ZTWHHH commited on
Commit
2d9b2d6
·
verified ·
1 Parent(s): ab7ed64

Add files using upload-large-folder tool

Browse files
This view is limited to 50 files because it contains too many changes.   See raw diff
Files changed (50) hide show
  1. data/lib/python3.10/site-packages/awscli/examples/ec2/associate-instance-event-window.rst +94 -0
  2. data/lib/python3.10/site-packages/awscli/examples/ec2/associate-ipam-resource-discovery.rst +39 -0
  3. data/lib/python3.10/site-packages/awscli/examples/ec2/create-internet-gateway.rst +24 -0
  4. data/lib/python3.10/site-packages/awscli/examples/ec2/create-local-gateway-route-table.rst +24 -0
  5. data/lib/python3.10/site-packages/awscli/examples/ec2/create-local-gateway-route.rst +19 -0
  6. data/lib/python3.10/site-packages/awscli/examples/ec2/create-nat-gateway.rst +53 -0
  7. data/lib/python3.10/site-packages/awscli/examples/ec2/create-spot-datafeed-subscription.rst +24 -0
  8. data/lib/python3.10/site-packages/awscli/examples/ec2/create-transit-gateway-route-table.rst +21 -0
  9. data/lib/python3.10/site-packages/awscli/examples/ec2/create-transit-gateway.rst +32 -0
  10. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-customer-gateway.rst +7 -0
  11. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-instance-event-window.rst +38 -0
  12. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-managed-prefix-list.rst +23 -0
  13. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-network-insights-access-scope.rst +14 -0
  14. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-queued-reserved-instances.rst +17 -0
  15. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-transit-gateway-peering-attachment.rst +28 -0
  16. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-transit-gateway.rst +30 -0
  17. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-verified-access-endpoint.rst +37 -0
  18. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-vpc-endpoint-service-configurations.rst +13 -0
  19. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-vpn-connection-route.rst +7 -0
  20. data/lib/python3.10/site-packages/awscli/examples/ec2/delete-vpn-gateway.rst +7 -0
  21. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-address-transfers.rst +22 -0
  22. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-client-vpn-routes.rst +36 -0
  23. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-coip-pools.rst +22 -0
  24. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-dhcp-options.rst +94 -0
  25. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-export-tasks.rst +30 -0
  26. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-fast-launch-images.rst +29 -0
  27. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-fpga-image-attribute.rst +20 -0
  28. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-id-format.rst +24 -0
  29. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-image-attribute.rst +33 -0
  30. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-instance-attribute.rst +67 -0
  31. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-instance-connect-endpoints.rst +32 -0
  32. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-instance-topology.rst +61 -0
  33. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-ipam-resource-discovery-associations.rst +50 -0
  34. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-ipams.rst +40 -0
  35. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-ipv6-pools.rst +26 -0
  36. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-network-insights-analyses.rst +48 -0
  37. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-network-interface-attribute.rst +76 -0
  38. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-prefix-lists.rst +21 -0
  39. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-security-groups.rst +103 -0
  40. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-snapshot-tier-status.rst +27 -0
  41. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-snapshots.rst +120 -0
  42. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-spot-fleet-instances.rst +21 -0
  43. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-spot-fleet-request-history.rst +49 -0
  44. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-stale-security-groups.rst +59 -0
  45. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-transit-gateway-route-tables.rst +32 -0
  46. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-verified-access-endpoints.rst +45 -0
  47. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-verified-access-instance-logging-configurations.rst +35 -0
  48. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-vpc-endpoint-services.rst +132 -0
  49. data/lib/python3.10/site-packages/awscli/examples/ec2/describe-vpn-gateways.rst +36 -0
  50. data/lib/python3.10/site-packages/awscli/examples/ec2/detach-network-interface.rst +7 -0
data/lib/python3.10/site-packages/awscli/examples/ec2/associate-instance-event-window.rst ADDED
@@ -0,0 +1,94 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To associate one or more instances with an event window**
2
+
3
+ The following ``associate-instance-event-window`` example associates one or more instances with an event window. ::
4
+
5
+ aws ec2 associate-instance-event-window \
6
+ --region us-east-1 \
7
+ --instance-event-window-id iew-0abcdef1234567890 \
8
+ --association-target "InstanceIds=i-1234567890abcdef0,i-0598c7d356eba48d7"
9
+
10
+ Output::
11
+
12
+ {
13
+ "InstanceEventWindow": {
14
+ "InstanceEventWindowId": "iew-0abcdef1234567890",
15
+ "Name": "myEventWindowName",
16
+ "CronExpression": "* 21-23 * * 2,3",
17
+ "AssociationTarget": {
18
+ "InstanceIds": [
19
+ "i-1234567890abcdef0",
20
+ "i-0598c7d356eba48d7"
21
+ ],
22
+ "Tags": [],
23
+ "DedicatedHostIds": []
24
+ },
25
+ "State": "creating"
26
+ }
27
+ }
28
+
29
+ For event window constraints, see `Considerations <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/event-windows.html#event-windows-considerations>`__ in the Scheduled Events section of the *Amazon EC2 User Guide*.
30
+
31
+ **Example 2: To associate instance tags with an event window**
32
+
33
+ The following ``associate-instance-event-window`` example associates instance tags with an event window. Enter an ``instance-event-window-id`` parameter to specify the event window. To associate instance tags, specify the ``association-target`` parameter, and for the parameter value, specify one or more tags. ::
34
+
35
+ aws ec2 associate-instance-event-window \
36
+ --region us-east-1 \
37
+ --instance-event-window-id iew-0abcdef1234567890 \
38
+ --association-target "InstanceTags=[{Key=k2,Value=v2},{Key=k1,Value=v1}]"
39
+
40
+ Output::
41
+
42
+ {
43
+ "InstanceEventWindow": {
44
+ "InstanceEventWindowId": "iew-0abcdef1234567890",
45
+ "Name": "myEventWindowName",
46
+ "CronExpression": "* 21-23 * * 2,3",
47
+ "AssociationTarget": {
48
+ "InstanceIds": [],
49
+ "Tags": [
50
+ {
51
+ "Key": "k2",
52
+ "Value": "v2"
53
+ },
54
+ {
55
+ "Key": "k1",
56
+ "Value": "v1"
57
+ }
58
+ ],
59
+ "DedicatedHostIds": []
60
+ },
61
+ "State": "creating"
62
+ }
63
+ }
64
+
65
+ For event window constraints, see `Considerations <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/event-windows.html#event-windows-considerations>`__ in the Scheduled Events section of the *Amazon EC2 User Guide*.
66
+
67
+ **Example 3: To associate a Dedicated Host with an event window**
68
+
69
+ The following ``associate-instance-event-window`` example associates a Dedicated Host with an event window. Enter an ``instance-event-window-id`` parameter to specify the event window. To associate a Dedicated Host, specify the ``--association-target`` parameter, and for the parameter values, specify one of more Dedicated Host IDs. ::
70
+
71
+ aws ec2 associate-instance-event-window \
72
+ --region us-east-1 \
73
+ --instance-event-window-id iew-0abcdef1234567890 \
74
+ --association-target "DedicatedHostIds=h-029fa35a02b99801d"
75
+
76
+ Output::
77
+
78
+ {
79
+ "InstanceEventWindow": {
80
+ "InstanceEventWindowId": "iew-0abcdef1234567890",
81
+ "Name": "myEventWindowName",
82
+ "CronExpression": "* 21-23 * * 2,3",
83
+ "AssociationTarget": {
84
+ "InstanceIds": [],
85
+ "Tags": [],
86
+ "DedicatedHostIds": [
87
+ "h-029fa35a02b99801d"
88
+ ]
89
+ },
90
+ "State": "creating"
91
+ }
92
+ }
93
+
94
+ For event window constraints, see `Considerations <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/event-windows.html#event-windows-considerations>`__ in the Scheduled Events section of the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/associate-ipam-resource-discovery.rst ADDED
@@ -0,0 +1,39 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To associate a resource discovery with an IPAM**
2
+
3
+ In this example, you are an IPAM delegated admin and a resource discovery has been created and shared with you by another AWS account so that you can use IPAM to manage and monitor resource CIDRs owned by the other account.
4
+
5
+ Note
6
+
7
+ * To complete this request, you'll need the resource discovery ID which you can get with `describe-ipam-resource-discoveries <https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/describe-ipam-resource-discoveries.html>`__ and the IPAM ID which you can get with `describe-ipams <https://awscli.amazonaws.com/v2/documentation/api/latest/reference/ec2/describe-ipams.html>`__.
8
+ * The resource discovery that you are associating must have first been shared with your account using AWS RAM.
9
+ * The ``--region`` you enter must match the home Region of the IPAM you are associating it with.
