule routes that event to a target\.
**Topics**
+ [AWS Events](aws-events.md)
+ [Event Patterns](filtering-examples-structure.md)
+ [Matching Null Values and Empty Strings in EventBridge Event Patterns](eventbridge-event-patterns-null-and-empty-strings.md)
+ [Arrays in EventBridge Event Patterns](arrays-in-eventbridge-event-patterns.md)
+ [Content\-based Filtering with Event Patterns](content-filtering-with-event-patterns.md) | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-and-event-patterns.md |
0e4cde4b207d-0 | Amazon EventBridge conforms to the AWS [shared responsibility model](http://aws.amazon.com/compliance/shared-responsibility-model/), which includes regulations and guidelines for data protection\. AWS is responsible for protecting the global infrastructure that runs all the AWS services\. AWS maintains control over data hosted on this infrastructure, including the security configuration controls for handling customer content and personal data\. AWS customers and APN partners, acting either as data controllers or data processors, are responsible for any personal data that they put in the AWS Cloud\.
For data protection purposes, we recommend that you protect AWS account credentials and set up individual user accounts with AWS Identity and Access Management \(IAM\), so that each user is given only the permissions necessary to fulfill their job duties\. We also recommend that you secure your data in the following ways:
+ Use multi\-factor authentication \(MFA\) with each account\.
+ Use SSL/TLS to communicate with AWS resources\.
+ Set up API and user activity logging with AWS CloudTrail\.
+ Use AWS encryption solutions, along with all default security controls within AWS services\.
+ Use advanced managed security services such as Amazon Macie, which assists in discovering and securing personal data that is stored in Amazon S3\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/data-protection.md |
0e4cde4b207d-1 | + Use advanced managed security services such as Amazon Macie, which assists in discovering and securing personal data that is stored in Amazon S3\.
We strongly recommend that you never put sensitive identifying information, such as your customers' account numbers, into free\-form fields such as a **Name** field\. This includes when you work with EventBridge or other AWS services using the console, API, AWS CLI, or AWS SDKs\. Any data that you enter into EventBridge or other services might get picked up for inclusion in diagnostic logs\. When you provide a URL to an external server, don't include credentials information in the URL to validate your request to that server\.
For more information about data protection, see the [AWS Shared Responsibility Model and GDPR](http://aws.amazon.com/blogs/security/the-aws-shared-responsibility-model-and-gdpr/) blog post on the *AWS Security Blog*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/data-protection.md |
749300777579-0 | The payload of events is stored internally in EventBridge\. This internal data is not encrypted\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/data-protection.md |
d1a7ed124624-0 | All data that passes between EventBridge and other services is encrypted using Transport layer Security \(TLS\)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/data-protection.md |
5dcd2ab4a4de-0 | The following is an example event in Amazon EventBridge\.
```
{
"version": "0",
"id": "6a7e8feb-b491-4cf7-a9f1-bf3703467718",
"detail-type": "EC2 Instance State-change Notification",
"source": "aws.ec2",
"account": "111122223333",
"time": "2017-12-22T18:43:48Z",
"region": "us-west-1",
"resources": [
"arn:aws:ec2:us-west-1:123456789012:instance/ i-1234567890abcdef0"
],
"detail": {
"instance-id": " i-1234567890abcdef0",
"state": "terminated"
}
}
```
It is important to remember the following details about an event:
+ They all have the same top\-level fields – the ones appearing in the example above – which are never absent\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/aws-events.md |
5dcd2ab4a4de-1 | + They all have the same top\-level fields – the ones appearing in the example above – which are never absent\.
+ The contents of the **detail** top\-level field are different depending on which service generated the event and what the event is\. The combination of the **source** and **detail\-type** fields serves to identify the fields and values found in the **detail** field\. For examples of events generated by AWS services, see [EventBridge Event Examples from Supported AWS Services](event-types.md)\.
Each event field is described below\.
**version**
By default, this is set to 0 \(zero\) in all events\.
**id**
A unique value is generated for every event\. This can be helpful in tracing events as they move through rules to targets, and are processed\.
**detail\-type**
Identifies, in combination with the **source** field, the fields and values that appear in the **detail** field\.
All events that are delivered via CloudTrail have `AWS API Call via CloudTrail` as the value for `detail-type`\. For more information, see [Events Delivered Via CloudTrail](event-types.md#events-for-services-not-listed)\.
**source** | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/aws-events.md |
5dcd2ab4a4de-2 | **source**
Identifies the service that sourced the event\. All events sourced from within AWS begin with "aws\." Customer\-generated events can have any value here, as long as it doesn't begin with "aws\." We recommend the use of Java package\-name style reverse domain\-name strings\.
To find the correct value for `source` for an AWS service, see the table in [AWS Service Namespaces](https://docs.aws.amazon.com/general/latest/gr/aws-arns-and-namespaces.html#genref-aws-service-namespaces)\. For example, the `source` value for Amazon CloudFront is `aws.cloudfront`\.
**account**
The 12\-digit number identifying an AWS account\.
**time**
The event timestamp, which can be specified by the service originating the event\. If the event spans a time interval, the service might choose to report the start time, so this value can be noticeably before the time the event is actually received\.
**region**
Identifies the AWS region where the event originated\.
**resources**
This JSON array contains ARNs that identify resources that are involved in the event\. Inclusion of these ARNs is at the discretion of the service\. For example, Amazon EC2 instance state\-changes include Amazon EC2 instance ARNs, Auto Scaling events include ARNs for both instances and Auto Scaling groups, but API calls with AWS CloudTrail do not include resource ARNs\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/aws-events.md |
5dcd2ab4a4de-3 | **detail**
A JSON object, whose content is at the discretion of the service originating the event\. The detail content in the example above is very simple, just two fields\. AWS API call events have detail objects with around 50 fields nested several levels deep\.
To see a list of all event types available from AWS services, see [EventBridge Event Examples from Supported AWS Services](event-types.md)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/aws-events.md |
0ab5777ca722-0 | You can set up a rule to run an AWS Lambda function on a schedule\. This tutorial shows how to use the AWS Management Console or the AWS CLI to create the rule\. If you want to use the AWS CLI but haven't installed it, see the [AWS Command Line Interface User Guide](https://docs.aws.amazon.com/cli/latest/userguide/)\.
