id
stringlengths
14
16
text
stringlengths
1
2.43k
source
stringlengths
99
229
3373ff6de7e5-5
"resources":[ ], "detail":{ "tablesCreated":"0", "warningMessage":"N/A", "partitionsUpdated":"0", "tablesUpdated":"0", "message":"Crawler Succeeded", "partitionsDeleted":"0", "accountId":"561226563745", "runningTime (sec)":"7", "tablesDeleted":"0", "crawlerName":"SchedulerTestCrawler51fb3a8b-1015-49f0-a969-ca126680b94b", "completionDate":"2017-11-11T01:25:00Z", "state":"Succeeded", "partitionsCreated":"0", "cloudWatchLogLink":"https://console.aws.amazon.com/cloudwatch/home?region=us-east-1#logEventViewer:group=/aws-glue/crawlers;stream=SchedulerTestCrawler51fb3a8b-1015-49f0-a969-ca126680b94b" } } ``` **Crawler Failed** ``` {
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3373ff6de7e5-6
} } ``` **Crawler Failed** ``` { "version":"0", "id":"f7965b59-470f-2e06-bb89-a8cebaabefac", "detail-type":"Glue Crawler State Change", "source":"aws.glue", "account":"782104008917", "time":"2017-10-20T05:10:08Z", "region":"us-east-1", "resources":[ ], "detail":{ "crawlerName":"test-crawler-notification", "errorMessage":"Internal Service Exception", "accountId":"1234", "cloudWatchLogLink":"https://console.aws.amazon.com/cloudwatch/home?region=us-east-1#logEventViewer:group=/aws-glue/crawlers;stream=test-crawler-notification", "state":"Failed", "message":"Crawler Failed" } } ``` **Job Run is in Starting State** ``` { "version":"0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3373ff6de7e5-7
**Job Run is in Starting State** ``` { "version":"0", "id":"66fbc5e1-aac3-5e85-63d0-856ec669a050", "detail-type":"Glue Job Run Status", "source":"aws.glue", "account":"123456789012", "time":"2018-04-24T20:57:34Z", "region":"us-east-1", "resources":[], "detail":{ "jobName":"MyJob", "severity":"INFO", "notificationCondition":{ "NotifyDelayAfter":1.0 }, "state":"STARTING", "jobRunId":"jr_6aa58e7a3aa44e2e4c7db2c50e2f7396cb57901729e4b702dcb2cfbbeb3f7a86", "message":"Job is in STARTING state", "startedOn":"2018-04-24T20:55:47.941Z" } } ``` **Job Run is in Running State** ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3373ff6de7e5-8
} } ``` **Job Run is in Running State** ``` { "version":"0", "id":"66fbc5e1-aac3-5e85-63d0-856ec669a050", "detail-type":"Glue Job Run Status", "source":"aws.glue", "account":"123456789012", "time":"2018-04-24T20:57:34Z", "region":"us-east-1", "resources":[], "detail":{ "jobName":"MyJob", "severity":"INFO", "notificationCondition":{ "NotifyDelayAfter":1.0 }, "state":"RUNNING", "jobRunId":"jr_6aa58e7a3aa44e2e4c7db2c50e2f7396cb57901729e4b702dcb2cfbbeb3f7a86", "message":"Job is in RUNNING state", "startedOn":"2018-04-24T20:55:47.941Z" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3373ff6de7e5-9
} } ``` **Job Run is in Stopping State** ``` { "version":"0", "id":"66fbc5e1-aac3-5e85-63d0-856ec669a050", "detail-type":"Glue Job Run Status", "source":"aws.glue", "account":"123456789012", "time":"2018-04-24T20:57:34Z", "region":"us-east-1", "resources":[], "detail":{ "jobName":"MyJob", "severity":"INFO", "notificationCondition":{ "NotifyDelayAfter":1.0 }, "state":"STOPPING", "jobRunId":"jr_6aa58e7a3aa44e2e4c7db2c50e2f7396cb57901729e4b702dcb2cfbbeb3f7a86", "message":"Job is in STOPPING state", "startedOn":"2018-04-24T20:55:47.941Z" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3373ff6de7e5-10
} } ``` **AWS Glue Data Catalog Table State Change** ``` { "version": "0", "id": "2617428d-715f-edef-70b8-d210da0317a0", "detail-type": "Glue Data Catalog Table State Change", "source": "aws.glue", "account": "123456789012", "time": "2019-01-16T18:16:01Z", "region": "eu-west-1", "resources": [ "arn:aws:glue:eu-west-1:123456789012:table/d1/t1" ], "detail": { "databaseName": "d1", "changedPartitions": [ "[C.pdf, dir3]", "[D.doc, dir4]" ], "typeOfChange": "BatchCreatePartition", "tableName": "t1" } } ``` **AWS Glue Data Catalog Database State Change**
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3373ff6de7e5-11
} } ``` **AWS Glue Data Catalog Database State Change** In the following example, the `typeofChange` is `CreateTable`\. Other possible values for this field are `CreateDatabase` and `UpdateTable`\. ``` { "version": "0", "id": "60e7ddc2-a588-5328-220a-21c060f6c3f4", "detail-type": "Glue Data Catalog Database State Change", "source": "aws.glue", "account": "123456789012", "time": "2019-01-16T18:08:48Z", "region": "eu-west-1", "resources": [ "arn:aws:glue:eu-west-1:123456789012:table/d1/t1" ], "detail": { "databaseName": "d1", "typeOfChange": "CreateTable", "changedTables": [ "t1" ] } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
9a14154cc684-0
For information about AWS IoT Greengrass events, see [Get Deployment Notifications](https://docs.aws.amazon.com/greengrass/latest/developerguide/deployment-notifications.html) in the *AWS IoT Greengrass Developer Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c8ec9655ab5e-0
For information about example AWS Ground Station events, see [Automating AWS Ground Station with CloudWatch Events](https://docs.aws.amazon.com/ground-station/latest/ug/automating-events.html) in the *AWS Ground Station User Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
4ddc21349ca1-0
For information about example Amazon GuardDuty events, see [Monitoring Amazon GuardDuty with Amazon CloudWatch Events](https://docs.aws.amazon.com/guardduty/latest/ug//guardduty_findings_cloudwatch.html) in the *Amazon GuardDuty User Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1d1fc3afc818-0
The following is the format for the AWS Personal Health Dashboard \(AWS Health\) events\. For more information, see [Managing AWS Health Events with Amazon CloudWatch Events](https://docs.aws.amazon.com/health/latest/ug/cloudwatch-events-health.html) in the *AWS Health User Guide*\. **AWS Health Event Format** ``` { "version": "0", "id": "7bf73129-1428-4cd3-a780-95db273d1602", "detail-type": "AWS Health Event", "source": "aws.health", "account": "123456789012", "time": "2016-06-05T06:27:57Z", "region": "region", "resources": [], "detail": { "eventArn": "arn:aws:health:region::event/id", "service": "service", "eventTypeCode": "AWS_service_code", "eventTypeCategory": "category", "startTime": "Sun, 05 Jun 2016 05:01:10 GMT", "endTime": "Sun, 05 Jun 2016 05:30:57 GMT", "eventDescription": [{
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1d1fc3afc818-1
"endTime": "Sun, 05 Jun 2016 05:30:57 GMT", "eventDescription": [{ "language": "lang-code", "latestDescription": "description" }] ... } } ``` *eventTypeCategory* The category code of the event\. The possible values are `issue`, `accountNotification`, and `scheduledChange`\. *eventTypeCode* The unique identifier for the event type\. Examples include `AWS_EC2_INSTANCE_NETWORK_MAINTENANCE_SCHEDULED` and `AWS_EC2_INSTANCE_REBOOT_MAINTENANCE_SCHEDULED`\. Events that include `MAINTENANCE_SCHEDULED` are usually pushed out about two weeks before the `startTime`\. *id* The unique identifier for the event\. *service* The AWS service affected by the event\. For example, `EC2`, `S3`, `REDSHIFT`, or `RDS`\. **Elastic Load Balancing API Issue** ``` { "version": "0", "id": "121345678-1234-1234-1234-123456789012", "detail-type": "AWS Health Event", "source": "aws.health",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1d1fc3afc818-2
"detail-type": "AWS Health Event", "source": "aws.health", "account": "123456789012", "time": "2016-06-05T06:27:57Z", "region": "ap-southeast-2", "resources": [], "detail": { "eventArn": "arn:aws:health:ap-southeast-2::event/AWS_ELASTICLOADBALANCING_API_ISSUE_90353408594353980", "service": "ELASTICLOADBALANCING", "eventTypeCode": "AWS_ELASTICLOADBALANCING_API_ISSUE", "eventTypeCategory": "issue", "startTime": "Sat, 11 Jun 2016 05:01:10 GMT", "endTime": "Sat, 11 Jun 2016 05:30:57 GMT", "eventDescription": [{ "language": "en_US", "latestDescription": "A description of the event will be provided here" } } ``` **Amazon EC2 Instance Store Drive Performance Degraded** ``` { "version": "0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1d1fc3afc818-3
**Amazon EC2 Instance Store Drive Performance Degraded** ``` { "version": "0", "id": "121345678-1234-1234-1234-123456789012", "detail-type": "AWS Health Event", "source": "aws.health", "account": "123456789012", "time": "2016-06-05T06:27:57Z", "region": "us-west-2", "resources": [ "i-abcd1111" ], "detail": { "eventArn": "arn:aws:health:us-west-2::event/AWS_EC2_INSTANCE_STORE_DRIVE_PERFORMANCE_DEGRADED_90353408594353980", "service": "EC2", "eventTypeCode": "AWS_EC2_INSTANCE_STORE_DRIVE_PERFORMANCE_DEGRADED", "eventTypeCategory": "issue", "startTime": "Sat, 05 Jun 2016 15:10:09 GMT", "eventDescription": [{ "language": "en_US", "latestDescription": "A description of the event will be provided here" }],
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1d1fc3afc818-4