10
+
11
+ The following ``associate-ipam-resource-discovery`` example associates a resource discovery with an IPAM. ::
12
+
13
+ aws ec2 associate-ipam-resource-discovery \
14
+ --ipam-id ipam-005f921c17ebd5107 \
15
+ --ipam-resource-discovery-id ipam-res-disco-03e0406de76a044ee \
16
+ --tag-specifications 'ResourceType=ipam-resource-discovery,Tags=[{Key=cost-center,Value=cc123}]' \
17
+ --region us-east-1
18
+
19
+ Output::
20
+
21
+ {
22
+ {
23
+ "IpamResourceDiscoveryAssociation": {
24
+ "OwnerId": "320805250157",
25
+ "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-04382a6346357cf82",
26
+ "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::320805250157:ipam-resource-discovery-association/ipam-res-disco-assoc-04382a6346357cf82",
27
+ "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe",
28
+ "IpamId": "ipam-005f921c17ebd5107",
29
+ "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107",
30
+ "IpamRegion": "us-east-1",
31
+ "IsDefault": false,
32
+ "ResourceDiscoveryStatus": "active",
33
+ "State": "associate-in-progress",
34
+ "Tags": []
35
+ }
36
+ }
37
+ }
38
+
39
+ Once you associate a resource discovery, you can monitor and/or manage the IP addresses of resources created by the other accounts. For more information, see `Integrate IPAM with accounts outside of your organization <https://docs.aws.amazon.com/vpc/latest/ipam/enable-integ-ipam-outside-org.html>`__ in the *Amazon VPC IPAM User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/create-internet-gateway.rst ADDED
@@ -0,0 +1,24 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To create an internet gateway**
2
+
3
+ The following ``create-internet-gateway`` example creates an internet gateway with the tag ``Name=my-igw``. ::
4
+
5
+ aws ec2 create-internet-gateway \
6
+ --tag-specifications ResourceType=internet-gateway,Tags=[{Key=Name,Value=my-igw}]
7
+
8
+ Output::
9
+
10
+ {
11
+ "InternetGateway": {
12
+ "Attachments": [],
13
+ "InternetGatewayId": "igw-0d0fb496b3994d755",
14
+ "OwnerId": "123456789012",
15
+ "Tags": [
16
+ {
17
+ "Key": "Name",
18
+ "Value": "my-igw"
19
+ }
20
+ ]
21
+ }
22
+ }
23
+
24
+ For more information, see `Internet gateways <https://docs.aws.amazon.com/vpc/latest/userguide/VPC_Internet_Gateway.html>`__ in the *Amazon VPC User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/create-local-gateway-route-table.rst ADDED
@@ -0,0 +1,24 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To create a local gateway route table**
2
+
3
+ The following ``create-local-gateway-route-table`` example creates a local gateway route table with the direct VPC routing mode. ::
4
+
5
+ aws ec2 create-local-gateway-route-table \
6
+ --local-gateway-id lgw-1a2b3c4d5e6f7g8h9 \
7
+ --mode direct-vpc-routing
8
+
9
+ Output::
10
+
11
+ {
12
+ "LocalGatewayRouteTable": {
13
+ "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890",
14
+ "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:111122223333:local-gateway-route-table/lgw-rtb-abcdefg1234567890",
15
+ "LocalGatewayId": "lgw-1a2b3c4d5e6f7g8h9",
16
+ "OutpostArn": "arn:aws:outposts:us-west-2:111122223333:outpost/op-021345abcdef67890",
17
+ "OwnerId": "111122223333",
18
+ "State": "pending",
19
+ "Tags": [],
20
+ "Mode": "direct-vpc-routing"
21
+ }
22
+ }
23
+
24
+ For more information, see `Local gateway route tables <https://docs.aws.amazon.com/outposts/latest/userguide/routing.html>`__ in the *AWS Outposts User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/create-local-gateway-route.rst ADDED
@@ -0,0 +1,19 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To create a static route for a local gateway route table**
2
+
3
+ The following ``create-local-gateway-route`` example creates the specified route in the specified local gateway route table. ::
4
+
5
+ aws ec2 create-local-gateway-route \
6
+ --destination-cidr-block 0.0.0.0/0 \
7
+ --local-gateway-route-table-id lgw-rtb-059615ef7dEXAMPLE
8
+
9
+ Output::
10
+
11
+ {
12
+ "Route": {
13
+ "DestinationCidrBlock": "0.0.0.0/0",
14
+ "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-07145b276bEXAMPLE",
15
+ "Type": "static",
16
+ "State": "deleted",
17
+ "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE"
18
+ }
19
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/create-nat-gateway.rst ADDED
@@ -0,0 +1,53 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To create a public NAT gateway**
2
+
3
+ The following ``create-nat-gateway`` example creates a public NAT gateway in the specified subnet and associates the Elastic IP address with the specified allocation ID. When you create a public NAT gateway, you must associate an Elastic IP address. ::
4
+
5
+ aws ec2 create-nat-gateway \
6
+ --subnet-id subnet-0250c25a1fEXAMPLE \
7
+ --allocation-id eipalloc-09ad461b0dEXAMPLE
8
+
9
+ Output::
10
+
11
+ {
12
+ "NatGateway": {
13
+ "CreateTime": "2021-12-01T22:22:38.000Z",
14
+ "NatGatewayAddresses": [
15
+ {
16
+ "AllocationId": "eipalloc-09ad461b0dEXAMPLE"
17
+ }
18
+ ],
19
+ "NatGatewayId": "nat-0c61bf8a12EXAMPLE",
20
+ "State": "pending",
21
+ "SubnetId": "subnet-0250c25a1fEXAMPLE",
22
+ "VpcId": "vpc-0a60eb65b4EXAMPLE",
23
+ "ConnectivityType": "public"
24
+ }
25
+ }
26
+
27
+ For more information, see `NAT gateways <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html>`__ in the *Amazon VPC User Guide*.
28
+
29
+ **Example 2: To create a private NAT gateway**
30
+
31
+ The following ``create-nat-gateway`` example creates a private NAT gateway in the specified subnet. A private NAT gateway does not have an associated Elastic IP address. ::
32
+
33
+ aws ec2 create-nat-gateway \
34
+ --subnet-id subnet-0250c25a1fEXAMPLE \
35
+ --connectivity-type private
36
+
37
+ Output::
38
+
39
+ {
40
+ "NatGateway": {
41
+ "CreateTime": "2021-12-01T22:26:00.000Z",
42
+ "NatGatewayAddresses": [
43
+ {}
44
+ ],
45
+ "NatGatewayId": "nat-011b568379EXAMPLE",
46
+ "State": "pending",
47
+ "SubnetId": "subnet-0250c25a1fEXAMPLE",
48
+ "VpcId": "vpc-0a60eb65b4EXAMPLE",
49
+ "ConnectivityType": "private"
50
+ }
51
+ }
52
+
53
+ For more information, see `NAT gateways <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-nat-gateway.html>`__ in the *Amazon VPC User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/create-spot-datafeed-subscription.rst ADDED
@@ -0,0 +1,24 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To create a Spot Instance data feed**
2
+
3
+ The following ``create-spot-datafeed-subscription`` example creates a Spot Instance data feed. ::
4
+
5
+ aws ec2 create-spot-datafeed-subscription \
6
+ --bucket amzn-s3-demo-bucket \
7
+ --prefix spot-data-feed
8
+
9
+ Output::
10
+
11
+ {
12
+ "SpotDatafeedSubscription": {
13
+ "Bucket": "amzn-s3-demo-bucket",
14
+ "OwnerId": "123456789012",
15
+ "Prefix": "spot-data-feed",
16
+ "State": "Active"
17
+ }
18
+ }
19
+
20
+ The data feed is stored in the Amazon S3 bucket that you specified. The file names for this data feed have the following format. ::
21
+
22
+ amzn-s3-demo-bucket.s3.amazonaws.com/spot-data-feed/123456789012.YYYY-MM-DD-HH.n.abcd1234.gz
23
+
24
+ For more information, see `Spot Instance data feed <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/spot-data-feeds.html>`__ in the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/create-transit-gateway-route-table.rst ADDED
@@ -0,0 +1,21 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To create a Transit Gateway Route Table**
2
+
3
+ The following ``create-transit-gateway-route-table`` example creates a route table for the specified transit gateway. ::
4
+
5
+ aws ec2 create-transit-gateway-route-table \
6
+ --transit-gateway-id tgw-0262a0e521EXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "TransitGatewayRouteTable": {
12
+ "TransitGatewayRouteTableId": "tgw-rtb-0960981be7EXAMPLE",
13
+ "TransitGatewayId": "tgw-0262a0e521EXAMPLE",
14
+ "State": "pending",
15
+ "DefaultAssociationRouteTable": false,
16
+ "DefaultPropagationRouteTable": false,
17
+ "CreationTime": "2019-07-10T19:01:46.000Z"
18
+ }
19
+ }
20
+
21
+ For more information, see `Create a transit gateway route table <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-route-tables.html#create-tgw-route-table>`__ in the *Transit Gateways Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/create-transit-gateway.rst ADDED
@@ -0,0 +1,32 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To create a transit gateway**
2
+
3
+ The following ``create-transit-gateway`` example creates a transit gateway. ::
4
+
5
+ aws ec2 create-transit-gateway \
6
+ --description MyTGW \
7
+ --options AmazonSideAsn=64516,AutoAcceptSharedAttachments=enable,DefaultRouteTableAssociation=enable,DefaultRouteTablePropagation=enable,VpnEcmpSupport=enable,DnsSupport=enable
8
+
9
+ Output::
10
+
11
+ {
12
+ "TransitGateway": {
13
+ "TransitGatewayId": "tgw-0262a0e521EXAMPLE",
14
+ "TransitGatewayArn": "arn:aws:ec2:us-east-2:111122223333:transit-gateway/tgw-0262a0e521EXAMPLE",
15
+ "State": "pending",
16
+ "OwnerId": "111122223333",
17
+ "Description": "MyTGW",
18
+ "CreationTime": "2019-07-10T14:02:12.000Z",
19
+ "Options": {
20
+ "AmazonSideAsn": 64516,
21
+ "AutoAcceptSharedAttachments": "enable",
22
+ "DefaultRouteTableAssociation": "enable",
23
+ "AssociationDefaultRouteTableId": "tgw-rtb-018774adf3EXAMPLE",
24
+ "DefaultRouteTablePropagation": "enable",
25
+ "PropagationDefaultRouteTableId": "tgw-rtb-018774adf3EXAMPLE",
26
+ "VpnEcmpSupport": "enable",
27
+ "DnsSupport": "enable"
28
+ }
29
+ }
30
+ }
31
+
32
+ For more information, see `Create a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#create-tgw>`__ in the *Transit Gateways Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-customer-gateway.rst ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ **To delete a customer gateway**
2
+
3
+ This example deletes the specified customer gateway. If the command succeeds, no output is returned.
4
+
5
+ Command::
6
+
7
+ aws ec2 delete-customer-gateway --customer-gateway-id cgw-0e11f167
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-instance-event-window.rst ADDED
@@ -0,0 +1,38 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To delete an event window**
2
+
3
+ The following ``delete-instance-event-window`` example deletes an event window. ::
4
+
5
+ aws ec2 delete-instance-event-window \
6
+ --region us-east-1 \
7
+ --instance-event-window-id iew-0abcdef1234567890
8
+
9
+ Output::
10
+
11
+ {
12
+ "InstanceEventWindowState": {
13
+ "InstanceEventWindowId": "iew-0abcdef1234567890",
14
+ "State": "deleting"
15
+ }
16
+ }
17
+
18
+ For event window constraints, see `Considerations <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/event-windows.html#event-windows-considerations>`__ in the Scheduled Events section of the *Amazon EC2 User Guide*.