EventBridge doesn't provide second\-level precision in schedule expressions\. The finest resolution using a cron expression is 1 minute\. Due to the distributed nature of the EventBridge and the target services, the delay between the time the scheduled rule is triggered and the time the target service honors the execution of the target resource might be several seconds\. Your scheduled rule is triggered in that minute but not on the precise zeroth second\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
99e714dae114-0 | Create a Lambda function to log the scheduled events\. Specify this function when you create your rule\.
**To create a Lambda function**
1. Open the AWS Lambda console at [https://console\.aws\.amazon\.com/lambda/](https://console.aws.amazon.com/lambda/)\.
1. If you're new to Lambda, you see a welcome page\. Choose **Get Started Now**\. Otherwise, choose **Create a Lambda function**\.
1. On the **Select blueprint** page, enter `hello` for the filter and choose the **hello\-world** blueprint\.
1. On the **Configure triggers** page, choose **Next**\.
1. On the **Configure function** page, do the following:
1. Enter a name and description for the Lambda function\. For example, name the function `LogScheduledEvent`\.
1. Edit the sample code for the Lambda function\. For example:
```
'use strict';
exports.handler = (event, context, callback) => {
console.log('LogScheduledEvent');
console.log('Received event:', JSON.stringify(event, null, 2));
callback(null, 'Finished');
};
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
99e714dae114-1 | callback(null, 'Finished');
};
```
1. For **Role**, choose **Choose an existing role**\. For **Existing role**, select your basic execution role\. Otherwise, create a basic execution role\.
1. Choose **Next**\.
1. On the **Review** page, choose **Create function**\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
4fd94c41d504-0 | Create a rule to run your Lambda function on a schedule\.
**To create a rule using the console**
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
1. Choose **Create rule**\.
1. Enter a name and description for the rule\.
1. For **Define pattern**, do the following:
1. Choose **Schedule**\.
1. Choose **Fixed rate every** and specify the schedule interval \(for example, 5 minutes\)\.
1. For **Select event bus**, choose **AWS default event bus**\. Scheduled rules are supported only on the default event bus\.
1. For **Target**, choose **Lambda function**\.
1. For **Function**, select the Lambda function that you created\.
1. Choose **Create**\.
If you prefer, you can create the rule using the AWS CLI\. First, you must grant the rule permission to invoke your Lambda function\. Then you can create the rule and add the Lambda function as a target\.
**To create a rule using the AWS CLI** | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
4fd94c41d504-1 | **To create a rule using the AWS CLI**
1. To create a rule that triggers itself on a schedule, use the following [put\-rule](https://docs.aws.amazon.com/cli/latest/reference/events/put-rule.html) command\.
```
aws events put-rule \
--name my-scheduled-rule \
--schedule-expression 'rate(5 minutes)'
```
When this rule triggers, it generates an event that serves as input to the targets of this rule\. The following is an example event\.
```
{
"version": "0",
"id": "53dc4d37-cffa-4f76-80c9-8b7d4a4d2eaa",
"detail-type": "Scheduled Event",
"source": "aws.events",
"account": "123456789012",
"time": "2015-10-08T16:53:06Z",
"region": "us-east-1",
"resources": [
"arn:aws:events:us-east-1:123456789012:rule/my-scheduled-rule"
],
"detail": {}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
4fd94c41d504-2 | ],
"detail": {}
}
```
1. Use the following [add\-permission](https://docs.aws.amazon.com/cli/latest/reference/lambda/add-permission.html) command to trust the EventBridge service principal \(`events.amazonaws.com`\) and scope permissions to the rule with the specified Amazon Resource Name \(ARN\)\.
```
aws lambda add-permission \
--function-name LogScheduledEvent \
--statement-id my-scheduled-event \
--action 'lambda:InvokeFunction' \
--principal events.amazonaws.com \
--source-arn arn:aws:events:us-east-1:123456789012:rule/my-scheduled-rule
```
1. Use the following [put\-targets](https://docs.aws.amazon.com/cli/latest/reference/events/put-targets.html) command to add the Lambda function that you created to this rule so that it runs every 5 minutes\.
```
aws events put-targets --rule my-scheduled-rule --targets file://targets.json
```
Create the file `targets.json` with the following contents\.
```
[
{
"Id": "1", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
4fd94c41d504-3 | ```
[
{
"Id": "1",
"Arn": "arn:aws:lambda:us-east-1:123456789012:function:LogScheduledEvent"
}
]
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
0a5f51c8bd38-0 | At least 5 minutes after completing step 2, you can verify that your Lambda function was invoked\.
**To test your rule**
1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\.
1. In the navigation pane, choose **Rules**\.
Choose the name of the rule that you created and choose **Metrics for the rule**\.
1. To view the output from your Lambda function, do the following:
1. Open the CloudWatch console at [https://console\.aws\.amazon\.com/cloudwatch/](https://console.aws.amazon.com/cloudwatch/)\.
1. In the navigation pane, choose **Logs**\.
1. Select the name of the log group for your Lambda function \(`/aws/lambda/function-name`\)\.
1. Select the name of the log stream to view the data provided by the function for the instance that you launched\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/run-lambda-schedule.md |
6773f3f35ae6-0 | The `PutEvents` action sends multiple events to EventBridge in a single request\. For more information, see [PutEvents](https://docs.aws.amazon.com/eventbridge/latest/APIReference/API_PutEvents.html) in the *Amazon EventBridge API Reference* and [put\-events](https://docs.aws.amazon.com/cli/latest/reference/events/put-events.html) in the *AWS CLI Command Reference*\.
Each `PutEvents` request can support a limited number of entries\. For more information, see [Amazon EventBridge Quotas](cloudwatch-limits-eventbridge.md)\. The `PutEvents` operation attempts to process all entries in the natural order of the request\. Each event has a unique id that is assigned by EventBridge after you call `PutEvents`\.
