Amazon EC2 examples using AWS CLI
The following code examples show you how to perform actions and implement common scenarios by using the AWS Command Line Interface with Amazon EC2.
Actions are code excerpts from larger programs and must be run in context. While actions show you how to call individual service functions, you can see actions in context in their related scenarios.
Each example includes a link to the complete source code, where you can find instructions on how to set up and run the code in context.
Topics
Actions
The following code example shows how to use accept-address-transfer.
- AWS CLI
-
To accept an Elastic IP address transferred to your account
The following
accept-address-transferexample accepts the transfer of the specified Elastic IP address to your account.aws ec2 accept-address-transfer \ --address100.21.184.216Output:
{ "AddressTransfer": { "PublicIp": "100.21.184.216", "AllocationId": "eipalloc-09ad461b0d03f6aaf", "TransferAccountId": "123456789012", "TransferOfferExpirationTimestamp": "2023-02-22T20:51:10.000Z", "TransferOfferAcceptedTimestamp": "2023-02-22T22:52:54.000Z", "AddressTransferStatus": "accepted" } }For more information, see Transfer Elastic IP addresses in the Amazon VPC User Guide.
-
For API details, see AcceptAddressTransfer
in AWS CLI Command Reference.
-
The following code example shows how to use accept-reserved-instances-exchange-quote.
- AWS CLI
-
To perform a Convertible Reserved Instance exchange
This example performs an exchange of the specified Convertible Reserved Instances.
Command:
aws ec2 accept-reserved-instances-exchange-quote --reserved-instance-ids7b8750c3-397e-4da4-bbcb-a45ebexample--target-configurationsOfferingId=b747b472-423c-48f3-8cee-679bcexampleOutput:
{ "ExchangeId": "riex-e68ed3c1-8bc8-4c17-af77-811afexample" }-
For API details, see AcceptReservedInstancesExchangeQuote
in AWS CLI Command Reference.
-
The following code example shows how to use accept-transit-gateway-peering-attachment.
- AWS CLI
-
To accept a transit gateway peering attachment
The following
accept-transit-gateway-peering-attachmentexample accepts the specified transit gateway peering attachment. The--regionparameter specifies the Region that the accepter transit gateway is located in.aws ec2 accept-transit-gateway-peering-attachment \ --transit-gateway-attachment-idtgw-attach-4455667788aabbccd\ --regionus-east-2Output:
{ "TransitGatewayPeeringAttachment": { "TransitGatewayAttachmentId": "tgw-attach-4455667788aabbccd", "RequesterTgwInfo": { "TransitGatewayId": "tgw-123abc05e04123abc", "OwnerId": "123456789012", "Region": "us-west-2" }, "AccepterTgwInfo": { "TransitGatewayId": "tgw-11223344aabbcc112", "OwnerId": "123456789012", "Region": "us-east-2" }, "State": "pending", "CreationTime": "2019-12-09T11:38:31.000Z" } }For more information, see Transit Gateway Peering Attachments in the Transit Gateways Guide.
-
For API details, see AcceptTransitGatewayPeeringAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use accept-transit-gateway-vpc-attachment.
- AWS CLI
-
To accept a request to attach a VPC to a transit gateway.
The following
accept-transit-gateway-vpc-attachmentexample accepts the request forte specified attachment.aws ec2 accept-transit-gateway-vpc-attachment \ --transit-gateway-attachment-idtgw-attach-0a34fe6b4fEXAMPLEOutput:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-0a34fe6b4fEXAMPLE", "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "VpcId": "vpc-07e8ffd50fEXAMPLE", "VpcOwnerId": "123456789012", "State": "pending", "SubnetIds": [ "subnet-0752213d59EXAMPLE" ], "CreationTime": "2019-07-10T17:33:46.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" } } }For more information, see Transit Gateway Attachments to a VPC in the Transit Gateways Guide.
-
For API details, see AcceptTransitGatewayVpcAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use accept-vpc-endpoint-connections.
- AWS CLI
-
To accept an interface endpoint connection request
This example accepts the specified endpoint connection request for the specified endpoint service.
Command:
aws ec2 accept-vpc-endpoint-connections --service-idvpce-svc-03d5ebb7d9579a2b3--vpc-endpoint-idsvpce-0c1308d7312217abcOutput:
{ "Unsuccessful": [] }-
For API details, see AcceptVpcEndpointConnections
in AWS CLI Command Reference.
-
The following code example shows how to use accept-vpc-peering-connection.
- AWS CLI
-
To accept a VPC peering connection
This example accepts the specified VPC peering connection request.
Command:
aws ec2 accept-vpc-peering-connection --vpc-peering-connection-idpcx-1a2b3c4dOutput:
{ "VpcPeeringConnection": { "Status": { "Message": "Provisioning", "Code": "provisioning" }, "Tags": [], "AccepterVpcInfo": { "OwnerId": "444455556666", "VpcId": "vpc-44455566", "CidrBlock": "10.0.1.0/28" }, "VpcPeeringConnectionId": "pcx-1a2b3c4d", "RequesterVpcInfo": { "OwnerId": "444455556666", "VpcId": "vpc-111abc45", "CidrBlock": "10.0.0.0/28" } } }-
For API details, see AcceptVpcPeeringConnection
in AWS CLI Command Reference.
-
The following code example shows how to use advertise-byoip-cidr.
- AWS CLI
-
To advertise an address range
The following
advertise-byoip-cidrexample advertises the specified public IPv4 address range.aws ec2 advertise-byoip-cidr \ --cidr203.0.113.25/24Output:
{ "ByoipCidr": { "Cidr": "203.0.113.25/24", "StatusMessage": "ipv4pool-ec2-1234567890abcdef0", "State": "provisioned" } }-
For API details, see AdvertiseByoipCidr
in AWS CLI Command Reference.
-
The following code example shows how to use allocate-address.
- AWS CLI
-
Example 1: To allocate an Elastic IP address from Amazon's address pool
The following
allocate-addressexample allocates an Elastic IP address. Amazon EC2 selects the address from Amazon's address pool.aws ec2 allocate-addressOutput:
{ "PublicIp": "70.224.234.241", "AllocationId": "eipalloc-01435ba59eEXAMPLE", "PublicIpv4Pool": "amazon", "NetworkBorderGroup": "us-west-2", "Domain": "vpc" }For more information, see Elastic IP addresses in the Amazon EC2 User Guide.
Example 2: To allocate an Elastic IP address and associate it with a network border group
The following
allocate-addressexample allocates an Elastic IP address and associates it with the specified network border group.aws ec2 allocate-address \ --network-border-groupus-west-2-lax-1Output:
{ "PublicIp": "70.224.234.241", "AllocationId": "eipalloc-e03dd489ceEXAMPLE", "PublicIpv4Pool": "amazon", "NetworkBorderGroup": "us-west-2-lax-1", "Domain": "vpc" }For more information, see Elastic IP addresses in the Amazon EC2 User Guide.
Example 3: To allocate an Elastic IP address from an address pool that you own
The following
allocate-addressexample allocates an Elastic IP address from an address pool that you have brought to your Amazon Web Services account. Amazon EC2 selects the address from the address pool.aws ec2 allocate-address \ --public-ipv4-poolipv4pool-ec2-1234567890abcdef0Output:
{ "AllocationId": "eipalloc-02463d08ceEXAMPLE", "NetworkBorderGroup": "us-west-2", "CustomerOwnedIp": "18.218.95.81", "CustomerOwnedIpv4Pool": "ipv4pool-ec2-1234567890abcdef0", "Domain": "vpc" "NetworkBorderGroup": "us-west-2", }For more information, see Elastic IP addresses in the Amazon EC2 User Guide.
Example 4: To allocate an Elastic IP address from an IPAM pool
The following
allocate-addressexample allocates a specific /32 Elastic IP address from an Amazon VPC IP Address Manager (IPAM) pool.aws ec2 allocate-address \ --regionus-east-1\ --ipam-pool-idipam-pool-1234567890abcdef0\ --address192.0.2.0Output:
{ "PublicIp": "192.0.2.0", "AllocationId": "eipalloc-abcdef01234567890", "PublicIpv4Pool": "ipam-pool-1234567890abcdef0", "NetworkBorderGroup": "us-east-1", "Domain": "vpc" }For more information, see Allocate sequential Elastic IP addresses from an IPAM pool in the Amazon VPC IPAM User Guide.
-
For API details, see AllocateAddress
in AWS CLI Command Reference.
-
The following code example shows how to use allocate-hosts.
- AWS CLI
-
Example 1: To allocate a Dedicated Host
The following
allocate-hostsexample allocates a single Dedicated Host in theeu-west-1aAvailability Zone, onto which you can launchm5.largeinstances. By default, the Dedicated Host accepts only target instance launches, and does not support host recovery.aws ec2 allocate-hosts \ --instance-typem5.large\ --availability-zoneeu-west-1a\ --quantity1Output:
{ "HostIds": [ "h-07879acf49EXAMPLE" ] }Example 2: To allocate a Dedicated Host with auto-placement and host recovery enabled
The following
allocate-hostsexample allocates a single Dedicated Host in theeu-west-1aAvailability Zone with auto-placement and host recovery enabled.aws ec2 allocate-hosts \ --instance-typem5.large\ --availability-zoneeu-west-1a\ --auto-placementon\ --host-recoveryon\ --quantity1Output:
{ "HostIds": [ "h-07879acf49EXAMPLE" ] }Example 3: To allocate a Dedicated Host with tags
The following
allocate-hostsexample allocates a single Dedicated Host and applies a tag with a key namedpurposeand a value ofproduction.aws ec2 allocate-hosts \ --instance-typem5.large\ --availability-zoneeu-west-1a\ --quantity1\ --tag-specifications 'ResourceType=dedicated-host,Tags={Key=purpose,Value=production}'Output:
{ "HostIds": [ "h-07879acf49EXAMPLE" ] }For more information, see Allocate a Dedicated Host in the Amazon EC2 User Guide.
-
For API details, see AllocateHosts
in AWS CLI Command Reference.
-
The following code example shows how to use allocate-ipam-pool-cidr.
- AWS CLI
-
To allocate a CIDR from an IPAM pool
The following
allocate-ipam-pool-cidrexample allocates a CIDR from an IPAM pool.(Linux):
aws ec2 allocate-ipam-pool-cidr \ --ipam-pool-idipam-pool-0533048da7d823723\ --netmask-length24(Windows):
aws ec2 allocate-ipam-pool-cidr^--ipam-pool-idipam-pool-0533048da7d823723^--netmask-length24Output:
{ "IpamPoolAllocation": { "Cidr": "10.0.0.0/24", "IpamPoolAllocationId": "ipam-pool-alloc-018ecc28043b54ba38e2cd99943cebfbd", "ResourceType": "custom", "ResourceOwner": "123456789012" } }For more information, see Manually allocate a CIDR to a pool to reserve IP address space in the Amazon VPC IPAM User Guide.
-
For API details, see AllocateIpamPoolCidr
in AWS CLI Command Reference.
-
The following code example shows how to use apply-security-groups-to-client-vpn-target-network.
- AWS CLI
-
To apply security groups to a target network for a Client VPN endpoint
The following
apply-security-groups-to-client-vpn-target-networkexample applies security groupsg-01f6e627a89f4db32to the association between the specified target network and Client VPN endpoint.aws ec2 apply-security-groups-to-client-vpn-target-network \ --security-group-idssg-01f6e627a89f4db32\ --vpc-idvpc-0e2110c2f324332e0\ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "SecurityGroupIds": [ "sg-01f6e627a89f4db32" ] }For more information, see Target Networks in the AWS Client VPN Administrator Guide.
-
For API details, see ApplySecurityGroupsToClientVpnTargetNetwork
in AWS CLI Command Reference.
-
The following code example shows how to use assign-ipv6-addresses.
- AWS CLI
-
To assign specific IPv6 addresses to a network interface
This example assigns the specified IPv6 addresses to the specified network interface.
Command:
aws ec2 assign-ipv6-addresses --network-interface-ideni-38664473--ipv6-addresses2001:db8:1234:1a00:3304:8879:34cf:40712001:db8:1234:1a00:9691:9503:25ad:1761Output:
{ "AssignedIpv6Addresses": [ "2001:db8:1234:1a00:3304:8879:34cf:4071", "2001:db8:1234:1a00:9691:9503:25ad:1761" ], "NetworkInterfaceId": "eni-38664473" }To assign IPv6 addresses that Amazon selects to a network interface
This example assigns two IPv6 addresses to the specified network interface. Amazon automatically assigns these IPv6 addresses from the available IPv6 addresses in the IPv6 CIDR block range of the subnet.
Command:
aws ec2 assign-ipv6-addresses --network-interface-ideni-38664473--ipv6-address-count2Output:
{ "AssignedIpv6Addresses": [ "2001:db8:1234:1a00:3304:8879:34cf:4071", "2001:db8:1234:1a00:9691:9503:25ad:1761" ], "NetworkInterfaceId": "eni-38664473" }-
For API details, see AssignIpv6Addresses
in AWS CLI Command Reference.
-
The following code example shows how to use assign-private-ip-addresses.
- AWS CLI
-
To assign a specific secondary private IP address a network interface
This example assigns the specified secondary private IP address to the specified network interface. If the command succeeds, no output is returned.
Command:
aws ec2 assign-private-ip-addresses --network-interface-ideni-e5aa89a3--private-ip-addresses10.0.0.82To assign secondary private IP addresses that Amazon EC2 selects to a network interface
This example assigns two secondary private IP addresses to the specified network interface. Amazon EC2 automatically assigns these IP addresses from the available IP addresses in the CIDR block range of the subnet the network interface is associated with. If the command succeeds, no output is returned.
Command:
aws ec2 assign-private-ip-addresses --network-interface-ideni-e5aa89a3--secondary-private-ip-address-count2-
For API details, see AssignPrivateIpAddresses
in AWS CLI Command Reference.
-
The following code example shows how to use assign-private-nat-gateway-address.
- AWS CLI
-
To assign private IP addresses to your private NAT gateway
The following
assign-private-nat-gateway-addressexample assigns two private IP addresses to the specified private NAT gateway.aws ec2 assign-private-nat-gateway-address \ --nat-gateway-idnat-1234567890abcdef0\ --private-ip-address-count2Output:
{ "NatGatewayId": "nat-1234567890abcdef0", "NatGatewayAddresses": [ { "NetworkInterfaceId": "eni-0065a61b324d1897a", "IsPrimary": false, "Status": "assigning" }, { "NetworkInterfaceId": "eni-0065a61b324d1897a", "IsPrimary": false, "Status": "assigning" } ] }For more information, see NAT gateways in the Amazon VPC User Guide.
-
For API details, see AssignPrivateNatGatewayAddress
in AWS CLI Command Reference.
-
The following code example shows how to use associate-address.
- AWS CLI
-
Example 1: To associate an Elastic IP address with an instance
The following
associate-addressexample associates an Elastic IP address with the specified EC2 instance.aws ec2 associate-address \ --instance-idi-0b263919b6498b123\ --allocation-ideipalloc-64d5890aOutput:
{ "AssociationId": "eipassoc-2bebb745" }Example 2: To associate an Elastic IP address with a network interface
The following
associate-addressexample associates the specified Elastic IP address with the specified network interface.aws ec2 associate-address --allocation-ideipalloc-64d5890a\ --network-interface-ideni-1a2b3c4dOutput:
{ "AssociationId": "eipassoc-2bebb745" }Example 3: To associate an Elastic IP address with a private IP address
The following
associate-addressexample associates the specified Elastic IP address with the specified private IP address in the specified network interface.aws ec2 associate-address \ --allocation-ideipalloc-64d5890a\ --network-interface-ideni-1a2b3c4d\ --private-ip-address10.0.0.85Output:
{ "AssociationId": "eipassoc-2bebb745" }For more information, see Elastic IP addresses in the Amazon EC2 User Guide.
-
For API details, see AssociateAddress
in AWS CLI Command Reference.
-
The following code example shows how to use associate-client-vpn-target-network.
- AWS CLI
-
To associate a target network with a Client VPN endpoint
The following
associate-client-vpn-target-networkexample associates a subnet with the specified Client VPN endpoint.aws ec2 associate-client-vpn-target-network \ --subnet-idsubnet-0123456789abcabca\ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "AssociationId": "cvpn-assoc-12312312312312312", "Status": { "Code": "associating" } }For more information, see Target Networks in the AWS Client VPN Administrator Guide.
-
For API details, see AssociateClientVpnTargetNetwork
in AWS CLI Command Reference.
-
The following code example shows how to use associate-dhcp-options.
- AWS CLI
-
To associate a DHCP options set with your VPC
This example associates the specified DHCP options set with the specified VPC. If the command succeeds, no output is returned.
Command:
aws ec2 associate-dhcp-options --dhcp-options-iddopt-d9070ebb--vpc-idvpc-a01106c2To associate the default DHCP options set with your VPC
This example associates the default DHCP options set with the specified VPC. If the command succeeds, no output is returned.
Command:
aws ec2 associate-dhcp-options --dhcp-options-iddefault--vpc-idvpc-a01106c2-
For API details, see AssociateDhcpOptions
in AWS CLI Command Reference.
-
The following code example shows how to use associate-iam-instance-profile.
- AWS CLI
-
To associate an IAM instance profile with an instance
This example associates an IAM instance profile named
admin-rolewith instancei-123456789abcde123.Command:
aws ec2 associate-iam-instance-profile --instance-idi-123456789abcde123--iam-instance-profileName=admin-roleOutput:
{ "IamInstanceProfileAssociation": { "InstanceId": "i-123456789abcde123", "State": "associating", "AssociationId": "iip-assoc-0e7736511a163c209", "IamInstanceProfile": { "Id": "AIPAJBLK7RKJKWDXVHIEC", "Arn": "arn:aws:iam::123456789012:instance-profile/admin-role" } } }-
For API details, see AssociateIamInstanceProfile
in AWS CLI Command Reference.
-
The following code example shows how to use associate-instance-event-window.
- AWS CLI
-
Example 1: To associate one or more instances with an event window
The following
associate-instance-event-windowexample associates one or more instances with an event window.aws ec2 associate-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --association-target"InstanceIds=i-1234567890abcdef0,i-0598c7d356eba48d7"Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [ "i-1234567890abcdef0", "i-0598c7d356eba48d7" ], "Tags": [], "DedicatedHostIds": [] }, "State": "creating" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 2: To associate instance tags with an event window
The following
associate-instance-event-windowexample associates instance tags with an event window. Enter aninstance-event-window-idparameter to specify the event window. To associate instance tags, specify theassociation-targetparameter, and for the parameter value, specify one or more tags.aws ec2 associate-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --association-target"InstanceTags=[{Key=k2,Value=v2},{Key=k1,Value=v1}]"Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [], "Tags": [ { "Key": "k2", "Value": "v2" }, { "Key": "k1", "Value": "v1" } ], "DedicatedHostIds": [] }, "State": "creating" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 3: To associate a Dedicated Host with an event window
The following
associate-instance-event-windowexample associates a Dedicated Host with an event window. Enter aninstance-event-window-idparameter to specify the event window. To associate a Dedicated Host, specify the--association-targetparameter, and for the parameter values, specify one of more Dedicated Host IDs.aws ec2 associate-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --association-target"DedicatedHostIds=h-029fa35a02b99801d"Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [], "Tags": [], "DedicatedHostIds": [ "h-029fa35a02b99801d" ] }, "State": "creating" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
-
For API details, see AssociateInstanceEventWindow
in AWS CLI Command Reference.