19
+
20
+ **Example 2: To force delete an event window**
21
+
22
+ The following ``delete-instance-event-window`` example force deletes an event window if the event window is currently associated with targets. ::
23
+
24
+ aws ec2 delete-instance-event-window \
25
+ --region us-east-1 \
26
+ --instance-event-window-id iew-0abcdef1234567890 \
27
+ --force-delete
28
+
29
+ Output::
30
+
31
+ {
32
+ "InstanceEventWindowState": {
33
+ "InstanceEventWindowId": "iew-0abcdef1234567890",
34
+ "State": "deleting"
35
+ }
36
+ }
37
+
38
+ For event window constraints, see `Considerations <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/event-windows.html#event-windows-considerations>`__ in the Scheduled Events section of the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-managed-prefix-list.rst ADDED
@@ -0,0 +1,23 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete a prefix list**
2
+
3
+ The following ``delete-managed-prefix-list`` example deletes the specified prefix list. ::
4
+
5
+ aws ec2 delete-managed-prefix-list \
6
+ --prefix-list-id pl-0123456abcabcabc1
7
+
8
+ Output::
9
+
10
+ {
11
+ "PrefixList": {
12
+ "PrefixListId": "pl-0123456abcabcabc1",
13
+ "AddressFamily": "IPv4",
14
+ "State": "delete-in-progress",
15
+ "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-0123456abcabcabc1",
16
+ "PrefixListName": "test",
17
+ "MaxEntries": 10,
18
+ "Version": 1,
19
+ "OwnerId": "123456789012"
20
+ }
21
+ }
22
+
23
+ For more information, see `Managed prefix lists <https://docs.aws.amazon.com/vpc/latest/userguide/managed-prefix-lists.html>`__ in the *Amazon VPC User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-network-insights-access-scope.rst ADDED
@@ -0,0 +1,14 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete a Network Access Scope**
2
+
3
+ The following ``delete-network-insights-access-scope`` example deletes the specified Network Access Scope. ::
4
+
5
+ aws ec2 delete-network-insights-access-scope \
6
+ --network-insights-access-scope-id nis-123456789abc01234
7
+
8
+ Output::
9
+
10
+ {
11
+ "NetworkInsightsAccessScopeId": "nis-123456789abc01234"
12
+ }
13
+
14
+ For more information, see `Getting started with Network Access Analyzer using the AWS CLI <https://docs.aws.amazon.com/vpc/latest/network-access-analyzer/getting-started-cli.html>`__ in the *Network Access Analyzer Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-queued-reserved-instances.rst ADDED
@@ -0,0 +1,17 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete a queued purchase**
2
+
3
+ The following ``delete-queued-reserved-instances`` example deletes the specified Reserved Instance, which was queued for purchase. ::
4
+
5
+ aws ec2 delete-queued-reserved-instances \
6
+ --reserved-instances-ids af9f760e-6f91-4559-85f7-4980eexample
7
+
8
+ Output::
9
+
10
+ {
11
+ "SuccessfulQueuedPurchaseDeletions": [
12
+ {
13
+ "ReservedInstancesId": "af9f760e-6f91-4559-85f7-4980eexample"
14
+ }
15
+ ],
16
+ "FailedQueuedPurchaseDeletions": []
17
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-transit-gateway-peering-attachment.rst ADDED
@@ -0,0 +1,28 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete a transit gateway peering attachment**
2
+
3
+ The following ``delete-transit-gateway-peering-attachment`` example deletes the specified transit gateway peering attachment. ::
4
+
5
+ aws ec2 delete-transit-gateway-peering-attachment \
6
+ --transit-gateway-attachment-id tgw-attach-4455667788aabbccd
7
+
8
+ Output::
9
+
10
+ {
11
+ "TransitGatewayPeeringAttachment": {
12
+ "TransitGatewayAttachmentId": "tgw-attach-4455667788aabbccd",
13
+ "RequesterTgwInfo": {
14
+ "TransitGatewayId": "tgw-123abc05e04123abc",
15
+ "OwnerId": "123456789012",
16
+ "Region": "us-west-2"
17
+ },
18
+ "AccepterTgwInfo": {
19
+ "TransitGatewayId": "tgw-11223344aabbcc112",
20
+ "OwnerId": "123456789012",
21
+ "Region": "us-east-2"
22
+ },
23
+ "State": "deleting",
24
+ "CreationTime": "2019-12-09T11:38:31.000Z"
25
+ }
26
+ }
27
+
28
+ For more information, see `Transit Gateway Peering Attachments <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-peering.html>`__ in the *Transit Gateways Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-transit-gateway.rst ADDED
@@ -0,0 +1,30 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete a transit gateway**
2
+
3
+ The following ``delete-transit-gateway`` example deletes the specified transit gateway. ::
4
+
5
+ aws ec2 delete-transit-gateway \
6
+ --transit-gateway-id tgw-01f04542b2EXAMPLE
7
+
8
+ Output::
9
+
10
+ {
11
+ "TransitGateway": {
12
+ "TransitGatewayId": "tgw-01f04542b2EXAMPLE",
13
+ "State": "deleting",
14
+ "OwnerId": "123456789012",
15
+ "Description": "Example Transit Gateway",
16
+ "CreationTime": "2019-08-27T15:04:35.000Z",
17
+ "Options": {
18
+ "AmazonSideAsn": 64515,
19
+ "AutoAcceptSharedAttachments": "disable",
20
+ "DefaultRouteTableAssociation": "enable",
21
+ "AssociationDefaultRouteTableId": "tgw-rtb-0ce7a6948fEXAMPLE",
22
+ "DefaultRouteTablePropagation": "enable",
23
+ "PropagationDefaultRouteTableId": "tgw-rtb-0ce7a6948fEXAMPLE",
24
+ "VpnEcmpSupport": "enable",
25
+ "DnsSupport": "enable"
26
+ }
27
+ }
28
+ }
29
+
30
+ For more information, see `Delete a transit gateway <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-transit-gateways.html#delete-tgw>`__ in the *Transit Gateways Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-verified-access-endpoint.rst ADDED
@@ -0,0 +1,37 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete a Verified Access endpoint**
2
+
3
+ The following ``delete-verified-access-endpoint`` example deletes the specified Verified Access endpoint. ::
4
+
5
+ aws ec2 delete-verified-access-endpoint \
6
+ --verified-access-endpoint-id vae-066fac616d4d546f2
7
+
8
+ Output::
9
+
10
+ {
11
+ "VerifiedAccessEndpoint": {
12
+ "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea",
13
+ "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235",
14
+ "VerifiedAccessEndpointId": "vae-066fac616d4d546f2",
15
+ "ApplicationDomain": "example.com",
16
+ "EndpointType": "network-interface",
17
+ "AttachmentType": "vpc",
18
+ "DomainCertificateArn": "arn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE",
19
+ "EndpointDomain": "my-ava-app.edge-00c3372d53b1540bb.vai-0ce000c0b7643abea.prod.verified-access.us-east-2.amazonaws.com",
20
+ "SecurityGroupIds": [
21
+ "sg-004915970c4c8f13a"
22
+ ],
23
+ "NetworkInterfaceOptions": {
24
+ "NetworkInterfaceId": "eni-0aec70418c8d87a0f",
25
+ "Protocol": "https",
26
+ "Port": 443
27
+ },
28
+ "Status": {
29
+ "Code": "deleting"
30
+ },
31
+ "Description": "Testing Verified Access",
32
+ "CreationTime": "2023-08-25T20:54:43",
33
+ "LastUpdatedTime": "2023-08-25T22:46:32"
34
+ }
35
+ }
36
+
37
+ For more information, see `Verified Access endpoints <https://docs.aws.amazon.com/verified-access/latest/ug/verified-access-endpoints.html>`__ in the *AWS Verified Access User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-vpc-endpoint-service-configurations.rst ADDED
@@ -0,0 +1,13 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To delete an endpoint service configuration**
2
+
3
+ This example deletes the specified endpoint service configuration.
4
+
5
+ Command::
6
+
7
+ aws ec2 delete-vpc-endpoint-service-configurations --service-ids vpce-svc-03d5ebb7d9579a2b3
8
+
9
+ Output::
10
+
11
+ {
12
+ "Unsuccessful": []
13
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-vpn-connection-route.rst ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ **To delete a static route from a VPN connection**
2
+
3
+ This example deletes the specified static route from the specified VPN connection. If the command succeeds, no output is returned.
4
+
5
+ Command::
6
+
7
+ aws ec2 delete-vpn-connection-route --vpn-connection-id vpn-40f41529 --destination-cidr-block 11.12.0.0/16
data/lib/python3.10/site-packages/awscli/examples/ec2/delete-vpn-gateway.rst ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ **To delete a virtual private gateway**
2
+
3
+ This example deletes the specified virtual private gateway. If the command succeeds, no output is returned.