The following example Java code sends two identical events to EventBridge:
```
PutEventsRequestEntry requestEntry = new PutEventsRequestEntry()
.withTime(new Date())
.withSource("com.mycompany.myapp")
.withDetailType("myDetailType")
.withResources("resource1", "resource2")
.withDetail("{ \"key1\": \"value1\", \"key2\": \"value2\" }");
PutEventsRequest request = new PutEventsRequest() | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
6773f3f35ae6-1 | PutEventsRequest request = new PutEventsRequest()
.withEntries(requestEntry, requestEntry);
PutEventsResult result = awsEventsClient.putEvents(request);
for (PutEventsResultEntry resultEntry : result.getEntries()) {
if (resultEntry.getEventId() != null) {
System.out.println("Event Id: " + resultEntry.getEventId());
} else {
System.out.println("Injection failed with Error Code: " + resultEntry.getErrorCode());
}
}
```
The `PutEvents` result includes an array of response entries\. Each entry in the response array directly correlates with an entry in the request array using natural ordering, from the top to the bottom of the request and response\. The response `Entries` array always includes the same number of entries as the request array\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
798acaabd643-0 | By default, failure of individual entries within a request does not stop the processing of subsequent entries in the request\. This means that a response Entries array includes both successfully and unsuccessfully processed entries\. You must detect unsuccessfully processed entries and include them in a subsequent call\.
Successful result entries include Id value, and unsuccessful result entries include `ErrorCode` and `ErrorMessage` values\. The `ErrorCode` parameter reflects the type of error\. `ErrorMessage` provides more detailed information about the error\. The example below has three result entries for a `PutEvents` request\. The second entry has failed and is reflected in the response\.
**Example: PutEvents Response Syntax**
```
{
"FailedEntryCount": 1,
"Entries": [
{
"EventId": "11710aed-b79e-4468-a20b-bb3c0c3b4860"
},
{ "ErrorCode": "InternalFailure",
"ErrorMessage": "Internal Service Failure"
},
"EventId": "d804d26a-88db-4b66-9eaf-9a11c708ae82"
}
]
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
798acaabd643-1 | }
]
}
```
Entries that were unsuccessfully processed can be included in subsequent `PutEvents` requests\. First, check the `FailedRecordCount` parameter in the `PutEventsResult` to confirm if there are failed records in the request\. If so, each `Entry` that has an `ErrorCode` that is not null should be added to a subsequent request\. For an example of this type of handler, refer to the following code\.
**Example: PutEvents failure handler**
```
PutEventsRequestEntry requestEntry = new PutEventsRequestEntry()
.withTime(new Date())
.withSource("com.mycompany.myapp")
.withDetailType("myDetailType")
.withResources("resource1", "resource2")
.withDetail("{ \"key1\": \"value1\", \"key2\": \"value2\" }");
List<PutEventsRequestEntry> putEventsRequestEntryList = new ArrayList<>();
for (int i = 0; i < 3; i++) {
putEventsRequestEntryList.add(requestEntry);
}
PutEventsRequest putEventsRequest = new PutEventsRequest(); | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
798acaabd643-2 | }
PutEventsRequest putEventsRequest = new PutEventsRequest();
putEventsRequest.withEntries(putEventsRequestEntryList);
PutEventsResult putEventsResult = awsEventsClient.putEvents(putEventsRequest);
while (putEventsResult.getFailedEntryCount() > 0) {
final List<PutEventsRequestEntry> failedEntriesList = new ArrayList<>();
final List<PutEventsResultEntry> PutEventsResultEntryList = putEventsResult.getEntries();
for (int i = 0; i < PutEventsResultEntryList.size(); i++) {
final PutEventsRequestEntry putEventsRequestEntry = putEventsRequestEntryList.get(i);
final PutEventsResultEntry putEventsResultEntry = PutEventsResultEntryList.get(i);
if (putEventsResultEntry.getErrorCode() != null) {
failedEntriesList.add(putEventsRequestEntry);
}
}
putEventsRequestEntryList = failedEntriesList;
putEventsRequest.setEntries(putEventsRequestEntryList);
putEventsResult = awsEventsClient.putEvents(putEventsRequest); | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
798acaabd643-3 | putEventsResult = awsEventsClient.putEvents(putEventsRequest);
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
ab10bdda8c9e-0 | You can use the AWS CLI to send custom events\. The following example puts one custom event into EventBridge:
```
aws events put-events \
--entries '[{"Time": "2016-01-14T01:02:03Z", "Source": "com.mycompany.myapp", "Resources": ["resource1", "resource2"], "DetailType": "myDetailType", "Detail": "{ \"key1\": \"value1\", \"key2\": \"value2\" }"}]'
```
You can also create a file for example, **entries\.json**, like the following:
```
[
{
"Time": "2016-01-14T01:02:03Z",
"Source": "com.mycompany.myapp",
"Resources": [
"resource1",
"resource2"
],
"DetailType": "myDetailType",
"Detail": "{ \"key1\": \"value1\", \"key2\": \"value2\" }"
}
]
```
You can use the AWS CLI to read the entries from this file and send events\. At a command prompt, type:
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
ab10bdda8c9e-1 | You can use the AWS CLI to read the entries from this file and send events\. At a command prompt, type:
```
aws events put-events --entries file://entries.json
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/add-events-putevents.md |
92e171b2e5d0-0 | The AWS services in the following list emit events that can be detected by EventBridge\.
Additionally, you can also use EventBridge with services that do not emit events and are not listed on this page, by watching for events delivered via CloudTrail\. For more information, see [Events Delivered Via CloudTrail](#events-for-services-not-listed)\.