-
The following code example shows how to use associate-ipam-resource-discovery.
- AWS CLI
-
To associate a resource discovery with an IPAM
In this example, you are an IPAM delegated admin and a resource discovery has been created and shared with you by another AWS account so that you can use IPAM to manage and monitor resource CIDRs owned by the other account.
Note
To complete this request, you'll need the resource discovery ID which you can get with describe-ipam-resource-discoveries and the IPAM ID which you can get with describe-ipams.The resource discovery that you are associating must have first been shared with your account using AWS RAM.The
--regionyou enter must match the home Region of the IPAM you are associating it with.The following
associate-ipam-resource-discoveryexample associates a resource discovery with an IPAM.aws ec2 associate-ipam-resource-discovery \ --ipam-idipam-005f921c17ebd5107\ --ipam-resource-discovery-idipam-res-disco-03e0406de76a044ee\ --tag-specifications 'ResourceType=ipam-resource-discovery,Tags=[{Key=cost-center,Value=cc123}]' \ --regionus-east-1Output:
{ { "IpamResourceDiscoveryAssociation": { "OwnerId": "320805250157", "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-04382a6346357cf82", "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::320805250157:ipam-resource-discovery-association/ipam-res-disco-assoc-04382a6346357cf82", "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "IpamId": "ipam-005f921c17ebd5107", "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107", "IpamRegion": "us-east-1", "IsDefault": false, "ResourceDiscoveryStatus": "active", "State": "associate-in-progress", "Tags": [] } } }Once you associate a resource discovery, you can monitor and/or manage the IP addresses of resources created by the other accounts. For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
-
For API details, see AssociateIpamResourceDiscovery
in AWS CLI Command Reference.
-
The following code example shows how to use associate-nat-gateway-address.
- AWS CLI
-
To associate an Elastic IP address with a public NAT gateway
The following
associate-nat-gateway-addressexample associates the specified Elastic IP address with the specified public NAT gateway. AWS automatically assigns a secondary private IPv4 address.aws ec2 associate-nat-gateway-address \ --nat-gateway-idnat-1234567890abcdef0\ --allocation-idseipalloc-0be6ecac95EXAMPLEOutput:
{ "NatGatewayId": "nat-1234567890abcdef0", "NatGatewayAddresses": [ { "AllocationId": "eipalloc-0be6ecac95EXAMPLE", "NetworkInterfaceId": "eni-09cc4b2558794f7f9", "IsPrimary": false, "Status": "associating" } ] }For more information, see NAT gateways in the Amazon VPC User Guide.
-
For API details, see AssociateNatGatewayAddress
in AWS CLI Command Reference.
-
The following code example shows how to use associate-route-table.
- AWS CLI
-
To associate a route table with a subnet
This example associates the specified route table with the specified subnet.
Command:
aws ec2 associate-route-table --route-table-idrtb-22574640--subnet-idsubnet-9d4a7b6cOutput:
{ "AssociationId": "rtbassoc-781d0d1a" }-
For API details, see AssociateRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use associate-security-group-vpc.
- AWS CLI
-
To associate a security group with another VPC
The following
associate-security-group-vpcexample associates the specified security group with the specified VPC.aws ec2 associate-security-group-vpc \ --group-idsg-04dbb43907d3f8a78\ --vpc-idvpc-0bf4c2739bc05a694Output:
{ "State": "associating" }For more information, see Associate security groups with multiple VPCs in the Amazon VPC User Guide.
-
For API details, see AssociateSecurityGroupVpc
in AWS CLI Command Reference.
-
The following code example shows how to use associate-subnet-cidr-block.
- AWS CLI
-
To associate an IPv6 CIDR block with a subnet
This example associates an IPv6 CIDR block with the specified subnet.
Command:
aws ec2 associate-subnet-cidr-block --subnet-idsubnet-5f46ec3b--ipv6-cidr-block2001:db8:1234:1a00::/64Output:
{ "SubnetId": "subnet-5f46ec3b", "Ipv6CidrBlockAssociation": { "Ipv6CidrBlock": "2001:db8:1234:1a00::/64", "AssociationId": "subnet-cidr-assoc-3aa54053", "Ipv6CidrBlockState": { "State": "associating" } } }-
For API details, see AssociateSubnetCidrBlock
in AWS CLI Command Reference.
-
The following code example shows how to use associate-transit-gateway-multicast-domain.
- AWS CLI
-
To associate a transit gateway with a multicast domain
The following
associate-transit-gateway-multicast-domainexample associates the specified subnet and attachment with the specified multicast domain.aws ec2 associate-transit-gateway-multicast-domain \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef79d6e597\ --transit-gateway-attachment-idtgw-attach-028c1dd0f8f5cbe8e\ --subnet-idssubnet-000de86e3b49c932a\ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef7EXAMPLEOutput:
{ "Associations": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef79d6e597", "TransitGatewayAttachmentId": "tgw-attach-028c1dd0f8f5cbe8e", "ResourceId": "vpc-01128d2c240c09bd5", "ResourceType": "vpc", "Subnets": [ { "SubnetId": "subnet-000de86e3b49c932a", "State": "associating" } ] } }For more information, see Multicast domains in the Transit Gateways Guide.
-
For API details, see AssociateTransitGatewayMulticastDomain
in AWS CLI Command Reference.
-
The following code example shows how to use associate-transit-gateway-route-table.
- AWS CLI
-
To associate a transit gateway route table with a transit gateway attachment
The following example associates the specified transit gateway route table with the specified VPC attachment.
aws ec2 associate-transit-gateway-route-table \ --transit-gateway-route-table-idtgw-rtb-002573ed1eEXAMPLE\ --transit-gateway-attachment-idtgw-attach-0b5968d3b6EXAMPLEOutput:
{ "Association": { "TransitGatewayRouteTableId": "tgw-rtb-002573ed1eEXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-0b5968d3b6EXAMPLE", "ResourceId": "vpc-0065acced4EXAMPLE", "ResourceType": "vpc", "State": "associating" } }For more information, see Associate a Transit Gateway Route Table in the AWS Transit Gateways Guide.
-
For API details, see AssociateTransitGatewayRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use associate-vpc-cidr-block.
- AWS CLI
-
Example 1: To associate an Amazon-provided IPv6 CIDR block with a VPC
The following
associate-vpc-cidr-blockexample associates an IPv6 CIDR block with the specified VPC.:aws ec2 associate-vpc-cidr-block \ --amazon-provided-ipv6-cidr-block \ --ipv6-cidr-block-network-border-groupus-west-2-lax-1\ --vpc-idvpc-8EXAMPLEOutput:
{ "Ipv6CidrBlockAssociation": { "AssociationId": "vpc-cidr-assoc-0838ce7d9dEXAMPLE", "Ipv6CidrBlockState": { "State": "associating" }, "NetworkBorderGroup": "us-west-2-lax-1" }, "VpcId": "vpc-8EXAMPLE" }Example 2:To associate an additional IPv4 CIDR block with a VPC
The following
associate-vpc-cidr-blockexample associates the IPv4 CIDR block10.2.0.0/16with the specified VPC.aws ec2 associate-vpc-cidr-block \ --vpc-idvpc-1EXAMPLE\ --cidr-block10.2.0.0/16Output:
{ "CidrBlockAssociation": { "AssociationId": "vpc-cidr-assoc-2EXAMPLE", "CidrBlock": "10.2.0.0/16", "CidrBlockState": { "State": "associating" } }, "VpcId": "vpc-1EXAMPLE" }-
For API details, see AssociateVpcCidrBlock
in AWS CLI Command Reference.
-
The following code example shows how to use attach-classic-link-vpc.
- AWS CLI
-
To link (attach) an EC2-Classic instance to a VPC
This example links instance i-1234567890abcdef0 to VPC vpc-88888888 through the VPC security group sg-12312312.
Command:
aws ec2 attach-classic-link-vpc --instance-idi-1234567890abcdef0--vpc-idvpc-88888888--groupssg-12312312Output:
{ "Return": true }-
For API details, see AttachClassicLinkVpc
in AWS CLI Command Reference.
-
The following code example shows how to use attach-internet-gateway.
- AWS CLI
-
To attach an internet gateway to your VPC
The following
attach-internet-gatewayexample attaches the specified internet gateway to the specific VPC.aws ec2 attach-internet-gateway \ --internet-gateway-idigw-0d0fb496b3EXAMPLE\ --vpc-idvpc-0a60eb65b4EXAMPLEThis command produces no output.
For more information, see Internet gateways in the Amazon VPC User Guide.
-
For API details, see AttachInternetGateway
in AWS CLI Command Reference.
-
The following code example shows how to use attach-network-interface.
- AWS CLI
-
Example 1: To attach a network interface to an instance
The following
attach-network-interfaceexample attaches the specified network interface to the specified instance.aws ec2 attach-network-interface \ --network-interface-ideni-0dc56a8d4640ad10a\ --instance-idi-1234567890abcdef0\ --device-index1Output:
{ "AttachmentId": "eni-attach-01a8fc87363f07cf9" }For more information, see Elastic network interfaces in the Amazon EC2 User Guide.
Example 2: To attach a network interface to an instance with multiple network cards
The following
attach-network-interfaceexample attaches the specified network interface to the specified instance and network card.aws ec2 attach-network-interface \ --network-interface-ideni-07483b1897541ad83\ --instance-idi-01234567890abcdef\ --network-card-index1\ --device-index1Output:
{ "AttachmentId": "eni-attach-0fbd7ee87a88cd06c" }For more information, see Elastic network interfaces in the Amazon EC2 User Guide.
-
For API details, see AttachNetworkInterface
in AWS CLI Command Reference.
-
The following code example shows how to use attach-verified-access-trust-provider.
- AWS CLI
-
To attach a trust provider to an instance
The following
attach-verified-access-trust-providerexample attaches the specified Verified Access trust provider to the specified Verified Access instance.aws ec2 attach-verified-access-trust-provider \ --verified-access-instance-idvai-0ce000c0b7643abea\ --verified-access-trust-provider-idvatp-0bb32de759a3e19e7Output:
{ "VerifiedAccessTrustProvider": { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "Description": "", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center", "PolicyReferenceName": "idc", "CreationTime": "2023-08-25T19:00:38", "LastUpdatedTime": "2023-08-25T19:00:38" }, "VerifiedAccessInstance": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "", "VerifiedAccessTrustProviders": [ { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center" } ], "CreationTime": "2023-08-25T18:27:56", "LastUpdatedTime": "2023-08-25T18:27:56" } }For more information, see Verified Access instances in the AWS Verified Access User Guide.
-
For API details, see AttachVerifiedAccessTrustProvider
in AWS CLI Command Reference.
-
The following code example shows how to use attach-volume.
- AWS CLI
-
To attach a volume to an instance
This example command attaches a volume (
vol-1234567890abcdef0) to an instance (i-01474ef662b89480) as/dev/sdf.Command:
aws ec2 attach-volume --volume-idvol-1234567890abcdef0--instance-idi-01474ef662b89480--device/dev/sdfOutput:
{ "AttachTime": "YYYY-MM-DDTHH:MM:SS.000Z", "InstanceId": "i-01474ef662b89480", "VolumeId": "vol-1234567890abcdef0", "State": "attaching", "Device": "/dev/sdf" }-
For API details, see AttachVolume
in AWS CLI Command Reference.
-
The following code example shows how to use attach-vpn-gateway.
- AWS CLI
-
To attach a virtual private gateway to your VPC
The following
attach-vpn-gatewayexample attaches the specified virtual private gateway to the specified VPC.aws ec2 attach-vpn-gateway \ --vpn-gateway-idvgw-9a4cacf3\ --vpc-idvpc-a01106c2Output:
{ "VpcAttachment": { "State": "attaching", "VpcId": "vpc-a01106c2" } }-
For API details, see AttachVpnGateway
in AWS CLI Command Reference.
-
The following code example shows how to use authorize-client-vpn-ingress.
- AWS CLI
-
To add an authorization rule for a Client VPN endpoint
The following
authorize-client-vpn-ingressexample adds an ingress authorization rule that permits all clients to access the internet (0.0.0.0/0).aws ec2 authorize-client-vpn-ingress \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --target-network-cidr0.0.0.0/0\ --authorize-all-groupsOutput:
{ "Status": { "Code": "authorizing" } }For more information, see Authorization Rules in the AWS Client VPN Administrator Guide.
-
For API details, see AuthorizeClientVpnIngress
in AWS CLI Command Reference.
-
The following code example shows how to use authorize-security-group-egress.
- AWS CLI
-
Example 1: To add a rule that allows outbound traffic to a specific address range
The following
authorize-security-group-egressexample adds a rule that grants access to the specified address ranges on TCP port 80.aws ec2 authorize-security-group-egress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=tcp,FromPort=80,ToPort=80,IpRanges=[{CidrIp=10.0.0.0/16}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-0b15794cdb17bf29c", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": true, "IpProtocol": "tcp", "FromPort": 80, "ToPort": 80, "CidrIpv4": "10.0.0.0/16" } ] }Example 2: To add a rule that allows outbound traffic to a specific security group
The following
authorize-security-group-egressexample adds a rule that grants access to the specified security group on TCP port 80.aws ec2 authorize-security-group-egress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=tcp,FromPort=80,ToPort=80,UserIdGroupPairs=[{GroupId=sg-0aad1c26bbeec5c22}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-0b5dd815afcea9cc3", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": true, "IpProtocol": "tcp", "FromPort": 80, "ToPort": 80, "ReferencedGroupInfo": { "GroupId": "sg-0aad1c26bbeec5c22", "UserId": "123456789012" } } ] }For more information, see Security groups in the Amazon VPC User Guide.
-
For API details, see AuthorizeSecurityGroupEgress
in AWS CLI Command Reference.
-
The following code example shows how to use authorize-security-group-ingress.
- AWS CLI
-
Example 1: To add a rule that allows inbound SSH traffic
The following
authorize-security-group-ingressexample adds a rule that allows inbound traffic on TCP port 22 (SSH).aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --protocoltcp\ --port22\ --cidr203.0.113.0/24Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-01afa97ef3e1bedfc", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "tcp", "FromPort": 22, "ToPort": 22, "CidrIpv4": "203.0.113.0/24" } ] }Example 2: To add a rule that allows inbound HTTP traffic from another security group
The following
authorize-security-group-ingressexample adds a rule that allows inbound access on TCP port 80 from the source security groupsg-1a2b3c4d. The source group must be in the same VPC or in a peer VPC (requires a VPC peering connection). Incoming traffic is allowed based on the private IP addresses of instances that are associated with the source security group (not the public IP address or Elastic IP address).aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --protocoltcp\ --port80\ --source-groupsg-1a2b3c4dOutput:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-01f4be99110f638a7", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "tcp", "FromPort": 80, "ToPort": 80, "ReferencedGroupInfo": { "GroupId": "sg-1a2b3c4d", "UserId": "123456789012" } } ] }Example 3: To add multiple rules in the same call
The following
authorize-security-group-ingressexample uses theip-permissionsparameter to add two inbound rules, one that enables inbound access on TCP port 3389 (RDP) and the other that enables ping/ICMP.aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=tcp,FromPort=3389,ToPort=3389,IpRanges=[{CidrIp=172.31.0.0/16}]" "IpProtocol=icmp,FromPort=-1,ToPort=-1,IpRanges=[{CidrIp=172.31.0.0/16}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-00e06e5d3690f29f3", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "tcp", "FromPort": 3389, "ToPort": 3389, "CidrIpv4": "172.31.0.0/16" }, { "SecurityGroupRuleId": "sgr-0a133dd4493944b87", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "tcp", "FromPort": -1, "ToPort": -1, "CidrIpv4": "172.31.0.0/16" } ] }Example 4: To add a rule for ICMP traffic
The following
authorize-security-group-ingressexample uses theip-permissionsparameter to add an inbound rule that allows the ICMP messageDestination Unreachable: Fragmentation Needed and Don't Fragment was Set(Type 3, Code 4) from anywhere.aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=icmp,FromPort=3,ToPort=4,IpRanges=[{CidrIp=0.0.0.0/0}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-0de3811019069b787", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "icmp", "FromPort": 3, "ToPort": 4, "CidrIpv4": "0.0.0.0/0" } ] }Example 5: To add a rule for IPv6 traffic
The following
authorize-security-group-ingressexample uses theip-permissionsparameter to add an inbound rule that allows SSH access (port 22) from the IPv6 range2001:db8:1234:1a00::/64.aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=tcp,FromPort=22,ToPort=22,Ipv6Ranges=[{CidrIpv6=2001:db8:1234:1a00::/64}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-0455bc68b60805563", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "tcp", "FromPort": 22, "ToPort": 22, "CidrIpv6": "2001:db8:1234:1a00::/64" } ] }Example 6: To add a rule for ICMPv6 traffic
The following
authorize-security-group-ingressexample uses theip-permissionsparameter to add an inbound rule that allows ICMPv6 traffic from anywhere.aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=icmpv6,Ipv6Ranges=[{CidrIpv6=::/0}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-04b612d9363ab6327", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "icmpv6", "FromPort": -1, "ToPort": -1, "CidrIpv6": "::/0" } ] }Example 7: Add a rule with a description
The following
authorize-security-group-ingressexample uses theip-permissionsparameter to add an inbound rule that allows RDP traffic from the specified IPv4 address range. The rule includes a description to help you identify it later.aws ec2 authorize-security-group-ingress \ --group-idsg-1234567890abcdef0\ --ip-permissions 'IpProtocol=tcp,FromPort=3389,ToPort=3389,IpRanges=[{CidrIp=203.0.113.0/24,Description='RDPaccessfromNYoffice'}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-0397bbcc01e974db3", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "tcp", "FromPort": 3389, "ToPort": 3389, "CidrIpv4": "203.0.113.0/24", "Description": "RDP access from NY office" } ] }Example 8: To add an inbound rule that uses a prefix list
The following
authorize-security-group-ingressexample uses theip-permissionsparameter to add an inbound rule that allows all traffic for the CIDR ranges in the specified prefix list.aws ec2 authorize-security-group-ingress \ --group-idsg-04a351bfe432d4e71\ --ip-permissions 'IpProtocol=all,PrefixListIds=[{PrefixListId=pl-002dc3ec097de1514}]'Output:
{ "Return": true, "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-09c74b32f677c6c7c", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "123456789012", "IsEgress": false, "IpProtocol": "-1", "FromPort": -1, "ToPort": -1, "PrefixListId": "pl-0721453c7ac4ec009" } ] }For more information, see Security groups in the Amazon VPC User Guide.
-
For API details, see AuthorizeSecurityGroupIngress
in AWS CLI Command Reference.
-
The following code example shows how to use bundle-instance.
- AWS CLI
-
To bundle an instance
This example bundles instance
i-1234567890abcdef0to a bucket calledbundletasks. Before you specify values for your access key IDs, review and follow the guidance in Best Practices for Managing AWS Access Keys.Command:
aws ec2 bundle-instance --instance-idi-1234567890abcdef0--bucketbundletasks--prefixwinami--owner-akidAK12AJEXAMPLE--owner-sakexample123exampleOutput:
{ "BundleTask": { "UpdateTime": "2015-09-15T13:30:35.000Z", "InstanceId": "i-1234567890abcdef0", "Storage": { "S3": { "Prefix": "winami", "Bucket": "bundletasks" } }, "State": "pending", "StartTime": "2015-09-15T13:30:35.000Z", "BundleId": "bun-294e041f" } }-
For API details, see BundleInstance
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-bundle-task.