"latestDescription": "A description of the event will be provided here" }], "affectedEntities": [{ "entityValue": "i-abcd1111", "tags": { "stage": "prod", "app": "my-app" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
339b314efd8e-0
The following are examples of the AWS Key Management Service \(AWS KMS\) events\. For more information, see [AWS KMS Events](https://docs.aws.amazon.com/kms/latest/developerguide/monitoring-cloudwatch.html#kms-events) in the *AWS Key Management Service Developer Guide*\. **KMS CMK Rotation** AWS KMS automatically rotated a CMK's key material\. ``` { "version": "0", "id": "6a7e8feb-b491-4cf7-a9f1-bf3703467718", "detail-type": "KMS CMK Rotation", "source": "aws.kms", "account": "111122223333", "time": "2016-08-25T21:05:33Z", "region": "us-west-2", "resources": [ "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" ], "detail": { "key-id": "1234abcd-12ab-34cd-56ef-1234567890ab" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
339b314efd8e-1
} } ``` **KMS Imported Key Material Expiration** AWS KMS deleted a CMK's expired key material\. ``` { "version": "0", "id": "9da9af57-9253-4406-87cb-7cc400e43465", "detail-type": "KMS Imported Key Material Expiration", "source": "aws.kms", "account": "111122223333", "time": "2016-08-22T20:12:19Z", "region": "us-west-2", "resources": [ "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" ], "detail": { "key-id": "1234abcd-12ab-34cd-56ef-1234567890ab" } } ``` **KMS CMK Deletion** AWS KMS completed a scheduled CMK deletion\. ``` { "version": "0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
339b314efd8e-2
AWS KMS completed a scheduled CMK deletion\. ``` { "version": "0", "id": "e9ce3425-7d22-412a-a699-e7a5fc3fbc9a", "detail-type": "KMS CMK Deletion", "source": "aws.kms", "account": "111122223333", "time": "2016-08-19T03:23:45Z", "region": "us-west-2", "resources": [ "arn:aws:kms:us-west-2:111122223333:key/1234abcd-12ab-34cd-56ef-1234567890ab" ], "detail": { "key-id": "1234abcd-12ab-34cd-56ef-1234567890ab" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-0
The following are examples of Amazon Macie events\. **Alert Created** ``` { "version": "0", "id": "CWE-event-id", "detail-type": "Macie Alert", "source": "aws.macie", "account": "123456789012", "time": "2017-04-24T22:28:49Z", "region": "us-east-1", "resources": [ "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id/alert/alert_id", "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id" ], "detail": { "notification-type": "ALERT_CREATED", "name": "Scanning bucket policies", "tags": [ "Custom_Alert", "Insider" ], "url": "https://lb00.us-east-1.macie.aws.amazon.com/111122223333/posts/alert_id",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-1
"alert-arn": "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id/alert/alert_id", "risk-score": 80, "trigger": { "rule-arn": "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id", "alert-type": "basic", "created-at": "2017-01-02 19:54:00.644000", "description": "Alerting on failed enumeration of large number of bucket policies", "risk": 8 }, "created-at": "2017-04-18T00:21:12.059000", "actor": "555566667777:assumed-role:superawesome:aroaidpldc7nsesfnheji", "summary": { "Description": "Alerting on failed enumeration of large number of bucket policies", "IP": { "34.199.185.34": 121, "34.205.153.2": 2, "72.21.196.70": 2 }, "Time Range": [ { "count": 125, "start": "2017-04-24T20:23:49Z",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-2
{ "count": 125, "start": "2017-04-24T20:23:49Z", "end": "2017-04-24T20:25:54Z" } ], "Source ARN": "arn:aws:sts::123456789012:assumed-role/RoleName", "Record Count": 1, "Location": { "us-east-1": 125 }, "Event Count": 125, "Events": { "GetBucketLocation": { "count": 48, "ISP": { "Amazon": 48 } }, "ListRoles": { "count": 2, "ISP": { "Amazon": 2 } }, "GetBucketPolicy": { "count": 37, "ISP": { "Amazon": 37 }, "Error Code": { "NoSuchBucketPolicy": 22 } }, "GetBucketAcl": { "count": 37, "ISP": { "Amazon": 37 }
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-3
"count": 37, "ISP": { "Amazon": 37 } }, "ListBuckets": { "count": 1, "ISP": { "Amazon": 1 } } }, "recipientAccountId": { "123456789012": 125 } } } } ``` ``` { "version": "0", "id": "CWE-event-id", "detail-type": "Macie Alert", "source": "aws.macie", "account": "123456789012", "time": "2017-04-18T18:15:41Z", "region": "us-east-1", "resources": [ "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id/alert/alert_id", "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id" ], "detail": { "notification-type": "ALERT_CREATED",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-4
], "detail": { "notification-type": "ALERT_CREATED", "name": "Bucket is writable by all authenticated users", "tags": [ "Custom_Alert", "Audit" ], "url": "https://lb00.us-east-1.macie.aws.amazon.com/111122223333/posts/alert_id", "alert-arn": "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id/alert/alert_id", "risk-score": 70, "trigger": { "rule-arn": "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id", "alert-type": "basic", "created-at": "2017-04-08 00:21:30.749000", "description": "Bucket is writable by all authenticated users", "risk": 7 }, "created-at": "2017-04-18T18:16:17.046454", "actor": "444455556666", "summary": { "Description": "Bucket is writable by all authenticated users", "Bucket": {
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-5
"summary": { "Description": "Bucket is writable by all authenticated users", "Bucket": { "secret-bucket-name": 1 }, "Record Count": 1, "ACL": { "secret-bucket-name": [ { "Owner": { "DisplayName": "bucket_owner", "ID": "089d2842f4b392f5c5c61f073bd2e4a37b3bb2e62659318c6960e8981648a17e" }, "Grants": [ { "Grantee": { "Type": "Group", "URI": "http://acs.amazonaws.com/groups/global/AuthenticatedUsers" }, "Permission": "WRITE" } ] } ] }, "Event Count": 1, "Timestamps": { "2017-01-10T22:48:06.784937": 1 } } } } ``` **Alert Updated** ``` {
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-6
} } ``` **Alert Updated** ``` { "version": "0", "id": "CWE-event-id", "detail-type": "Macie Alert", "source": "aws.macie", "account": "123456789012", "time": "2017-04-18T17:47:48Z", "region": "us-east-1", "resources": [ "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id/alert/alert_id", "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id" ], "detail": { "notification-type": "ALERT_UPDATED", "name": "Public bucket contains high risk object", "tags": [ "Custom_Alert", "Audit" ], "url": "https://lb00.us-east-1.macie.aws.amazon.com/111122223333/posts/alert_id",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-7
"alert-arn": "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id/alert/alert_id", "risk-score": 100, "trigger": { "rule-arn": "arn:aws:macie:us-east-1:123456789012:trigger/trigger_id", "alert-type": "basic", "created-at": "2017-04-08 00:23:39.138000", "description": "Public bucket contains high risk object", "risk": 10 }, "created-at": "2017-04-08T00:36:26.270000", "actor": "public_bucket", "summary": { "Description": "Public bucket contains high risk object", "Object": { "public_bucket/secret_key.txt": 1, "public_bucket/financial_summary.txt": 1 }, "Record Count": 2, "Themes": { "Secret Markings": 1, "Corporate Proposals": 1, "Confidential Markings": 1 }, "Event Count": 2, "DLP risk": { "7": 2 },
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-8
"Event Count": 2, "DLP risk": { "7": 2 }, "Owner": { "bucket_owner": 2 }, "Timestamps": { "2017-04-03T16:12:53+00:00": 2 } } } } ``` ``` { "version": "0", "id": "CWE-event-id", "detail-type": "Macie Alert", "source": "aws.macie", "account": "123456789012", "time": "2017-04-22T03:31:47Z", "region": "us-east-1", "resources": [ "arn:aws:macie:us-east-1:123456789012:trigger/macie/alert/alert_id", "arn:aws:macie:us-east-1:123456789012:trigger/macie" ], "detail": { "notification-type": "ALERT_UPDATED",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-9