4
+
5
+ Command::
6
+
7
+ aws ec2 delete-vpn-gateway --vpn-gateway-id vgw-9a4cacf3
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-address-transfers.rst ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe an Elastic IP address transfer**
2
+
3
+ The following ``describe-address-transfers`` example describes the Elastic IP address transfer for the specified Elastic IP address. ::
4
+
5
+ aws ec2 describe-address-transfers \
6
+ --allocation-ids eipalloc-09ad461b0d03f6aaf
7
+
8
+ Output::
9
+
10
+ {
11
+ "AddressTransfers": [
12
+ {
13
+ "PublicIp": "100.21.184.216",
14
+ "AllocationId": "eipalloc-09ad461b0d03f6aaf",
15
+ "TransferAccountId": "123456789012",
16
+ "TransferOfferExpirationTimestamp": "2023-02-22T22:51:01.000Z",
17
+ "AddressTransferStatus": "pending"
18
+ }
19
+ ]
20
+ }
21
+
22
+ For more information, see `Transfer Elastic IP addresses <https://docs.aws.amazon.com/vpc/latest/userguide/vpc-eips.html#transfer-EIPs-intro>`__ in the *Amazon VPC User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-client-vpn-routes.rst ADDED
@@ -0,0 +1,36 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the routes for a Client VPN endpoint**
2
+
3
+ The following ``describe-client-vpn-routes`` example displays details about the routes for the specified Client VPN endpoint. ::
4
+
5
+ aws ec2 describe-client-vpn-routes \
6
+ --client-vpn-endpoint-id cvpn-endpoint-123456789123abcde
7
+
8
+ Output::
9
+
10
+ {
11
+ "Routes": [
12
+ {
13
+ "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde",
14
+ "DestinationCidr": "10.0.0.0/16",
15
+ "TargetSubnet": "subnet-0123456789abcabca",
16
+ "Type": "Nat",
17
+ "Origin": "associate",
18
+ "Status": {
19
+ "Code": "active"
20
+ },
21
+ "Description": "Default Route"
22
+ },
23
+ {
24
+ "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde",
25
+ "DestinationCidr": "0.0.0.0/0",
26
+ "TargetSubnet": "subnet-0123456789abcabca",
27
+ "Type": "Nat",
28
+ "Origin": "add-route",
29
+ "Status": {
30
+ "Code": "active"
31
+ }
32
+ }
33
+ ]
34
+ }
35
+
36
+ For more information, see `Routes <https://docs.aws.amazon.com/vpn/latest/clientvpn-admin/cvpn-working-routes.html>`__ in the *AWS Client VPN Administrator Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-coip-pools.rst ADDED
@@ -0,0 +1,22 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe customer-owned IP address pools**
2
+
3
+ The following ``describe-coip-pools`` example describes the customer-owned IP address pools in your AWS account. ::
4
+
5
+ aws ec2 describe-coip-pools
6
+
7
+ Output::
8
+
9
+ {
10
+ "CoipPools": [
11
+ {
12
+ "PoolId": "ipv4pool-coip-123a45678bEXAMPLE",
13
+ "PoolCidrs": [
14
+ "0.0.0.0/0"
15
+ ],
16
+ "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE",
17
+ "PoolArn": "arn:aws:ec2:us-west-2:123456789012:coip-pool/ipv4pool-coip-123a45678bEXAMPLE"
18
+ }
19
+ ]
20
+ }
21
+
22
+ For more information, see `Customer-owned IP addresses <https://docs.aws.amazon.com/outposts/latest/userguide/outposts-networking-components.html#ip-addressing>`__ in the *AWS Outposts User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-dhcp-options.rst ADDED
@@ -0,0 +1,94 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To describe your DHCP options**
2
+
3
+ The following ``describe-dhcp-options`` example retrieves details about your DHCP options. ::
4
+
5
+ aws ec2 describe-dhcp-options
6
+
7
+ Output::
8
+
9
+ {
10
+ "DhcpOptions": [
11
+ {
12
+ "DhcpConfigurations": [
13
+ {
14
+ "Key": "domain-name",
15
+ "Values": [
16
+ {
17
+ "Value": "us-east-2.compute.internal"
18
+ }
19
+ ]
20
+ },
21
+ {
22
+ "Key": "domain-name-servers",
23
+ "Values": [
24
+ {
25
+ "Value": "AmazonProvidedDNS"
26
+ }
27
+ ]
28
+ }
29
+ ],
30
+ "DhcpOptionsId": "dopt-19edf471",
31
+ "OwnerId": "111122223333"
32
+ },
33
+ {
34
+ "DhcpConfigurations": [
35
+ {
36
+ "Key": "domain-name",
37
+ "Values": [
38
+ {
39
+ "Value": "us-east-2.compute.internal"
40
+ }
41
+ ]
42
+ },
43
+ {
44
+ "Key": "domain-name-servers",
45
+ "Values": [
46
+ {
47
+ "Value": "AmazonProvidedDNS"
48
+ }
49
+ ]
50
+ }
51
+ ],
52
+ "DhcpOptionsId": "dopt-fEXAMPLE",
53
+ "OwnerId": "111122223333"
54
+ }
55
+ ]
56
+ }
57
+
58
+ For more information, see `Working with DHCP Option Sets <https://docs.aws.amazon.com/vpc/latest/userguide/VPC_DHCP_Options.html#DHCPOptionSet>`__ in the *AWS VPC User Guide*.
59
+
60
+ **Example 2: To describe your DHCP options and filter the output**
61
+
62
+ The following ``describe-dhcp-options`` example describes your DHCP options and uses a filter to return only DHCP options that have ``example.com`` for the domain name server. The example uses the ``--query`` parameter to display only the configuration information and ID in the output. ::
63
+
64
+ aws ec2 describe-dhcp-options \
65
+ --filters Name=key,Values=domain-name-servers Name=value,Values=example.com \
66
+ --query "DhcpOptions[*].[DhcpConfigurations,DhcpOptionsId]"
67
+
68
+ Output::
69
+
70
+ [
71
+ [
72
+ [
73
+ {
74
+ "Key": "domain-name",
75
+ "Values": [
76
+ {
77
+ "Value": "example.com"
78
+ }
79
+ ]
80
+ },
81
+ {
82
+ "Key": "domain-name-servers",
83
+ "Values": [
84
+ {
85
+ "Value": "172.16.16.16"
86
+ }
87
+ ]
88
+ }
89
+ ],
90
+ "dopt-001122334455667ab"
91
+ ]
92
+ ]
93
+
94
+ For more information, see `Working with DHCP Option Sets <https://docs.aws.amazon.com/vpc/latest/userguide/VPC_DHCP_Options.html#DHCPOptionSet>`__ in the *AWS VPC User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-export-tasks.rst ADDED
@@ -0,0 +1,30 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To list details about an instance export task**
2
+
3
+ This example describes the export task with ID export-i-fh8sjjsq.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-export-tasks --export-task-ids export-i-fh8sjjsq
8
+
9
+ Output::
10
+
11
+ {
12
+ "ExportTasks": [
13
+ {
14
+ "State": "active",
15
+ "InstanceExportDetails": {
16
+ "InstanceId": "i-1234567890abcdef0",
17
+ "TargetEnvironment": "vmware"
18
+ },
19
+ "ExportToS3Task": {
20
+ "S3Bucket": "myexportbucket",
21
+ "S3Key": "RHEL5export-i-fh8sjjsq.ova",
22
+ "DiskImageFormat": "vmdk",
23
+ "ContainerFormat": "ova"
24
+ },
25
+ "Description": "RHEL5 instance",
26
+ "ExportTaskId": "export-i-fh8sjjsq"
27
+ }
28
+ ]
29
+ }
30
+
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-fast-launch-images.rst ADDED
@@ -0,0 +1,29 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the details for Windows AMIs that are configured for faster launching**
2
+
3
+ The following ``describe-fast-launch-images`` example describes the details for each of the AMIs in your account that are configured for faster launching, including the resource type, the snapshot configuration, the launch template details, the maximum number of parallel launches, the AMI owner ID, the state of the fast launch configuration, the reason the state was changed, and the time that the state change occurred. ::
4
+
5
+ aws ec2 describe-fast-launch-images
6
+
7
+ Output::
8
+
9
+ {
10
+ "FastLaunchImages": [
11
+ {
12
+ "ImageId": "ami-01234567890abcedf",
13
+ "ResourceType": "snapshot",
14
+ "SnapshotConfiguration": {},
15
+ "LaunchTemplate": {
16
+ "LaunchTemplateId": "lt-01234567890abcedf",
17
+ "LaunchTemplateName": "EC2FastLaunchDefaultResourceCreation-a8c6215d-94e6-441b-9272-dbd1f87b07e2",
18
+ "Version": "1"
19
+ },
20
+ "MaxParallelLaunches": 6,
21
+ "OwnerId": "0123456789123",
22
+ "State": "enabled",
23
+ "StateTransitionReason": "Client.UserInitiated",
24
+ "StateTransitionTime": "2022-01-27T22:20:06.552000+00:00"
25
+ }
26
+ ]
27
+ }
28
+
29
+ For more information about configuring a Windows AMI for faster launching, see `Configure your AMI for faster launching <https://docs.aws.amazon.com/AWSEC2/latest/WindowsGuide/windows-ami-version-history.html#win-ami-config-fast-launch>`__ in the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-fpga-image-attribute.rst ADDED
@@ -0,0 +1,20 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the attributes of an Amazon FPGA image**
2
+
3
+ This example describes the load permissions for the specified AFI.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-fpga-image-attribute --fpga-image-id afi-0d123e123bfc85abc --attribute loadPermission
8
+
9
+ Output::
10
+
11
+ {
12
+ "FpgaImageAttribute": {
13
+ "FpgaImageId": "afi-0d123e123bfc85abc",
14
+ "LoadPermissions": [
15
+ {
16
+ "UserId": "123456789012"
17
+ }
18
+ ]
19
+ }
20
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-id-format.rst ADDED
@@ -0,0 +1,24 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To describe the ID format of a resource**
2
+
3
+ The following ``describe-id-format`` example describes the ID format for security groups. ::
4
+
5
+ aws ec2 describe-id-format \
6
+ --resource security-group
7
+
8
+ In the following example output, the ``Deadline`` value indicates that the deadline for this resource type to permanently switch from the short ID format to the long ID format expired at 00:00 UTC on August 15, 2018. ::
9
+
10
+ {
11
+ "Statuses": [
12
+ {
13
+ "Deadline": "2018-08-15T00:00:00.000Z",
14
+ "Resource": "security-group",
15
+ "UseLongIds": true
16
+ }
17
+ ]
18
+ }
19
+
20
+ **Example 2: To describe the ID format for all resources**
21
+
22
+ The following ``describe-id-format`` example describes the ID format for all resource types. All resource types that supported the short ID format were switched to use the long ID format. ::
23
+
24
+ aws ec2 describe-id-format
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-image-attribute.rst ADDED
@@ -0,0 +1,33 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the launch permissions for an AMI**
2
+
3
+ This example describes the launch permissions for the specified AMI.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-image-attribute --image-id ami-5731123e --attribute launchPermission
8
+
9
+ Output::
10
+
11
+ {
12
+ "LaunchPermissions": [
13
+ {
14
+ "UserId": "123456789012"
15
+ }
16
+ ],
17
+ "ImageId": "ami-5731123e",
18
+ }
19
+
20
+ **To describe the product codes for an AMI**
21
+
22
+ This example describes the product codes for the specified AMI. Note that this AMI has no product codes.
23
+
24
+ Command::
25
+
26
+ aws ec2 describe-image-attribute --image-id ami-5731123e --attribute productCodes
27
+
28
+ Output::
29
+
30
+ {
31
+ "ProductCodes": [],
32
+ "ImageId": "ami-5731123e",
33
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-instance-attribute.rst ADDED
@@ -0,0 +1,67 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the instance type**
2
+
3
+ This example describes the instance type of the specified instance.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-instance-attribute --instance-id i-1234567890abcdef0 --attribute instanceType
8
+
9
+ Output::
10
+
11
+ {
12
+ "InstanceId": "i-1234567890abcdef0"
13
+ "InstanceType": {
14
+ "Value": "t1.micro"
15
+ }
16
+ }
17
+
18
+ **To describe the disableApiTermination attribute**
19
+
20
+ This example describes the ``disableApiTermination`` attribute of the specified instance.
21
+
22
+ Command::
23
+
24
+ aws ec2 describe-instance-attribute --instance-id i-1234567890abcdef0 --attribute disableApiTermination
25
+
26
+ Output::
27
+
28
+ {
29
+ "InstanceId": "i-1234567890abcdef0"
30
+ "DisableApiTermination": {
31
+ "Value": "false"
32
+ }
33
+ }
34
+
35
+ **To describe the block device mapping for an instance**
36
+
37
+ This example describes the ``blockDeviceMapping`` attribute of the specified instance.