**Topics**
+ [Amazon Augmented AI Events](#a2i-event-type)
+ [Application Auto Scaling Events](#as-app-event-type)
+ [AWS Batch Events](#batch-event-type)
+ [Amazon EventBridge Scheduled Events](#schedule-event-type)
+ [Amazon Chime Events](#chime-event-type)
+ [Events from CloudWatch](#cloudwatch-event-type)
+ [CodeBuild Events](#codebuild-event-type)
+ [CodeCommit Events](#codecommit-event-type)
+ [AWS CodeDeploy Events](#acd-event-types)
+ [CodePipeline Events](#codepipeline-event-type)
+ [AWS Config Events](#config-event-types)
+ [Amazon EBS Events](#ebs-event-types)
+ [Amazon EC2 Auto Scaling Events](#auto-scaling-event-types)
+ [Amazon EC2 Spot Instance Interruption Events](#spot-instance-event-types) | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
92e171b2e5d0-1 | + [Amazon EC2 Spot Instance Interruption Events](#spot-instance-event-types)
+ [Amazon EC2 State Change Events](#ec2-event-type)
+ [Amazon Elastic Container Registry \(Amazon ECR\) Events](#ecr-event-types)
+ [Amazon Elastic Container Service \(Amazon ECS\) Events](#ecs-event-types)
+ [AWS Elemental MediaConvert Events](#emc-event-types)
+ [AWS Elemental MediaPackage Events](#emp-event-types)
+ [AWS Elemental MediaStore Events](#ems-event-types)
+ [Amazon EMR Events](#emr-event-type)
+ [Amazon GameLift Event](#gamelift-event-types)
+ [AWS Glue Events](#glue-event-types)
+ [AWS IoT Greengrass Events](#ground-station-event-types)
+ [AWS Ground Station Events](#ground-station-event-types)
+ [Amazon GuardDuty Events](#guardduty-event-types)
+ [AWS Health Events](#health-event-types)
+ [AWS KMS Events](#kms-event-types)
+ [Amazon Macie Events](#macie-event-types)
+ [AWS Management Console Sign\-in Events](#console-event-type) | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
92e171b2e5d0-2 | + [AWS Management Console Sign\-in Events](#console-event-type)
+ [AWS OpsWorks Stacks Events](#opsworks-event-types)
+ [Amazon SageMaker Events](#sagemaker-event-types)
+ [AWS Security Hub Events](#securityhub-event-types)
+ [AWS Server Migration Service Events](#server-migration-service-event-types)
+ [AWS Systems Manager Events](#ssm-event-types)
+ [AWS Systems Manager Configuration Compliance Events](#ssm-configuration-compliance-event-types)
+ [AWS Systems Manager Maintenance Windows Events](#ec2-maintenance-windows-event-types)
+ [AWS Systems Manager Parameter Store Events](#ssm-parameter-store-event-types)
+ [AWS Step Functions Events](#stepfunctions-event-type)
+ [Tag Change Events on AWS Resources](#tag-event-types)
+ [AWS Trusted Advisor Events](#trusted-advisor-event-types)
+ [Amazon WorkSpaces Events](#workspaces-event-types)
+ [Events Delivered Via CloudTrail](#events-for-services-not-listed) | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
82c56de03870-0 | For examples of events generated by Amazon Augmented AI, see [Use Events in Amazon Augmented AI](https://docs.aws.amazon.com/sagemaker/latest/dg/augmented-ai-cloudwatch-events.html)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
25fca2a6f95f-0 | For examples of events generated by Application Auto Scaling, see [Application Auto Scaling Events and EventBridge](https://docs.aws.amazon.com/autoscaling/application/userguide/monitoring-eventbridge.html)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
532aaf945396-0 | For examples of events generated by AWS Batch, see [AWS Batch Events](https://docs.aws.amazon.com/batch/latest/userguide/batch_cwe_events.html)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
e98a5198c6fb-0 | The following is an example of a scheduled event:
```
{
"id": "53dc4d37-cffa-4f76-80c9-8b7d4a4d2eaa",
"detail-type": "Scheduled Event",
"source": "aws.events",
"account": "123456789012",
"time": "2015-10-08T16:53:06Z",
"region": "us-east-1",
"resources": [ "arn:aws:events:us-east-1:123456789012:rule/MyScheduledRule" ],
"detail": {}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
c2fd5d0ef5c1-0 | For examples of events generated by Amazon Chime, see [Automating Amazon Chime with EventBridge](https://docs.aws.amazon.com/chime/latest/ag/automating-chime-with-cloudwatch-events.html)\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
749078c7cbfb-0 | For sample events from CloudWatch, see [Alarm Events and EventBridge](https://docs.aws.amazon.com/AmazonCloudWatch/latest/monitoring/cloudwatch-and-eventbridge.html) in the *AWS CodeBuild User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
75150116c09d-0 | For CodeBuild sample events, see [Build Notifications Input Format Reference](https://docs.aws.amazon.com/codebuild/latest/userguide/sample-build-notifications.html#sample-build-notifications-ref) in the *AWS CodeBuild User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
fde1620d5444-0 | For CodeCommit sample events, see [Monitoring CodeCommit Events in EventBridge and CloudWatch Events](https://docs.aws.amazon.com/codecommit/latest/userguide/monitoring-events.html) in the *AWS CodeCommit User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
af55ac7071a9-0 | The following are examples of the events for CodeDeploy\. For more information, see [Monitoring Deployments with CloudWatch Events](https://docs.aws.amazon.com/codedeploy/latest/userguide/monitoring-cloudwatch-events.html) in the *AWS CodeDeploy User Guide*\.
**CodeDeploy Deployment State\-change Notification**
There was a change in the state of a deployment\.
```
{
"account": "123456789012",
"region": "us-east-1",
"detail-type": "CodeDeploy Deployment State-change Notification",
"source": "aws.codedeploy",
"version": "0",
"time": "2016-06-30T22:06:31Z",
"id": "c071bfbf-83c4-49ca-a6ff-3df053957145",
"resources": [
"arn:aws:codedeploy:us-east-1:123456789012:application:myApplication",
"arn:aws:codedeploy:us-east-1:123456789012:deploymentgroup:myApplication/myDeploymentGroup"
],
"detail": { | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
af55ac7071a9-1 | ],
"detail": {
"instanceGroupId": "9fd2fbef-2157-40d8-91e7-6845af69e2d2",
"region": "us-east-1",
"application": "myApplication",
"deploymentId": "d-123456789",
"state": "SUCCESS",
"deploymentGroup": "myDeploymentGroup"
}
}
```
**CodeDeploy Instance State\-change Notification**
There was a change in the state of an instance that belongs to a deployment group\.