], "detail": { "notification-type": "ALERT_UPDATED", "name": "Lists the instance profiles that have the specified associated IAM role, Lists the names of the inline policies that are embedded in the specified IAM role", "tags": [ "Predictive", "Behavioral_Anomaly" ], "url": "https://lb00.us-east-1.macie.aws.amazon.com/111122223333/posts/alert_id", "alert-arn": "arn:aws:macie:us-east-1:123456789012:trigger/macie/alert/alert_id", "risk-score": 20, "created-at": "2017-04-22T03:08:35.256000", "actor": "123456789012:assumed-role:rolename", "trigger": { "alert-type": "predictive", "features": { "distinctEventName": { "name": "distinctEventName", "description": "Event Names executed during a user session", "narrative": "A sudden increase in event names utilized by a user can be an indicator of a change in user behavior or account risk", "risk": 3 },
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ea4cfc5d4446-10
"risk": 3 }, "ListInstanceProfilesForRole": { "name": "ListInstanceProfilesForRole", "description": "Lists the instance profiles that have the specified associated IAM role", "narrative": "Information collection activity suggesting the start of a reconnaissance or exfiltration campaign", "anomalous": true, "multiplier": 8.420560747663552, "excession_times": [ "2017-04-21T18:00:00Z" ], "risk": 1 }, "ListRolePolicies": { "name": "ListRolePolicies", "description": "Lists the names of the inline policies that are embedded in the specified IAM role", "narrative": "Information collection activity suggesting the start of a reconnaisance or exfiltration campaign", "anomalous": true, "multiplier": 12.017441860465116, "excession_times": [ "2017-04-21T18:00:00Z" ], "risk": 2 } } } } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1fad603862e0-0
AWS Management Console sign\-in events can be detected by CloudWatch Events\. For information on regional sign\-in events see: [Logging Regional Sign\-in Events](https://docs.aws.amazon.com/IAM/latest/UserGuide/cloudtrail-integration.html#cloudtrail-integration_signin-regions)\. The following is an example of a console sign\-in event: ``` { "id": "6f87d04b-9f74-4f04-a780-7acf4b0a9b38", "detail-type": "AWS Console Sign In via CloudTrail", "source": "aws.signin", "account": "123456789012", "time": "2016-01-05T18:21:27Z", "region": "us-east-1", "resources": [], "detail": { "eventVersion": "1.02", "userIdentity": { "type": "Root", "principalId": "123456789012", "arn": "arn:aws:iam::123456789012:root", "accountId": "123456789012" },
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
1fad603862e0-1
"accountId": "123456789012" }, "eventTime": "2016-01-05T18:21:27Z", "eventSource": "signin.amazonaws.com", "eventName": "ConsoleLogin", "awsRegion": "us-east-1", "sourceIPAddress": "0.0.0.0", "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_10_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/47.0.2526.106 Safari/537.36", "requestParameters": null, "responseElements": { "ConsoleLogin": "Success" }, "additionalEventData": { "LoginTo": "https://console.aws.amazon.com/console/home?state=hashArgs%23&isauthcode=true", "MobileVersion": "No", "MFAUsed": "No" }, "eventID": "324731c0-64b3-4421-b552-dfc3c27df4f6", "eventType": "AwsConsoleSignIn" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
88f13a0393ae-0
The following are examples of AWS OpsWorks Stacks events\. **AWS OpsWorks Stacks instance state change** Indicates a change in the state of an AWS OpsWorks Stacks instance\. The following are instance states\. + `booting` + `connection_lost` + `online` + `pending` + `rebooting` + `requested` + `running_setup` + `setup_failed` + `shutting_down` + `start_failed` + `stopping` + `stop_failed` + `stopped` + `terminating` + `terminated` ``` { "version": "0", "id": "dc5fa8df-48f1-2108-b1b9-1fe5ebcf2296", "detail-type": "OpsWorks Instance State Change", "source": "aws.opsworks", "account": "123456789012", "time": "2018-01-25T11:12:23Z", "region": "us-east-1", "resources": [
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
88f13a0393ae-1
"region": "us-east-1", "resources": [ "arn:aws:opsworks:us-east-1:123456789012:instance/a648d98f-fdd8-4323-952a-a50z3e4z500z" ], "detail": { "initiated_by": "user", "hostname": "testing1", "stack-id": "acd3df16-e859-4598-8414-377b12a902da", "layer-ids": [ "d1a0cb7f-c7e9-4a63-811c-976f0267b2c8" ], "instance-id": "a648d98f-fdd8-4323-952a-a50z3e4z500z", "ec2-instance-id": "i-08b1c2b67aa292276", "status": "requested" } } ``` The `initiated_by` field is only populated when the instance is in the `requested`, `terminating`, or `stopping` states\. The `initiated_by` field can contain one of the following values\. + `user` \- A user requested the instance state change by using either the API or AWS Management Console\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
88f13a0393ae-2
+ `user` \- A user requested the instance state change by using either the API or AWS Management Console\. + `auto-scaling` \- The AWS OpsWorks Stacks automatic scaling feature initiated the instance state change\. + `auto-healing` \- The AWS OpsWorks Stacks automatic healing feature initiated the instance state change\. **AWS OpsWorks Stacks command state change** A change occurred in the state of an AWS OpsWorks Stacks command\. The following are command states\. + `expired` \- A command timed out\. + `failed` \- A general command failure occurred\. + `skipped` \- A command was skipped because the instance has a different state in AWS OpsWorks Stacks than in Amazon EC2\. + `successful` \- A command succeeded\. + `superseded` \- A command was skipped because it would have applied configuration changes that have already been applied\. ``` { "version": "0", "id": "96c778b6-a40e-c8c1-aafc-c9852a3a7b52", "detail-type": "OpsWorks Command State Change", "source": "aws.opsworks", "account": "123456789012", "time": "2018-01-26T08:54:40Z", "region": "us-east-1",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
88f13a0393ae-3
"time": "2018-01-26T08:54:40Z", "region": "us-east-1", "resources": [ "arn:aws:opsworks:us-east-1:123456789012:instance/a648d98f-fdd8-4323-952a-a50a3e4e500f" ], "detail": { "command-id": "acc9f4f3-a3ec-4fab-b70f-c7d04e71e3ec", "instance-id": "a648d98f-fdd8-4323-952a-a50a3e4e500f", "type": "setup", "status": "successful" } } ``` **AWS OpsWorks Stacks deployment state change** A change occurred in the state of an AWS OpsWorks Stacks deployment\. The following are deployment states\. + `running` + `successful` + `failed` ``` { "version": "0", "id": "b8230afa-60c7-f43f-b632-841c1cfb22ff", "detail-type": "OpsWorks Deployment State Change",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
88f13a0393ae-4
"detail-type": "OpsWorks Deployment State Change", "source": "aws.opsworks", "account": "123456789012", "time": "2018-01-25T11:15:48Z", "region": "us-east-1", "resources": [ "arn:aws:opsworks:us-east-1:123456789012:instance/a648d98f-fdd8-4323-952a-a50a3e4e500f" ], "detail": { "duration": 16, "stack-id": "acd3df16-e859-4598-8414-377b12a902da", "instance-ids": [ "a648d98f-fdd8-4323-952a-a50a3e4e500f" ], "deployment-id": "606419dc-418e-489c-8531-bff9770fc346", "command": "configure", "status": "successful" } } ``` The `duration` field is only populated when a deployment is finished, and shows time in seconds\. **AWS OpsWorks Stacks alert**
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
88f13a0393ae-5
The `duration` field is only populated when a deployment is finished, and shows time in seconds\. **AWS OpsWorks Stacks alert** An AWS OpsWorks Stacks service error was raised\. ``` { "version": "0", "id": "f99faa6f-0e27-e398-95bb-8f190806d275", "detail-type": "OpsWorks Alert", "source": "aws.opsworks", "account": "123456789012", "time": "2018-01-20T16:51:29Z", "region": "us-east-1", "resources": [], "detail": { "stack-id": "2f48f2be-ac7d-4dd5-80bb-88375f94db7b", "instance-id": "986efb74-69e8-4c6d-878e-5b77c054cbb0", "type": "InstanceStop", "message": "The shutdown of the instance timed out. Please try stopping it again." } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-0
The following are examples of Amazon SageMaker events\. **Amazon SageMaker training job state change** Indicates a change in the status of an Amazon SageMaker training job\. If the value of `TrainingJobStatus` is `Failed`, the event contains the `FailureReason` field, which provides a description of why the training job failed\. ``` { "version": "0", "id": "844e2571-85d4-695f-b930-0153b71dcb42", "detail-type": "SageMaker Training Job State Change", "source": "aws.sagemaker", "account": "123456789012", "time": "2018-10-06T12:26:13Z", "region": "us-east-1", "resources": [ "arn:aws:sagemaker:us-east-1:123456789012:training-job/kmeans-1" ], "detail": { "TrainingJobName": "89c96cc8-dded-4739-afcc-6f1dc936701d", "TrainingJobArn": "arn:aws:sagemaker:us-east-1:123456789012:training-job/kmeans-1",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-1