- AWS CLI
-
To cancel a bundle task
This example cancels bundle task
bun-2a4e041c.Command:
aws ec2 cancel-bundle-task --bundle-idbun-2a4e041cOutput:
{ "BundleTask": { "UpdateTime": "2015-09-15T13:27:40.000Z", "InstanceId": "i-1234567890abcdef0", "Storage": { "S3": { "Prefix": "winami", "Bucket": "bundletasks" } }, "State": "cancelling", "StartTime": "2015-09-15T13:24:35.000Z", "BundleId": "bun-2a4e041c" } }-
For API details, see CancelBundleTask
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-capacity-reservation-fleets.
- AWS CLI
-
To cancel a Capacity Reservation Fleet
The following
cancel-capacity-reservation-fleetsexample cancels the specified Capacity Reservation Fleet and the capacity it reserves. When you cancel a Fleet, its status changes tocancelled, and it can no longer create new Capacity Reservations. Additionally, all of the individual Capacity Reservations in the Fleet are cancelled, and the instances that were previously running in the reserved capacity continue to run normally in shared capacity.aws ec2 cancel-capacity-reservation-fleets \ --capacity-reservation-fleet-idscrf-abcdef01234567890Output:
{ "SuccessfulFleetCancellations": [ { "CurrentFleetState": "cancelling", "PreviousFleetState": "active", "CapacityReservationFleetId": "crf-abcdef01234567890" } ], "FailedFleetCancellations": [] }For more information about Capacity Reservation Fleets, see Capacity Reservation Fleets in the Amazon EC2 User Guide.
-
For API details, see CancelCapacityReservationFleets
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-capacity-reservation.
- AWS CLI
-
To cancel a capacity reservation
The following
cancel-capacity-reservationexample cancels the specified capacity reservation.aws ec2 cancel-capacity-reservation \ --capacity-reservation-idcr-1234abcd56EXAMPLEOutput:
{ "Return": true }For more information, see Cancel a Capacity Reservation in the Amazon EC2 User Guide.
-
For API details, see CancelCapacityReservation
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-conversion-task.
- AWS CLI
-
To cancel an active conversion of an instance or a volume
This example cancels the upload associated with the task ID import-i-fh95npoc. If the command succeeds, no output is returned.
Command:
aws ec2 cancel-conversion-task --conversion-task-idimport-i-fh95npoc-
For API details, see CancelConversionTask
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-export-task.
- AWS CLI
-
To cancel an active export task
This example cancels an active export task with the task ID export-i-fgelt0i7. If the command succeeds, no output is returned.
Command:
aws ec2 cancel-export-task --export-task-idexport-i-fgelt0i7-
For API details, see CancelExportTask
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-image-launch-permission.
- AWS CLI
-
To cancel having an AMI shared with your Amazon Web Services account
The following
cancel-image-launch-permissionexample removes your account from the specified AMI's launch permissions.aws ec2 cancel-image-launch-permission \ --image-idami-0123456789example\ --regionus-east-1Output:
{ "Return": true }For more information, see Cancel having an AMI shared with your Amazon Web Services account in the Amazon EC2 User Guide.
-
For API details, see CancelImageLaunchPermission
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-import-task.
- AWS CLI
-
To cancel an import task
The following
cancel-import-taskexample cancels the specified import image task.aws ec2 cancel-import-task \ --import-task-idimport-ami-1234567890abcdef0Output:
{ "ImportTaskId": "import-ami-1234567890abcdef0", "PreviousState": "active", "State": "deleting" }-
For API details, see CancelImportTask
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-reserved-instances-listing.
- AWS CLI
-
To cancel a Reserved Instance listing
The following
cancel-reserved-instances-listingexample cancels the specified Reserved Instance listing.aws ec2 cancel-reserved-instances-listing \ --reserved-instances-listing-id5ec28771-05ff-4b9b-aa31-9e57dexample-
For API details, see CancelReservedInstancesListing
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-spot-fleet-requests.
- AWS CLI
-
Example 1: To cancel a Spot fleet request and terminate the associated instances
The following
cancel-spot-fleet-requestsexample cancels a Spot Fleet request and terminates the associated On-Demand Instances and Spot Instances.aws ec2 cancel-spot-fleet-requests \ --spot-fleet-request-idssfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE\ --terminate-instancesOutput:
{ "SuccessfulFleetRequests": [ { "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE", "CurrentSpotFleetRequestState": "cancelled_terminating", "PreviousSpotFleetRequestState": "active" } ], "UnsuccessfulFleetRequests": [] }Example 2: To cancel a Spot fleet request without terminating the associated instances
The following
cancel-spot-fleet-requestsexample cancels a Spot Fleet request without terminating the associated On-Demand Instances and Spot Instances.aws ec2 cancel-spot-fleet-requests \ --spot-fleet-request-idssfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE\ --no-terminate-instancesOutput:
{ "SuccessfulFleetRequests": [ { "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE", "CurrentSpotFleetRequestState": "cancelled_running", "PreviousSpotFleetRequestState": "active" } ], "UnsuccessfulFleetRequests": [] }For more information, see Cancel a Spot Fleet request in the Amazon EC2 User Guide.
-
For API details, see CancelSpotFleetRequests
in AWS CLI Command Reference.
-
The following code example shows how to use cancel-spot-instance-requests.
- AWS CLI
-
To cancel Spot Instance requests
This example command cancels a Spot Instance request.
Command:
aws ec2 cancel-spot-instance-requests --spot-instance-request-idssir-08b93456Output:
{ "CancelledSpotInstanceRequests": [ { "State": "cancelled", "SpotInstanceRequestId": "sir-08b93456" } ] }-
For API details, see CancelSpotInstanceRequests
in AWS CLI Command Reference.
-
The following code example shows how to use confirm-product-instance.
- AWS CLI
-
To confirm the product instance
This example determines whether the specified product code is associated with the specified instance.
Command:
aws ec2 confirm-product-instance --product-code774F4FF8--instance-idi-1234567890abcdef0Output:
{ "OwnerId": "123456789012" }-
For API details, see ConfirmProductInstance
in AWS CLI Command Reference.
-
The following code example shows how to use copy-fpga-image.
- AWS CLI
-
To copy an Amazon FPGA image
This example copies the specified AFI from the
us-east-1region to the current region (eu-west-1).Command:
aws ec2 copy-fpga-image --namecopy-afi--source-fpga-image-idafi-0d123e123bfc85abc--source-regionus-east-1--regioneu-west-1Output:
{ "FpgaImageId": "afi-06b12350a123fbabc" }-
For API details, see CopyFpgaImage
in AWS CLI Command Reference.
-
The following code example shows how to use copy-image.
- AWS CLI
-
Example 1: To copy an AMI to another Region
The following
copy-imageexample command copies the specified AMI from theus-west-2Region to theus-east-1Region and adds a short description.aws ec2 copy-image \ --regionus-east-1\ --nameami-name\ --source-regionus-west-2\ --source-image-idami-066877671789bd71b\ --description"This is my copied image."Output:
{ "ImageId": "ami-0123456789abcdefg" }For more information, see Copy an AMI in the Amazon EC2 User Guide.
Example 2: To copy an AMI to another Region and encrypt the backing snapshot
The following
copy-imagecommand copies the specified AMI from theus-west-2Region to the current Region and encrypts the backing snapshot using the specified KMS key.aws ec2 copy-image \ --source-regionus-west-2\ --nameami-name\ --source-image-idami-066877671789bd71b\ --encrypted \ --kms-key-idalias/my-kms-keyOutput:
{ "ImageId": "ami-0123456789abcdefg" }For more information, see Copy an AMI in the Amazon EC2 User Guide.
Example 3: To include your user-defined AMI tags when copying an AMI
The following
copy-imagecommand uses the--copy-image-tagsparameter to copy your user-defined AMI tags when copying the AMI.aws ec2 copy-image \ --regionus-east-1\ --nameami-name\ --source-regionus-west-2\ --source-image-idami-066877671789bd71b\ --description"This is my copied image."--copy-image-tagsOutput:
{ "ImageId": "ami-0123456789abcdefg" }For more information, see Copy an AMI in the Amazon EC2 User Guide.
-
For API details, see CopyImage
in AWS CLI Command Reference.
-
The following code example shows how to use copy-snapshot.
- AWS CLI
-
Example 1: To copy a snapshot to another Region
The following
copy-snapshotexample command copies the specified snapshot from theus-west-2Region to theus-east-1Region and adds a short description.aws ec2 copy-snapshot \ --regionus-east-1\ --source-regionus-west-2\ --source-snapshot-idsnap-066877671789bd71b\ --description 'This is my copied snapshot.'Output:
{ "SnapshotId": "snap-066877671789bd71b" }Example 2: To copy an unencrypted snapshot and encrypt the new snapshot
The following
copy-snapshotcommand copies the specified unencrypted snapshot from theus-west-2Region to the current Region and encrypts the new snapshot using the specified KMS key.aws ec2 copy-snapshot \ --source-regionus-west-2\ --source-snapshot-idsnap-066877671789bd71b\ --encrypted \ --kms-key-idalias/my-kms-keyOutput:
{ "SnapshotId": "snap-066877671789bd71b" }For more information, see Copy an Amazon EBS snapshot in the Amazon EBS User Guide.
-
For API details, see CopySnapshot
in AWS CLI Command Reference.
-
The following code example shows how to use create-capacity-reservation-fleet.
- AWS CLI
-
To create a Capacity Reservation Fleet
The following
create-capacity-reservation-fleetexample creates a Capacity Reservation Fleet for the instance type specified in the request, up to the specified total target capacity. The number of instances for which the Capacity Reservation Fleet reserves capacity depends on the total target capacity and instance type weights that you specify in the request. Specify the instance types to use and a priority for each of the designated instance types.aws ec2 create-capacity-reservation-fleet \ --total-target-capacity24\ --allocation-strategyprioritized\ --instance-match-criteriaopen\ --tenancydefault\ --end-date2022-12-31T23:59:59.000Z\ --instance-type-specificationsfile://instanceTypeSpecification.jsonContents of
instanceTypeSpecification.json:[ { "InstanceType": "m5.xlarge", "InstancePlatform": "Linux/UNIX", "Weight": 3.0, "AvailabilityZone":"us-east-1a", "EbsOptimized": true, "Priority" : 1 } ]Output:
{ "Status": "submitted", "TotalFulfilledCapacity": 0.0, "CapacityReservationFleetId": "crf-abcdef01234567890", "TotalTargetCapacity": 24 }For more information about Capacity Reservation Fleets, see Capacity Reservation Fleets in the Amazon EC2 User Guide.
For more information about instance type weight and total target capacity, see Instance type weight and Total target capacity in the Amazon EC2 User Guide.
For more information about designating priority for specified instance types, see Allocation strategy and Instance type priority in the Amazon EC2 User Guide.
-
For API details, see CreateCapacityReservationFleet
in AWS CLI Command Reference.
-
The following code example shows how to use create-capacity-reservation.
- AWS CLI
-
Example 1: To create a Capacity Reservation
The following
create-capacity-reservationexample creates a capacity reservation in theeu-west-1aAvailability Zone, into which you can launch threet2.mediuminstances running a Linux/Unix operating system. By default, the capacity reservation is created with open instance matching criteria and no support for ephemeral storage, and it remains active until you manually cancel it.aws ec2 create-capacity-reservation \ --availability-zoneeu-west-1a\ --instance-typet2.medium\ --instance-platformLinux/UNIX\ --instance-count3Output:
{ "CapacityReservation": { "CapacityReservationId": "cr-1234abcd56EXAMPLE ", "EndDateType": "unlimited", "AvailabilityZone": "eu-west-1a", "InstanceMatchCriteria": "open", "EphemeralStorage": false, "CreateDate": "2019-08-16T09:27:35.000Z", "AvailableInstanceCount": 3, "InstancePlatform": "Linux/UNIX", "TotalInstanceCount": 3, "State": "active", "Tenancy": "default", "EbsOptimized": false, "InstanceType": "t2.medium" } }Example 2: To create a Capacity Reservation that automatically ends at a specified date/time
The following
create-capacity-reservationexample creates a capacity reservation in theeu-west-1aAvailability Zone, into which you can launch threem5.largeinstances running a Linux/Unix operating system. This capacity reservation automatically ends on 08/31/2019 at 23:59:59.aws ec2 create-capacity-reservation \ --availability-zoneeu-west-1a\ --instance-typem5.large\ --instance-platformLinux/UNIX\ --instance-count3\ --end-date-typelimited\ --end-date2019-08-31T23:59:59ZOutput:
{ "CapacityReservation": { "CapacityReservationId": "cr-1234abcd56EXAMPLE ", "EndDateType": "limited", "AvailabilityZone": "eu-west-1a", "EndDate": "2019-08-31T23:59:59.000Z", "InstanceMatchCriteria": "open", "EphemeralStorage": false, "CreateDate": "2019-08-16T10:15:53.000Z", "AvailableInstanceCount": 3, "InstancePlatform": "Linux/UNIX", "TotalInstanceCount": 3, "State": "active", "Tenancy": "default", "EbsOptimized": false, "InstanceType": "m5.large" } }Example 3: To create a Capacity Reservation that accepts only targeted instance launches
The following
create-capacity-reservationexample creates a capacity reservation that accepts only targeted instance launches.aws ec2 create-capacity-reservation \ --availability-zoneeu-west-1a\ --instance-typem5.large\ --instance-platformLinux/UNIX\ --instance-count3\ --instance-match-criteriatargetedOutput:
{ "CapacityReservation": { "CapacityReservationId": "cr-1234abcd56EXAMPLE ", "EndDateType": "unlimited", "AvailabilityZone": "eu-west-1a", "InstanceMatchCriteria": "targeted", "EphemeralStorage": false, "CreateDate": "2019-08-16T10:21:57.000Z", "AvailableInstanceCount": 3, "InstancePlatform": "Linux/UNIX", "TotalInstanceCount": 3, "State": "active", "Tenancy": "default", "EbsOptimized": false, "InstanceType": "m5.large" } }For more information, see Create a Capacity Reservation in the Amazon EC2 User Guide.
-
For API details, see CreateCapacityReservation
in AWS CLI Command Reference.
-
The following code example shows how to use create-carrier-gateway.
- AWS CLI
-
To create a carrier gateway
The following
create-carrier-gatewayexample creates a carrier gateway for the specified VPC.aws ec2 create-carrier-gateway \ --vpc-idvpc-0c529aEXAMPLE1111Output:
{ "CarrierGateway": { "CarrierGatewayId": "cagw-0465cdEXAMPLE1111", "VpcId": "vpc-0c529aEXAMPLE1111", "State": "pending", "OwnerId": "123456789012" } }For more information, see Carrier gateways in the AWS Wavelength User Guide.
-
For API details, see CreateCarrierGateway
in AWS CLI Command Reference.
-
The following code example shows how to use create-client-vpn-endpoint.
- AWS CLI
-
To create a Client VPN endpoint
The following
create-client-vpn-endpointexample creates a Client VPN endpoint that uses mutual authentication and specifies a value for the client CIDR block.aws ec2 create-client-vpn-endpoint \ --client-cidr-block"172.31.0.0/16"\ --server-certificate-arnarn:aws:acm:ap-south-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-11111EXAMPLE\ --authentication-optionsType=certificate-authentication,MutualAuthentication={ClientRootCertificateChainArn=arn:aws:acm:ap-south-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-22222EXAMPLE}\ --connection-log-optionsEnabled=falseOutput:
{ "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "Status": { "Code": "pending-associate" }, "DnsName": "cvpn-endpoint-123456789123abcde.prod.clientvpn.ap-south-1.amazonaws.com" }For more information, see Client VPN Endpoints in the AWS Client VPN Administrator Guide.
-
For API details, see CreateClientVpnEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use create-client-vpn-route.
- AWS CLI
-
To create a route for a Client VPN endpoint
The following
create-client-vpn-routeexample adds a route to the internet (0.0.0.0/0) for the specified subnet of the Client VPN endpoint.aws ec2 create-client-vpn-route \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --destination-cidr-block0.0.0.0/0\ --target-vpc-subnet-idsubnet-0123456789abcabcaOutput:
{ "Status": { "Code": "creating" } }For more information, see Routes in the AWS Client VPN Administrator Guide.
-
For API details, see CreateClientVpnRoute
in AWS CLI Command Reference.
-
The following code example shows how to use create-coip-cidr.
- AWS CLI
-
To create a range of customer-owned IP (CoIP) addresses
The following
create-coip-cidrexample creates the specified range of CoIP addresses in the specified CoIP pool.aws ec2 create-coip-cidr \ --cidr15.0.0.0/24\ --coip-pool-idipv4pool-coip-1234567890abcdefgOutput:
{ "CoipCidr": { "Cidr": "15.0.0.0/24", "CoipPoolId": "ipv4pool-coip-1234567890abcdefg", "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890" } }For more information, see Customer-owned IP addresses in the AWS Outposts User Guide.
-
For API details, see CreateCoipCidr
in AWS CLI Command Reference.
-
The following code example shows how to use create-coip-pool.
- AWS CLI
-
To create a pool of customer-owned IP (CoIP) addresses
The following
create-coip-poolexample creates a CoIP pool for CoIP addresses in the specified local gateway route table.aws ec2 create-coip-pool \ --local-gateway-route-table-idlgw-rtb-abcdefg1234567890Output:
{ "CoipPool": { "PoolId": "ipv4pool-coip-1234567890abcdefg", "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890", "PoolArn": "arn:aws:ec2:us-west-2:123456789012:coip-pool/ipv4pool-coip-1234567890abcdefg" } }For more information, see Customer-owned IP addresses in the AWS Outposts User Guide.
-
For API details, see CreateCoipPool
in AWS CLI Command Reference.
-
The following code example shows how to use create-customer-gateway.
- AWS CLI
-
To create a customer gateway
This example creates a customer gateway with the specified IP address for its outside interface.
Command:
aws ec2 create-customer-gateway --typeipsec.1--public-ip12.1.2.3--bgp-asn65534Output:
{ "CustomerGateway": { "CustomerGatewayId": "cgw-0e11f167", "IpAddress": "12.1.2.3", "State": "available", "Type": "ipsec.1", "BgpAsn": "65534" } }-
For API details, see CreateCustomerGateway
in AWS CLI Command Reference.
-
The following code example shows how to use create-default-subnet.
- AWS CLI
-
To create a default subnet
This example creates a default subnet in Availability Zone
us-east-2a.Command:
aws ec2 create-default-subnet --availability-zone us-east-2a { "Subnet": { "AvailabilityZone": "us-east-2a", "Tags": [], "AvailableIpAddressCount": 4091, "DefaultForAz": true, "Ipv6CidrBlockAssociationSet": [], "VpcId": "vpc-1a2b3c4d", "State": "available", "MapPublicIpOnLaunch": true, "SubnetId": "subnet-1122aabb", "CidrBlock": "172.31.32.0/20", "AssignIpv6AddressOnCreation": false } }-
For API details, see CreateDefaultSubnet
in AWS CLI Command Reference.
-
The following code example shows how to use create-default-vpc.
- AWS CLI
-
To create a default VPC
This example creates a default VPC.