```
{
"account": "123456789012",
"region": "us-east-1",
"detail-type": "CodeDeploy Instance State-change Notification",
"source": "aws.codedeploy",
"version": "0",
"time": "2016-06-30T23:18:50Z",
"id": "fb1d3015-c091-4bf9-95e2-d98521ab2ecb",
"resources": [ | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
af55ac7071a9-2 | "resources": [
"arn:aws:ec2:us-east-1:123456789012:instance/i-0000000aaaaaaaaaa",
"arn:aws:codedeploy:us-east-1:123456789012:deploymentgroup:myApplication/myDeploymentGroup",
"arn:aws:codedeploy:us-east-1:123456789012:application:myApplication"
],
"detail": {
"instanceId": "i-0000000aaaaaaaaaa",
"region": "us-east-1",
"state": "SUCCESS",
"application": "myApplication",
"deploymentId": "d-123456789",
"instanceGroupId": "8cd3bfa8-9e72-4cbe-a1e5-da4efc7efd49",
"deploymentGroup": "myDeploymentGroup"
}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
87a4107289d0-0 | The following are examples of events for CodePipeline\.
**Pipeline Execution State Change**
```
{
"version": "0",
"id": "CWE-event-id",
"detail-type": "CodePipeline Pipeline Execution State Change",
"source": "aws.codepipeline",
"account": "123456789012",
"time": "2017-04-22T03:31:47Z",
"region": "us-east-1",
"resources": [
"arn:aws:codepipeline:us-east-1:123456789012:pipeline:myPipeline"
],
"detail": {
"pipeline": "myPipeline",
"version": "1",
"state": "STARTED",
"execution-id": "01234567-0123-0123-0123-012345678901"
}
}
```
**Stage Execution State Change**
```
{
"version": "0",
"id": "CWE-event-id",
"detail-type": "CodePipeline Stage Execution State Change", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
87a4107289d0-1 | "id": "CWE-event-id",
"detail-type": "CodePipeline Stage Execution State Change",
"source": "aws.codepipeline",
"account": "123456789012",
"time": "2017-04-22T03:31:47Z",
"region": "us-east-1",
"resources": [
"arn:aws:codepipeline:us-east-1:123456789012:pipeline:myPipeline"
],
"detail": {
"pipeline": "myPipeline",
"version": "1",
"execution-id": "01234567-0123-0123-0123-012345678901",
"stage": "Prod",
"state": "STARTED"
}
}
```
**Action Execution State Change**
In this sample, there are two `region` fields\. The one at the top is the name of the AWS Region where the action in the target pipeline is executed\. In this example, this is `us-east-1`\. The `region` in the `detail` section is the AWS Region where the event was created\. This is the same as the Region where the pipeline was created\. In this example, this is `us-west-2`\.
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
87a4107289d0-2 | ```
{
"version": "0",
"id": "CWE-event-id",
"detail-type": "CodePipeline Action Execution State Change",
"source": "aws.codepipeline",
"account": "123456789012",
"time": "2017-04-22T03:31:47Z",
"region": "us-east-1",
"resources": [
"arn:aws:codepipeline:us-east-1:123456789012:pipeline:myPipeline"
],
"detail": {
"pipeline": "myPipeline",
"version": 1,
"execution-id": "01234567-0123-0123-0123-012345678901",
"stage": "Prod",
"action": "myAction",
"state": "STARTED",
"region":"us-west-2",
"type": {
"owner": "AWS",
"category": "Deploy",
"provider": "CodeDeploy",
"version": 1
}
}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
3826faa40562-0 | For information about the AWS Config events, see [Monitoring AWS Config with Amazon CloudWatch Events](https://docs.aws.amazon.com/config/latest/developerguide/monitor-config-with-cloudwatchevents.html) in the *AWS Config Developer Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a653077e61ac-0 | For information about the Amazon EBS events, see [Amazon CloudWatch Events for Amazon EBS](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-cloud-watch-events.html) in the *Amazon EC2 User Guide for Linux Instances*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
06fdc98c3b89-0 | For information about the Auto Scaling events, see [Getting CloudWatch Events When Your Auto Scaling Group Scales](https://docs.aws.amazon.com/autoscaling/ec2/userguide/cloud-watch-events.html) in the *Amazon EC2 Auto Scaling User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
0a2c3a8c6933-0 | For information about the events for Spot Instance interruptions, see [Spot Instance Interruption Notices](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/spot-interruptions.html#spot-instance-termination-notices) in the *Amazon EC2 User Guide for Linux Instances*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a32f1249b4c4-0 | The following is an example of the events for Amazon EC2 instances when the instance state changes\.
**EC2 Instance State\-change Notification**
This example is for an instance in the `pending` state\. The other possible values for `state` include `running`, `shutting-down`, `stopped`, `stopping`, and `terminated`\.
```
{
"id":"7bf73129-1428-4cd3-a780-95db273d1602",
"detail-type":"EC2 Instance State-change Notification",
"source":"aws.ec2",
"account":"123456789012",
"time":"2015-11-11T21:29:54Z",
"region":"us-east-1",
"resources":[
"arn:aws:ec2:us-east-1:123456789012:instance/i-abcd1111"
],
"detail":{
"instance-id":"i-abcd1111",
"state":"pending"
}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
c510d77040de-0 | Amazon ECR sends image actions events to EventBridge\. Events are sent when images are pushed, scanned, or deleted\.
For Amazon ECS sample events, see [Amazon ECR Events](https://docs.aws.amazon.com/AmazonECR/latest/userguide/ecr-eventbridge.html#ecr-eventbridge-bus) in the *Amazon Elastic Container Registry User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
47c745e025ff-0 | Amazon ECS sends two types of events to EventBridge: container instance events and task events\. Container instance events are only sent if you are using the EC2 launch type for your tasks\. For tasks using the Fargate launch type, you only receive task state events\. Amazon ECS tracks the state of container instances and tasks\. If either resources changes, an event is triggered\. These events are classified as either container instance state change events or task state change events\.