"TrainingJobStatus": "Completed", "SecondaryStatus": "Completed", "HyperParameters": { "Hyper": "Parameters" }, "AlgorithmSpecification": { "TrainingImage": "TrainingImage", "TrainingInputMode": "TrainingInputMode" }, "RoleArn": "a little teapot, some little teapot", "InputDataConfig": [ { "ChannelName": "Train", "DataSource": { "S3DataSource": { "S3DataType": "S3DataType", "S3Uri": "S3Uri", "S3DataDistributionType": "S3DataDistributionType" } }, "ContentType": "ContentType", "CompressionType": "CompressionType", "RecordWrapperType": "RecordWrapperType" } ], "OutputDataConfig": { "KmsKeyId": "KmsKeyId", "S3OutputPath": "S3OutputPath" }, "ResourceConfig": { "InstanceType": "InstanceType",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-2
}, "ResourceConfig": { "InstanceType": "InstanceType", "InstanceCount": 3, "VolumeSizeInGB": 20, "VolumeKmsKeyId": "VolumeKmsKeyId" }, "VpcConfig": { }, "StoppingCondition": { "MaxRuntimeInSeconds": 60 }, "CreationTime": "2018-10-06T12:26:13Z", "TrainingStartTime": "2018-10-06T12:26:13Z", "TrainingEndTime": "2018-10-06T12:26:13Z", "LastModifiedTime": "2018-10-06T12:26:13Z", "SecondaryStatusTransitions": [ ], "Tags": { } } } ``` **Amazon SageMaker HyperParameter tuning job state change** Indicates a change in the status of an Amazon SageMaker hyperparameter tuning job\. ``` { "version": "0", "id": "844e2571-85d4-695f-b930-0153b71dcb42",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-3
"id": "844e2571-85d4-695f-b930-0153b71dcb42", "detail-type": "SageMaker HyperParameter Tuning Job State Change", "source": "aws.sagemaker", "account": "123456789012", "time": "2018-10-06T12:26:13Z", "region": "us-east-1", "resources": [ "arn:aws:sagemaker:us-east-1:123456789012:tuningJob/x" ], "detail": { "HyperParameterTuningJobName": "016bffd3-6d71-4d3a-9710-0a332b2759fc", "HyperParameterTuningJobArn": "arn:aws:sagemaker:us-east-1:123456789012:tuningJob/x", "TrainingJobDefinition": { "StaticHyperParameters": {}, "AlgorithmSpecification": { "TrainingImage": "trainingImageName", "TrainingInputMode": "inputModeFile", "MetricDefinitions": [ { "Name": "metricName",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-4
"MetricDefinitions": [ { "Name": "metricName", "Regex": "regex" } ] }, "RoleArn": "roleArn", "InputDataConfig": [ { "ChannelName": "channelName", "DataSource": { "S3DataSource": { "S3DataType": "s3DataType", "S3Uri": "s3Uri", "S3DataDistributionType": "s3DistributionType" } }, "ContentType": "contentType", "CompressionType": "gz", "RecordWrapperType": "RecordWrapper" } ], "VpcConfig": { "SecurityGroupIds": [ "securityGroupIds" ], "Subnets": [ "subnets" ] }, "OutputDataConfig": { "KmsKeyId": "kmsKeyId", "S3OutputPath": "s3OutputPath" }, "ResourceConfig": {
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-5
"S3OutputPath": "s3OutputPath" }, "ResourceConfig": { "InstanceType": "instanceType", "InstanceCount": 10, "VolumeSizeInGB": 500, "VolumeKmsKeyId": "volumeKeyId" }, "StoppingCondition": { "MaxRuntimeInSeconds": 3600 } }, "HyperParameterTuningJobStatus": "status", "CreationTime": "2018-10-06T12:26:13Z", "LastModifiedTime": "2018-10-06T12:26:13Z", "TrainingJobStatusCounters": { "Completed": 1, "InProgress": 0, "RetryableError": 0, "NonRetryableError": 0, "Stopped": 0 }, "ObjectiveStatusCounters": { "Succeeded": 1, "Pending": 0, "Failed": 0 }, "Tags": {} } } ``` **Amazon SageMaker transform job state change** Indicates a change in the state of an Amazon SageMaker batch transform job\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-6
``` **Amazon SageMaker transform job state change** Indicates a change in the state of an Amazon SageMaker batch transform job\. If the value of `TransformJobStatus` is `Failed`, the event contains the `FailureReason` field, which provides a description of why the training job failed\. ``` { "version": "0", "id": "844e2571-85d4-695f-b930-0153b71dcb42", "detail-type": "SageMaker Transform Job State Change", "source": "aws.sagemaker", "account": "123456789012", "time": "2018-10-06T12:26:13Z", "region": "us-east-1", "resources": [ "arn:aws:sagemaker:us-east-1:123456789012:transform-job/myjob" ], "detail": { "TransformJobName": "4b52bd8f-e034-4345-818d-884bdd7c9724", "TransformJobArn": "arn:aws:sagemaker:us-east-1:123456789012:transform-job/myjob", "TransformJobStatus": "Completed",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-7
"TransformJobStatus": "Completed", "ModelName": "ModelName", "MaxConcurrentTransforms": 5, "MaxPayloadInMB": 10, "BatchStrategy": "Strategy", "Environment": { "environment1": "environment2" }, "TransformInput": { "DataSource": { "S3DataSource": { "S3DataType": "s3DataType", "S3Uri": "s3Uri" } }, "ContentType": "content type", "CompressionType": "compression type", "SplitType": "split type" }, "TransformOutput": { "S3OutputPath": "s3Uri", "Accept": "accept", "AssembleWith": "assemblyType", "KmsKeyId": "kmsKeyId" }, "TransformResources": { "InstanceType": "instanceType", "InstanceCount": 3 }, "CreationTime": "2018-10-06T12:26:13Z",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
c96974c5dde0-8
"InstanceCount": 3 }, "CreationTime": "2018-10-06T12:26:13Z", "TransformStartTime": "2018-10-06T12:26:13Z", "TransformEndTime": "2018-10-06T12:26:13Z", "Tags": { } } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
4088f538a5e9-0
For information about example Security Hub events, see [Monitoring AWS Security Hub with Amazon CloudWatch Events](https://docs.aws.amazon.com/securityhub/latest/userguide//securityhub-cloudwatch-events.html) in the *AWS Security Hub User Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
cae610b26c79-0
The following are examples of the events for AWS Server Migration Service\. **Deleted replication job notification** ``` { "version": "0", "id": "5630992d-92cd-439f-f2a8-92c8212aee24", "detail-type": "Server Migration Job State Change", "source": "aws.sms", "account": "123456789012", "time": "2018-02-07T22:30:11Z", "region": "us-west-1", "resources": [ "arn:aws:sms:us-west-1:123456789012:sms-job-21a64348" ], "detail": { "state": "Deleted", "replication-run-id": "N/A", "replication-job-id": "sms-job-21a64348", "version": "1.0" } } ``` **Completed replication job notification** ``` { "version": "0", "id": "3f9c59cc-f941-522a-be6d-f08e44ff1715",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
cae610b26c79-1
"id": "3f9c59cc-f941-522a-be6d-f08e44ff1715", "detail-type": "Server Migration Job State Change", "source": "aws.sms", "account": "123456789012", "time": "2018-02-07T22:54:00Z", "region": "us-west-1", "resources": [ "arn:aws:sms:us-west-1:123456789012:sms-job-2ea64347", "arn:aws:sms:us-west-1:123456789012:sms-job-2ea64347/sms-run-e1a64388" ], "detail": { "state": "Completed", "replication-run-id": "sms-run-e1a64388", "replication-job-id": "sms-job-2ea64347", "ami-id": "ami-746d6314", "version": "1.0" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-0
The following are examples of the events for AWS Systems Manager\. For more information, see [Log Command Execution Status Changes for Run Command](https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/rc-cwe.html) in the *Amazon EC2 User Guide for Linux Instances*\. **Run Command Status\-change Notification** ``` { "version": "0", "id": "51c0891d-0e34-45b1-83d6-95db273d1602", "detail-type": "EC2 Command Status-change Notification", "source": "aws.ssm", "account": "123456789012", "time": "2016-07-10T21:51:32Z", "region": "us-east-1", "resources": ["arn:aws:ec2:us-east-1:123456789012:instance/i-abcd1111"], "detail": { "command-id": "e8d3c0e4-71f7-4491-898f-c9b35bee5f3b", "document-name": "AWS-RunPowerShellScript", "expire-after": "2016-07-14T22:01:30.049Z",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-1
"expire-after": "2016-07-14T22:01:30.049Z", "parameters": { "executionTimeout": ["3600"], "commands": ["date"] }, "requested-date-time": "2016-07-10T21:51:30.049Z", "status": "Success" } } ``` **Run Command Invocation Status\-change Notification** ``` { "version": "0", "id": "4780e1b8-f56b-4de5-95f2-95db273d1602", "detail-type": "EC2 Command Invocation Status-change Notification", "source": "aws.ssm", "account": "123456789012", "time": "2016-07-10T21:51:32Z", "region": "us-east-1", "resources": ["arn:aws:ec2:us-east-1:123456789012:instance/i-abcd1111"], "detail": { "command-id": "e8d3c0e4-71f7-4491-898f-c9b35bee5f3b",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-2