Command:
aws ec2 create-default-vpcOutput:
{ "Vpc": { "VpcId": "vpc-8eaae5ea", "InstanceTenancy": "default", "Tags": [], "Ipv6CidrBlockAssociationSet": [], "State": "pending", "DhcpOptionsId": "dopt-af0c32c6", "CidrBlock": "172.31.0.0/16", "IsDefault": true } }-
For API details, see CreateDefaultVpc
in AWS CLI Command Reference.
-
The following code example shows how to use create-dhcp-options.
- AWS CLI
-
To create a set of DHCP options
The following
create-dhcp-optionsexample creates a set of DHCP options that specifies the domain name, the domain name servers, and the NetBIOS node type.aws ec2 create-dhcp-options \ --dhcp-configuration \"Key=domain-name-servers,Values=10.2.5.1,10.2.5.2"\"Key=domain-name,Values=example.com"\"Key=netbios-node-type,Values=2"Output:
{ "DhcpOptions": { "DhcpConfigurations": [ { "Key": "domain-name", "Values": [ { "Value": "example.com" } ] }, { "Key": "domain-name-servers", "Values": [ { "Value": "10.2.5.1" }, { "Value": "10.2.5.2" } ] }, { "Key": "netbios-node-type", "Values": [ { "Value": "2" } ] } ], "DhcpOptionsId": "dopt-06d52773eff4c55f3" } }-
For API details, see CreateDhcpOptions
in AWS CLI Command Reference.
-
The following code example shows how to use create-egress-only-internet-gateway.
- AWS CLI
-
To create an egress-only Internet gateway
This example creates an egress-only Internet gateway for the specified VPC.
Command:
aws ec2 create-egress-only-internet-gateway --vpc-idvpc-0c62a468Output:
{ "EgressOnlyInternetGateway": { "EgressOnlyInternetGatewayId": "eigw-015e0e244e24dfe8a", "Attachments": [ { "State": "attached", "VpcId": "vpc-0c62a468" } ] } }-
For API details, see CreateEgressOnlyInternetGateway
in AWS CLI Command Reference.
-
The following code example shows how to use create-fleet.
- AWS CLI
-
Example 1: To create an EC2 Fleet that launches Spot Instances as the default purchasing model
The following
create-fleetexample creates an EC2 Fleet using the minimum parameters required to launch a fleet: a launch template, target capacity, and default purchasing model. The launch template is identified by its launch template ID and version number. The target capacity for the fleet is 2 instances, and the default purchasing model isspot, which results in the fleet launching 2 Spot Instances.When you create an EC2 Fleet, use a JSON file to specify information about the instances to launch.
aws ec2 create-fleet \ --cli-input-jsonfile://file_name.jsonContents of file_name.json:
{ "LaunchTemplateConfigs": [ { "LaunchTemplateSpecification": { "LaunchTemplateId": "lt-0e8c754449b27161c", "Version": "1" } } ], "TargetCapacitySpecification": { "TotalTargetCapacity": 2, "DefaultTargetCapacityType": "spot" } }Output:
{ "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" }Example 2: To create an EC2 Fleet that launches On-Demand Instances as the default purchasing model
The following
create-fleetexample creates an EC2 Fleet using the minimum parameters required to launch a fleet: a launch template, target capacity, and default purchasing model. The launch template is identified by its launch template ID and version number. The target capacity for the fleet is 2 instances, and the default purchasing model ison-demand, which results in the fleet launching 2 On-Demand Instances.When you create an EC2 Fleet, use a JSON file to specify information about the instances to launch.
aws ec2 create-fleet \ --cli-input-jsonfile://file_name.jsonContents of file_name.json:
{ "LaunchTemplateConfigs": [ { "LaunchTemplateSpecification": { "LaunchTemplateId": "lt-0e8c754449b27161c", "Version": "1" } } ], "TargetCapacitySpecification": { "TotalTargetCapacity": 2, "DefaultTargetCapacityType": "on-demand" } }Output:
{ "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" }Example 3: To create an EC2 Fleet that launches On-Demand Instances as the primary capacity
The following
create-fleetexample creates an EC2 Fleet that specifies the total target capacity of 2 instances for the fleet, and a target capacity of 1 On-Demand Instance. The default purchasing model isspot. The fleet launches 1 On-Demand Instance as specified, but needs to launch one more instance to fulfil the total target capacity. The purchasing model for the difference is calculated asTotalTargetCapacity-OnDemandTargetCapacity=DefaultTargetCapacityType, which results in the fleet launching 1 Spot Instance.When you create an EC2 Fleet, use a JSON file to specify information about the instances to launch.
aws ec2 create-fleet \ --cli-input-jsonfile://file_name.jsonContents of file_name.json:
{ "LaunchTemplateConfigs": [ { "LaunchTemplateSpecification": { "LaunchTemplateId": "lt-0e8c754449b27161c", "Version": "1" } } ], "TargetCapacitySpecification": { "TotalTargetCapacity": 2, "OnDemandTargetCapacity":1, "DefaultTargetCapacityType": "spot" } }Output:
{ "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" }Example 4: To create an EC2 Fleet that launches Spot Instances using the lowest-price allocation strategy
If the allocation strategy for Spot Instances is not specified, the default allocation strategy, which is
lowest-price, is used. The followingcreate-fleetexample creates an EC2 Fleet using thelowest-priceallocation strategy. The three launch specifications, which override the launch template, have different instance types but the same weighted capacity and subnet. The total target capacity is 2 instances and the default purchasing model isspot. The EC2 Fleet launches 2 Spot Instances using the instance type of the launch specification with the lowest price.When you create an EC2 Fleet, use a JSON file to specify information about the instances to launch.
aws ec2 create-fleet \ --cli-input-jsonfile://file_name.jsonContentsoffile_name.json::{"LaunchTemplateConfigs":[{"LaunchTemplateSpecification":{"LaunchTemplateId": "lt-0e8c754449b27161c", "Version": "1"},"Overrides":[{"InstanceType": "c4.large", "WeightedCapacity":1,"SubnetId":"subnet-a4f6c5d3"},{"InstanceType": "c3.large", "WeightedCapacity":1,"SubnetId":"subnet-a4f6c5d3"},{"InstanceType": "c5.large", "WeightedCapacity":1,"SubnetId":"subnet-a4f6c5d3"}]}],"TargetCapacitySpecification":{"TotalTargetCapacity":2,"DefaultTargetCapacityType":"spot"}}Output:
{ "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" }-
For API details, see CreateFleet
in AWS CLI Command Reference.
-
The following code example shows how to use create-flow-logs.
- AWS CLI
-
Example 1: To create a flow log
The following
create-flow-logsexample creates a flow log that captures all rejected traffic for the specified network interface. The flow logs are delivered to a log group in CloudWatch Logs using the permissions in the specified IAM role.aws ec2 create-flow-logs \ --resource-typeNetworkInterface\ --resource-idseni-11223344556677889\ --traffic-typeREJECT\ --log-group-namemy-flow-logs\ --deliver-logs-permission-arnarn:aws:iam::123456789101:role/publishFlowLogsOutput:
{ "ClientToken": "so0eNA2uSHUNlHI0S2cJ305GuIX1CezaRdGtexample", "FlowLogIds": [ "fl-12345678901234567" ], "Unsuccessful": [] }For more information, see VPC Flow Logs in the Amazon VPC User Guide.
Example 2: To create a flow log with a custom format
The following
create-flow-logsexample creates a flow log that captures all traffic for the specified VPC and delivers the flow logs to an Amazon S3 bucket. The--log-formatparameter specifies a custom format for the flow log records. To run this command on Windows, change the single quotes (') to double quotes (").aws ec2 create-flow-logs \ --resource-typeVPC\ --resource-idsvpc-00112233344556677\ --traffic-typeALL\ --log-destination-types3\ --log-destinationarn:aws:s3:::flow-log-bucket/my-custom-flow-logs/\ --log-format '${version} ${vpc-id} ${subnet-id} ${instance-id} ${srcaddr} ${dstaddr} ${srcport} ${dstport} ${protocol} ${tcp-flags} ${type} ${pkt-srcaddr} ${pkt-dstaddr}'For more information, see VPC Flow Logs in the Amazon VPC User Guide.
Example 3: To create a flow log with a one-minute maximum aggregation interval
The following
create-flow-logsexample creates a flow log that captures all traffic for the specified VPC and delivers the flow logs to an Amazon S3 bucket. The--max-aggregation-intervalparameter specifies a maximum aggregation interval of 60 seconds (1 minute).aws ec2 create-flow-logs \ --resource-typeVPC\ --resource-idsvpc-00112233344556677\ --traffic-typeALL\ --log-destination-types3\ --log-destinationarn:aws:s3:::flow-log-bucket/my-custom-flow-logs/\ --max-aggregation-interval60For more information, see VPC Flow Logs in the Amazon VPC User Guide.
-
For API details, see CreateFlowLogs
in AWS CLI Command Reference.
-
The following code example shows how to use create-fpga-image.
- AWS CLI
-
To create an Amazon FPGA image
This example creates an AFI from the specified tarball in the specified bucket.
Command:
aws ec2 create-fpga-image --namemy-afi--descriptiontest-afi--input-storage-locationBucket=my-fpga-bucket,Key=dcp/17_12_22-103226.Developer_CL.tar--logs-storage-locationBucket=my-fpga-bucket,Key=logsOutput:
{ "FpgaImageId": "afi-0d123e123bfc85abc", "FpgaImageGlobalId": "agfi-123cb27b5e84a0abc" }-
For API details, see CreateFpgaImage
in AWS CLI Command Reference.
-
The following code example shows how to use create-image.
- AWS CLI
-
Example 1: To create an AMI from an Amazon EBS-backed instance
The following
create-imageexample creates an AMI from the specified instance.aws ec2 create-image \ --instance-idi-1234567890abcdef0\ --name"My server"\ --description"An AMI for my server"Output:
{ "ImageId": "ami-abcdef01234567890" }For more information about specifying a block device mapping for your AMI, see Specifying a block device mapping for an AMI in the Amazon EC2 User Guide.
Example 2: To create an AMI from an Amazon EBS-backed instance without reboot
The following
create-imageexample creates an AMI and sets the --no-reboot parameter, so that the instance is not rebooted before the image is created.aws ec2 create-image \ --instance-idi-1234567890abcdef0\ --name"My server"\ --no-rebootOutput:
{ "ImageId": "ami-abcdef01234567890" }For more information about specifying a block device mapping for your AMI, see Specifying a block device mapping for an AMI in the Amazon EC2 User Guide.
Example 3: To tag an AMI and snapshots on creation
The following
create-imageexample creates an AMI, and tags the AMI and the snapshots with the same tagcost-center=cc123aws ec2 create-image \ --instance-idi-1234567890abcdef0\ --name"My server"\ --tag-specifications"ResourceType=image,Tags=[{Key=cost-center,Value=cc123}]""ResourceType=snapshot,Tags=[{Key=cost-center,Value=cc123}]"Output:
{ "ImageId": "ami-abcdef01234567890" }For more information about tagging your resources on creation, see Add tags on resource creation in the Amazon EC2 User Guide.
-
For API details, see CreateImage
in AWS CLI Command Reference.
-
The following code example shows how to use create-instance-connect-endpoint.
- AWS CLI
-
To create an EC2 Instance Connect Endpoint
The following
create-instance-connect-endpointexample creates an EC2 Instance Connect Endpoint in the specified subnet.aws ec2 create-instance-connect-endpoint \ --regionus-east-1\ --subnet-idsubnet-0123456789exampleOutput:
{ "VpcId": "vpc-0123abcd", "InstanceConnectEndpointArn": "arn:aws:ec2:us-east-1:111111111111:instance-connect-endpoint/eice-0123456789example", "AvailabilityZone": "us-east-1a", "NetworkInterfaceIds": [ "eni-0123abcd" ], "PreserveClientIp": true, "Tags": [], "FipsDnsName": "eice-0123456789example.0123abcd.fips.ec2-instance-connect-endpoint.us-east-1.amazonaws.com", "StateMessage": "", "State": "create-complete", "DnsName": "eice-0123456789example.0123abcd.ec2-instance-connect-endpoint.us-east-1.amazonaws.com", "SubnetId": "subnet-0123abcd", "OwnerId": "111111111111", "SecurityGroupIds": [ "sg-0123abcd" ], "InstanceConnectEndpointId": "eice-0123456789example", "CreatedAt": "2023-04-07T15:43:53.000Z" }For more information, see Create an EC2 Instance Connect Endpoint in the Amazon EC2 User Guide.
-
For API details, see CreateInstanceConnectEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use create-instance-event-window.
- AWS CLI
-
Example 1: To create an event window with a time range
The following
create-instance-event-windowexample creates an event window with a time range. You can't also specify thecron-expressionparameter.aws ec2 create-instance-event-window \ --regionus-east-1\ --time-rangeStartWeekDay=monday,StartHour=2,EndWeekDay=wednesday,EndHour=8\ --tag-specifications"ResourceType=instance-event-window,Tags=[{Key=K1,Value=V1}]"\ --namemyEventWindowNameOutput:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "TimeRanges": [ { "StartWeekDay": "monday", "StartHour": 2, "EndWeekDay": "wednesday", "EndHour": 8 } ], "Name": "myEventWindowName", "State": "creating", "Tags": [ { "Key": "K1", "Value": "V1" } ] } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 2: To create an event window with a cron expression
The following
create-instance-event-windowexample creates an event window with a cron expression. You can't also specify thetime-rangeparameter.aws ec2 create-instance-event-window \ --regionus-east-1\ --cron-expression"* 21-23 * * 2,3"\ --tag-specifications"ResourceType=instance-event-window,Tags=[{Key=K1,Value=V1}]"\ --namemyEventWindowNameOutput:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "State": "creating", "Tags": [ { "Key": "K1", "Value": "V1" } ] } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
-
For API details, see CreateInstanceEventWindow
in AWS CLI Command Reference.
-
The following code example shows how to use create-instance-export-task.
- AWS CLI
-
To export an instance
This example command creates a task to export the instance i-1234567890abcdef0 to the Amazon S3 bucket myexportbucket.
Command:
aws ec2 create-instance-export-task --description"RHEL5 instance"--instance-idi-1234567890abcdef0--target-environmentvmware--export-to-s3-taskDiskImageFormat=vmdk,ContainerFormat=ova,S3Bucket=myexportbucket,S3Prefix=RHEL5Output:
{ "ExportTask": { "State": "active", "InstanceExportDetails": { "InstanceId": "i-1234567890abcdef0", "TargetEnvironment": "vmware" }, "ExportToS3Task": { "S3Bucket": "myexportbucket", "S3Key": "RHEL5export-i-fh8sjjsq.ova", "DiskImageFormat": "vmdk", "ContainerFormat": "ova" }, "Description": "RHEL5 instance", "ExportTaskId": "export-i-fh8sjjsq" } }-
For API details, see CreateInstanceExportTask
in AWS CLI Command Reference.
-
The following code example shows how to use create-internet-gateway.
- AWS CLI
-
To create an internet gateway
The following
create-internet-gatewayexample creates an internet gateway with the tagName=my-igw.aws ec2 create-internet-gateway \ --tag-specificationsResourceType=internet-gateway,Tags=[{Key=Name,Value=my-igw}]Output:
{ "InternetGateway": { "Attachments": [], "InternetGatewayId": "igw-0d0fb496b3994d755", "OwnerId": "123456789012", "Tags": [ { "Key": "Name", "Value": "my-igw" } ] } }For more information, see Internet gateways in the Amazon VPC User Guide.
-
For API details, see CreateInternetGateway
in AWS CLI Command Reference.
-
The following code example shows how to use create-ipam-pool.
- AWS CLI
-
To create an IPAM pool
The following
create-ipam-poolexample creates an IPAM pool.(Linux):
aws ec2 create-ipam-pool \ --ipam-scope-idipam-scope-02fc38cd4c48e7d38\ --address-familyipv4\ --auto-import \ --allocation-min-netmask-length16\ --allocation-max-netmask-length26\ --allocation-default-netmask-length24\ --allocation-resource-tags"Key=Environment,Value=Preprod"\ --tag-specifications 'ResourceType=ipam-pool,Tags=[{Key=Name,Value="Preprod pool"}]'(Windows):
aws ec2 create-ipam-pool^--ipam-scope-idipam-scope-02fc38cd4c48e7d38^--address-familyipv4^--auto-import^--allocation-min-netmask-length16^--allocation-max-netmask-length26^--allocation-default-netmask-length24^--allocation-resource-tags"Key=Environment,Value=Preprod"^--tag-specifications ResourceType=ipam-pool,Tags=[{Key=Name,Value="Preprod pool"}]Output:
{ "IpamPool": { "OwnerId": "123456789012", "IpamPoolId": "ipam-pool-0533048da7d823723", "IpamPoolArn": "arn:aws:ec2::123456789012:ipam-pool/ipam-pool-0533048da7d823723", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-02fc38cd4c48e7d38", "IpamScopeType": "private", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "Locale": "None", "PoolDepth": 1, "State": "create-in-progress", "AutoImport": true, "AddressFamily": "ipv4", "AllocationMinNetmaskLength": 16, "AllocationMaxNetmaskLength": 26, "AllocationDefaultNetmaskLength": 24, "AllocationResourceTags": [ { "Key": "Environment", "Value": "Preprod" } ], "Tags": [ { "Key": "Name", "Value": "Preprod pool" } ] } }For more information, see Plan for IP address provisioning in the Amazon VPC IPAM User Guide.
-
For API details, see CreateIpamPool
in AWS CLI Command Reference.
-
The following code example shows how to use create-ipam-resource-discovery.
- AWS CLI
-
To create a resource discovery
In this example, you're a delegated IPAM admin who wants to create and share a resource discovery with the IPAM admin in another AWS Organization so that the admin in the other organization can manage and monitor the IP addresses of resources in your organization.
Important
This example includes both the
--regionand--operating-regionsoptions because, while they are optional, they must be configured in a particular way to successfully integrate a resource discovery with an IPAM. *--operating-regionsmust match the Regions where you have resources that you want IPAM to discover. If there are Regions where you do not want IPAM to manage the IP addresses (for example for compliance reasons), do not include them. *--regionmust match the home Region of the IPAM you want to associate it with. You must create the resource discovery in the same Region that the IPAM was created in. For example, if the IPAM you are associating with was created in us-east-1, include--region us-east-1in the request.Both the--regionand--operating-regionsoptions default to the Region you're running the command in if you don't specify them.In this example, the operating Regions of the IPAM we're integrating with include
us-west-1,us-west-2, andap-south-1. When we create the resource discovery, we want IPAM to discover the resource IP addresses inus-west-1andus-west-2but notap-south-1. So we are including only--operating-regions RegionName='us-west-1' RegionName='us-west-2'in the request.The following
create-ipam-resource-discoveryexample creates an IPAM resource discovery.aws ec2 create-ipam-resource-discovery \ --description 'Example-resource-discovery' \ --tag-specifications 'ResourceType=ipam-resource-discovery,Tags=[{Key=cost-center,Value=cc123}]' \ --operating-regions RegionName='us-west-1' RegionName='us-west-2' \ --regionus-east-1Output:
{ "IpamResourceDiscovery":{ "OwnerId": "149977607591", "IpamResourceDiscoveryId": "ipam-res-disco-0257046d8aa78b8bc", "IpamResourceDiscoveryArn": "arn:aws:ec2::149977607591:ipam-resource-discovery/ipam-res-disco-0257046d8aa78b8bc", "IpamResourceDiscoveryRegion": "us-east-1", "Description": "'Example-resource-discovery'", "OperatingRegions":[ {"RegionName": "us-west-1"}, {"RegionName": "us-west-2"}, {"RegionName": "us-east-1"} ], "IsDefault": false, "State": "create-in-progress", "Tags": [ { "Key": "cost-center", "Value": "cc123" } ] }Once you create a resource discovery, you may want to share it with another IPAM delegated admin, which you can do with create-resource-share. For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
-
For API details, see CreateIpamResourceDiscovery
in AWS CLI Command Reference.