38
+
39
+ Command::
40
+
41
+ aws ec2 describe-instance-attribute --instance-id i-1234567890abcdef0 --attribute blockDeviceMapping
42
+
43
+ Output::
44
+
45
+ {
46
+ "InstanceId": "i-1234567890abcdef0"
47
+ "BlockDeviceMappings": [
48
+ {
49
+ "DeviceName": "/dev/sda1",
50
+ "Ebs": {
51
+ "Status": "attached",
52
+ "DeleteOnTermination": true,
53
+ "VolumeId": "vol-049df61146c4d7901",
54
+ "AttachTime": "2013-05-17T22:42:34.000Z"
55
+ }
56
+ },
57
+ {
58
+ "DeviceName": "/dev/sdf",
59
+ "Ebs": {
60
+ "Status": "attached",
61
+ "DeleteOnTermination": false,
62
+ "VolumeId": "vol-049df61146c4d7901",
63
+ "AttachTime": "2013-09-10T23:07:00.000Z"
64
+ }
65
+ }
66
+ ],
67
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-instance-connect-endpoints.rst ADDED
@@ -0,0 +1,32 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe an EC2 Instance Connect Endpoint**
2
+
3
+ The following ``describe-instance-connect-endpoints`` example describes the specified EC2 Instance Connect Endpoint. ::
4
+
5
+ aws ec2 describe-instance-connect-endpoints \
6
+ --region us-east-1 \
7
+ --instance-connect-endpoint-ids eice-0123456789example
8
+
9
+ Output::
10
+
11
+ {
12
+ "InstanceConnectEndpoints": [
13
+ {
14
+ "OwnerId": "111111111111",
15
+ "InstanceConnectEndpointId": "eice-0123456789example",
16
+ "InstanceConnectEndpointArn": "arn:aws:ec2:us-east-1:111111111111:instance-connect-endpoint/eice-0123456789example",
17
+ "State": "create-complete",
18
+ "StateMessage": "",
19
+ "DnsName": "eice-0123456789example.b67b86ba.ec2-instance-connect-endpoint.us-east-1.amazonaws.com",
20
+ "NetworkInterfaceIds": [
21
+ "eni-0123456789example"
22
+ ],
23
+ "VpcId": "vpc-0123abcd",
24
+ "AvailabilityZone": "us-east-1d",
25
+ "CreatedAt": "2023-02-07T12:05:37+00:00",
26
+ "SubnetId": "subnet-0123abcd",
27
+ "Tags": []
28
+ }
29
+ ]
30
+ }
31
+
32
+ For more information, see `Create an EC2 Instance Connect Endpoint <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/create-ec2-instance-connect-endpoints.html>`__ in the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-instance-topology.rst ADDED
@@ -0,0 +1,61 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the instance topology of all your instances**
2
+
3
+ The following ``describe-instance-topology`` example describes the topology of all your instances that match the supported instance types for this command. ::
4
+
5
+ aws ec2 describe-instance-topology \
6
+ --region us-west-2
7
+
8
+ Output::
9
+
10
+ {
11
+ "Instances": [
12
+ {
13
+ "InstanceId": "i-1111111111example",
14
+ "InstanceType": "p4d.24xlarge",
15
+ "GroupName": "my-ml-cpg",
16
+ "NetworkNodes": [
17
+ "nn-1111111111example",
18
+ "nn-2222222222example",
19
+ "nn-3333333333example"
20
+ ],
21
+ "ZoneId": "usw2-az2",
22
+ "AvailabilityZone": "us-west-2a"
23
+ },
24
+ {
25
+ "InstanceId": "i-2222222222example",
26
+ "InstanceType": "p4d.24xlarge",
27
+ "NetworkNodes": [
28
+ "nn-1111111111example",
29
+ "nn-2222222222example",
30
+ "nn-3333333333example"
31
+ ],
32
+ "ZoneId": "usw2-az2",
33
+ "AvailabilityZone": "us-west-2a"
34
+ },
35
+ {
36
+ "InstanceId": "i-3333333333example",
37
+ "InstanceType": "trn1.32xlarge",
38
+ "NetworkNodes": [
39
+ "nn-1212121212example",
40
+ "nn-1211122211example",
41
+ "nn-1311133311example"
42
+ ],
43
+ "ZoneId": "usw2-az4",
44
+ "AvailabilityZone": "us-west-2d"
45
+ },
46
+ {
47
+ "InstanceId": "i-444444444example",
48
+ "InstanceType": "trn1.2xlarge",
49
+ "NetworkNodes": [
50
+ "nn-1111111111example",
51
+ "nn-5434334334example",
52
+ "nn-1235301234example"
53
+ ],
54
+ "ZoneId": "usw2-az2",
55
+ "AvailabilityZone": "us-west-2a"
56
+ }
57
+ ],
58
+ "NextToken": "SomeEncryptedToken"
59
+ }
60
+
61
+ For more information, including more examples, see `Amazon EC2 instance topology <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ec2-instance-topology.html>`__ in the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-ipam-resource-discovery-associations.rst ADDED
@@ -0,0 +1,50 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To view all resource discovery associations with your IPAM**
2
+
3
+ In this example, you're a IPAM delegated admin who has associated resource discoveries with your IPAM to integrate other accounts with your IPAM. You've noticed that your IPAM is not discovering the resources in the operating Regions of the resource discovery as expected. You want to check the status and state of the resource discovery to ensure that the account that created it is still active and the resource discovery is still being shared.
4
+
5
+ The ``--region`` must be the home Region of your IPAM.
6
+
7
+ The following ``describe-ipam-resource-discovery-associations`` example lists the resource discovery associations in your AWS account. ::
8
+
9
+ aws ec2 describe-ipam-resource-discovery-associations \
10
+ --region us-east-1
11
+
12
+ Output::
13
+
14
+ {
15
+ "IpamResourceDiscoveryAssociations": [
16
+ {
17
+ "OwnerId": "320805250157",
18
+ "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-05e6b45eca5bf5cf7",
19
+ "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::320805250157:ipam-resource-discovery-association/ipam-res-disco-assoc-05e6b45eca5bf5cf7",
20
+ "IpamResourceDiscoveryId": "ipam-res-disco-0f4ef577a9f37a162",
21
+ "IpamId": "ipam-005f921c17ebd5107",
22
+ "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107",
23
+ "IpamRegion": "us-east-1",
24
+ "IsDefault": true,
25
+ "ResourceDiscoveryStatus": "active",
26
+ "State": "associate-complete",
27
+ "Tags": []
28
+ },
29
+ {
30
+ "OwnerId": "149977607591",
31
+ "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-0dfd21ae189ab5f62",
32
+ "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::149977607591:ipam-resource-discovery-association/ipam-res-disco-assoc-0dfd21ae189ab5f62",
33
+ "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe",
34
+ "IpamId": "ipam-005f921c17ebd5107",
35
+ "IpamArn": "arn:aws:ec2::149977607591:ipam/ipam-005f921c17ebd5107",
36
+ "IpamRegion": "us-east-1",
37
+ "IsDefault": false,
38
+ "ResourceDiscoveryStatus": "active",
39
+ "State": "create-complete",
40
+ "Tags": []
41
+ }
42
+ ]
43
+ }
44
+
45
+ In this example, after running this command, you notice that you have one non-default resource discovery (``"IsDefault": false ``) that is ``"ResourceDiscoveryStatus": "not-found"`` and ``"State": "create-complete"``. The resource discovery owner's account has been closed. If, in another case, you notice that is ``"ResourceDiscoveryStatus": "not-found"`` and ``"State": "associate-complete"``, this indicates that one of the following has happened:
46
+
47
+ * The resource discovery was deleted by the resource discovery owner.
48
+ * The resource discovery owner unshared the resource discovery.