"document-name": "AWS-RunPowerShellScript", "instance-id": "i-9bb89e2b", "requested-date-time": "2016-07-10T21:51:30.049Z", "status": "Success" } } ``` **Automation Step Status\-change Notification** ``` { "version": "0", "id": "eeca120b-a321-433e-9635-dab369006a6b", "detail-type": "EC2 Automation Step Status-change Notification", "source": "aws.ssm", "account": "123456789012", "time": "2016-11-29T19:43:35Z", "region": "us-east-1", "resources": ["arn:aws:ssm:us-east-1:123456789012:automation-execution/333ba70b-2333-48db-b17e-a5e69c6f4d1c", "arn:aws:ssm:us-east-1:123456789012:automation-definition/runcommand1:1"], "detail": {
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-3
"detail": { "ExecutionId": "333ba70b-2333-48db-b17e-a5e69c6f4d1c", "Definition": "runcommand1", "DefinitionVersion": 1.0, "Status": "Success", "EndTime": "Nov 29, 2016 7:43:25 PM", "StartTime": "Nov 29, 2016 7:43:23 PM", "Time": 2630.0, "StepName": "runFixedCmds", "Action": "aws:runCommand" } } ``` **Automation Execution Status\-change Notification** ``` { "version": "0", "id": "d290ece9-1088-4383-9df6-cd5b4ac42b99", "detail-type": "EC2 Automation Execution Status-change Notification", "source": "aws.ssm", "account": "123456789012", "time": "2016-11-29T19:43:35Z", "region": "us-east-1",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-4
"time": "2016-11-29T19:43:35Z", "region": "us-east-1", "resources": ["arn:aws:ssm:us-east-1:123456789012:automation-execution/333ba70b-2333-48db-b17e-a5e69c6f4d1c", "arn:aws:ssm:us-east-1:123456789012:automation-definition/runcommand1:1"], "detail": { "ExecutionId": "333ba70b-2333-48db-b17e-a5e69c6f4d1c", "Definition": "runcommand1", "DefinitionVersion": 1.0, "Status": "Success", "StartTime": "Nov 29, 2016 7:43:20 PM", "EndTime": "Nov 29, 2016 7:43:26 PM", "Time": 5753.0, "ExecutedBy": "arn:aws:iam::123456789012:user/userName" } } ``` **State Manager Association State Change** ``` { "version":"0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-5
**State Manager Association State Change** ``` { "version":"0", "id":"db839caf-6f6c-40af-9a48-25b2ae2b7774", "detail-type":"EC2 State Manager Association State Change", "source":"aws.ssm", "account":"123456789012", "time":"2017-05-16T23:01:10Z", "region":"us-west-1", "resources":[ "arn:aws:ssm:us-west-1::document/AWS-RunPowerShellScript" ], "detail":{ "association-id":"6e37940a-23ba-4ab0-9b96-5d0a1a05464f", "document-name":"AWS-RunPowerShellScript", "association-version":"1", "document-version":"Optional.empty", "targets":"[{\"key\":\"InstanceIds\",\"values\":[\"i-12345678\"]}]", "creation-date":"2017-02-13T17:22:54.458Z",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-6
"creation-date":"2017-02-13T17:22:54.458Z", "last-successful-execution-date":"2017-05-16T23:00:01Z", "last-execution-date":"2017-05-16T23:00:01Z", "last-updated-date":"2017-02-13T17:22:54.458Z", "status":"Success", "association-status-aggregated-count":"{\"Success\":1}", "schedule-expression":"cron(0 */30 * * * ? *)", "association-cwe-version":"1.0" } } ``` **State Manager Instance Association State Change** ``` { "version":"0", "id":"6a7e8feb-b491-4cf7-a9f1-bf3703467718", "detail-type":"EC2 State Manager Instance Association State Change", "source":"aws.ssm", "account":"123456789012", "time":"2017-02-23T15:23:48Z", "region":"us-east-1", "resources":[
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-7
"region":"us-east-1", "resources":[ "arn:aws:ec2:us-east-1:123456789012:instance/i-12345678", "arn:aws:ssm:us-east-1:123456789012:document/my-custom-document" ], "detail":{ "association-id":"34fcb7e0-9a14-4984-9989-0e04e3f60bd8", "instance-id":"i-12345678", "document-name":"my-custom-document", "document-version":"1", "targets":"[{\"key\":\"instanceids\",\"values\":[\"i-12345678\"]}]", "creation-date":"2017-02-23T15:23:48Z", "last-successful-execution-date":"2017-02-23T16:23:48Z", "last-execution-date":"2017-02-23T16:23:48Z", "status":"Success", "detailed-status":"", "error-code":"testErrorCode", "execution-summary":"testExecutionSummary",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
2274df7bc7c0-8
"error-code":"testErrorCode", "execution-summary":"testExecutionSummary", "output-url":"sampleurl", "instance-association-cwe-version":"1" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
e627b264e4ff-0
The following are examples of the events for Amazon EC2 Systems Manager \(SSM\) configuration compliance\. **Association Compliant** ``` { "version": "0", "id": "01234567-0123-0123-0123-012345678901", "detail-type": "Configuration Compliance State Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-07-17T19:03:26Z", "region": "us-west-1", "resources": [ "arn:aws:ssm:us-west-1:461348341421:managed-instance/i-01234567890abcdef" ], "detail": { "last-runtime": "2017-01-01T10:10:10Z", "compliance-status": "compliant", "resource-type": "managed-instance", "resource-id": "i-01234567890abcdef", "compliance-type": "Association" } } ``` **Association Non\-Compliant** ``` { "version": "0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
e627b264e4ff-1
**Association Non\-Compliant** ``` { "version": "0", "id": "01234567-0123-0123-0123-012345678901", "detail-type": "Configuration Compliance State Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-07-17T19:02:31Z", "region": "us-west-1", "resources": [ "arn:aws:ssm:us-west-1:461348341421:managed-instance/i-01234567890abcdef" ], "detail": { "last-runtime": "2017-01-01T10:10:10Z", "compliance-status": "non_compliant", "resource-type": "managed-instance", "resource-id": "i-01234567890abcdef", "compliance-type": "Association" } } ``` **Patch Compliant** ``` { "version": "0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
e627b264e4ff-2
``` **Patch Compliant** ``` { "version": "0", "id": "01234567-0123-0123-0123-012345678901", "detail-type": "Configuration Compliance State Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-07-17T19:03:26Z", "region": "us-west-1", "resources": [ "arn:aws:ssm:us-west-1:461348341421:managed-instance/i-01234567890abcdef" ], "detail": { "resource-type": "managed-instance", "resource-id": "i-01234567890abcdef", "compliance-status": "compliant", "compliance-type": "Patch", "patch-baseline-id": "PB789", "severity": "critical" } } ``` **Patch Non\-Compliant** ``` { "version": "0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
e627b264e4ff-3
**Patch Non\-Compliant** ``` { "version": "0", "id": "01234567-0123-0123-0123-012345678901", "detail-type": "Configuration Compliance State Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-07-17T19:02:31Z", "region": "us-west-1", "resources": [ "arn:aws:ssm:us-west-1:461348341421:managed-instance/i-01234567890abcdef" ], "detail": { "resource-type": "managed-instance", "resource-id": "i-01234567890abcdef", "compliance-status": "non_compliant", "compliance-type": "Patch", "patch-baseline-id": "PB789", "severity": "critical" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3573d9a0fe32-0
The following are examples of the events for Systems Manager Maintenance Windows\. **Register a Target** The status could also be `DEREGISTERED`\. ``` { "version":"0", "id":"01234567-0123-0123-0123-0123456789ab", "detail-type":"Maintenance Window Target Registration Notification", "source":"aws.ssm", "account":"012345678901", "time":"2016-11-16T00:58:37Z", "region":"us-east-1", "resources":[ "arn:aws:ssm:us-west-2:001312665065:maintenancewindow/mw-0ed7251d3fcf6e0c2", "arn:aws:ssm:us-west-2:001312665065:windowtarget/e7265f13-3cc5-4f2f-97a9-7d3ca86c32a6" ], "detail":{ "window-target-id":"e7265f13-3cc5-4f2f-97a9-7d3ca86c32a6",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3573d9a0fe32-1
"window-id":"mw-0ed7251d3fcf6e0c2", "status":"REGISTERED" } } ``` **Window Execution Type** The other possibilities for status are `PENDING`, `IN_PROGRESS`, `SUCCESS`, `FAILED`, `TIMED_OUT`, and `SKIPPED_OVERLAPPING`\. ``` { "version":"0", "id":"01234567-0123-0123-0123-0123456789ab", "detail-type":"Maintenance Window Execution State-change Notification", "source":"aws.ssm", "account":"012345678901", "time":"2016-11-16T01:00:57Z", "region":"us-east-1", "resources":[ "arn:aws:ssm:us-west-2:0123456789ab:maintenancewindow/mw-123456789012345678" ], "detail":{ "start-time":"2016-11-16T01:00:56.427Z", "end-time":"2016-11-16T01:00:57.070Z",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3573d9a0fe32-2
