AWS Cloud9 tidak lagi tersedia untuk pelanggan baru. Pelanggan yang sudah ada AWS Cloud9 dapat terus menggunakan layanan seperti biasa. Pelajari selengkapnya
Terjemahan disediakan oleh mesin penerjemah. Jika konten terjemahan yang diberikan bertentangan dengan versi bahasa Inggris aslinya, utamakan versi bahasa Inggris.
Pencatatan AWS Cloud9 API panggilan dengan AWS CloudTrail
AWS Cloud9 terintegrasi dengan CloudTrail, layanan yang menyediakan catatan tindakan yang diambil oleh pengguna, peran, atau Layanan AWS dalam AWS Cloud9. CloudTrail menangkap semua API panggilan untuk AWS Cloud9 sebagai acara. Panggilan yang diambil termasuk panggilan dari AWS Cloud9 konsol dan dari panggilan kode ke AWS Cloud9 APIs. Jika Anda membuat jejak, Anda dapat mengaktifkan pengiriman CloudTrail acara secara terus menerus ke bucket Amazon Simple Storage Service (Amazon S3), termasuk acara untuk. AWS Cloud9 Jika Anda tidak mengonfigurasi jejak, Anda masih dapat melihat peristiwa terbaru di CloudTrail konsol dalam Riwayat acara. Dengan menggunakan informasi yang dikumpulkan oleh CloudTrail, Anda dapat menentukan permintaan yang dibuat AWS Cloud9, alamat IP dari mana permintaan dibuat, siapa yang membuat permintaan, kapan dibuat, dan detail tambahan.
Untuk mempelajari selengkapnya CloudTrail, lihat Panduan AWS CloudTrail Pengguna.
AWS Cloud9 informasi di CloudTrail
CloudTrail diaktifkan pada Akun AWS saat Anda membuat akun. Ketika aktivitas terjadi di AWS Cloud9, aktivitas tersebut dicatat dalam suatu CloudTrail peristiwa bersama dengan peristiwa AWS layanan lainnya dalam riwayat Acara. Anda dapat melihat, mencari, dan mengunduh peristiwa terbaru di akun AWS . Untuk informasi selengkapnya, lihat Melihat Acara dengan Riwayat CloudTrail Acara.
Untuk catatan acara yang sedang berlangsung di Anda Akun AWS, termasuk acara untuk AWS Cloud9, buat jejak. Jejak memungkinkan CloudTrail untuk mengirimkan file log ke bucket Amazon S3. Secara default, saat Anda membuat jejak di konsol, jejak tersebut berlaku untuk semua Wilayah AWS. Jejak mencatat peristiwa dari semua Wilayah di AWS partisi dan mengirimkan file log ke bucket S3 yang Anda tentukan. Selain itu, Anda dapat mengonfigurasi AWS layanan lain untuk menganalisis lebih lanjut dan menindaklanjuti data peristiwa yang dikumpulkan dalam CloudTrail log. Untuk informasi selengkapnya, lihat berikut:
AWS Cloud9 mendukung pencatatan tindakan berikut sebagai peristiwa dalam file CloudTrail log:
-
CreateEnvironmentEC2
-
CreateEnvironmentSSH
-
CreateEnvironmentMembership
-
DeleteEnvironment
-
DeleteEnvironmentMembership
-
DescribeEnvironmentMemberships
-
DescribeEnvironments
-
DescribeEnvironmentStatus
-
ListEnvironments
-
ListTagsForResource
-
TagResource
-
UntagResource
-
UpdateEnvironment
-
UpdateEnvironmentMembership
catatan
Beberapa CloudTrail peristiwa untuk AWS Cloud9 tidak disebabkan oleh API operasi publik. Sebaliknya, peristiwa berikut dimulai oleh pembaruan internal yang memengaruhi autentikasi pengguna dan dikelola kredensial sementara:
-
DisableManagedCredentialsByCollaborator
-
EnvironmentTokenSuccessfullyCreated
-
ManagedCredentialsUpdatedOnEnvironment
Setiap entri peristiwa atau log berisi informasi tentang siapa yang membuat permintaan tersebut. Informasi identitas membantu Anda menentukan berikut ini:
-
Apakah permintaan dibuat dengan root atau kredensi AWS Identity and Access Management IAM pengguna.
-
Apakah permintaan tersebut dibuat dengan kredensial keamanan sementara untuk satu peran atau pengguna terfederasi.
-
Apakah permintaan tersebut dibuat oleh Layanan AWS lain.
Untuk informasi selengkapnya, lihat CloudTrail userIdentity Elemen.
Memahami entri file AWS Cloud9 log
Trail adalah konfigurasi yang memungkinkan pengiriman peristiwa sebagai file log ke bucket Amazon S3 yang Anda tentukan. CloudTrail file log berisi satu atau lebih entri log. Peristiwa mewakili permintaan tunggal dari sumber manapun dan mencakup informasi tentang tindakan yang diminta, tanggal dan waktu tindakan, dan parameter permintaan. CloudTrail file log bukanlah jejak tumpukan yang diurutkan dari API panggilan publik, sehingga tidak muncul dalam urutan tertentu.