49
+
50
+ For more information, see `Integrate IPAM with accounts outside of your organization <https://docs.aws.amazon.com/vpc/latest/ipam/enable-integ-ipam-outside-org.html>`__ in the *Amazon VPC IPAM User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-ipams.rst ADDED
@@ -0,0 +1,40 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To view the details for an IPAM**
2
+
3
+ The following ``describe-ipams`` example shows the details of an IPAM. ::
4
+
5
+ aws ec2 describe-ipams \
6
+ --filters Name=owner-id,Values=123456789012
7
+
8
+ Output::
9
+
10
+ {
11
+ "Ipams": [
12
+ {
13
+ "OwnerId": "123456789012",
14
+ "IpamId": "ipam-08440e7a3acde3908",
15
+ "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908",
16
+ "IpamRegion": "us-east-1",
17
+ "PublicDefaultScopeId": "ipam-scope-0b9eed026396dbc16",
18
+ "PrivateDefaultScopeId": "ipam-scope-02fc38cd4c48e7d38",
19
+ "ScopeCount": 3,
20
+ "OperatingRegions": [
21
+ {
22
+ "RegionName": "us-east-1"
23
+ },
24
+ {
25
+ "RegionName": "us-east-2"
26
+ },
27
+ {
28
+ "RegionName": "us-west-1"
29
+ }
30
+ ],
31
+ "State": "create-complete",
32
+ "Tags": [
33
+ {
34
+ "Key": "Name",
35
+ "Value": "ExampleIPAM"
36
+ }
37
+ ]
38
+ }
39
+ ]
40
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-ipv6-pools.rst ADDED
@@ -0,0 +1,26 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe your IPv6 address pools**
2
+
3
+ The following ``describe-ipv6-pools`` example displays details for all of your IPv6 address pools. ::
4
+
5
+ aws ec2 describe-ipv6-pools
6
+
7
+ Output::
8
+
9
+ {
10
+ "Ipv6Pools": [
11
+ {
12
+ "PoolId": "ipv6pool-ec2-012345abc12345abc",
13
+ "PoolCidrBlocks": [
14
+ {
15
+ "Cidr": "2001:db8:123::/48"
16
+ }
17
+ ],
18
+ "Tags": [
19
+ {
20
+ "Key": "pool-1",
21
+ "Value": "public"
22
+ }
23
+ ]
24
+ }
25
+ ]
26
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-network-insights-analyses.rst ADDED
@@ -0,0 +1,48 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To view the results of a path analysis**
2
+
3
+ The following ``describe-network-insights-analyses`` example describes the specified analysis. In this example, the source is an internet gateway, the destination is an EC2 instance, and the protocol is TCP. The analysis succeeded (``Status`` is ``succeeded``) and the path is not reachable (``NetworkPathFound`` is ``false``). The explanation code ``ENI_SG_RULES_MISMATCH`` indicates that the security group for the instance does not contain a rule that allows traffic on the destination port. ::
4
+
5
+ aws ec2 describe-network-insights-analyses \
6
+ --network-insights-analysis-ids nia-02207aa13eb480c7a
7
+
8
+ Output::
9
+
10
+ {
11
+ "NetworkInsightsAnalyses": [
12
+ {
13
+ "NetworkInsightsAnalysisId": "nia-02207aa13eb480c7a",
14
+ "NetworkInsightsAnalysisArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-analysis/nia-02207aa13eb480c7a",
15
+ "NetworkInsightsPathId": "nip-0b26f224f1d131fa8",
16
+ "StartDate": "2021-01-20T22:58:37.495Z",
17
+ "Status": "succeeded",
18
+ "NetworkPathFound": false,
19
+ "Explanations": [
20
+ {
21
+ "Direction": "ingress",
22
+ "ExplanationCode": "ENI_SG_RULES_MISMATCH",
23
+ "NetworkInterface": {
24
+ "Id": "eni-0a25edef15a6cc08c",
25
+ "Arn": "arn:aws:ec2:us-east-1:123456789012:network-interface/eni-0a25edef15a6cc08c"
26
+ },
27
+ "SecurityGroups": [
28
+ {
29
+ "Id": "sg-02f0d35a850ba727f",
30
+ "Arn": "arn:aws:ec2:us-east-1:123456789012:security-group/sg-02f0d35a850ba727f"
31
+ }
32
+ ],
33
+ "Subnet": {
34
+ "Id": "subnet-004ff41eccb4d1194",
35
+ "Arn": "arn:aws:ec2:us-east-1:123456789012:subnet/subnet-004ff41eccb4d1194"
36
+ },
37
+ "Vpc": {
38
+ "Id": "vpc-f1663d98ad28331c7",
39
+ "Arn": "arn:aws:ec2:us-east-1:123456789012:vpc/vpc-f1663d98ad28331c7"
40
+ }
41
+ }
42
+ ],
43
+ "Tags": []
44
+ }
45
+ ]
46
+ }
47
+
48
+ For more information, see `Getting started using the AWS CLI <https://docs.aws.amazon.com/vpc/latest/reachability/getting-started-cli.html>`__ in the *Reachability Analyzer Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-network-interface-attribute.rst ADDED
@@ -0,0 +1,76 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the attachment attribute of a network interface**
2
+
3
+ This example command describes the ``attachment`` attribute of the specified network interface.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-network-interface-attribute --network-interface-id eni-686ea200 --attribute attachment
8
+
9
+ Output::
10
+
11
+ {
12
+ "NetworkInterfaceId": "eni-686ea200",
13
+ "Attachment": {
14
+ "Status": "attached",
15
+ "DeviceIndex": 0,
16
+ "AttachTime": "2015-05-21T20:02:20.000Z",
17
+ "InstanceId": "i-1234567890abcdef0",
18
+ "DeleteOnTermination": true,
19
+ "AttachmentId": "eni-attach-43348162",
20
+ "InstanceOwnerId": "123456789012"
21
+ }
22
+ }
23
+
24
+ **To describe the description attribute of a network interface**
25
+
26
+ This example command describes the ``description`` attribute of the specified network interface.
27
+
28
+ Command::
29
+
30
+ aws ec2 describe-network-interface-attribute --network-interface-id eni-686ea200 --attribute description
31
+
32
+ Output::
33
+
34
+ {
35
+ "NetworkInterfaceId": "eni-686ea200",
36
+ "Description": {
37
+ "Value": "My description"
38
+ }
39
+ }
40
+
41
+ **To describe the groupSet attribute of a network interface**
42
+
43
+ This example command describes the ``groupSet`` attribute of the specified network interface.
44
+
45
+ Command::
46
+
47
+ aws ec2 describe-network-interface-attribute --network-interface-id eni-686ea200 --attribute groupSet
48
+
49
+ Output::
50
+
51
+ {
52
+ "NetworkInterfaceId": "eni-686ea200",
53
+ "Groups": [
54
+ {
55
+ "GroupName": "my-security-group",
56
+ "GroupId": "sg-903004f8"
57
+ }
58
+ ]
59
+ }
60
+
61
+ **To describe the sourceDestCheck attribute of a network interface**
62
+
63
+ This example command describes the ``sourceDestCheck`` attribute of the specified network interface.
64
+
65
+ Command::
66
+
67
+ aws ec2 describe-network-interface-attribute --network-interface-id eni-686ea200 --attribute sourceDestCheck
68
+
69
+ Output::
70
+
71
+ {
72
+ "NetworkInterfaceId": "eni-686ea200",
73
+ "SourceDestCheck": {
74
+ "Value": true
75
+ }
76
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-prefix-lists.rst ADDED
@@ -0,0 +1,21 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe prefix lists**
2
+
3
+ This example lists all available prefix lists for the region.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-prefix-lists
8
+
9
+ Output::
10
+
11
+ {
12
+ "PrefixLists": [
13
+ {
14
+ "PrefixListName": "com.amazonaws.us-east-1.s3",
15
+ "Cidrs": [
16
+ "54.231.0.0/17"
17
+ ],
18
+ "PrefixListId": "pl-63a5400a"
19
+ }
20
+ ]
21
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-security-groups.rst ADDED
@@ -0,0 +1,103 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To describe a security group**
2
+
3
+ The following ``describe-security-groups`` example describes the specified security group. ::
4
+
5
+ aws ec2 describe-security-groups \
6
+ --group-ids sg-903004f8
7
+
8
+ Output::
9
+
10
+ {
11
+ "SecurityGroups": [
12
+ {
13
+ "IpPermissionsEgress": [
14
+ {
15
+ "IpProtocol": "-1",
16
+ "IpRanges": [
17
+ {
18
+ "CidrIp": "0.0.0.0/0"
19
+ }
20
+ ],
21
+ "UserIdGroupPairs": [],
22
+ "PrefixListIds": []
23
+ }
24
+ ],
25
+ "Description": "My security group",
26
+ "Tags": [
27
+ {
28
+ "Value": "SG1",
29
+ "Key": "Name"
30
+ }
31
+ ],
32
+ "IpPermissions": [
33
+ {
34
+ "IpProtocol": "-1",
35
+ "IpRanges": [],
36
+ "UserIdGroupPairs": [
37
+ {
38
+ "UserId": "123456789012",
39
+ "GroupId": "sg-903004f8"
40
+ }
41
+ ],
42
+ "PrefixListIds": []
43
+ },
44
+ {
45
+ "PrefixListIds": [],
46
+ "FromPort": 22,
47
+ "IpRanges": [
48
+ {
49
+ "Description": "Access from NY office",
50
+ "CidrIp": "203.0.113.0/24"
51
+ }
52
+ ],
53
+ "ToPort": 22,
54
+ "IpProtocol": "tcp",
55
+ "UserIdGroupPairs": []
56
+ }
57
+ ],
58
+ "GroupName": "MySecurityGroup",
59
+ "VpcId": "vpc-1a2b3c4d",
60
+ "OwnerId": "123456789012",
61
+ "GroupId": "sg-903004f8",
62
+ }
63
+ ]
64
+ }
65
+
66
+ **Example 2: To describe security groups that have specific rules**
67
+
68
+ The following ``describe-security-groups`` example uses filters to scope the results to security groups that have a rule that allows SSH traffic (port 22) and a rule that allows traffic from all addresses (``0.0.0.0/0``). The example uses the ``--query`` parameter to display only the names of the security groups. Security groups must match all filters to be returned in the results; however, a single rule does not have to match all filters. For example, the output returns a security group with a rule that allows SSH traffic from a specific IP address and another rule that allows HTTP traffic from all addresses. ::
69
+
70
+ aws ec2 describe-security-groups \
71
+ --filters Name=ip-permission.from-port,Values=22 Name=ip-permission.to-port,Values=22 Name=ip-permission.cidr,Values='0.0.0.0/0' \
72
+ --query "SecurityGroups[*].[GroupName]" \
73
+ --output text
74
+
75
+ Output::
76
+
77
+ default
78
+ my-security-group
79
+ web-servers
80
+ launch-wizard-1
81
+
82
+ **Example 3: To describe security groups based on tags**
83
+
84
+ The following ``describe-security-groups`` example uses filters to scope the results to security groups that include ``test`` in the security group name, and that have the tag ``Test=To-delete``. The example uses the ``--query`` parameter to display only the names and IDs of the security groups. ::
85
+
86
+ aws ec2 describe-security-groups \
87
+ --filters Name=group-name,Values=*test* Name=tag:Test,Values=To-delete \
88
+ --query "SecurityGroups[*].{Name:GroupName,ID:GroupId}"
89
+
90
+ Output::
91
+
92
+ [
93
+ {
94
+ "Name": "testfornewinstance",
95
+ "ID": "sg-33bb22aa"
96
+ },
97
+ {
98
+ "Name": "newgrouptest",
99
+ "ID": "sg-1a2b3c4d"
100
+ }
101
+ ]
102
+
103
+ For additional examples using tag filters, see `Working with tags <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html#Using_Tags_CLI>`__ in the *Amazon EC2 User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-snapshot-tier-status.rst ADDED
@@ -0,0 +1,27 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To view archival information about an archived snapshot**
2
+
3
+ The following ``describe-snapshot-tier-status`` example provides archival information about an archived snapshot. ::
4
+
5
+ aws ec2 describe-snapshot-tier-status \
6
+ --filters "Name=snapshot-id, Values=snap-01234567890abcedf"
7
+
8
+ Output::
9
+
10
+ {
11
+ "SnapshotTierStatuses": [
12
+ {
13
+ "Status": "completed",
14
+ "ArchivalCompleteTime": "2021-09-15T17:33:16.147Z",
15
+ "LastTieringProgress": 100,
16
+ "Tags": [],
17
+ "VolumeId": "vol-01234567890abcedf",
18
+ "LastTieringOperationState": "archival-completed",
19
+ "StorageTier": "archive",
20
+ "OwnerId": "123456789012",
21
+ "SnapshotId": "snap-01234567890abcedf",
22
+ "LastTieringStartTime": "2021-09-15T16:44:37.574Z"
23
+ }
24
+ ]
25
+ }
26
+
27
+ For more information, see `View archived snapshots <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-snapshot-archiving.html#view-archived-snapshot>`__ in the *Amazon Elastic Compute Cloud User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-snapshots.rst ADDED
@@ -0,0 +1,120 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To describe a snapshot**
2
+
3
+ The following ``describe-snapshots`` example describes the specified snapshot. ::
4
+
5
+ aws ec2 describe-snapshots \
6
+ --snapshot-ids snap-1234567890abcdef0
7
+
8
+ Output::
9
+
10
+ {
11
+ "Snapshots": [
12
+ {
13
+ "Description": "This is my snapshot",
14
+ "Encrypted": false,
15
+ "VolumeId": "vol-049df61146c4d7901",
16
+ "State": "completed",
17
+ "VolumeSize": 8,
18
+ "StartTime": "2019-02-28T21:28:32.000Z",
19
+ "Progress": "100%",
20
+ "OwnerId": "012345678910",
21
+ "SnapshotId": "snap-01234567890abcdef",
22
+ "Tags": [
23
+ {
24
+ "Key": "Stack",
25
+ "Value": "test"
26
+ }
27
+ ]
28
+ }
29
+ ]
30
+ }
31
+
32
+ For more information, see `Amazon EBS snapshots <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/EBSSnapshots.html>`__ in the *Amazon EC2 User Guide*.