"end-time":"2016-11-16T01:00:57.070Z", "window-id":"mw-0ed7251d3fcf6e0c2", "window-execution-id":"b60fb56e-776c-4e5c-84ee-123456789012", "status":"TIMED_OUT" } } ``` **Task Execution Type** The other possibilities for status are `IN_PROGRESS`, `SUCCESS`, `FAILED`, and `TIMED_OUT`\. ``` { "version":"0", "id":"01234567-0123-0123-0123-0123456789ab", "detail-type":"Maintenance Window Task Execution State-change Notification", "source":"aws.ssm", "account":"012345678901", "time":"2016-11-16T01:00:56Z", "region":"us-east-1", "resources":[ "arn:aws:ssm:us-west-2:0123456789ab:maintenancewindow/mw-123456789012345678" ], "detail":{
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3573d9a0fe32-3
], "detail":{ "start-time":"2016-11-16T01:00:56.759Z", "task-execution-id":"6417e808-7f35-4d1a-843f-123456789012", "end-time":"2016-11-16T01:00:56.847Z", "window-id":"mw-0ed7251d3fcf6e0c2", "window-execution-id":"b60fb56e-776c-4e5c-84ee-123456789012", "status":"TIMED_OUT" } } ``` **Task Target Processed** The other possibilities for status are `IN_PROGRESS`, `SUCCESS`, `FAILED`, and `TIMED_OUT`\. ``` { "version":"0", "id":"01234567-0123-0123-0123-0123456789ab", "detail-type":"Maintenance Window Task Target Invocation State-change Notification", "source":"aws.ssm", "account":"012345678901", "time":"2016-11-16T01:00:57Z",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3573d9a0fe32-4
"account":"012345678901", "time":"2016-11-16T01:00:57Z", "region":"us-east-1", "resources":[ "arn:aws:ssm:us-west-2:0123456789ab:maintenancewindow/mw-123456789012345678" ], "detail":{ "start-time":"2016-11-16T01:00:56.427Z", "end-time":"2016-11-16T01:00:57.070Z", "window-id":"mw-0ed7251d3fcf6e0c2", "window-execution-id":"b60fb56e-776c-4e5c-84ee-123456789012", "task-execution-id":"6417e808-7f35-4d1a-843f-123456789012", "window-target-id":"e7265f13-3cc5-4f2f-97a9-123456789012", "status":"TIMED_OUT", "owner-information":"Owner" } } ``` **Window State Change**
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
3573d9a0fe32-5
"owner-information":"Owner" } } ``` **Window State Change** The possibilities for status are `ENABLED` and `DISABLED`\. ``` { "version":"0", "id":"01234567-0123-0123-0123-0123456789ab", "detail-type":"Maintenance Window State-change Notification", "source":"aws.ssm", "account":"012345678901", "time":"2016-11-16T00:58:37Z", "region":"us-east-1", "resources":[ "arn:aws:ssm:us-west-2:0123456789ab:maintenancewindow/mw-123456789012345678" ], "detail":{ "window-id":"mw-123456789012", "status":"DISABLED" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
190937cb80bc-0
The following are examples of the events for Amazon EC2 Systems Manager \(SSM\) Parameter Store\. **Create Parameter** ``` { "version": "0", "id": "6a7e4feb-b491-4cf7-a9f1-bf3703497718", "detail-type": "Parameter Store Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-05-22T16:43:48Z", "region": "us-east-1", "resources": [ "arn:aws:ssm:us-east-1:123456789012:parameter/foo" ], "detail": { "operation": "Create", "name": "foo", "type": "String", "description": "Sample Parameter" } } ``` **Update Parameter** ``` { "version": "0", "id": "9547ef2d-3b7e-4057-b6cb-5fdf09ee7c8f", "detail-type": "Parameter Store Change",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
190937cb80bc-1
"detail-type": "Parameter Store Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-05-22T16:44:48Z", "region": "us-east-1", "resources": [ "arn:aws:ssm:us-east-1:123456789012:parameter/foo" ], "detail": { "operation": "Update", "name": "foo", "type": "String", "description": "Sample Parameter" } } ``` **Delete Parameter** ``` { "version": "0", "id": "80e9b391-6a9b-413c-839a-453b528053af", "detail-type": "Parameter Store Change", "source": "aws.ssm", "account": "123456789012", "time": "2017-05-22T16:45:48Z", "region": "us-east-1", "resources": [
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
190937cb80bc-2
"region": "us-east-1", "resources": [ "arn:aws:ssm:us-east-1:123456789012:parameter/foo" ], "detail": { "operation": "Delete", "name": "foo", "type": "String", "description": "Sample Parameter" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
148dea04825c-0
For Step Functions sample events, see [Step Functions Event Examples](https://docs.aws.amazon.com/step-functions/latest/dg/cw-events.html#cw-events-events) in the *AWS Step Functions Developer Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
efbe4c7fb07a-0
The following is an example of a tag event\. ``` { "version": "0", "id": "ffd8a6fe-32f8-ef66-c85c-111111111111", "detail-type": "Tag Change on Resource", "source": "aws.tag", "account": "123456789012", "time": "2018-09-18T20:41:06Z", "region": "us-east-1", "resources": [ "arn:aws:ec2:us-east-1:123456789012:instance/i-0000000aaaaaaaaaa" ], "detail": { "changed-tag-keys": [ "key2", "key3" ], "service": "ec2", "resource-type": "instance", "version": 5, "tags": { "key4": "value4", "key1": "value1", "key2": "value2" } } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
dfa18c360909-0
The following are examples of the events for AWS Trusted Advisor\. For more information, see [Monitoring Trusted Advisor Check Results with Amazon CloudWatch Events](https://docs.aws.amazon.com/awssupport/latest/user/cloudwatch-events-ta.html) in the *AWS Support User Guide*\. **Low Utilization Amazon EC2 Instances** ``` { "version": "0", "id": "1234abcd-ab12-123a-123a-1234567890ab", "detail-type": "Trusted Advisor Check Item Refresh Notification", "source": "aws.trustedadvisor", "account": "123456789012", "time": "2018-01-12T20:07:49Z", "region": "us-east-2", "resources": [], "detail": { "check-name": "Low Utilization Amazon EC2 Instances", "check-item-detail": { "Day 1": "0.1% 0.00MB", "Day 2": "0.1% 0.00MB", "Day 3": "0.1% 0.00MB", "Region/AZ": "ca-central-1a", "Estimated Monthly Savings": "$9.22",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
dfa18c360909-1
"Region/AZ": "ca-central-1a", "Estimated Monthly Savings": "$9.22", "14-Day Average CPU Utilization": "0.1%", "Day 14": "0.1% 0.00MB", "Day 13": "0.1% 0.00MB", "Day 12": "0.1% 0.00MB", "Day 11": "0.1% 0.00MB", "Day 10": "0.1% 0.00MB", "14-Day Average Network I/O": "0.00MB", "Number of Days Low Utilization": "14 days", "Instance Type": "t2.micro", "Instance ID": "i-01234567890abcdef", "Day 8": "0.1% 0.00MB", "Instance Name": null, "Day 9": "0.1% 0.00MB", "Day 4": "0.1% 0.00MB", "Day 5": "0.1% 0.00MB", "Day 6": "0.1% 0.00MB", "Day 7": "0.1% 0.00MB" }, "status": "WARN",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
dfa18c360909-2
"Day 7": "0.1% 0.00MB" }, "status": "WARN", "resource_id": "arn:aws:ec2:ca-central-1:123456789012:instance/i-01234567890abcdef", "uuid": "aa12345f-55c7-498e-b7ac-123456789012" } } ``` **Load Balancer Optimization** ``` { "version": "0", "id": "1234abcd-ab12-123a-123a-1234567890ab", "detail-type": "Trusted Advisor Check Item Refresh Notification", "source": "aws.trustedadvisor", "account": "123456789012", "time": "2018-01-12T20:07:03Z", "region": "us-east-2", "resources": [], "detail": { "check-name": "Load Balancer Optimization ", "check-item-detail": { "Instances in Zone a": "1", "Status": "Yellow", "Instances in Zone b": "0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
dfa18c360909-3
"Instances in Zone a": "1", "Status": "Yellow", "Instances in Zone b": "0", "# of Zones": "2", "Region": "eu-central-1", "Load Balancer Name": "my-load-balance", "Instances in Zone e": null, "Instances in Zone c": null, "Reason": "Single AZ", "Instances in Zone d": null }, "status": "WARN", "resource_id": "arn:aws:elasticloadbalancing:eu-central-1:123456789012:loadbalancer/my-load-balancer", "uuid": "aa12345f-55c7-498e-b7ac-123456789012" } } ``` **Exposed Access Keys** ``` { "version": "0", "id": "1234abcd-ab12-123a-123a-1234567890ab", "detail-type": "Trusted Advisor Check Item Refresh Notification", "source": "aws.trustedadvisor", "account": "123456789012",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
dfa18c360909-4
"source": "aws.trustedadvisor", "account": "123456789012", "time": "2018-01-12T19:38:24Z", "region": "us-east-1", "resources": [], "detail": { "check-name": "Exposed Access Keys", "check-item-detail": { "Case ID": "12345678-1234-1234-abcd-1234567890ab", "Usage (USD per Day)": "0", "User Name (IAM or Root)": "my-username", "Deadline": "1440453299248", "Access Key ID": "AKIAIOSFODNN7EXAMPLE", "Time Updated": "1440021299248", "Fraud Type": "Exposed", "Location": "www.example.com" }, "status": "ERROR", "resource_id": "", "uuid": "aa12345f-55c7-498e-b7ac-123456789012" } } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
ef0aefee51b6-0