For Amazon ECS sample events, see [Amazon ECS Events](https://docs.aws.amazon.com/AmazonECS/latest/developerguide/cloudwatch_event_stream.html) in the *Amazon Elastic Container Service Developer Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
f2741eb24fa5-0 | For MediaConvert sample events, see [Using CloudWatch Events to Monitor AWS Elemental MediaConvert Jobs](https://docs.aws.amazon.com/mediaconvert/latest/ug/cloudwatch_events.html) in the *AWS Elemental MediaConvert User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
73a596c51e82-0 | For MediaPackage sample events, see [Monitoring AWS Elemental MediaPackage with Amazon CloudWatch Events](https://docs.aws.amazon.com/mediapackage/latest/ug/monitoring-cloudwatch-events.html) in the *AWS Elemental MediaPackage User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
f8d429bf02c7-0 | For MediaStore sample events, see [Automating AWS Elemental MediaStore with CloudWatch Events](https://docs.aws.amazon.com/mediastore/latest/ug/monitoring-automating-with-cloudwatch-events.html) in the *AWS Elemental MediaStore User Guide*\. | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
d89d8d4c83a7-0 | Events reported by Amazon EMR have `aws.emr` as the value for `Source`, while Amazon EMR API events reported via CloudTrail have `aws.elasticmapreduce` as the value for `Source`\.
The following are examples of events reported by Amazon EMR\.
**Amazon EMR Auto Scaling Policy State Change**
```
{
"version":"0",
"id":"2f8147ab-8c48-47c6-b0b6-3ee23ec8d300",
"detail-type":"EMR Auto Scaling Policy State Change",
"source":"aws.emr",
"account":"123456789012",
"time":"2016-12-16T20:42:44Z",
"region":"us-east-1",
"resources":[],
"detail":{
"resourceId":"ig-X2LBMHTGPCBU",
"clusterId":"j-1YONHTCP3YZKC",
"state":"PENDING",
"message":"AutoScaling policy modified by user request",
"scalingResourceType":"INSTANCE_GROUP"
}
}
```
**Amazon EMR Cluster State Change – Starting**
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
d89d8d4c83a7-1 | }
}
```
**Amazon EMR Cluster State Change – Starting**
```
{
"version": "0",
"id": "999cccaa-eaaa-0000-1111-123456789012",
"detail-type": "EMR Cluster State Change",
"source": "aws.emr",
"account": "123456789012",
"time": "2016-12-16T20:43:05Z",
"region": "us-east-1",
"resources": [],
"detail": {
"severity": "INFO",
"stateChangeReason": "{\"code\":\"\"}",
"name": "Development Cluster",
"clusterId": "j-123456789ABCD",
"state": "STARTING",
"message": "Amazon EMR cluster j-123456789ABCD (Development Cluster) was requested at 2016-12-16 20:42 UTC and is being created."
}
}
```
**Amazon EMR Cluster State Change – Terminated**
```
{
"version": "0", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
d89d8d4c83a7-2 | **Amazon EMR Cluster State Change – Terminated**
```
{
"version": "0",
"id": "1234abb0-f87e-1234-b7b6-000000123456",
"detail-type": "EMR Cluster State Change",
"source": "aws.emr",
"account": "123456789012",
"time": "2016-12-16T21:00:23Z",
"region": "us-east-1",
"resources": [],
"detail": {
"severity": "INFO",
"stateChangeReason": "{\"code\":\"USER_REQUEST\",\"message\":\"Terminated by user request\"}",
"name": "Development Cluster",
"clusterId": "j-123456789ABCD",
"state": "TERMINATED",
"message": "Amazon EMR Cluster jj-123456789ABCD (Development Cluster) has terminated at 2016-12-16 21:00 UTC with a reason of USER_REQUEST."
}
}
```
**Amazon EMR Instance Group State Change**
```
{
"version": "0", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
d89d8d4c83a7-3 | **Amazon EMR Instance Group State Change**
```
{
"version": "0",
"id": "999cccaa-eaaa-0000-1111-123456789012",
"detail-type": "EMR Instance Group State Change",
"source": "aws.emr",
"account": "123456789012",
"time": "2016-12-16T20:57:47Z",
"region": "us-east-1",
"resources": [],
"detail": {
"market": "ON_DEMAND",
"severity": "INFO",
"requestedInstanceCount": "2",
"instanceType": "m3.xlarge",
"instanceGroupType": "CORE",
"instanceGroupId": "ig-ABCDEFGHIJKL",
"clusterId": "j-123456789ABCD",
"runningInstanceCount": "2",
"state": "RUNNING", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
d89d8d4c83a7-4 | "runningInstanceCount": "2",
"state": "RUNNING",
"message": "The resizing operation for instance group ig-ABCDEFGHIJKL in Amazon EMR cluster j-123456789ABCD (Development Cluster) is complete. It now has an instance count of 2. The resize started at 2016-12-16 20:57 UTC and took 0 minutes to complete."
}
}
```
**Amazon EMR Step Status Change**
```
{
"version": "0",
"id": "999cccaa-eaaa-0000-1111-123456789012",
"detail-type": "EMR Step Status Change",
"source": "aws.emr",
"account": "123456789012",
"time": "2016-12-16T20:53:09Z",
"region": "us-east-1",
"resources": [],
"detail": {
"severity": "ERROR",
"actionOnFailure": "CONTINUE",
"stepId": "s-ZYXWVUTSRQPON",
"name": "CustomJAR",
"clusterId": "j-123456789ABCD",
"state": "FAILED", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
d89d8d4c83a7-5 | "clusterId": "j-123456789ABCD",
"state": "FAILED",
"message": "Step s-ZYXWVUTSRQPON (CustomJAR) in Amazon EMR cluster j-123456789ABCD (Development Cluster) failed at 2016-12-16 20:53 UTC."