-
The following code example shows how to use create-ipam-scope.
- AWS CLI
-
To create an IPAM scope
The following
create-ipam-scopeexample creates an IPAM scope.(Linux):
aws ec2 create-ipam-scope \ --ipam-idipam-08440e7a3acde3908\ --description"Example description"\ --tag-specifications 'ResourceType=ipam-scope,Tags=[{Key=Name,Value="Example name value"}]'(Windows):
aws ec2 create-ipam-scope^--ipam-idipam-08440e7a3acde3908^--description"Example description"^--tag-specifications ResourceType=ipam-scope,Tags=[{Key=Name,Value="Example name value"}]Output:
{ "IpamScope": { "OwnerId": "123456789012", "IpamScopeId": "ipam-scope-01c1ebab2b63bd7e4", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-01c1ebab2b63bd7e4", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "IpamScopeType": "private", "IsDefault": false, "Description": "Example description", "PoolCount": 0, "State": "create-in-progress", "Tags": [ { "Key": "Name", "Value": "Example name value" } ] } }For more information, see Create additional scopes in the Amazon VPC IPAM User Guide.
-
For API details, see CreateIpamScope
in AWS CLI Command Reference.
-
The following code example shows how to use create-ipam.
- AWS CLI
-
To create an IPAM
The following
create-ipamexample creates an IPAM.(Linux):
aws ec2 create-ipam \ --description"Example description"\ --operating-regions"RegionName=us-east-2""RegionName=us-west-1"\ --tag-specifications 'ResourceType=ipam,Tags=[{Key=Name,Value=ExampleIPAM}]'(Windows):
aws ec2 create-ipam^--description"Example description"^--operating-regions"RegionName=us-east-2""RegionName=us-west-1"^--tag-specificationsResourceType=ipam,Tags=[{Key=Name,Value=ExampleIPAM}]Output:
{ "Ipam": { "OwnerId": "123456789012", "IpamId": "ipam-036486dfa6af58ee0", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-036486dfa6af58ee0", "IpamRegion": "us-east-1", "PublicDefaultScopeId": "ipam-scope-071b8042b0195c183", "PrivateDefaultScopeId": "ipam-scope-0807405dece705a30", "ScopeCount": 2, "OperatingRegions": [ { "RegionName": "us-east-2" }, { "RegionName": "us-west-1" }, { "RegionName": "us-east-1" } ], "State": "create-in-progress", "Tags": [ { "Key": "Name", "Value": "ExampleIPAM" } ] } }For more information, see Create an IPAM in the Amazon VPC IPAM User Guide.
-
For API details, see CreateIpam
in AWS CLI Command Reference.
-
The following code example shows how to use create-key-pair.
- AWS CLI
-
To create a key pair
This example creates a key pair named
MyKeyPair.Command:
aws ec2 create-key-pair --key-nameMyKeyPairThe output is an ASCII version of the private key and key fingerprint. You need to save the key to a file.
For more information, see Using Key Pairs in the AWS Command Line Interface User Guide.
-
For API details, see CreateKeyPair
in AWS CLI Command Reference.
-
The following code example shows how to use create-launch-template-version.
- AWS CLI
-
To create a launch template version
This example creates a new launch template version based on version 1 of the launch template and specifies a different AMI ID.
Command:
aws ec2 create-launch-template-version --launch-template-idlt-0abcd290751193123--version-descriptionWebVersion2--source-version1--launch-template-data '{"ImageId":"ami-c998b6b2"}'Output:
{ "LaunchTemplateVersion": { "VersionDescription": "WebVersion2", "LaunchTemplateId": "lt-0abcd290751193123", "LaunchTemplateName": "WebServers", "VersionNumber": 2, "CreatedBy": "arn:aws:iam::123456789012:root", "LaunchTemplateData": { "ImageId": "ami-c998b6b2", "InstanceType": "t2.micro", "NetworkInterfaces": [ { "Ipv6Addresses": [ { "Ipv6Address": "2001:db8:1234:1a00::123" } ], "DeviceIndex": 0, "SubnetId": "subnet-7b16de0c", "AssociatePublicIpAddress": true } ] }, "DefaultVersion": false, "CreateTime": "2017-12-01T13:35:46.000Z" } }-
For API details, see CreateLaunchTemplateVersion
in AWS CLI Command Reference.
-
The following code example shows how to use create-launch-template.
- AWS CLI
-
Example 1: To create a launch template
The following
create-launch-templateexample creates a launch template that specifies the subnet in which to launch the instance , assigns a public IP address and an IPv6 address to the instance, and creates a tag for the instance.aws ec2 create-launch-template \ --launch-template-nameTemplateForWebServer\ --version-descriptionWebVersion1\ --launch-template-data '{"NetworkInterfaces":[{"AssociatePublicIpAddress":true,"DeviceIndex":0,"Ipv6AddressCount":1,"SubnetId":"subnet-7b16de0c"}],"ImageId":"ami-8c1be5f6","InstanceType":"t2.small","TagSpecifications":[{"ResourceType":"instance","Tags":[{"Key":"purpose","Value":"webserver"}]}]}'Output:
{ "LaunchTemplate": { "LatestVersionNumber": 1, "LaunchTemplateId": "lt-01238c059e3466abc", "LaunchTemplateName": "TemplateForWebServer", "DefaultVersionNumber": 1, "CreatedBy": "arn:aws:iam::123456789012:user/Bob", "CreateTime": "2019-01-27T09:13:24.000Z" } }For more information, see Launching an Instance from a Launch Template in the Amazon Elastic Compute Cloud User Guide. For information about quoting JSON-formatted parameters, see Quoting Strings in the AWS Command Line Interface User Guide.
Example 2: To create a launch template for Amazon EC2 Auto Scaling
The following
create-launch-templateexample creates a launch template with multiple tags and a block device mapping to specify an additional EBS volume when an instance launches. Specify a value forGroupsthat corresponds to security groups for the VPC that your Auto Scaling group will launch instances into. Specify the VPC and subnets as properties of the Auto Scaling group.aws ec2 create-launch-template \ --launch-template-nameTemplateForAutoScaling\ --version-descriptionAutoScalingVersion1\ --launch-template-data '{"NetworkInterfaces":[{"DeviceIndex":0,"AssociatePublicIpAddress":true,"Groups":["sg-7c227019,sg-903004f8"],"DeleteOnTermination":true}],"ImageId":"ami-b42209de","InstanceType":"m4.large","TagSpecifications":[{"ResourceType":"instance","Tags":[{"Key":"environment","Value":"production"},{"Key":"purpose","Value":"webserver"}]},{"ResourceType":"volume","Tags":[{"Key":"environment","Value":"production"},{"Key":"cost-center","Value":"cc123"}]}],"BlockDeviceMappings":[{"DeviceName":"/dev/sda1","Ebs":{"VolumeSize":100}}]}' --regionus-east-1Output:
{ "LaunchTemplate": { "LatestVersionNumber": 1, "LaunchTemplateId": "lt-0123c79c33a54e0abc", "LaunchTemplateName": "TemplateForAutoScaling", "DefaultVersionNumber": 1, "CreatedBy": "arn:aws:iam::123456789012:user/Bob", "CreateTime": "2019-04-30T18:16:06.000Z" } }For more information, see Creating a Launch Template for an Auto Scaling Group in the Amazon EC2 Auto Scaling User Guide. For information about quoting JSON-formatted parameters, see Quoting Strings in the AWS Command Line Interface User Guide.
Example 3: To create a launch template that specifies encryption of EBS volumes
The following
create-launch-templateexample creates a launch template that includes encrypted EBS volumes created from an unencrypted snapshot. It also tags the volumes during creation. If encryption by default is disabled, you must specify the"Encrypted"option as shown in the following example. If you use the"KmsKeyId"option to specify a customer managed CMK, you also must specify the"Encrypted"option even if encryption by default is enabled.aws ec2 create-launch-template \ --launch-template-nameTemplateForEncryption\ --launch-template-datafile://config.jsonContents of
config.json:{ "BlockDeviceMappings":[ { "DeviceName":"/dev/sda1", "Ebs":{ "VolumeType":"gp2", "DeleteOnTermination":true, "SnapshotId":"snap-066877671789bd71b", "Encrypted":true, "KmsKeyId":"arn:aws:kms:us-east-1:012345678910:key/abcd1234-a123-456a-a12b-a123b4cd56ef" } } ], "ImageId":"ami-00068cd7555f543d5", "InstanceType":"c5.large", "TagSpecifications":[ { "ResourceType":"volume", "Tags":[ { "Key":"encrypted", "Value":"yes" } ] } ] }Output:
{ "LaunchTemplate": { "LatestVersionNumber": 1, "LaunchTemplateId": "lt-0d5bd51bcf8530abc", "LaunchTemplateName": "TemplateForEncryption", "DefaultVersionNumber": 1, "CreatedBy": "arn:aws:iam::123456789012:user/Bob", "CreateTime": "2020-01-07T19:08:36.000Z" } }For more information, see Restoring an Amazon EBS Volume from a Snapshot and Encryption by Default in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see CreateLaunchTemplate
in AWS CLI Command Reference.
-
The following code example shows how to use create-local-gateway-route-table-virtual-interface-group-association.
- AWS CLI
-
To associate a local gateway route table with a virtual interfaces (VIFs) group
The following
create-local-gateway-route-table-virtual-interface-group-associationexample creates an association between the specified local gateway route table and VIF group.aws ec2 create-local-gateway-route-table-virtual-interface-group-association \ --local-gateway-route-table-idlgw-rtb-exampleidabcd1234\ --local-gateway-virtual-interface-group-idlgw-vif-grp-exampleid0123abcdOutput:
{ "LocalGatewayRouteTableVirtualInterfaceGroupAssociation": { "LocalGatewayRouteTableVirtualInterfaceGroupAssociationId": "lgw-vif-grp-assoc-exampleid12345678", "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-exampleid0123abcd", "LocalGatewayId": "lgw-exampleid11223344", "LocalGatewayRouteTableId": "lgw-rtb-exampleidabcd1234", "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:111122223333:local-gateway-route-table/lgw-rtb-exampleidabcd1234", "OwnerId": "111122223333", "State": "pending", "Tags": [] } }For more information, see VIF group associations in the AWS Outposts User Guide.
-
For API details, see CreateLocalGatewayRouteTableVirtualInterfaceGroupAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use create-local-gateway-route-table-vpc-association.
- AWS CLI
-
To associate a VPC with a route table
The following
create-local-gateway-route-table-vpc-associationexample associates the specified VPC with the specified local gateway route table.aws ec2 create-local-gateway-route-table-vpc-association \ --local-gateway-route-table-idlgw-rtb-059615ef7dEXAMPLE\ --vpc-idvpc-07ef66ac71EXAMPLEOutput:
{ "LocalGatewayRouteTableVpcAssociation": { "LocalGatewayRouteTableVpcAssociationId": "lgw-vpc-assoc-0ee765bcc8EXAMPLE", "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE", "LocalGatewayId": "lgw-09b493aa7cEXAMPLE", "VpcId": "vpc-07ef66ac71EXAMPLE", "State": "associated" } }-
For API details, see CreateLocalGatewayRouteTableVpcAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use create-local-gateway-route-table.
- AWS CLI
-
To create a local gateway route table
The following
create-local-gateway-route-tableexample creates a local gateway route table with the direct VPC routing mode.aws ec2 create-local-gateway-route-table \ --local-gateway-idlgw-1a2b3c4d5e6f7g8h9\ --modedirect-vpc-routingOutput:
{ "LocalGatewayRouteTable": { "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890", "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:111122223333:local-gateway-route-table/lgw-rtb-abcdefg1234567890", "LocalGatewayId": "lgw-1a2b3c4d5e6f7g8h9", "OutpostArn": "arn:aws:outposts:us-west-2:111122223333:outpost/op-021345abcdef67890", "OwnerId": "111122223333", "State": "pending", "Tags": [], "Mode": "direct-vpc-routing" } }For more information, see Local gateway route tables in the AWS Outposts User Guide.
-
For API details, see CreateLocalGatewayRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use create-local-gateway-route.
- AWS CLI
-
To create a static route for a local gateway route table
The following
create-local-gateway-routeexample creates the specified route in the specified local gateway route table.aws ec2 create-local-gateway-route \ --destination-cidr-block0.0.0.0/0\ --local-gateway-route-table-idlgw-rtb-059615ef7dEXAMPLEOutput:
{ "Route": { "DestinationCidrBlock": "0.0.0.0/0", "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-07145b276bEXAMPLE", "Type": "static", "State": "deleted", "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE" } }-
For API details, see CreateLocalGatewayRoute
in AWS CLI Command Reference.
-
The following code example shows how to use create-managed-prefix-list.
- AWS CLI
-
To create a prefix list
The following
create-managed-prefix-listexample creates an IPv4 prefix list with a maximum of 10 entries, and creates 2 entries in the prefix list.aws ec2 create-managed-prefix-list \ --address-familyIPv4\ --max-entries10\ --entriesCidr=10.0.0.0/16,Description=vpc-aCidr=10.2.0.0/16,Description=vpc-b\ --prefix-list-namevpc-cidrsOutput:
{ "PrefixList": { "PrefixListId": "pl-0123456abcabcabc1", "AddressFamily": "IPv4", "State": "create-in-progress", "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-0123456abcabcabc1", "PrefixListName": "vpc-cidrs", "MaxEntries": 10, "Version": 1, "Tags": [], "OwnerId": "123456789012" } }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see CreateManagedPrefixList
in AWS CLI Command Reference.
-
The following code example shows how to use create-nat-gateway.
- AWS CLI
-
Example 1: To create a public NAT gateway
The following
create-nat-gatewayexample creates a public NAT gateway in the specified subnet and associates the Elastic IP address with the specified allocation ID. When you create a public NAT gateway, you must associate an Elastic IP address.aws ec2 create-nat-gateway \ --subnet-idsubnet-0250c25a1fEXAMPLE\ --allocation-ideipalloc-09ad461b0dEXAMPLEOutput:
{ "NatGateway": { "CreateTime": "2021-12-01T22:22:38.000Z", "NatGatewayAddresses": [ { "AllocationId": "eipalloc-09ad461b0dEXAMPLE" } ], "NatGatewayId": "nat-0c61bf8a12EXAMPLE", "State": "pending", "SubnetId": "subnet-0250c25a1fEXAMPLE", "VpcId": "vpc-0a60eb65b4EXAMPLE", "ConnectivityType": "public" } }For more information, see NAT gateways in the Amazon VPC User Guide.
Example 2: To create a private NAT gateway
The following
create-nat-gatewayexample creates a private NAT gateway in the specified subnet. A private NAT gateway does not have an associated Elastic IP address.aws ec2 create-nat-gateway \ --subnet-idsubnet-0250c25a1fEXAMPLE\ --connectivity-typeprivateOutput:
{ "NatGateway": { "CreateTime": "2021-12-01T22:26:00.000Z", "NatGatewayAddresses": [ {} ], "NatGatewayId": "nat-011b568379EXAMPLE", "State": "pending", "SubnetId": "subnet-0250c25a1fEXAMPLE", "VpcId": "vpc-0a60eb65b4EXAMPLE", "ConnectivityType": "private" } }For more information, see NAT gateways in the Amazon VPC User Guide.
-
For API details, see CreateNatGateway
in AWS CLI Command Reference.
-
The following code example shows how to use create-network-acl-entry.
- AWS CLI
-
To create a network ACL entry
This example creates an entry for the specified network ACL. The rule allows ingress traffic from any IPv4 address (0.0.0.0/0) on UDP port 53 (DNS) into any associated subnet. If the command succeeds, no output is returned.
Command:
aws ec2 create-network-acl-entry --network-acl-idacl-5fb85d36--ingress --rule-number100--protocoludp--port-rangeFrom=53,To=53--cidr-block0.0.0.0/0--rule-actionallowThis example creates a rule for the specified network ACL that allows ingress traffic from any IPv6 address (::/0) on TCP port 80 (HTTP).
Command:
aws ec2 create-network-acl-entry --network-acl-idacl-5fb85d36--ingress --rule-number120--protocoltcp--port-rangeFrom=80,To=80--ipv6-cidr-block::/0--rule-actionallow-
For API details, see CreateNetworkAclEntry
in AWS CLI Command Reference.
-
The following code example shows how to use create-network-acl.
- AWS CLI
-
To create a network ACL
This example creates a network ACL for the specified VPC.
Command:
aws ec2 create-network-acl --vpc-idvpc-a01106c2Output:
{ "NetworkAcl": { "Associations": [], "NetworkAclId": "acl-5fb85d36", "VpcId": "vpc-a01106c2", "Tags": [], "Entries": [ { "CidrBlock": "0.0.0.0/0", "RuleNumber": 32767, "Protocol": "-1", "Egress": true, "RuleAction": "deny" }, { "CidrBlock": "0.0.0.0/0", "RuleNumber": 32767, "Protocol": "-1", "Egress": false, "RuleAction": "deny" } ], "IsDefault": false } }-
For API details, see CreateNetworkAcl
in AWS CLI Command Reference.
-
The following code example shows how to use create-network-insights-access-scope.
- AWS CLI
-
To create a Network Access Scope
The following
create-network-insights-access-scopeexample creates a Network Access Scope.aws ec2 create-network-insights-access-scope \ --cli-input-jsonfile://access-scope-file.jsonContents of
access-scope-file.json:{ "MatchPaths": [ { "Source": { "ResourceStatement": { "Resources": [ "vpc-abcd12e3" ] } } } ], "ExcludePaths": [ { "Source": { "ResourceStatement": { "ResourceTypes": [ "AWS::EC2::InternetGateway" ] } } } ] }Output:
{ "NetworkInsightsAccessScope": { "NetworkInsightsAccessScopeId": "nis-123456789abc01234", "NetworkInsightsAccessScopeArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-access-scope/nis-123456789abc01234", "CreatedDate": "2022-01-25T19:20:28.796000+00:00", "UpdatedDate": "2022-01-25T19:20:28.797000+00:00" }, "NetworkInsightsAccessScopeContent": { "NetworkInsightsAccessScopeId": "nis-123456789abc01234", "MatchPaths": [ { "Source": { "ResourceStatement": { "Resources": [ "vpc-abcd12e3" ] } } } ], "ExcludePaths": [ { "Source": { "ResourceStatement": { "ResourceTypes": [ "AWS::EC2::InternetGateway" ] } } } ] } }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see CreateNetworkInsightsAccessScope
in AWS CLI Command Reference.
-
The following code example shows how to use create-network-insights-path.