For information about the Amazon WorkSpaces events, see [Monitor Your WorkSpaces Using CloudWatch Events](https://docs.aws.amazon.com/workspaces/latest/adminguide/cloudwatch-events.html) in the *Amazon WorkSpaces Administration Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
9db3fa7b4a79-0
You can also use EventBridge with services that do not emit events and are not listed on this page\. AWS CloudTrail is a service that automatically records events such as AWS API calls\. You can create EventBridge rules that trigger on the information captured by CloudTrail\. For more information about CloudTrail, see [What is AWS CloudTrail?](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-user-guide.html)\. For more information about creating a EventBridge rule that uses CloudTrail, see [Creating an EventBridge Rule That Triggers on an AWS API Call Using AWS CloudTrail](create-eventbridge-cloudtrail-rule.md)\. All events that are delivered via CloudTrail have `AWS API Call via CloudTrail` as the value for `detail-type`\. Some occurrences in AWS can be reported to EventBridge both by the service itself and by CloudTrail, but in different ways\. For example, an Amazon EC2 API call that launches or terminates an instance generates events available to EventBridge through CloudTrail\. However, the Amazon EC2 instance state changes, from ‘running’ to ‘terminating’ for example, are EventBridge events themselves\. The following is an example of an event delivered via CloudTrail\. The event was generated by an AWS API call to Amazon S3 to create a bucket\. ``` { "version": "0", "id": "36eb8523-97d0-4518-b33d-ee3579ff19f0",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
9db3fa7b4a79-1
"id": "36eb8523-97d0-4518-b33d-ee3579ff19f0", "detail-type": "AWS API Call via CloudTrail", "source": "aws.s3", "account": "123456789012", "time": "2016-02-20T01:09:13Z", "region": "us-east-1", "resources": [], "detail": { "eventVersion": "1.03", "userIdentity": { "type": "Root", "principalId": "123456789012", "arn": "arn:aws:iam::123456789012:root", "accountId": "123456789012", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2016-02-20T01:05:59Z" } } }, "eventTime": "2016-02-20T01:09:13Z", "eventSource": "s3.amazonaws.com", "eventName": "CreateBucket",
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
9db3fa7b4a79-2
"eventSource": "s3.amazonaws.com", "eventName": "CreateBucket", "awsRegion": "us-east-1", "sourceIPAddress": "100.100.100.100", "userAgent": "[S3Console/0.4]", "requestParameters": { "bucketName": "bucket-test-iad" }, "responseElements": null, "requestID": "9D767BCC3B4E7487", "eventID": "24ba271e-d595-4e66-a7fd-9c16cbf8abae", "eventType": "AwsApiCall" } } ``` AWS API call events that are larger than 256 KB in size are not supported\. For more information about the API calls that you can use as triggers for rules, see [Services Supported by CloudTrail Event History](https://docs.aws.amazon.com/awscloudtrail/latest/userguide/view-cloudtrail-events-supported-services.html)\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/event-types.md
905d14d7ce63-0
This topic provides examples of identity\-based policies in which an account administrator can attach permissions policies to IAM identities \(that is, users, groups, and roles\)\. The following shows an example of a permissions policy that allows a user to put event data into Kinesis\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "CloudWatchEventsInvocationAccess", "Effect": "Allow", "Action": [ "kinesis:PutRecord" ], "Resource": "*" } ] } ``` The sections in this topic cover the following: **Topics** + [Permissions Required to Use the CloudWatch Console](#console-permissions-eventbridge) + [AWS Managed \(Predefined\) Policies for EventBridge](#managed-policies-eventbridge) + [Permissions Required for EventBridge to Access Certain Targets](#target-permissions-eventbridge) + [Customer Managed Policy Examples](#customer-managed-policies-eventbridge)
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
0165041aeb47-0
For a user to work with EventBridge in the CloudWatch console, that user must have a minimum set of permissions that allow the user to describe other AWS resources for their account\. To use EventBridge in the CloudWatch console, you must have permissions from the following services: + Automation + Amazon EC2 Auto Scaling + AWS CloudTrail + CloudWatch + EventBridge + IAM + Kinesis + Lambda + Amazon SNS + Amazon SWF If you create an IAM policy that is more restrictive than the minimum required permissions, the console won't function as intended for users with that IAM policy\. To ensure that those users can still use the CloudWatch console, also attach the `CloudWatchEventsReadOnlyAccess` managed policy to the user, as described in [AWS Managed \(Predefined\) Policies for EventBridge](#managed-policies-eventbridge)\. You don't need to allow minimum console permissions for users that are making calls only to the AWS CLI or the CloudWatch API\. The full set of permissions required to work with the CloudWatch console is the following: + `automation:CreateAction` + `automation:DescribeAction` + `automation:UpdateAction` + `autoscaling:DescribeAutoScalingGroups` + `cloudtrail:DescribeTrails` + `ec2:DescribeInstances` + `ec2:DescribeVolumes`
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
0165041aeb47-1
+ `cloudtrail:DescribeTrails` + `ec2:DescribeInstances` + `ec2:DescribeVolumes` + `events:DeleteRule` + `events:DescribeRule` + `events:DisableRule` + `events:EnableRule` + `events:ListRuleNamesByTarget` + `events:ListRules` + `events:ListTargetsByRule` + `events:PutEvents` + `events:PutRule` + `events:PutTargets` + `events:RemoveTargets` + `events:TestEventPattern` + `iam:ListRoles` + `kinesis:ListStreams` + `lambda:AddPermission` + `lambda:ListFunctions` + `lambda:RemovePermission` + `sns:GetTopicAttributes` + `sns:ListTopics` + `sns:SetTopicAttributes` + `swf:DescribeAction` + `swf:ReferenceAction` + `swf:RegisterAction` + `swf:RegisterDomain` + `swf:UpdateAction`
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
617b54f91d09-0
AWS addresses many common use cases by providing standalone IAM policies that are created and administered by AWS\. Managed policies grant necessary permissions for common use cases so you can avoid having to investigate what permissions are needed\. For more information, see [AWS Managed Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html#aws-managed-policies) in the *IAM User Guide*\. The following AWS managed policies, which you can attach to users in your account, are specific to EventBridge: + **CloudWatchEventsFullAccess** – Grants full access to EventBridge + **CloudWatchEventsInvocationAccess** – Allows EventBridge to relay events to the streams in Amazon Kinesis Data Streams in your account + **CloudWatchEventsReadOnlyAccess** – Grants read\-only access to EventBridge + **CloudWatchEventsBuiltInTargetExecutionAccess** – Allows built\-in targets in EventBridge to perform Amazon EC2 actions on your behalf
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
03b4a7958d72-0
In order for EventBridge to relay events to your Kinesis stream targets, you must create an IAM role\. **To create an IAM role for sending EventBridge** 1. Open the IAM console at [https://console\.aws\.amazon\.com/iam/](https://console.aws.amazon.com/iam/)\. 1. Follow the steps in [Creating a Role to Delegate Permissions to an AWS Service](https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_create_for-service.html) in the *IAM User Guide* to create an IAM role\. As you follow the steps to create a role, do the following: + In **Role Name**, use a name that is unique within your account \(for example, **CloudWatchEventsSending**\)\. + In **Select Role Type**, choose **AWS Service Roles**, and then choose **Amazon EventBridge**\. This grants EventBridge permissions to assume the role\. + In **Attach Policy**, choose **CloudWatchEventsInvocationAccess**\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
03b4a7958d72-1
+ In **Attach Policy**, choose **CloudWatchEventsInvocationAccess**\. You can also create your own custom IAM policies to allow permissions for EventBridge actions and resources\. You can attach these custom policies to the IAM users or groups that require those permissions\. For more information about IAM policies, see [Overview of IAM Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html) in the *IAM User Guide*\. For more information about managing and creating custom IAM policies, see [Managing IAM Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/ManagingPolicies.html) in the *IAM User Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