}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-0 | The following are examples of Amazon GameLift events\. For more information, see [FlexMatch Events Reference](https://docs.aws.amazon.com/gamelift/latest/developerguide/match-events.html) in the *Amazon GameLift Developer Guide*\.
**Matchmaking Searching**
```
{
"version": "0",
"id": "cc3d3ebe-1d90-48f8-b268-c96655b8f013",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-08T21:15:36.421Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-08T21:15:35.676Z",
"players": [
{
"playerId": "player-1"
}
]
} | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-1 | {
"playerId": "player-1"
}
]
}
],
"estimatedWaitMillis": "NOT_AVAILABLE",
"type": "MatchmakingSearching",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1"
}
]
}
}
}
```
**Potential Match Created**
```
{
"version": "0",
"id": "fce8633f-aea3-45bc-aeba-99d639cad2d4",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-08T21:17:41.178Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"tickets": [
{ | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-2 | ],
"detail": {
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-08T21:15:35.676Z",
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
},
{
"ticketId": "ticket-2",
"startTime": "2017-08-08T21:17:40.657Z",
"players": [
{
"playerId": "player-2",
"team": "blue"
}
]
}
],
"acceptanceTimeout": 600,
"ruleEvaluationMetrics": [
{
"ruleName": "EvenSkill",
"passedCount": 3,
"failedCount": 0
},
{
"ruleName": "EvenTeams",
"passedCount": 3,
"failedCount": 0
},
{
"ruleName": "FastConnection",
"passedCount": 3, | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-3 | },
{
"ruleName": "FastConnection",
"passedCount": 3,
"failedCount": 0
},
{
"ruleName": "NoobSegregation",
"passedCount": 3,
"failedCount": 0
}
],
"acceptanceRequired": true,
"type": "PotentialMatchCreated",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1",
"team": "red"
},
{
"playerId": "player-2",
"team": "blue"
}
]
},
"matchId": "3faf26ac-f06e-43e5-8d86-08feff26f692"
}
}
```
**Accept Match**
```
{
"version": "0",
"id": "b3f76d66-c8e5-416a-aa4c-aa1278153edc",
"detail-type": "GameLift Matchmaking Event", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-4 | "detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-09T20:04:42.660Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-09T20:01:35.305Z",
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
},
{
"ticketId": "ticket-2",
"startTime": "2017-08-09T20:04:16.637Z",
"players": [
{
"playerId": "player-2",
"team": "blue",
"accepted": false
}
]
}
],
"type": "AcceptMatch", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-5 | }
]
}
],
"type": "AcceptMatch",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1",
"team": "red"
},
{
"playerId": "player-2",
"team": "blue",
"accepted": false
}
]
},
"matchId": "848b5f1f-0460-488e-8631-2960934d13e5"
}
}
```
**Accept Match Completed**
```
{
"version": "0",
"id": "b1990d3d-f737-4d6c-b150-af5ace8c35d3",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-08T20:43:14.621Z",
"region": "us-west-2",
"resources": [ | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-6 | "region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-08T20:30:40.972Z",
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
},
{
"ticketId": "ticket-2",
"startTime": "2017-08-08T20:33:14.111Z",
"players": [
{
"playerId": "player-2",
"team": "blue"
}
]
}
],
"acceptance": "TimedOut",
"type": "AcceptMatchCompleted",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1",
"team": "red"
},
{ | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-7 | {
"playerId": "player-1",
"team": "red"
},
{
"playerId": "player-2",
"team": "blue"
}
]
},
"matchId": "a0d9bd24-4695-4f12-876f-ea6386dd6dce"
}
}
```
**Matchmaking Succeeded**
```
{
"version": "0",
"id": "5ccb6523-0566-412d-b63c-1569e00d023d",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-09T19:59:09.159Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"tickets": [
{
"ticketId": "ticket-1", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-8 | "detail": {
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-09T19:58:59.277Z",
"players": [
{
"playerId": "player-1",
"playerSessionId": "psess-6e7c13cf-10d6-4756-a53f-db7de782ed67",
"team": "red"
}
]
},
{
"ticketId": "ticket-2",
"startTime": "2017-08-09T19:59:08.663Z",
"players": [
{
"playerId": "player-2",
"playerSessionId": "psess-786b342f-9c94-44eb-bb9e-c1de46c472ce",
"team": "blue"
}
]
}
],
"type": "MatchmakingSucceeded",
"gameSessionInfo": { | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-9 | }
],
"type": "MatchmakingSucceeded",
"gameSessionInfo": {
"gameSessionArn": "arn:aws:gamelift:us-west-2:123456789012:gamesession/836cf48d-bcb0-4a2c-bec1-9c456541352a",
"ipAddress": "192.168.1.1",
"port": 10777,
"players": [
{
"playerId": "player-1",
"playerSessionId": "psess-6e7c13cf-10d6-4756-a53f-db7de782ed67",
"team": "red"
},
{
"playerId": "player-2",
"playerSessionId": "psess-786b342f-9c94-44eb-bb9e-c1de46c472ce",
"team": "blue"
}
]
},
"matchId": "c0ec1a54-7fec-4b55-8583-76d67adb7754"
}
}
```
**Matchmaking Timed Out**
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-10 | }
}
```
**Matchmaking Timed Out**
```
{
"version": "0",
"id": "fe528a7d-46ad-4bdc-96cb-b094b5f6bf56",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-09T20:11:35.598Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"reason": "TimedOut",
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-09T20:01:35.305Z",
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
}
],
"ruleEvaluationMetrics": [
{ | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-11 | }
]
}
],
"ruleEvaluationMetrics": [
{
"ruleName": "EvenSkill",
"passedCount": 3,