- AWS CLI
-
To create a path
The following
create-network-insights-pathexample creates a path. The source is the specified internet gateway and the destination is the specified EC2 instance. To determine whether the destination is reachable using the specified protocol and port, analyze the path using thestart-network-insights-analysiscommand.aws ec2 create-network-insights-path \ --sourceigw-0797cccdc9d73b0e5\ --destinationi-0495d385ad28331c7\ --destination-port22\ --protocolTCPOutput:
{ "NetworkInsightsPaths": { "NetworkInsightsPathId": "nip-0b26f224f1d131fa8", "NetworkInsightsPathArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-path/nip-0b26f224f1d131fa8", "CreatedDate": "2021-01-20T22:43:46.933Z", "Source": "igw-0797cccdc9d73b0e5", "Destination": "i-0495d385ad28331c7", "Protocol": "tcp" } }For more information, see Getting started using the AWS CLI in the Reachability Analyzer Guide.
-
For API details, see CreateNetworkInsightsPath
in AWS CLI Command Reference.
-
The following code example shows how to use create-network-interface-permission.
- AWS CLI
-
To create a network interface permission
This example grants permission to account
123456789012to attach network interfaceeni-1a2b3c4dto an instance.Command:
aws ec2 create-network-interface-permission --network-interface-ideni-1a2b3c4d--aws-account-id123456789012--permissionINSTANCE-ATTACHOutput:
{ "InterfacePermission": { "PermissionState": { "State": "GRANTED" }, "NetworkInterfacePermissionId": "eni-perm-06fd19020ede149ea", "NetworkInterfaceId": "eni-1a2b3c4d", "Permission": "INSTANCE-ATTACH", "AwsAccountId": "123456789012" } }-
For API details, see CreateNetworkInterfacePermission
in AWS CLI Command Reference.
-
The following code example shows how to use create-network-interface.
- AWS CLI
-
Example 1: To specify an IPv4 address for a network interface
The following
create-network-interfaceexample creates a network interface for the specified subnet with the specified primary IPv4 address.aws ec2 create-network-interface \ --subnet-idsubnet-00a24d0d67acf6333\ --description"my network interface"\ --groupssg-09dfba7ed20cda78b\ --private-ip-address10.0.8.17Output:
{ "NetworkInterface": { "AvailabilityZone": "us-west-2a", "Description": "my network interface", "Groups": [ { "GroupName": "my-security-group", "GroupId": "sg-09dfba7ed20cda78b" } ], "InterfaceType": "interface", "Ipv6Addresses": [], "MacAddress": "06:6a:0f:9a:49:37", "NetworkInterfaceId": "eni-0492b355f0cf3b3f8", "OwnerId": "123456789012", "PrivateDnsName": "ip-10-0-8-18.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.17", "PrivateIpAddresses": [ { "Primary": true, "PrivateDnsName": "ip-10-0-8-17.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.17" } ], "RequesterId": "AIDA4Z3Y7GSXTMEXAMPLE", "RequesterManaged": false, "SourceDestCheck": true, "Status": "pending", "SubnetId": "subnet-00a24d0d67acf6333", "TagSet": [], "VpcId": "vpc-02723a0feeeb9d57b" } }Example 2: To create a network interface with an IPv4 address and an IPv6 address
The following
create-network-interfaceexample creates a network interface for the specified subnet with an IPv4 address and an IPv6 address that are selected by Amazon EC2.aws ec2 create-network-interface \ --subnet-idsubnet-00a24d0d67acf6333\ --description"my dual stack network interface"\ --ipv6-address-count1\ --groupssg-09dfba7ed20cda78bOutput:
{ "NetworkInterface": { "AvailabilityZone": "us-west-2a", "Description": "my dual stack network interface", "Groups": [ { "GroupName": "my-security-group", "GroupId": "sg-09dfba7ed20cda78b" } ], "InterfaceType": "interface", "Ipv6Addresses": [ { "Ipv6Address": "2600:1f13:cfe:3650:a1dc:237c:393a:4ba7", "IsPrimaryIpv6": false } ], "MacAddress": "06:b8:68:d2:b2:2d", "NetworkInterfaceId": "eni-05da417453f9a84bf", "OwnerId": "123456789012", "PrivateDnsName": "ip-10-0-8-18.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.18", "PrivateIpAddresses": [ { "Primary": true, "PrivateDnsName": "ip-10-0-8-18.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.18" } ], "RequesterId": "AIDA4Z3Y7GSXTMEXAMPLE", "RequesterManaged": false, "SourceDestCheck": true, "Status": "pending", "SubnetId": "subnet-00a24d0d67acf6333", "TagSet": [], "VpcId": "vpc-02723a0feeeb9d57b", "Ipv6Address": "2600:1f13:cfe:3650:a1dc:237c:393a:4ba7" } }Example 3: To create a network interface with connection tracking configuration options
The following
create-network-interfaceexample creates a network interface and configures the idle connection tracking timeouts.aws ec2 create-network-interface \ --subnet-idsubnet-00a24d0d67acf6333\ --groupssg-02e57dbcfe0331c1b\ --connection-tracking-specificationTcpEstablishedTimeout=86400,UdpTimeout=60Output:
{ "NetworkInterface": { "AvailabilityZone": "us-west-2a", "ConnectionTrackingConfiguration": { "TcpEstablishedTimeout": 86400, "UdpTimeout": 60 }, "Description": "", "Groups": [ { "GroupName": "my-security-group", "GroupId": "sg-02e57dbcfe0331c1b" } ], "InterfaceType": "interface", "Ipv6Addresses": [], "MacAddress": "06:4c:53:de:6d:91", "NetworkInterfaceId": "eni-0c133586e08903d0b", "OwnerId": "123456789012", "PrivateDnsName": "ip-10-0-8-94.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.94", "PrivateIpAddresses": [ { "Primary": true, "PrivateDnsName": "ip-10-0-8-94.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.94" } ], "RequesterId": "AIDA4Z3Y7GSXTMEXAMPLE", "RequesterManaged": false, "SourceDestCheck": true, "Status": "pending", "SubnetId": "subnet-00a24d0d67acf6333", "TagSet": [], "VpcId": "vpc-02723a0feeeb9d57b" } }Example 4: To create an Elastic Fabric Adapter
The following
create-network-interfaceexample creates an EFA.aws ec2 create-network-interface \ --interface-typeefa\ --subnet-idsubnet-00a24d0d67acf6333\ --description"my efa"\ --groupssg-02e57dbcfe0331c1bOutput:
{ "NetworkInterface": { "AvailabilityZone": "us-west-2a", "Description": "my efa", "Groups": [ { "GroupName": "my-efa-sg", "GroupId": "sg-02e57dbcfe0331c1b" } ], "InterfaceType": "efa", "Ipv6Addresses": [], "MacAddress": "06:d7:a4:f7:4d:57", "NetworkInterfaceId": "eni-034acc2885e862b65", "OwnerId": "123456789012", "PrivateDnsName": "ip-10-0-8-180.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.180", "PrivateIpAddresses": [ { "Primary": true, "PrivateDnsName": "ip-10-0-8-180.us-west-2.compute.internal", "PrivateIpAddress": "10.0.8.180" } ], "RequesterId": "AIDA4Z3Y7GSXTMEXAMPLE", "RequesterManaged": false, "SourceDestCheck": true, "Status": "pending", "SubnetId": "subnet-00a24d0d67acf6333", "TagSet": [], "VpcId": "vpc-02723a0feeeb9d57b" } }For more information, see Elastic network interfaces in the Amazon EC2 User Guide.
-
For API details, see CreateNetworkInterface
in AWS CLI Command Reference.
-
The following code example shows how to use create-placement-group.
- AWS CLI
-
To create a placement group
This example command creates a placement group with the specified name.
Command:
aws ec2 create-placement-group --group-namemy-cluster--strategyclusterTo create a partition placement group
This example command creates a partition placement group named
HDFS-Group-Awith five partitions.Command:
aws ec2 create-placement-group --group-nameHDFS-Group-A--strategypartition--partition-count5-
For API details, see CreatePlacementGroup
in AWS CLI Command Reference.
-
The following code example shows how to use create-replace-root-volume-task.
- AWS CLI
-
Example 1: To restore a root volume to its initial launch state
The following
create-replace-root-volume-taskexample restores the root volume of instance i-0123456789abcdefa to its initial launch state.aws ec2 create-replace-root-volume-task \ --instance-idi-0123456789abcdefaOutput:
{ "ReplaceRootVolumeTask": { "InstanceId": "i-0123456789abcdefa", "ReplaceRootVolumeTaskId": "replacevol-0111122223333abcd", "TaskState": "pending", "StartTime": "2022-03-14T15:06:38Z", "Tags": [] } }Example 2: To restore a root volume to a specific snapshot
The following
create-replace-root-volume-taskexample restores the root volume of instance i-0123456789abcdefa to snapshot snap-0abcdef1234567890.aws ec2 create-replace-root-volume-task \ --instance-idi-0123456789abcdefa\ --snapshot-idsnap-0abcdef1234567890Output:
{ "ReplaceRootVolumeTask": { "InstanceId": "i-0123456789abcdefa", "ReplaceRootVolumeTaskId": "replacevol-0555566667777abcd", "TaskState": "pending", "StartTime": "2022-03-14T15:16:28Z", "Tags": [] } }For more information, see Replace a root volume in the Amazon EC2 User Guide.
-
For API details, see CreateReplaceRootVolumeTask
in AWS CLI Command Reference.
-
The following code example shows how to use create-reserved-instances-listing.
- AWS CLI
-
To list a Reserved Instance in the Reserved Instance Marketplace
The following
create-reserved-instances-listingexample creates a listing for the specified Reserved Instance in the Reserved Instance Marketplace.aws ec2 create-reserved-instances-listing \ --reserved-instances-id5ec28771-05ff-4b9b-aa31-9e57dexample\ --instance-count3\ --price-schedulesCurrencyCode=USD,Price=25.50\ --client-token550e8400-e29b-41d4-a716-446655440000-
For API details, see CreateReservedInstancesListing
in AWS CLI Command Reference.
-
The following code example shows how to use create-restore-image-task.
- AWS CLI
-
To restore an AMI from an S3 bucket
The following
create-restore-image-taskexample restores an AMI from an S3 bucket. Use the values forS3ObjectKey `` and ``Bucketfrom thedescribe-store-image-tasksoutput, specify the object key of the AMI and the name of the S3 bucket to which the AMI was copied, and specify the name for the restored AMI. The name must be unique for AMIs in the Region for this account. The restored AMI will receive a new AMI ID.aws ec2 create-restore-image-task \ --object-keyami-1234567890abcdef0.bin\ --bucketmy-ami-bucket\ --name 'New AMI Name'Output:
{ "ImageId": "ami-0eab20fe36f83e1a8" }For more information, see Store and restore an AMI using S3 in the Amazon EC2 User Guide.
-
For API details, see CreateRestoreImageTask
in AWS CLI Command Reference.
-
The following code example shows how to use create-route-table.
- AWS CLI
-
To create a route table
This example creates a route table for the specified VPC.
Command:
aws ec2 create-route-table --vpc-idvpc-a01106c2Output:
{ "RouteTable": { "Associations": [], "RouteTableId": "rtb-22574640", "VpcId": "vpc-a01106c2", "PropagatingVgws": [], "Tags": [], "Routes": [ { "GatewayId": "local", "DestinationCidrBlock": "10.0.0.0/16", "State": "active" } ] } }-
For API details, see CreateRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use create-route.
- AWS CLI
-
To create a route
This example creates a route for the specified route table. The route matches all IPv4 traffic (
0.0.0.0/0) and routes it to the specified Internet gateway. If the command succeeds, no output is returned.Command:
aws ec2 create-route --route-table-idrtb-22574640--destination-cidr-block0.0.0.0/0--gateway-idigw-c0a643a9This example command creates a route in route table rtb-g8ff4ea2. The route matches traffic for the IPv4 CIDR block 10.0.0.0/16 and routes it to VPC peering connection, pcx-111aaa22. This route enables traffic to be directed to the peer VPC in the VPC peering connection. If the command succeeds, no output is returned.
Command:
aws ec2 create-route --route-table-idrtb-g8ff4ea2--destination-cidr-block10.0.0.0/16--vpc-peering-connection-idpcx-1a2b3c4dThis example creates a route in the specified route table that matches all IPv6 traffic (
::/0) and routes it to the specified egress-only Internet gateway.Command:
aws ec2 create-route --route-table-idrtb-dce620b8--destination-ipv6-cidr-block::/0--egress-only-internet-gateway-ideigw-01eadbd45ecd7943f-
For API details, see CreateRoute
in AWS CLI Command Reference.
-
The following code example shows how to use create-security-group.
- AWS CLI
-
To create a security group for EC2-Classic
This example creates a security group named
MySecurityGroup.Command:
aws ec2 create-security-group --group-nameMySecurityGroup--description"My security group"Output:
{ "GroupId": "sg-903004f8" }To create a security group for EC2-VPC
This example creates a security group named
MySecurityGroupfor the specified VPC.Command:
aws ec2 create-security-group --group-nameMySecurityGroup--description"My security group"--vpc-idvpc-1a2b3c4dOutput:
{ "GroupId": "sg-903004f8" }For more information, see Using Security Groups in the AWS Command Line Interface User Guide.
-
For API details, see CreateSecurityGroup
in AWS CLI Command Reference.
-
The following code example shows how to use create-snapshot.
- AWS CLI
-
To create a snapshot
This example command creates a snapshot of the volume with a volume ID of
vol-1234567890abcdef0and a short description to identify the snapshot.Command:
aws ec2 create-snapshot --volume-idvol-1234567890abcdef0--description"This is my root volume snapshot"Output:
{ "Description": "This is my root volume snapshot", "Tags": [], "Encrypted": false, "VolumeId": "vol-1234567890abcdef0", "State": "pending", "VolumeSize": 8, "StartTime": "2018-02-28T21:06:01.000Z", "Progress": "", "OwnerId": "012345678910", "SnapshotId": "snap-066877671789bd71b" }To create a snapshot with tags
This example command creates a snapshot and applies two tags: purpose=prod and costcenter=123.
Command:
aws ec2 create-snapshot --volume-idvol-1234567890abcdef0--description 'Prod backup' --tag-specifications 'ResourceType=snapshot,Tags=[{Key=purpose,Value=prod},{Key=costcenter,Value=123}]'Output:
{ "Description": "Prod backup", "Tags": [ { "Value": "prod", "Key": "purpose" }, { "Value": "123", "Key": "costcenter" } ], "Encrypted": false, "VolumeId": "vol-1234567890abcdef0", "State": "pending", "VolumeSize": 8, "StartTime": "2018-02-28T21:06:06.000Z", "Progress": "", "OwnerId": "012345678910", "SnapshotId": "snap-09ed24a70bc19bbe4" }-
For API details, see CreateSnapshot
in AWS CLI Command Reference.
-
The following code example shows how to use create-snapshots.
- AWS CLI
-
Example 1: To create a multi-volume snapshot
The following
create-snapshotsexample creates snapshots of all volumes attached to the specified instance.aws ec2 create-snapshots \ --instance-specificationInstanceId=i-1234567890abcdef0\ --description"This is snapshot of a volume from my-instance"Output:
{ "Snapshots": [ { "Description": "This is a snapshot of a volume from my-instance", "Tags": [], "Encrypted": false, "VolumeId": "vol-0a01d2d5a34697479", "State": "pending", "VolumeSize": 16, "StartTime": "2019-08-05T16:58:19.000Z", "Progress": "", "OwnerId": "123456789012", "SnapshotId": "snap-07f30e3909aa0045e" }, { "Description": "This is a snapshot of a volume from my-instance", "Tags": [], "Encrypted": false, "VolumeId": "vol-02d0d4947008cb1a2", "State": "pending", "VolumeSize": 20, "StartTime": "2019-08-05T16:58:19.000Z", "Progress": "", "OwnerId": "123456789012", "SnapshotId": "snap-0ec20b602264aad48" }, ... ] }Example 2: To create a multi-volume snapshot with tags from the source volume
The following
create-snapshotsexample creates snapshots of all volumes attached to the specified instance and copies the tags from each volume to its corresponding snapshot.aws ec2 create-snapshots \ --instance-specificationInstanceId=i-1234567890abcdef0\ --copy-tags-from-sourcevolume\ --description"This is snapshot of a volume from my-instance"Output:
{ "Snapshots": [ { "Description": "This is a snapshot of a volume from my-instance", "Tags": [ { "Key": "Name", "Value": "my-volume" } ], "Encrypted": false, "VolumeId": "vol-02d0d4947008cb1a2", "State": "pending", "VolumeSize": 20, "StartTime": "2019-08-05T16:53:04.000Z", "Progress": "", "OwnerId": "123456789012", "SnapshotId": "snap-053bfaeb821a458dd" } ... ] }Example 3: To create a multi-volume snapshot not including the root volume
The following
create-snapshotsexample creates a snapshot of all volumes attached to the specified instance except for the root volume.aws ec2 create-snapshots \ --instance-specificationInstanceId=i-1234567890abcdef0,ExcludeBootVolume=trueSee example 1 for sample output.
Example 4: To create a multi-volume snapshot and add tags
The following
create-snapshotsexample creates snapshots of all volumes attached to the specified instance and adds two tags to each snapshot.aws ec2 create-snapshots \ --instance-specificationInstanceId=i-1234567890abcdef0\ --tag-specifications 'ResourceType=snapshot,Tags=[{Key=Name,Value=backup},{Key=costcenter,Value=123}]'See example 1 for sample output.
-
For API details, see CreateSnapshots
in AWS CLI Command Reference.
-
The following code example shows how to use create-spot-datafeed-subscription.
- AWS CLI
-
To create a Spot Instance data feed
The following
create-spot-datafeed-subscriptionexample creates a Spot Instance data feed.aws ec2 create-spot-datafeed-subscription \ --bucketamzn-s3-demo-bucket\ --prefixspot-data-feedOutput:
{ "SpotDatafeedSubscription": { "Bucket": "amzn-s3-demo-bucket", "OwnerId": "123456789012", "Prefix": "spot-data-feed", "State": "Active" } }The data feed is stored in the Amazon S3 bucket that you specified. The file names for this data feed have the following format.
amzn-s3-demo-bucket.s3.amazonaws.com/spot-data-feed/123456789012.YYYY-MM-DD-HH.n.abcd1234.gzFor more information, see Spot Instance data feed in the Amazon EC2 User Guide.
-
For API details, see CreateSpotDatafeedSubscription
in AWS CLI Command Reference.
-
The following code example shows how to use create-store-image-task.
- AWS CLI
-
To store an AMI in an S3 bucket
The following
create-store-image-taskexample stores an AMI in an S3 bucket. Specify the ID of the AMI and the name of the S3 bucket in which to store the AMI.aws ec2 create-store-image-task \ --image-idami-1234567890abcdef0\ --bucketmy-ami-bucketOutput:
{ "ObjectKey": "ami-1234567890abcdef0.bin" }For more information, see Store and restore an AMI using S3 in the Amazon EC2 User Guide.
-
For API details, see CreateStoreImageTask
in AWS CLI Command Reference.
-
The following code example shows how to use create-subnet-cidr-reservation.
- AWS CLI
-
To create a subnet CIDR reservation
The following
create-subnet-cidr-reservationexample creates a subnet CIDR reservation for the specified subnet and CIDR range.aws ec2 create-subnet-cidr-reservation \ --subnet-idsubnet-03c51e2eEXAMPLE\ --reservation-typeprefix\ --cidr10.1.0.20/26Output:
{ "SubnetCidrReservation": { "SubnetCidrReservationId": "scr-044f977c4eEXAMPLE", "SubnetId": "subnet-03c51e2e6cEXAMPLE", "Cidr": "10.1.0.16/28", "ReservationType": "prefix", "OwnerId": "123456789012" } }For more information, see Subnet CIDR reservations in the Amazon VPC User Guide.