33
+
34
+ **Example 2: To describe snapshots based on filters**
35
+
36
+ The following ``describe-snapshots`` example uses filters to scope the results to snapshots owned by your AWS account that are in the ``pending`` state. The example uses the ``--query`` parameter to display only the snapshot IDs and the time the snapshot was started. ::
37
+
38
+ aws ec2 describe-snapshots \
39
+ --owner-ids self \
40
+ --filters Name=status,Values=pending \
41
+ --query "Snapshots[*].{ID:SnapshotId,Time:StartTime}"
42
+
43
+ Output::
44
+
45
+ [
46
+ {
47
+ "ID": "snap-1234567890abcdef0",
48
+ "Time": "2019-08-04T12:48:18.000Z"
49
+ },
50
+ {
51
+ "ID": "snap-066877671789bd71b",
52
+ "Time": "2019-08-04T02:45:16.000Z
53
+ },
54
+ ...
55
+ ]
56
+
57
+ The following ``describe-snapshots`` example uses filters to scope the results to snapshots created from the specified volume. The example uses the ``--query`` parameter to display only the snapshot IDs. ::
58
+
59
+ aws ec2 describe-snapshots \
60
+ --filters Name=volume-id,Values=049df61146c4d7901 \
61
+ --query "Snapshots[*].[SnapshotId]" \
62
+ --output text
63
+
64
+ Output::
65
+
66
+ snap-1234567890abcdef0
67
+ snap-08637175a712c3fb9
68
+ ...
69
+
70
+ For additional examples using filters, see `Listing and filtering your resources <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Filtering.html#Filtering_Resources_CLI>`__ in the *Amazon EC2 User Guide*.
71
+
72
+ **Example 3: To describe snapshots based on tags**
73
+
74
+ The following ``describe-snapshots`` example uses tag filters to scope the results to snapshots that have the tag ``Stack=Prod``. ::
75
+
76
+ aws ec2 describe-snapshots \
77
+ --filters Name=tag:Stack,Values=prod
78
+
79
+ For an example of the output for ``describe-snapshots``, see Example 1.
80
+
81
+ For additional examples using tag filters, see `Working with tags <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Tags.html#Using_Tags_CLI>`__ in the *Amazon EC2 User Guide*.
82
+
83
+ **Example 4: To describe snapshots based on age**
84
+
85
+ The following ``describe-snapshots`` example uses JMESPath expressions to describe all snapshots created by your AWS account before the specified date. It displays only the snapshot IDs. ::
86
+
87
+ aws ec2 describe-snapshots \
88
+ --owner-ids 012345678910 \
89
+ --query "Snapshots[?(StartTime<='2020-03-31')].[SnapshotId]"
90
+
91
+ For additional examples using filters, see `Listing and filtering your resources <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/Using_Filtering.html#Filtering_Resources_CLI>`__ in the *Amazon EC2 User Guide*.
92
+
93
+ **Example 5: To view only archived snapshots**
94
+
95
+ The following ``describe-snapshots`` example lists only snapshots that are stored in the archive tier. ::
96
+
97
+ aws ec2 describe-snapshots \
98
+ --filters "Name=storage-tier,Values=archive"
99
+
100
+ Output::
101
+
102
+ {
103
+ "Snapshots": [
104
+ {
105
+ "Description": "Snap A",
106
+ "Encrypted": false,
107
+ "VolumeId": "vol-01234567890aaaaaa",
108
+ "State": "completed",
109
+ "VolumeSize": 8,
110
+ "StartTime": "2021-09-07T21:00:00.000Z",
111
+ "Progress": "100%",
112
+ "OwnerId": "123456789012",
113
+ "SnapshotId": "snap-01234567890aaaaaa",
114
+ "StorageTier": "archive",
115
+ "Tags": []
116
+ },
117
+ ]
118
+ }
119
+
120
+ For more information, see `View archived snapshots <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/working-with-snapshot-archiving.html#view-archived-snapshot>`__ in the *Amazon Elastic Compute Cloud User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-spot-fleet-instances.rst ADDED
@@ -0,0 +1,21 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the Spot Instances associated with a Spot fleet**
2
+
3
+ This example command lists the Spot instances associated with the specified Spot fleet.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-spot-fleet-instances --spot-fleet-request-id sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE
8
+
9
+ Output::
10
+
11
+ {
12
+ "ActiveInstances": [
13
+ {
14
+ "InstanceId": "i-1234567890abcdef0",
15
+ "InstanceType": "m3.medium",
16
+ "SpotInstanceRequestId": "sir-08b93456"
17
+ },
18
+ ...
19
+ ],
20
+ "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE"
21
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-spot-fleet-request-history.rst ADDED
@@ -0,0 +1,49 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe Spot fleet history**
2
+
3
+ This example command returns the history for the specified Spot fleet starting at the specified time.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-spot-fleet-request-history --spot-fleet-request-id sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE --start-time 2015-05-26T00:00:00Z
8
+
9
+ The following example output shows the successful launches of two Spot Instances for the Spot fleet.
10
+
11
+ Output::
12
+
13
+ {
14
+ "HistoryRecords": [
15
+ {
16
+ "Timestamp": "2015-05-26T23:17:20.697Z",
17
+ "EventInformation": {
18
+ "EventSubType": "submitted"
19
+ },
20
+ "EventType": "fleetRequestChange"
21
+ },
22
+ {
23
+ "Timestamp": "2015-05-26T23:17:20.873Z",
24
+ "EventInformation": {
25
+ "EventSubType": "active"
26
+ },
27
+ "EventType": "fleetRequestChange"
28
+ },
29
+ {
30
+ "Timestamp": "2015-05-26T23:21:21.712Z",
31
+ "EventInformation": {
32
+ "InstanceId": "i-1234567890abcdef0",
33
+ "EventSubType": "launched"
34
+ },
35
+ "EventType": "instanceChange"
36
+ },
37
+ {
38
+ "Timestamp": "2015-05-26T23:21:21.816Z",
39
+ "EventInformation": {
40
+ "InstanceId": "i-1234567890abcdef1",
41
+ "EventSubType": "launched"
42
+ },
43
+ "EventType": "instanceChange"
44
+ }
45
+ ],
46
+ "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE",
47
+ "NextToken": "CpHNsscimcV5oH7bSbub03CI2Qms5+ypNpNm+53MNlR0YcXAkp0xFlfKf91yVxSExmbtma3awYxMFzNA663ZskT0AHtJ6TCb2Z8bQC2EnZgyELbymtWPfpZ1ZbauVg+P+TfGlWxWWB/Vr5dk5d4LfdgA/DRAHUrYgxzrEXAMPLE=",
48
+ "StartTime": "2015-05-26T00:00:00Z"
49
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-stale-security-groups.rst ADDED
@@ -0,0 +1,59 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe stale security groups**
2
+
3
+ This example describes stale security group rules for ``vpc-11223344``. The response shows that sg-5fa68d3a in your account has a stale ingress SSH rule that references ``sg-279ab042`` in the peer VPC, and that ``sg-fe6fba9a`` in your account has a stale egress SSH rule that references ``sg-ef6fba8b`` in the peer VPC.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-stale-security-groups --vpc-id vpc-11223344
8
+
9
+ Output::
10
+
11
+ {
12
+ "StaleSecurityGroupSet": [
13
+ {
14
+ "VpcId": "vpc-11223344",
15
+ "StaleIpPermissionsEgress": [
16
+ {
17
+ "ToPort": 22,
18
+ "FromPort": 22,
19
+ "UserIdGroupPairs": [
20
+ {
21
+ "VpcId": "vpc-7a20e51f",
22
+ "GroupId": "sg-ef6fba8b",
23
+ "VpcPeeringConnectionId": "pcx-b04deed9",
24
+ "PeeringStatus": "active"
25
+ }
26
+ ],
27
+ "IpProtocol": "tcp"
28
+ }
29
+ ],
30
+ "GroupName": "MySG1",
31
+ "StaleIpPermissions": [],
32
+ "GroupId": "sg-fe6fba9a",
33
+ "Description": MySG1"
34
+ },
35
+ {
36
+ "VpcId": "vpc-11223344",
37
+ "StaleIpPermissionsEgress": [],
38
+ "GroupName": "MySG2",
39
+ "StaleIpPermissions": [
40
+ {
41
+ "ToPort": 22,
42
+ "FromPort": 22,
43
+ "UserIdGroupPairs": [
44
+ {
45
+ "VpcId": "vpc-7a20e51f",
46
+ "GroupId": "sg-279ab042",
47
+ "Description": "Access from pcx-b04deed9",
48
+ "VpcPeeringConnectionId": "pcx-b04deed9",
49
+ "PeeringStatus": "active"
50
+ }
51
+ ],
52
+ "IpProtocol": "tcp"
53
+ }
54
+ ],
55
+ "GroupId": "sg-5fa68d3a",
56
+ "Description": "MySG2"
57
+ }
58
+ ]
59
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-transit-gateway-route-tables.rst ADDED
@@ -0,0 +1,32 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe your transit gateway route tables**
2
+
3
+ The following ``describe-transit-gateway-route-tables`` example displays details for your transit gateway route tables. ::
4
+
5
+ aws ec2 describe-transit-gateway-route-tables
6
+
7
+ Output::
8
+
9
+ {
10
+ "TransitGatewayRouteTables": [
11
+ {
12
+ "TransitGatewayRouteTableId": "tgw-rtb-0ca78a549EXAMPLE",
13
+ "TransitGatewayId": "tgw-0bc994abffEXAMPLE",
14
+ "State": "available",
15
+ "DefaultAssociationRouteTable": true,
16