"failedCount": 0
},
{
"ruleName": "EvenTeams",
"passedCount": 3,
"failedCount": 0
},
{
"ruleName": "FastConnection",
"passedCount": 3,
"failedCount": 0
},
{
"ruleName": "NoobSegregation",
"passedCount": 3,
"failedCount": 0
}
],
"type": "MatchmakingTimedOut",
"message": "Removed from matchmaking due to timing out.",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
}
}
}
```
**Matchmaking Cancelled**
```
{
"version": "0", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-12 | ```
**Matchmaking Cancelled**
```
{
"version": "0",
"id": "8d6f84da-5e15-4741-8d5c-5ac99091c27f",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-09T20:00:07.843Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"reason": "Cancelled",
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-09T19:59:26.118Z",
"players": [
{
"playerId": "player-1"
}
]
}
],
"ruleEvaluationMetrics": [
{
"ruleName": "EvenSkill", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-13 | ],
"ruleEvaluationMetrics": [
{
"ruleName": "EvenSkill",
"passedCount": 0,
"failedCount": 0
},
{
"ruleName": "EvenTeams",
"passedCount": 0,
"failedCount": 0
},
{
"ruleName": "FastConnection",
"passedCount": 0,
"failedCount": 0
},
{
"ruleName": "NoobSegregation",
"passedCount": 0,
"failedCount": 0
}
],
"type": "MatchmakingCancelled",
"message": "Cancelled by request.",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1"
}
]
}
}
}
```
**Matchmaking Failed**
```
{
"version": "0", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-14 | ```
**Matchmaking Failed**
```
{
"version": "0",
"id": "025b55a4-41ac-4cf4-89d1-f2b3c6fd8f9d",
"detail-type": "GameLift Matchmaking Event",
"source": "aws.gamelift",
"account": "123456789012",
"time": "2017-08-16T18:41:09.970Z",
"region": "us-west-2",
"resources": [
"arn:aws:gamelift:us-west-2:123456789012:matchmakingconfiguration/SampleConfiguration"
],
"detail": {
"tickets": [
{
"ticketId": "ticket-1",
"startTime": "2017-08-16T18:41:02.631Z",
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
}
],
"customEventData": "foo",
"type": "MatchmakingFailed", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
a3ed6478dea1-15 | }
],
"customEventData": "foo",
"type": "MatchmakingFailed",
"reason": "UNEXPECTED_ERROR",
"message": "An unexpected error was encountered during match placing.",
"gameSessionInfo": {
"players": [
{
"playerId": "player-1",
"team": "red"
}
]
},
"matchId": "3ea83c13-218b-43a3-936e-135cc570cba7"
}
}
``` | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
3373ff6de7e5-0 | The following is the format for AWS Glue events\.
**Successful Job Run**
```
{
"version":"0",
"id":"abcdef00-1234-5678-9abc-def012345678",
"detail-type":"Glue Job State Change",
"source":"aws.glue",
"account":"123456789012",
"time":"2017-09-07T18:57:21Z",
"region":"us-west-2",
"resources":[],
"detail":{
"jobName":"MyJob",
"severity":"INFO",
"state":"SUCCEEDED",
"jobRunId":"jr_abcdef0123456789abcdef0123456789abcdef0123456789abcdef0123456789",
"message":"Job run succeeded"
}
}
```
**Failed Job Run**
```
{
"version":"0",
"id":"abcdef01-1234-5678-9abc-def012345678", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
3373ff6de7e5-1 | "id":"abcdef01-1234-5678-9abc-def012345678",
"detail-type":"Glue Job State Change",
"source":"aws.glue",
"account":"123456789012",
"time":"2017-09-07T06:02:03Z",
"region":"us-west-2",
"resources":[],
"detail":{
"jobName":"MyJob",
"severity":"ERROR",
"state":"FAILED",
"jobRunId":"jr_0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef",
"message":"JobName:MyJob and JobRunId:jr_0123456789abcdef0123456789abcdef0123456789abcdef0123456789abcdef failed to execute with exception Role arn:aws:iam::123456789012:role/Glue_Role should be given assume role permissions for Glue Service."
}
}
```
**Timeout**
```
{
"version":"0", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
3373ff6de7e5-2 | ```
**Timeout**
```
{
"version":"0",
"id":"abcdef00-1234-5678-9abc-def012345678",
"detail-type":"Glue Job State Change",
"source":"aws.glue",
"account":"123456789012",
"time":"2017-11-20T20:22:06Z",
"region":"us-east-1",
"resources":[],
"detail":{
"jobName":"MyJob",
"severity":"WARN",
"state":"TIMEOUT",
"jobRunId":"jr_abc0123456789abcdef0123456789abcdef0123456789abcdef0123456789def",
"message":"Job run timed out"
}
}
```
**Stopped Job Run**
```
{
"version":"0",
"id":"abcdef00-1234-5678-9abc-def012345678",
"detail-type":"Glue Job State Change", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
3373ff6de7e5-3 | "detail-type":"Glue Job State Change",
"source":"aws.glue",
"account":"123456789012",
"time":"2017-11-20T20:22:06Z",
"region":"us-east-1",
"resources":[],
"detail":{
"jobName":"MyJob",
"severity":"INFO",
"state":"STOPPED",
"jobRunId":"jr_abc0123456789abcdef0123456789abcdef0123456789abcdef0123456789def",
"message":"Job run stopped"
}
}
```
**Crawler Started**
```
{
"version":"0",
"id":"05efe8a2-c309-6884-a41b-3508bcdc9695",
"detail-type":"Glue Crawler State Change",
"source":"aws.glue",
"account":"561226563745",
"time":"2017-11-11T01:09:46Z",
"region":"us-east-1", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
3373ff6de7e5-4 | "time":"2017-11-11T01:09:46Z",
"region":"us-east-1",
"resources":[
],
"detail":{
"accountId":"561226563745",
"crawlerName":"S3toS3AcceptanceTestCrawlera470bd94-9e00-4518-8942-e80c8431c322",
"startTime":"2017-11-11T01:09:46Z",
"state":"Started",
"message":"Crawler Started"
}
}
```
**Crawler Succeeded**
```
{
"version":"0",
"id":"3d675db5-59b9-6388-b8e8-e0a9b6d567a9",
"detail-type":"Glue Crawler State Change",
"source":"aws.glue",
"account":"561226563745",
"time":"2017-11-11T01:25:00Z",
"region":"us-east-1",
"resources":[
],
"detail":{
"tablesCreated":"0", | https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.