CreateEnvironmentEC2
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan CreateEnvironmentEC2
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "CreateEnvironmentEC2", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "instanceType": "t2.small", "subnetId": "subnet-1d4a9eEX", "description": "HIDDEN_DUE_TO_SECURITY_REASONS", "dryRun": true, "automaticStopTimeMinutes": 30, "name": "my-test-environment", "clientRequestToken": "cloud9-console-f8e37272-e541-435d-a567-5c684EXAMPLE" }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
CreateEnvironmentSSH
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan CreateEnvironmentSSH
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "CreateEnvironmentSSH", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "host": "198.51.100.0", "port": 22, "name": "my-ssh-environment", "description": "HIDDEN_DUE_TO_SECURITY_REASONS", "clientRequestToken": "cloud9-console-b015a0e9-469e-43e3-be90-6f432EXAMPLE", "loginName": "ec2-user" }, "responseElements": { "environmentId": "5c39cc4a85d74a8bbb6e23ed6EXAMPLE" }, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
CreateEnvironmentMembership
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan CreateEnvironmentMembership
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "CreateEnvironmentMembership", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE", "userArn": "arn:aws:iam::111122223333:user/MyUser", "permissions": "read-write" }, "responseElements": { "membership": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE", "permissions": "read-write", "userId": "AIDACKCEVSQ6C2EXAMPLE", "userArn": "arn:aws:iam::111122223333:user/MyUser" } }, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
DeleteEnvironment
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan DeleteEnvironment
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "DeleteEnvironment", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE" }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
DeleteEnvironmentMembership
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan DeleteEnvironmentMembership
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "DeleteEnvironmentMembership", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE", "userArn": "arn:aws:iam::111122223333:user/MyUser", }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
DescribeEnvironmentMemberships
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan DescribeEnvironmentMemberships
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "DescribeEnvironmentMemberships", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "nextToken": "NEXT_TOKEN_EXAMPLE", "permissions": [ "owner" ], "maxResults": 15 }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "readOnly": true, "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
DescribeEnvironments
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan DescribeEnvironments
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "DescribeEnvironments", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "environmentIds": [ "2f5ff70a640f49398f67e3bdeb811ab2" ] }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "readOnly": true, "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
DescribeEnvironmentStatus
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan DescribeEnvironmentStatus
tindakan.
{ "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:myuser_role", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:myuser_role", "accountId": "123456789012", "userName": "barshane_role" }, "webIdFederationData": {}, "attributes": { "mfaAuthenticated": "false", "creationDate": "2021-03-12T15:10:54Z" } } }, "eventTime": "2021-03-12T15:13:31Z", "eventSource": "cloud9.amazonaws.com", "eventName": "DescribeEnvironmentStatus", "awsRegion": "us-east-1", "sourceIPAddress": "XX.XX.XXX.XX", "userAgent": "aws-internal/3 aws-sdk-java/1.11.951 Linux/4.9.230-0.1.ac.223.84.332.metal1.x86_64 OpenJDK_64-Bit_Server_VM/25.282-b08 java/1.8.0_282 vendor/Oracle_Corporation", "requestParameters": { "environmentId": "31ea8a12746a4221b7d8e07d9ef6ee21" }, "responseElements": null, "requestID": "68b163fb-aa88-4f40-bafd-4a18bf24cbd5", "eventID": "c0fc52a9-7331-4ad0-a8ee-157995dfb5e6", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "eventCategory": "Management", "recipientAccountId": "123456789012" }
ListEnvironments
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan ListEnvironments
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "ListEnvironments", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "nextToken": "NEXT_TOKEN_EXAMPLE", "maxResults": 15 }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "readOnly": true, "eventType": "AwsApiCall", "recipientAccountId": "123456789012" } ] }
ListTagsForResource
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan ListTagsForResource
tindakan.
{ "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:myuser_role", "accountId": "123456789012", "accessKeyId": "AIDACKCEVSQ6C2EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "123456789012:myuser_role", "accountId": "123456789012", "userName": "barshane_role" }, "webIdFederationData": {}, "attributes": { "mfaAuthenticated": "false", "creationDate": "2021-03-23T16:41:51Z" } } }, "eventTime": "2021-03-23T16:42:58Z", "eventSource": "cloud9.amazonaws.com", "eventName": "ListTagsForResource", "awsRegion": "us-east-1", "sourceIPAddress": "XX.XX.XXX.XX", "userAgent": "aws-internal/3 aws-sdk-java/1.11.976 Linux/4.9.230-0.1.ac.224.84.332.metal1.x86_64 OpenJDK_64-Bit_Server_VM/25.282-b08 java/1.8.0_282 vendor/Oracle_Corporation cfg/retry-mode/legacy", "requestParameters": { "resourceARN": "arn:aws:cloud9:us-east-1:123456789012:environment:3XXXXXXXXX6a4221b7d8e07d9ef6ee21" }, "responseElements": { "tags": "HIDDEN_DUE_TO_SECURITY_REASONS" }, "requestID": "5750a344-8462-4020-82f9-f1d500a75162", "eventID": "188d572d-9a14-4082-b98b-0389964c7c30", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "eventCategory": "Management", "recipientAccountId": "123456789012" }
TagResource
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan TagResource
tindakan.