-
For API details, see CreateSubnetCidrReservation
in AWS CLI Command Reference.
-
The following code example shows how to use create-subnet.
- AWS CLI
-
Example 1: To create a subnet with an IPv4 CIDR block only
The following
create-subnetexample creates a subnet in the specified VPC with the specified IPv4 CIDR block.aws ec2 create-subnet \ --vpc-idvpc-081ec835f3EXAMPLE\ --cidr-block10.0.0.0/24\ --tag-specificationsResourceType=subnet,Tags=[{Key=Name,Value=my-ipv4-only-subnet}]Output:
{ "Subnet": { "AvailabilityZone": "us-west-2a", "AvailabilityZoneId": "usw2-az2", "AvailableIpAddressCount": 251, "CidrBlock": "10.0.0.0/24", "DefaultForAz": false, "MapPublicIpOnLaunch": false, "State": "available", "SubnetId": "subnet-0e99b93155EXAMPLE", "VpcId": "vpc-081ec835f3EXAMPLE", "OwnerId": "123456789012", "AssignIpv6AddressOnCreation": false, "Ipv6CidrBlockAssociationSet": [], "Tags": [ { "Key": "Name", "Value": "my-ipv4-only-subnet" } ], "SubnetArn": "arn:aws:ec2:us-west-2:123456789012:subnet/subnet-0e99b93155EXAMPLE" } }Example 2: To create a subnet with both IPv4 and IPv6 CIDR blocks
The following
create-subnetexample creates a subnet in the specified VPC with the specified IPv4 and IPv6 CIDR blocks.aws ec2 create-subnet \ --vpc-idvpc-081ec835f3EXAMPLE\ --cidr-block10.0.0.0/24\ --ipv6-cidr-block2600:1f16:cfe:3660::/64\ --tag-specificationsResourceType=subnet,Tags=[{Key=Name,Value=my-ipv4-ipv6-subnet}]Output:
{ "Subnet": { "AvailabilityZone": "us-west-2a", "AvailabilityZoneId": "usw2-az2", "AvailableIpAddressCount": 251, "CidrBlock": "10.0.0.0/24", "DefaultForAz": false, "MapPublicIpOnLaunch": false, "State": "available", "SubnetId": "subnet-0736441d38EXAMPLE", "VpcId": "vpc-081ec835f3EXAMPLE", "OwnerId": "123456789012", "AssignIpv6AddressOnCreation": false, "Ipv6CidrBlockAssociationSet": [ { "AssociationId": "subnet-cidr-assoc-06c5f904499fcc623", "Ipv6CidrBlock": "2600:1f13:cfe:3660::/64", "Ipv6CidrBlockState": { "State": "associating" } } ], "Tags": [ { "Key": "Name", "Value": "my-ipv4-ipv6-subnet" } ], "SubnetArn": "arn:aws:ec2:us-west-2:123456789012:subnet/subnet-0736441d38EXAMPLE" } }Example 3: To create a subnet with an IPv6 CIDR block only
The following
create-subnetexample creates a subnet in the specified VPC with the specified IPv6 CIDR block.aws ec2 create-subnet \ --vpc-idvpc-081ec835f3EXAMPLE\ --ipv6-native \ --ipv6-cidr-block2600:1f16:115:200::/64\ --tag-specificationsResourceType=subnet,Tags=[{Key=Name,Value=my-ipv6-only-subnet}]Output:
{ "Subnet": { "AvailabilityZone": "us-west-2a", "AvailabilityZoneId": "usw2-az2", "AvailableIpAddressCount": 0, "DefaultForAz": false, "MapPublicIpOnLaunch": false, "State": "available", "SubnetId": "subnet-03f720e7deEXAMPLE", "VpcId": "vpc-081ec835f3EXAMPLE", "OwnerId": "123456789012", "AssignIpv6AddressOnCreation": true, "Ipv6CidrBlockAssociationSet": [ { "AssociationId": "subnet-cidr-assoc-01ef639edde556709", "Ipv6CidrBlock": "2600:1f13:cfe:3660::/64", "Ipv6CidrBlockState": { "State": "associating" } } ], "Tags": [ { "Key": "Name", "Value": "my-ipv6-only-subnet" } ], "SubnetArn": "arn:aws:ec2:us-west-2:123456789012:subnet/subnet-03f720e7deEXAMPLE" } }For more information, see VPCs and subnets in the Amazon VPC User Guide.
-
For API details, see CreateSubnet
in AWS CLI Command Reference.
-
The following code example shows how to use create-tags.
- AWS CLI
-
Example 1: To add a tag to a resource
The following
create-tagsexample adds the tagStack=productionto the specified image, or overwrites an existing tag for the AMI where the tag key isStack.aws ec2 create-tags \ --resourcesami-1234567890abcdef0\ --tagsKey=Stack,Value=productionThis command produces no output
Example 2: To add tags to multiple resources
The following
create-tagsexample adds (or overwrites) two tags for an AMI and an instance. One of the tags has a key (webserver) but no value (value is set to an empty string). The other tag has a key (stack) and a value (Production).aws ec2 create-tags \ --resourcesami-1a2b3c4di-1234567890abcdef0\ --tagsKey=webserver,Value=Key=stack,Value=ProductionThis command produces no output
Example 3: To add tags containing special characters
The following
create-tagsexamples add the tag[Group]=testfor an instance. The square brackets ([ and ]) are special characters, and must be escaped. The following examples also use the line continuation character appropriate for each environment.If you are using Windows, surround the element that has special characters with double quotes ("), and then precede each double quote character with a backslash (\) as follows.
aws ec2 create-tags^--resourcesi-1234567890abcdef0^--tags Key=\"[Group]\",Value=testIf you are using Windows PowerShell, surround the element the value that has special characters with double quotes ("), precede each double quote character with a backslash (\), and then surround the entire key and value structure with single quotes (') as follows.
aws ec2 create-tags`--resourcesi-1234567890abcdef0`--tags 'Key=\"[Group]\",Value=test'If you are using Linux or OS X, surround the element that has special characters with double quotes ("), and then surround the entire key and value structure with single quotes (') as follows.
aws ec2 create-tags \ --resourcesi-1234567890abcdef0\ --tags 'Key="[Group]",Value=test'For more information, see Tag your Amazon EC2 resources in the Amazon EC2 User Guide.
-
For API details, see CreateTags
in AWS CLI Command Reference.
-
The following code example shows how to use create-traffic-mirror-filter-rule.
- AWS CLI
-
To create a filter rule for incoming TCP traffic
The following
create-traffic-mirror-filter-ruleexample creates a rule that you can use to mirror all incoming TCP traffic. Before you run this command, usecreate-traffic-mirror-filterto create the the traffic mirror filter.aws ec2 create-traffic-mirror-filter-rule \ --description 'TCP Rule' \ --destination-cidr-block0.0.0.0/0\ --protocol6\ --rule-actionaccept\ --rule-number1\ --source-cidr-block0.0.0.0/0\ --traffic-directioningress\ --traffic-mirror-filter-idtmf-04812ff784b25ae67Output:
{ "TrafficMirrorFilterRule": { "DestinationCidrBlock": "0.0.0.0/0", "TrafficMirrorFilterId": "tmf-04812ff784b25ae67", "TrafficMirrorFilterRuleId": "tmfr-02d20d996673f3732", "SourceCidrBlock": "0.0.0.0/0", "TrafficDirection": "ingress", "Description": "TCP Rule", "RuleNumber": 1, "RuleAction": "accept", "Protocol": 6 }, "ClientToken": "4752b573-40a6-4eac-a8a4-a72058761219" }For more information, see Create a traffic mirror filter in the Traffic Mirroring Guide.
-
For API details, see CreateTrafficMirrorFilterRule
in AWS CLI Command Reference.
-
The following code example shows how to use create-traffic-mirror-filter.
- AWS CLI
-
To create a traffic mirror filter
The following
create-traffic-mirror-filterexample creates a traffic mirror filter. After you create the filter, usecreate-traffic-mirror-filter-ruleto add rules.aws ec2 create-traffic-mirror-filter \ --description 'TCP Filter'Output:
{ "ClientToken": "28908518-100b-4987-8233-8c744EXAMPLE", "TrafficMirrorFilter": { "TrafficMirrorFilterId": "tmf-04812ff784EXAMPLE", "Description": "TCP Filter", "EgressFilterRules": [], "IngressFilterRules": [], "Tags": [], "NetworkServices": [] } }For more information, see Create a traffic mirror filter in the Traffic Mirroring Guide.
-
For API details, see CreateTrafficMirrorFilter
in AWS CLI Command Reference.
-
The following code example shows how to use create-traffic-mirror-session.
- AWS CLI
-
To create a traffic mirror session
The following
create-traffic-mirror-sessioncommand creates a traffic mirror session for the specified source and target for 25 bytes of the packet.aws ec2 create-traffic-mirror-session \ --description 'example session' \ --traffic-mirror-target-idtmt-07f75d8feeEXAMPLE\ --network-interface-ideni-070203f901EXAMPLE\ --session-number1\ --packet-length25\ --traffic-mirror-filter-idtmf-04812ff784EXAMPLEOutput:
{ "TrafficMirrorSession": { "TrafficMirrorSessionId": "tms-08a33b1214EXAMPLE", "TrafficMirrorTargetId": "tmt-07f75d8feeEXAMPLE", "TrafficMirrorFilterId": "tmf-04812ff784EXAMPLE", "NetworkInterfaceId": "eni-070203f901EXAMPLE", "OwnerId": "111122223333", "PacketLength": 25, "SessionNumber": 1, "VirtualNetworkId": 7159709, "Description": "example session", "Tags": [] }, "ClientToken": "5236cffc-ee13-4a32-bb5b-388d9da09d96" }For more information, see Create a traffic mirror session in the Traffic Mirroring Guide.
-
For API details, see CreateTrafficMirrorSession
in AWS CLI Command Reference.
-
The following code example shows how to use create-traffic-mirror-target.
- AWS CLI
-
To create a a Network Load Balancer traffic mirror target
The following
create-traffic-mirror-targetexample creates a Network Load Balancer traffic mirror target.aws ec2 create-traffic-mirror-target \ --description 'Example Network Load Balancer Target' \ --network-load-balancer-arnarn:aws:elasticloadbalancing:us-east-1:111122223333:loadbalancer/net/NLB/7cdec873EXAMPLEOutput:
{ "TrafficMirrorTarget": { "Type": "network-load-balancer", "Tags": [], "Description": "Example Network Load Balancer Target", "OwnerId": "111122223333", "NetworkLoadBalancerArn": "arn:aws:elasticloadbalancing:us-east-1:724145273726:loadbalancer/net/NLB/7cdec873EXAMPLE", "TrafficMirrorTargetId": "tmt-0dabe9b0a6EXAMPLE" }, "ClientToken": "d5c090f5-8a0f-49c7-8281-72c796a21f72" }To create a network traffic mirror target
The following
create-traffic-mirror-targetexample creates a network interface Traffic Mirror target.aws ec2 create-traffic-mirror-target \ --description 'Network interface target' \ --network-interface-ideni-eni-01f6f631eEXAMPLEOutput:
{ "ClientToken": "5289a345-0358-4e62-93d5-47ef3061d65e", "TrafficMirrorTarget": { "Description": "Network interface target", "NetworkInterfaceId": "eni-01f6f631eEXAMPLE", "TrafficMirrorTargetId": "tmt-02dcdbe2abEXAMPLE", "OwnerId": "111122223333", "Type": "network-interface", "Tags": [] } }For more information, see Create a traffic mirror target in the Traffic Mirroring Guide.
-
For API details, see CreateTrafficMirrorTarget
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-connect-peer.
- AWS CLI
-
To create a Transit Gateway Connect peer
The following
create-transit-gateway-connect-peerexample creates a Connect peer.aws ec2 create-transit-gateway-connect-peer \ --transit-gateway-attachment-idtgw-attach-0f0927767cEXAMPLE\ --peer-address172.31.1.11\ --inside-cidr-blocks169.254.6.0/29Output:
{ "TransitGatewayConnectPeer": { "TransitGatewayAttachmentId": "tgw-attach-0f0927767cEXAMPLE", "TransitGatewayConnectPeerId": "tgw-connect-peer-0666adbac4EXAMPLE", "State": "pending", "CreationTime": "2021-10-13T03:35:17.000Z", "ConnectPeerConfiguration": { "TransitGatewayAddress": "10.0.0.234", "PeerAddress": "172.31.1.11", "InsideCidrBlocks": [ "169.254.6.0/29" ], "Protocol": "gre", "BgpConfigurations": [ { "TransitGatewayAsn": 64512, "PeerAsn": 64512, "TransitGatewayAddress": "169.254.6.2", "PeerAddress": "169.254.6.1", "BgpStatus": "down" }, { "TransitGatewayAsn": 64512, "PeerAsn": 64512, "TransitGatewayAddress": "169.254.6.3", "PeerAddress": "169.254.6.1", "BgpStatus": "down" } ] } } }For more information, see Transit gateway Connect attachments and Transit Gateway Connect peers in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayConnectPeer
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-connect.
- AWS CLI
-
To create a transit gateway Connect attachment
The following
create-transit-gateway-connectexample creates a Connect attachment, with the "gre" protocol, for the specified attachment.aws ec2 create-transit-gateway-connect \ --transport-transit-gateway-attachment-idtgw-attach-0a89069f57EXAMPLE\ --options"Protocol=gre"Output:
{ "TransitGatewayConnect": { "TransitGatewayAttachmentId": "tgw-attach-037012e5dcEXAMPLE", "TransportTransitGatewayAttachmentId": "tgw-attach-0a89069f57EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "State": "pending", "CreationTime": "2021-03-09T19:59:17+00:00", "Options": { "Protocol": "gre" } } }For more information, see Transit gateway Connect attachments and Transit Gateway Connect peers in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayConnect
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-multicast-domain.
- AWS CLI
-
Example 1: To create an IGMP multicast domain
The following
create-transit-gateway-multicast-domainexample creates a multicast domain for the specified transit gateway. With static sources disabled, any instances in subnets associated with the multicast domain can send multicast traffic. If at least one member uses the IGMP protocol, you must enable IGMPv2 support.aws ec2 create-transit-gateway-multicast-domain \ --transit-gateway-idtgw-0bf0bffefaEXAMPLE\ --optionsStaticSourcesSupport=disable,Igmpv2Support=enableOutput:
{ "TransitGatewayMulticastDomain": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c9e29e2a7EXAMPLE", "TransitGatewayId": "tgw-0bf0bffefaEXAMPLE", "TransitGatewayMulticastDomainArn": "arn:aws:ec2:us-west-2:123456789012:transit-gateway-multicast-domain/tgw-mcast-domain-0c9e29e2a7EXAMPLE", "OwnerId": "123456789012", "Options": { "Igmpv2Support": "enable", "StaticSourcesSupport": "disable", "AutoAcceptSharedAssociations": "disable" }, "State": "pending", "CreationTime": "2021-09-29T22:17:13.000Z" } }Example 2: To create a static multicast domain
The following
create-transit-gateway-multicast-domainexample creates a multicast domain for the specified transit gateway. With static sources enabled, you must statically add sources.aws ec2 create-transit-gateway-multicast-domain \ --transit-gateway-idtgw-0bf0bffefaEXAMPLE\ --optionsStaticSourcesSupport=enable,Igmpv2Support=disableOutput:
{ "TransitGatewayMulticastDomain": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-000fb24d04EXAMPLE", "TransitGatewayId": "tgw-0bf0bffefaEXAMPLE", "TransitGatewayMulticastDomainArn": "arn:aws:ec2:us-west-2:123456789012:transit-gateway-multicast-domain/tgw-mcast-domain-000fb24d04EXAMPLE", "OwnerId": "123456789012", "Options": { "Igmpv2Support": "disable", "StaticSourcesSupport": "enable", "AutoAcceptSharedAssociations": "disable" }, "State": "pending", "CreationTime": "2021-09-29T22:20:19.000Z" } }For more information, see Managing multicast domains in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayMulticastDomain
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-peering-attachment.
- AWS CLI
-
To create a transit gateway peering attachment
The following
create-transit-gateway-peering-attachmentexample creates a peering attachment request between the two specified transit gateways.aws ec2 create-transit-gateway-peering-attachment \ --transit-gateway-idtgw-123abc05e04123abc\ --peer-transit-gateway-idtgw-11223344aabbcc112\ --peer-account-id123456789012\ --peer-regionus-east-2Output:
{ "TransitGatewayPeeringAttachment": { "TransitGatewayAttachmentId": "tgw-attach-4455667788aabbccd", "RequesterTgwInfo": { "TransitGatewayId": "tgw-123abc05e04123abc", "OwnerId": "123456789012", "Region": "us-west-2" }, "AccepterTgwInfo": { "TransitGatewayId": "tgw-11223344aabbcc112", "OwnerId": "123456789012", "Region": "us-east-2" }, "State": "initiatingRequest", "CreationTime": "2019-12-09T11:38:05.000Z" } }For more information, see Transit Gateway Peering Attachments in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayPeeringAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-policy-table.
- AWS CLI
-
To create a transit gateway policy table
The following
create-transit-gateway-policy-tableexample creates a transit gateway policy table for the specified transit gateway.aws ec2 create-transit-gateway-policy-table \ --transit-gateway-idtgw-067f8505c18f0bd6eOutput:
{ "TransitGatewayPolicyTable": { "TransitGatewayPolicyTableId": "tgw-ptb-0a16f134b78668a81", "TransitGatewayId": "tgw-067f8505c18f0bd6e", "State": "pending", "CreationTime": "2023-11-28T16:36:43+00:00" } }For more information, see Transit gateway policy tables in the Transit Gateway User Guide.
-
For API details, see CreateTransitGatewayPolicyTable
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-prefix-list-reference.
- AWS CLI
-
To create a reference to a prefix list
The following
create-transit-gateway-prefix-list-referenceexample creates a reference to the specified prefix list in the specified transit gateway route table.aws ec2 create-transit-gateway-prefix-list-reference \ --transit-gateway-route-table-idtgw-rtb-0123456789abcd123\ --prefix-list-idpl-11111122222222333\ --transit-gateway-attachment-idtgw-attach-aaaaaabbbbbb11111Output:
{ "TransitGatewayPrefixListReference": { "TransitGatewayRouteTableId": "tgw-rtb-0123456789abcd123", "PrefixListId": "pl-11111122222222333", "PrefixListOwnerId": "123456789012", "State": "pending", "Blackhole": false, "TransitGatewayAttachment": { "TransitGatewayAttachmentId": "tgw-attach-aaaaaabbbbbb11111", "ResourceType": "vpc", "ResourceId": "vpc-112233445566aabbc" } } }For more information, see Create a prefix list reference in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayPrefixListReference
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-route-table.
- AWS CLI
-
To create a Transit Gateway Route Table
The following
create-transit-gateway-route-tableexample creates a route table for the specified transit gateway.aws ec2 create-transit-gateway-route-table \ --transit-gateway-idtgw-0262a0e521EXAMPLEOutput:
{ "TransitGatewayRouteTable": { "TransitGatewayRouteTableId": "tgw-rtb-0960981be7EXAMPLE", "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "State": "pending", "DefaultAssociationRouteTable": false, "DefaultPropagationRouteTable": false, "CreationTime": "2019-07-10T19:01:46.000Z" } }For more information, see Create a transit gateway route table in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-route.