+ "DefaultPropagationRouteTable": true,
17
+ "CreationTime": "2018-11-28T14:24:49.000Z",
18
+ "Tags": []
19
+ },
20
+ {
21
+ "TransitGatewayRouteTableId": "tgw-rtb-0e8f48f148EXAMPLE",
22
+ "TransitGatewayId": "tgw-0043d72bb4EXAMPLE",
23
+ "State": "available",
24
+ "DefaultAssociationRouteTable": true,
25
+ "DefaultPropagationRouteTable": true,
26
+ "CreationTime": "2018-11-28T14:24:00.000Z",
27
+ "Tags": []
28
+ }
29
+ ]
30
+ }
31
+
32
+ For more information, see `View transit gateway route tables <https://docs.aws.amazon.com/vpc/latest/tgw/tgw-route-tables.html#view-tgw-route-tables>`__ in the *Transit Gateways Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-verified-access-endpoints.rst ADDED
@@ -0,0 +1,45 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe a Verified Access endpoint**
2
+
3
+ The following ``describe-verified-access-endpoints`` example describes the specified Verified Access endpoint. ::
4
+
5
+ aws ec2 describe-verified-access-endpoints \
6
+ --verified-access-endpoint-ids vae-066fac616d4d546f2
7
+
8
+ Output::
9
+
10
+ {
11
+ "VerifiedAccessEndpoints": [
12
+ {
13
+ "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea",
14
+ "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235",
15
+ "VerifiedAccessEndpointId": "vae-066fac616d4d546f2",
16
+ "ApplicationDomain": "example.com",
17
+ "EndpointType": "network-interface",
18
+ "AttachmentType": "vpc",
19
+ "DomainCertificateArn": "arn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE",
20
+ "EndpointDomain": "my-ava-app.edge-00c3372d53b1540bb.vai-0ce000c0b7643abea.prod.verified-access.us-east-2.amazonaws.com",
21
+ "SecurityGroupIds": [
22
+ "sg-004915970c4c8f13a"
23
+ ],
24
+ "NetworkInterfaceOptions": {
25
+ "NetworkInterfaceId": "eni-0aec70418c8d87a0f",
26
+ "Protocol": "https",
27
+ "Port": 443
28
+ },
29
+ "Status": {
30
+ "Code": "active"
31
+ },
32
+ "Description": "",
33
+ "CreationTime": "2023-08-25T20:54:43",
34
+ "LastUpdatedTime": "2023-08-25T22:17:26",
35
+ "Tags": [
36
+ {
37
+ "Key": "Name",
38
+ "Value": "my-va-endpoint"
39
+ }
40
+ ]
41
+ }
42
+ ]
43
+ }
44
+
45
+ For more information, see `Verified Access endpoints <https://docs.aws.amazon.com/verified-access/latest/ug/verified-access-endpoints.html>`__ in the *AWS Verified Access User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-verified-access-instance-logging-configurations.rst ADDED
@@ -0,0 +1,35 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe the logging configuration for a Verified Access instance**
2
+
3
+ The following ``describe-verified-access-instance-logging-configurations`` example describes the logging configuration for the specified Verified Access instance. ::
4
+
5
+ aws ec2 describe-verified-access-instance-logging-configurations \
6
+ --verified-access-instance-ids vai-0ce000c0b7643abea
7
+
8
+ Output::
9
+
10
+ {
11
+ "LoggingConfigurations": [
12
+ {
13
+ "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea",
14
+ "AccessLogs": {
15
+ "S3": {
16
+ "Enabled": false
17
+ },
18
+ "CloudWatchLogs": {
19
+ "Enabled": true,
20
+ "DeliveryStatus": {
21
+ "Code": "success"
22
+ },
23
+ "LogGroup": "my-log-group"
24
+ },
25
+ "KinesisDataFirehose": {
26
+ "Enabled": false
27
+ },
28
+ "LogVersion": "ocsf-1.0.0-rc.2",
29
+ "IncludeTrustContext": false
30
+ }
31
+ }
32
+ ]
33
+ }
34
+
35
+ For more information, see `Verified Access logs <https://docs.aws.amazon.com/verified-access/latest/ug/access-logs.html>`__ in the *AWS Verified Access User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-vpc-endpoint-services.rst ADDED
@@ -0,0 +1,132 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **Example 1: To describe all VPC endpoint services**
2
+
3
+ The following ``describe-vpc-endpoint-services`` example lists all VPC endpoint services for an AWS Region. ::
4
+
5
+ aws ec2 describe-vpc-endpoint-services
6
+
7
+ Output::
8
+
9
+ {
10
+ "ServiceDetails": [
11
+ {
12
+ "ServiceType": [
13
+ {
14
+ "ServiceType": "Gateway"
15
+ }
16
+ ],
17
+ "AcceptanceRequired": false,
18
+ "ServiceName": "com.amazonaws.us-east-1.dynamodb",
19
+ "VpcEndpointPolicySupported": true,
20
+ "Owner": "amazon",
21
+ "AvailabilityZones": [
22
+ "us-east-1a",
23
+ "us-east-1b",
24
+ "us-east-1c",
25
+ "us-east-1d",
26
+ "us-east-1e",
27
+ "us-east-1f"
28
+ ],
29
+ "BaseEndpointDnsNames": [
30
+ "dynamodb.us-east-1.amazonaws.com"
31
+ ]
32
+ },
33
+ {
34
+ "ServiceType": [
35
+ {
36
+ "ServiceType": "Interface"
37
+ }
38
+ ],
39
+ "PrivateDnsName": "ec2.us-east-1.amazonaws.com",
40
+ "ServiceName": "com.amazonaws.us-east-1.ec2",
41
+ "VpcEndpointPolicySupported": false,
42
+ "Owner": "amazon",
43
+ "AvailabilityZones": [
44
+ "us-east-1a",
45
+ "us-east-1b",
46
+ "us-east-1c",
47
+ "us-east-1d",
48
+ "us-east-1e",
49
+ "us-east-1f"
50
+ ],
51
+ "AcceptanceRequired": false,
52
+ "BaseEndpointDnsNames": [
53
+ "ec2.us-east-1.vpce.amazonaws.com"
54
+ ]
55
+ },
56
+ {
57
+ "ServiceType": [
58
+ {
59
+ "ServiceType": "Interface"
60
+ }
61
+ ],
62
+ "PrivateDnsName": "ssm.us-east-1.amazonaws.com",
63
+ "ServiceName": "com.amazonaws.us-east-1.ssm",
64
+ "VpcEndpointPolicySupported": true,
65
+ "Owner": "amazon",
66
+ "AvailabilityZones": [
67
+ "us-east-1a",
68
+ "us-east-1b",
69
+ "us-east-1c",
70
+ "us-east-1d",
71
+ "us-east-1e"
72
+ ],
73
+ "AcceptanceRequired": false,
74
+ "BaseEndpointDnsNames": [
75
+ "ssm.us-east-1.vpce.amazonaws.com"
76
+ ]
77
+ }
78
+ ],
79
+ "ServiceNames": [
80
+ "com.amazonaws.us-east-1.dynamodb",
81
+ "com.amazonaws.us-east-1.ec2",
82
+ "com.amazonaws.us-east-1.ec2messages",
83
+ "com.amazonaws.us-east-1.elasticloadbalancing",
84
+ "com.amazonaws.us-east-1.kinesis-streams",
85
+ "com.amazonaws.us-east-1.s3",
86
+ "com.amazonaws.us-east-1.ssm"
87
+ ]
88
+ }
89
+
90
+ **Example 2: To describe the details about an endpoint service**
91
+
92
+ The following ``describe-vpc-endpoint-services`` example lists the details of the Amazon S3 interface endpoint service. ::
93
+
94
+ aws ec2 describe-vpc-endpoint-services \
95
+ --filter 'Name=service-type,Values=Interface' Name=service-name,Values=com.amazonaws.us-east-1.s3
96
+
97
+ Output::
98
+
99
+ {
100
+ "ServiceDetails": [
101
+ {
102
+ "ServiceName": "com.amazonaws.us-east-1.s3",
103
+ "ServiceId": "vpce-svc-081d84efcdEXAMPLE",
104
+ "ServiceType": [
105
+ {
106
+ "ServiceType": "Interface"
107
+ }
108
+ ],
109
+ "AvailabilityZones": [
110
+ "us-east-1a",
111
+ "us-east-1b",
112
+ "us-east-1c",
113
+ "us-east-1d",
114
+ "us-east-1e",
115
+ "us-east-1f"
116
+ ],
117
+ "Owner": "amazon",
118
+ "BaseEndpointDnsNames": [
119
+ "s3.us-east-1.vpce.amazonaws.com"
120
+ ],
121
+ "VpcEndpointPolicySupported": true,
122
+ "AcceptanceRequired": false,
123
+ "ManagesVpcEndpoints": false,
124
+ "Tags": []
125
+ }
126
+ ],
127
+ "ServiceNames": [
128
+ "com.amazonaws.us-east-1.s3"
129
+ ]
130
+ }
131
+
132
+ For more information, see `View available AWS service names <https://docs.aws.amazon.com/vpc/latest/privatelink/aws-services-privatelink-support.html#vpce-view-available-services>`__ in the *AWS PrivateLink User Guide*.
data/lib/python3.10/site-packages/awscli/examples/ec2/describe-vpn-gateways.rst ADDED
@@ -0,0 +1,36 @@
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
1
+ **To describe your virtual private gateways**
2
+
3
+ This example describes your virtual private gateways.
4
+
5
+ Command::
6
+
7
+ aws ec2 describe-vpn-gateways
8
+
9
+ Output::
10
+
11
+ {
12
+ "VpnGateways": [
13
+ {
14
+ "State": "available",
15
+ "Type": "ipsec.1",
16
+ "VpnGatewayId": "vgw-f211f09b",
17
+ "VpcAttachments": [
18
+ {
19
+ "State": "attached",
20
+ "VpcId": "vpc-98eb5ef5"
21
+ }
22
+ ]
23
+ },
24
+ {
25
+ "State": "available",
26
+ "Type": "ipsec.1",
27
+ "VpnGatewayId": "vgw-9a4cacf3",
28
+ "VpcAttachments": [
29
+ {
30
+ "State": "attaching",
31
+ "VpcId": "vpc-a01106c2"
32
+ }
33
+ ]
34
+ }
35
+ ]
36
+ }
data/lib/python3.10/site-packages/awscli/examples/ec2/detach-network-interface.rst ADDED
@@ -0,0 +1,7 @@
 
 
 
 
 
 
 
 
1
+ **To detach a network interface from your instance**
2
+
3
+ This example detaches the specified network interface from the specified instance. If the command succeeds, no output is returned.
4
+
5
+ Command::
6
+
7
+ aws ec2 detach-network-interface --attachment-id eni-attach-66c4350a