{ "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts:: 123456789012:myuser_role", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/myuser_role", "accountId": "123456789012", "userName": "MyUser" }, "webIdFederationData": {}, "attributes": { "mfaAuthenticated": "false", "creationDate": "2021-03-23T15:03:57Z" } } }, "eventTime": "2021-03-23T15:08:16Z", "eventSource": "cloud9.amazonaws.com", "eventName": "TagResource", "awsRegion": "us-east-1", "sourceIPAddress": "54.XXX.XXX.XXX", "userAgent": "aws-internal/3 aws-sdk-java/1.11.976 Linux/4.9.230-0.1.ac.224.84.332.metal1.x86_64 OpenJDK_64-Bit_Server_VM/25.282-b08 java/1.8.0_282 vendor/Oracle_Corporation cfg/retry-mode/legacy", "requestParameters": { "resourceARN": "arn:aws:cloud9:us-east-1:123456789012:environment:3XXXXXXXXX6a4221b7d8e07d9ef6ee21", "tags": "HIDDEN_DUE_TO_SECURITY_REASONS" }, "responseElements": null, "requestID": "658e9d70-91c2-41b8-9a69-c6b4cc6a9456", "eventID": "022b2893-73d1-44cb-be6f-d3faa68e83b1", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "eventCategory": "Management", "recipientAccountId": "123456789012" }
UntagResource
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan UntagResource
tindakan.
{ "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012/MyUser", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:MyUser", "accountId": "123456789012", "userName": "MyUser" }, "webIdFederationData": {}, "attributes": { "mfaAuthenticated": "false", "creationDate": "2021-03-23T15:58:36Z" } } }, "eventTime": "2021-03-23T16:05:08Z", "eventSource": "cloud9.amazonaws.com", "eventName": "UntagResource", "awsRegion": "us-east-1", "sourceIPAddress": "3.XX.XX.XXX", "userAgent": "aws-internal/3 aws-sdk-java/1.11.976 Linux/4.9.230-0.1.ac.224.84.332.metal1.x86_64 OpenJDK_64-Bit_Server_VM/25.282-b08 java/1.8.0_282 vendor/Oracle_Corporation cfg/retry-mode/legacy", "requestParameters": { "resourceARN": "arn:aws:cloud9:us-east-1:123456789012:environment:3XXXXXXXXX6a4221b7d8e07d9ef6ee21", "tagKeys": "HIDDEN_DUE_TO_SECURITY_REASONS" }, "responseElements": null, "requestID": "0eadaef3-dc0a-4cd7-85f6-135b8529f75f", "eventID": "41f2f2e2-4b17-43d4-96fc-9857981ca1de", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "eventCategory": "Management", "recipientAccountId": "123456789012" }
UpdateEnvironment
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan UpdateEnvironment
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "UpdateEnvironment", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE", "description": "HIDDEN_DUE_TO_SECURITY_REASONS", "name": "my-test-environment-renamed" }, "responseElements": null, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ] }
UpdateEnvironmentMembership
Contoh berikut menunjukkan entri CloudTrail log yang menunjukkan UpdateEnvironmentMembership
tindakan.
{ "Records": [ { "eventVersion": "1.05", "userIdentity": { "type": "IAMUser", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::111122223333:user/MyUser", "accountId": "111122223333", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "userName": "MyUser", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-01-14T11:29:47Z" } }, "invokedBy": "signin.amazonaws.com" }, "eventTime": "2019-01-14T11:33:27Z", "eventSource": "cloud9.amazonaws.com", "eventName": "UpdateEnvironmentMembership", "awsRegion": "us-west-2", "sourceIPAddress": "192.0.2.0", "userAgent": "signin.amazonaws.com", "requestParameters": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE", "userArn": "arn:aws:iam::111122223333:user/MyUser", "permissions": "read-only" }, "responseElements": { "membership": { "environmentId": "2f5ff70a640f49398f67e3bdeEXAMPLE", "permissions": "read-only", "userId": "AIDACKCEVSQ6C2EXAMPLE", "userArn": "arn:aws:iam::111122223333:user/MyUser" } }, "requestID": "f0e629fb-fd37-49bd-b2cc-e9822EXAMPLE", "eventID": "8a906445-1b2a-47e9-8d7c-5b242EXAMPLE", "eventType": "AwsApiCall", "recipientAccountId": "111122223333" } ]}