c1b3112f974c-0
For EventBridge to access certain targets, you must specify an IAM role for accessing that target, and that role must have a certain policy attached\. If the target is a Kinesis stream, the role used to send event data to that target must include the following policy\. ``` { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "kinesis:PutRecord" ], "Resource": "*" } ] } ``` If the target is Systems Manager Run Command and you're specifying one or more InstanceIds values for the command, the role that you specify must include the following policy\. ``` { "Version": "2012-10-17", "Statement": [ { "Action": "ssm:SendCommand", "Effect": "Allow", "Resource": [ "arn:aws:ec2:{{region}}:{{accountId}}:instance/[[instanceIds]]", "arn:aws:ssm:{{region}}:*:document/{{documentName}}" ] } ] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
c1b3112f974c-1
] } ] } ``` If the target is Systems Manager Run Command and you're specifying one or more tags for the command, the role that you specify must include the following policy\. ``` { "Version": "2012-10-17", "Statement": [ { "Action": "ssm:SendCommand", "Effect": "Allow", "Resource": [ "arn:aws:ec2:{{region}}:{{accountId}}:instance/*" ], "Condition": { "StringEquals": { "ec2:ResourceTag/*": [ "[[tagValues]]" ] } } }, { "Action": "ssm:SendCommand", "Effect": "Allow", "Resource": [ "arn:aws:ssm:{{region}}:*:document/{{documentName}}" ] } ] } ``` If the target is an AWS Step Functions state machine, the role that you specify must include the following policy\. ``` {
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
c1b3112f974c-2
If the target is an AWS Step Functions state machine, the role that you specify must include the following policy\. ``` { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "states:StartExecution" ], "Resource": [ "arn:aws:states:*:*:stateMachine:*" ] } ] } ``` If the target is an ECS task, the role that you specify must include the following policy\. ``` { "Version": "2012-10-17", "Statement": [{ "Effect": "Allow", "Action": [ "ecs:RunTask" ], "Resource": [ "arn:aws:ecs:*:{{account-id}}:task-definition/{{task-definition-name}}" ], "Condition": { "ArnLike": { "ecs:cluster": "arn:aws:ecs:*:{{account-id}}:cluster/{{cluster-name}}" } } }] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
91772d79ce24-0
In this section, you can find example user policies that grant permissions for various EventBridge actions\. These policies work when you are using the EventBridge API, AWS SDKs, or the AWS CLI\. **Note** All examples use the US West \(Oregon\) Region \(us\-west\-2\) and contain fictitious account IDs\. You can use the following sample IAM policies listed to limit the EventBridge access for your IAM users and roles\. **Topics** + [Example 1: CloudWatchEventsBuiltInTargetExecutionAccess](#example-policy-eventbridge-builtin-target) + [Example 2: CloudWatchEventsInvocationAccess](#example-policy-eventbridge-invocation-access) + [Example 3: CloudWatchEventsConsoleAccess](#example-policy-eventbridge-console-access) + [Example 4: CloudWatchEventsFullAccess](#example-policy-eventbridge-full-access) + [Example 5: CloudWatchEventsReadOnlyAccess](#example-policy-eventbridge-readonly-access) + [Example 6: Use Tagging to Control Access to Specific Rules](#cwl-iam-policy-tagging)
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
012f34c84ad2-0
The following policy allows built\-in targets in EventBridge to perform Amazon EC2 actions on your behalf\. **Important** Creating rules with built\-in targets is supported only in the AWS Management Console\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "CloudWatchEventsBuiltInTargetExecutionAccess", "Effect": "Allow", "Action": [ "ec2:Describe*", "ec2:RebootInstances", "ec2:StopInstances", "ec2:TerminateInstances", "ec2:CreateSnapshot" ], "Resource": "*" } ] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
e9ebe8dc9956-0
The following policy allows EventBridge to relay events to the streams in Kinesis streams in your account\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "CloudWatchEventsInvocationAccess", "Effect": "Allow", "Action": [ "kinesis:PutRecord" ], "Resource": "*" } ] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
d72ba9085010-0
The following policy ensures that IAM users can use the EventBridge console\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "CloudWatchEventsConsoleAccess", "Effect": "Allow", "Action": [ "automation:CreateAction", "automation:DescribeAction", "automation:UpdateAction", "autoscaling:DescribeAutoScalingGroups", "cloudtrail:DescribeTrails", "ec2:DescribeInstances", "ec2:DescribeVolumes", "events:*", "iam:ListRoles", "kinesis:ListStreams", "lambda:AddPermission", "lambda:ListFunctions", "lambda:RemovePermission", "sns:GetTopicAttributes", "sns:ListTopics", "sns:SetTopicAttributes", "swf:DescribeAction", "swf:ReferenceAction", "swf:RegisterAction", "swf:RegisterDomain", "swf:UpdateAction" ], "Resource": "*"
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
d72ba9085010-1
"swf:RegisterDomain", "swf:UpdateAction" ], "Resource": "*" }, { "Sid": "IAMPassRoleForCloudWatchEvents", "Effect": "Allow", "Action": "iam:PassRole", "Resource": [ "arn:aws:iam::*:role/AWS_Events_Invoke_Targets", "arn:aws:iam::*:role/AWS_Events_Actions_Execution" ] } ] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
35d9b53eed82-0
The following policy allows performing actions against EventBridge through the AWS CLI and SDK\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "CloudWatchEventsFullAccess", "Effect": "Allow", "Action": "events:*", "Resource": "*" }, { "Sid": "IAMPassRoleForCloudWatchEvents", "Effect": "Allow", "Action": "iam:PassRole", "Resource": "arn:aws:iam::*:role/AWS_Events_Invoke_Targets" } ] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
54407e093e77-0
The following policy provides read\-only access to EventBridge\. ``` { "Version": "2012-10-17", "Statement": [ { "Sid": "CloudWatchEventsReadOnlyAccess", "Effect": "Allow", "Action": [ "events:Describe*", "events:List*", "events:TestEventPattern" ], "Resource": "*" } ] } ```
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
2cae74d14758-0
You can grant users access to specified EventBridge rules while preventing them from accessing other rules\. To do so, tag these rules and use IAM policies that refer to those tags\. For more information about tagging EventBridge resources, see [Tagging Your Amazon EventBridge Resources](eventbridge-tagging.md)\. When you tag EventBridge rules, you can grant an IAM policy to a user to allow access to only the rules with a particular tag\. For example, the following policy statement grants access to only rules with the value of `Prod` for the tag key `Stack`\. ``` { "Statement": [ { "Effect": "Allow", "Action": "events:*", "Resource": "*", "Condition": { "StringEquals": { "events:ResourceTag/Stack": "Prod" } } } ] } ``` For more information about using IAM policy statements, see [Controlling Access Using Policies](https://docs.aws.amazon.com/IAM/latest/UserGuide/access_controlling.html) in the *IAM User Guide*\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/iam-identity-based-access-control-eventbridge.md
89695778f365-0
You can use EventBridge to run Amazon ECS tasks when certain AWS events occur\. In this tutorial, you set up a EventBridge rule that runs an Amazon ECS task whenever a file is uploaded to a certain Amazon S3 bucket using the Amazon S3 PUT operation\. This tutorial assumes that you have already created the task definition in Amazon ECS\. **To run an Amazon ECS task whenever a file is uploaded to an S3 bucket using the PUT operation** 1. Open the Amazon EventBridge console at [https://console\.aws\.amazon\.com/events/](https://console.aws.amazon.com/events/)\. 1. In the navigation pane, choose **Rules**\. 1. Choose **Create rule**\. 1. Enter a name and description for the rule\. 1. For **Define pattern**, do the following: 1. Choose **Event pattern**\. 1. Choose **Pre\-defined pattern by service**\. 1. For **Service provider**, choose **AWS**\. 1. For **Service Name**, choose **Simple Storage Service \(S3\)**\. 1. For **Event type**, choose **Object Level Operations**\. 1. Choose **Specific operation\(s\)**, **Put Object**\.
https://github.com/siagholami/aws-documentation/tree/main/documents/amazon-eventbridge-user-guide/doc_source/eventbridge-tutorial-ecs.md