- AWS CLI
-
To create a transit gateway route
The following
create-transit-gateway-routeexample creates a route, with the specified destination, for the specified route table.aws ec2 create-transit-gateway-route \ --destination-cidr-block10.0.2.0/24\ --transit-gateway-route-table-idtgw-rtb-0b6f6aaa01EXAMPLE\ --transit-gateway-attachment-idtgw-attach-0b5968d3b6EXAMPLEOutput:
{ "Route": { "DestinationCidrBlock": "10.0.2.0/24", "TransitGatewayAttachments": [ { "ResourceId": "vpc-0065acced4EXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-0b5968d3b6EXAMPLE", "ResourceType": "vpc" } ], "Type": "static", "State": "active" } }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayRoute
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway-vpc-attachment.
- AWS CLI
-
Example 1: To associate a transit gateway with a VPC
The following
create-transit-gateway-vpc-attachmentexample creates a transit gateway attachment to the specified VPC.aws ec2 create-transit-gateway-vpc-attachment \ --transit-gateway-idtgw-0262a0e521EXAMPLE\ --vpc-idvpc-07e8ffd50f49335df\ --subnet-idsubnet-0752213d59EXAMPLEOutput:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-0a34fe6b4fEXAMPLE", "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "VpcId": "vpc-07e8ffd50fEXAMPLE", "VpcOwnerId": "111122223333", "State": "pending", "SubnetIds": [ "subnet-0752213d59EXAMPLE" ], "CreationTime": "2019-07-10T17:33:46.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" } } }For more information, see Create a transit gateway attachment to a VPC in the Transit Gateways Guide.
Example 2: To associate a transit gateway with multiple subnets in a VPC
The following
create-transit-gateway-vpc-attachmentexample creates a transit gateway attachment to the specified VPC and subnets.aws ec2 create-transit-gateway-vpc-attachment \ --transit-gateway-idtgw-02f776b1a7EXAMPLE\ --vpc-idvpc-3EXAMPLE\ --subnet-ids"subnet-dEXAMPLE""subnet-6EXAMPLE"Output:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-0e141e0bebEXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "VpcId": "vpc-3EXAMPLE", "VpcOwnerId": "111122223333", "State": "pending", "SubnetIds": [ "subnet-6EXAMPLE", "subnet-dEXAMPLE" ], "CreationTime": "2019-12-17T20:07:52.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" } } }For more information, see Create a transit gateway attachment to a VPC in the Transit Gateways Guide.
-
For API details, see CreateTransitGatewayVpcAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use create-transit-gateway.
- AWS CLI
-
To create a transit gateway
The following
create-transit-gatewayexample creates a transit gateway.aws ec2 create-transit-gateway \ --descriptionMyTGW\ --optionsAmazonSideAsn=64516,AutoAcceptSharedAttachments=enable,DefaultRouteTableAssociation=enable,DefaultRouteTablePropagation=enable,VpnEcmpSupport=enable,DnsSupport=enableOutput:
{ "TransitGateway": { "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "TransitGatewayArn": "arn:aws:ec2:us-east-2:111122223333:transit-gateway/tgw-0262a0e521EXAMPLE", "State": "pending", "OwnerId": "111122223333", "Description": "MyTGW", "CreationTime": "2019-07-10T14:02:12.000Z", "Options": { "AmazonSideAsn": 64516, "AutoAcceptSharedAttachments": "enable", "DefaultRouteTableAssociation": "enable", "AssociationDefaultRouteTableId": "tgw-rtb-018774adf3EXAMPLE", "DefaultRouteTablePropagation": "enable", "PropagationDefaultRouteTableId": "tgw-rtb-018774adf3EXAMPLE", "VpnEcmpSupport": "enable", "DnsSupport": "enable" } } }For more information, see Create a transit gateway in the Transit Gateways Guide.
-
For API details, see CreateTransitGateway
in AWS CLI Command Reference.
-
The following code example shows how to use create-verified-access-endpoint.
- AWS CLI
-
To create a Verified Access endpoint
The following
create-verified-access-endpointexample creates a Verified Access endpoint for the speciied Verified Access group. The specified network interface and security group must belong to the same VPC.aws ec2 create-verified-access-endpoint \ --verified-access-group-idvagr-0dbe967baf14b7235\ --endpoint-typenetwork-interface\ --attachment-typevpc\ --domain-certificate-arnarn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE\ --application-domainexample.com\ --endpoint-domain-prefixmy-ava-app\ --security-group-idssg-004915970c4c8f13a\ --network-interface-optionsNetworkInterfaceId=eni-0aec70418c8d87a0f,Protocol=https,Port=443\ --tag-specificationsResourceType=verified-access-endpoint,Tags=[{Key=Name,Value=my-va-endpoint}]Output:
{ "VerifiedAccessEndpoint": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessEndpointId": "vae-066fac616d4d546f2", "ApplicationDomain": "example.com", "EndpointType": "network-interface", "AttachmentType": "vpc", "DomainCertificateArn": "arn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE", "EndpointDomain": "my-ava-app.edge-00c3372d53b1540bb.vai-0ce000c0b7643abea.prod.verified-access.us-east-2.amazonaws.com", "SecurityGroupIds": [ "sg-004915970c4c8f13a" ], "NetworkInterfaceOptions": { "NetworkInterfaceId": "eni-0aec70418c8d87a0f", "Protocol": "https", "Port": 443 }, "Status": { "Code": "pending" }, "Description": "", "CreationTime": "2023-08-25T20:54:43", "LastUpdatedTime": "2023-08-25T20:54:43", "Tags": [ { "Key": "Name", "Value": "my-va-endpoint" } ] } }For more information, see Verified Access endpoints in the AWS Verified Access User Guide.
-
For API details, see CreateVerifiedAccessEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use create-verified-access-group.
- AWS CLI
-
To create a Verified Access group
The following
create-verified-access-groupexample creates a Verified Access group for the specified Verified Access instance.aws ec2 create-verified-access-group \ --verified-access-instance-idvai-0ce000c0b7643abea\ --tag-specificationsResourceType=verified-access-group,Tags=[{Key=Name,Value=my-va-group}]Output:
{ "VerifiedAccessGroup": { "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "", "Owner": "123456789012", "VerifiedAccessGroupArn": "arn:aws:ec2:us-east-2:123456789012:verified-access-group/vagr-0dbe967baf14b7235", "CreationTime": "2023-08-25T19:55:19", "LastUpdatedTime": "2023-08-25T19:55:19", "Tags": [ { "Key": "Name", "Value": "my-va-group" } ] } }For more information, see Verified Access groups in the AWS Verified Access User Guide.
-
For API details, see CreateVerifiedAccessGroup
in AWS CLI Command Reference.
-
The following code example shows how to use create-verified-access-instance.
- AWS CLI
-
To create a Verified Access instance
The following
create-verified-access-instanceexample creates a Verified Access instance with a Name tag.aws ec2 create-verified-access-instance \ --tag-specificationsResourceType=verified-access-instance,Tags=[{Key=Name,Value=my-va-instance}]Output:
{ "VerifiedAccessInstance": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "", "VerifiedAccessTrustProviders": [], "CreationTime": "2023-08-25T18:27:56", "LastUpdatedTime": "2023-08-25T18:27:56", "Tags": [ { "Key": "Name", "Value": "my-va-instance" } ] } }For more information, see Verified Access instances in the AWS Verified Access User Guide.
-
For API details, see CreateVerifiedAccessInstance
in AWS CLI Command Reference.
-
The following code example shows how to use create-verified-access-trust-provider.
- AWS CLI
-
To create a Verified Access trust provider
The following
create-verified-access-trust-providerexample sets up a Verified Access trust provider using AWS Identity Center.aws ec2 create-verified-access-trust-provider \ --trust-provider-typeuser\ --user-trust-provider-typeiam-identity-center\ --policy-reference-nameidc\ --tag-specificationsResourceType=verified-access-trust-provider,Tags=[{Key=Name,Value=my-va-trust-provider}]Output:
{ "VerifiedAccessTrustProvider": { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "Description": "", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center", "PolicyReferenceName": "idc", "CreationTime": "2023-08-25T18:40:36", "LastUpdatedTime": "2023-08-25T18:40:36", "Tags": [ { "Key": "Name", "Value": "my-va-trust-provider" } ] } }For more information, see Trust providers for Verified Access in the AWS Verified Access User Guide.
-
For API details, see CreateVerifiedAccessTrustProvider
in AWS CLI Command Reference.
-
The following code example shows how to use create-volume.
- AWS CLI
-
To create an empty General Purpose SSD (gp2) volume
The following
create-volumeexample creates an 80 GiB General Purpose SSD (gp2) volume in the specified Availability Zone. Note that the current Region must beus-east-1, or you can add the--regionparameter to specify the Region for the command.aws ec2 create-volume \ --volume-typegp2\ --size80\ --availability-zoneus-east-1aOutput:
{ "AvailabilityZone": "us-east-1a", "Tags": [], "Encrypted": false, "VolumeType": "gp2", "VolumeId": "vol-1234567890abcdef0", "State": "creating", "Iops": 240, "SnapshotId": "", "CreateTime": "YYYY-MM-DDTHH:MM:SS.000Z", "Size": 80 }If you do not specify a volume type, the default volume type is
gp2.aws ec2 create-volume \ --size80\ --availability-zoneus-east-1aExample 2: To create a Provisioned IOPS SSD (io1) volume from a snapshot
The following
create-volumeexample creates a Provisioned IOPS SSD (io1) volume with 1000 provisioned IOPS in the specified Availability Zone using the specified snapshot.aws ec2 create-volume \ --volume-typeio1\ --iops1000\ --snapshot-idsnap-066877671789bd71b\ --availability-zoneus-east-1aOutput:
{ "AvailabilityZone": "us-east-1a", "Tags": [], "Encrypted": false, "VolumeType": "io1", "VolumeId": "vol-1234567890abcdef0", "State": "creating", "Iops": 1000, "SnapshotId": "snap-066877671789bd71b", "CreateTime": "YYYY-MM-DDTHH:MM:SS.000Z", "Size": 500 }Example 3: To create an encrypted volume
The following
create-volumeexample creates an encrypted volume using the default CMK for EBS encryption. If encryption by default is disabled, you must specify the--encryptedparameter as follows.aws ec2 create-volume \ --size80\ --encrypted \ --availability-zoneus-east-1aOutput:
{ "AvailabilityZone": "us-east-1a", "Tags": [], "Encrypted": true, "VolumeType": "gp2", "VolumeId": "vol-1234567890abcdef0", "State": "creating", "Iops": 240, "SnapshotId": "", "CreateTime": "YYYY-MM-DDTHH:MM:SS.000Z", "Size": 80 }If encryption by default is enabled, the following example command creates an encrypted volume, even without the
--encryptedparameter.aws ec2 create-volume \ --size80\ --availability-zoneus-east-1aIf you use the
--kms-key-idparameter to specify a customer managed CMK, you must specify the--encryptedparameter even if encryption by default is enabled.aws ec2 create-volume \ --volume-typegp2\ --size80\ --encrypted \ --kms-key-id0ea3fef3-80a7-4778-9d8c-1c0c6EXAMPLE\ --availability-zoneus-east-1aExample 4: To create a volume with tags
The following
create-volumeexample creates a volume and adds two tags.aws ec2 create-volume \ --availability-zoneus-east-1a\ --volume-typegp2\ --size80\ --tag-specifications 'ResourceType=volume,Tags=[{Key=purpose,Value=production},{Key=cost-center,Value=cc123}]'-
For API details, see CreateVolume
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpc-endpoint-connection-notification.
- AWS CLI
-
To create an endpoint connection notification
This example creates a notification for a specific endpoint service that alerts you when interface endpoints have connected to your service and when endpoints have been accepted for your service.
Command:
aws ec2 create-vpc-endpoint-connection-notification --connection-notification-arnarn:aws:sns:us-east-2:123456789012:VpceNotification--connection-eventsConnectAccept--service-idvpce-svc-1237881c0d25a3abcOutput:
{ "ConnectionNotification": { "ConnectionNotificationState": "Enabled", "ConnectionNotificationType": "Topic", "ServiceId": "vpce-svc-1237881c0d25a3abc", "ConnectionEvents": [ "Accept", "Connect" ], "ConnectionNotificationId": "vpce-nfn-008776de7e03f5abc", "ConnectionNotificationArn": "arn:aws:sns:us-east-2:123456789012:VpceNotification" } }-
For API details, see CreateVpcEndpointConnectionNotification
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpc-endpoint-service-configuration.
- AWS CLI
-
Example 1: To create an endpoint service configuration for an interface endpoint
The following
create-vpc-endpoint-service-configurationexample creates a VPC endpoint service configuration using the Network Load Balancernlb-vpce. This example also specifies that requests to connect to the service through an interface endpoint must be accepted.aws ec2 create-vpc-endpoint-service-configuration \ --network-load-balancer-arnsarn:aws:elasticloadbalancing:us-east-1:123456789012:loadbalancer/net/nlb-vpce/e94221227f1ba532\ --acceptance-requiredOutput:
{ "ServiceConfiguration": { "ServiceType": [ { "ServiceType": "Interface" } ], "NetworkLoadBalancerArns": [ "arn:aws:elasticloadbalancing:us-east-1:123456789012:loadbalancer/net/nlb-vpce/e94221227f1ba532" ], "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-03d5ebb7d9579a2b3", "ServiceState": "Available", "ServiceId": "vpce-svc-03d5ebb7d9579a2b3", "AcceptanceRequired": true, "AvailabilityZones": [ "us-east-1d" ], "BaseEndpointDnsNames": [ "vpce-svc-03d5ebb7d9579a2b3.us-east-1.vpce.amazonaws.com" ] } }For more information, see Create an endpoint service in the AWS PrivateLink User Guide.
Example 2: To create an endpoint service configuration for a Gateway Load Balancer endpoint
The following
create-vpc-endpoint-service-configurationexample creates a VPC endpoint service configuration using the Gateway Load BalancerGWLBService. Requests to connect to the service through a Gateway Load Balancer endpoint are automatically accepted.aws ec2 create-vpc-endpoint-service-configuration \ --gateway-load-balancer-arnsarn:aws:elasticloadbalancing:us-east-1:123456789012:loadbalancer/gwy/GWLBService/123123123123abcc\ --no-acceptance-requiredOutput:
{ "ServiceConfiguration": { "ServiceType": [ { "ServiceType": "GatewayLoadBalancer" } ], "ServiceId": "vpce-svc-123123a1c43abc123", "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-123123a1c43abc123", "ServiceState": "Available", "AvailabilityZones": [ "us-east-1d" ], "AcceptanceRequired": false, "ManagesVpcEndpoints": false, "GatewayLoadBalancerArns": [ "arn:aws:elasticloadbalancing:us-east-1:123456789012:loadbalancer/gwy/GWLBService/123123123123abcc" ] } }For more information, see Create a Gateway Load Balancer endpoint service in the AWS PrivateLink User Guide.
-
For API details, see CreateVpcEndpointServiceConfiguration
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpc-endpoint.
- AWS CLI
-
Example 1: To create a gateway endpoint
The following
create-vpc-endpointexample creates a gateway VPC endpoint between VPCvpc-1a2b3c4dand Amazon S3 in theus-east-1region, and associates route tablertb-11aa22bbwith the endpoint.aws ec2 create-vpc-endpoint \ --vpc-idvpc-1a2b3c4d\ --service-namecom.amazonaws.us-east-1.s3\ --route-table-idsrtb-11aa22bbOutput:
{ "VpcEndpoint": { "PolicyDocument": "{\"Version\":\"2008-10-17\",\"Statement\":[{\"Sid\":\"\",\"Effect\":\"Allow\",\"Principal\":\"\*\",\"Action\":\"\*\",\"Resource\":\"\*\"}]}", "VpcId": "vpc-1a2b3c4d", "State": "available", "ServiceName": "com.amazonaws.us-east-1.s3", "RouteTableIds": [ "rtb-11aa22bb" ], "VpcEndpointId": "vpc-1a2b3c4d", "CreationTimestamp": "2015-05-15T09:40:50Z" } }For more information, see Create a gateway endpoint in the AWS PrivateLink User Guide.
Example 2: To create an interface endpoint
The following
create-vpc-endpointexample creates an interface VPC endpoint between VPCvpc-1a2b3c4dand Amazon S3 in theus-east-1region. The command creates the endpoint in subnetsubnet-1a2b3c4d, associates it with security groupsg-1a2b3c4d, and adds a tag with a key of "Service" and a Value of "S3".aws ec2 create-vpc-endpoint \ --vpc-idvpc-1a2b3c4d\ --vpc-endpoint-typeInterface\ --service-namecom.amazonaws.us-east-1.s3\ --subnet-idssubnet-7b16de0c\ --security-group-idsg-1a2b3c4d\ --tag-specificationsResourceType=vpc-endpoint,Tags=[{Key=service,Value=S3}]Output:
{ "VpcEndpoint": { "VpcEndpointId": "vpce-1a2b3c4d5e6f1a2b3", "VpcEndpointType": "Interface", "VpcId": "vpc-1a2b3c4d", "ServiceName": "com.amazonaws.us-east-1.s3", "State": "pending", "RouteTableIds": [], "SubnetIds": [ "subnet-1a2b3c4d" ], "Groups": [ { "GroupId": "sg-1a2b3c4d", "GroupName": "default" } ], "PrivateDnsEnabled": false, "RequesterManaged": false, "NetworkInterfaceIds": [ "eni-0b16f0581c8ac6877" ], "DnsEntries": [ { "DnsName": "*.vpce-1a2b3c4d5e6f1a2b3-9hnenorg.s3.us-east-1.vpce.amazonaws.com", "HostedZoneId": "Z7HUB22UULQXV" }, { "DnsName": "*.vpce-1a2b3c4d5e6f1a2b3-9hnenorg-us-east-1c.s3.us-east-1.vpce.amazonaws.com", "HostedZoneId": "Z7HUB22UULQXV" } ], "CreationTimestamp": "2021-03-05T14:46:16.030000+00:00", "Tags": [ { "Key": "service", "Value": "S3" } ], "OwnerId": "123456789012" } }For more information, see Create an interface VPC endpoint in the AWS PrivateLink User Guide.
Example 3: To create a Gateway Load Balancer endpoint
The following
create-vpc-endpointexample creates a Gateway Load Balancer endpoint between VPCvpc-111122223333aabbcand and a service that is configured using a Gateway Load Balancer.aws ec2 create-vpc-endpoint \ --service-namecom.amazonaws.vpce.us-east-1.vpce-svc-123123a1c43abc123\ --vpc-endpoint-typeGatewayLoadBalancer\ --vpc-idvpc-111122223333aabbc\ --subnet-idssubnet-0011aabbcc2233445Output:
{ "VpcEndpoint": { "VpcEndpointId": "vpce-aabbaabbaabbaabba", "VpcEndpointType": "GatewayLoadBalancer", "VpcId": "vpc-111122223333aabbc", "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-123123a1c43abc123", "State": "pending", "SubnetIds": [ "subnet-0011aabbcc2233445" ], "RequesterManaged": false, "NetworkInterfaceIds": [ "eni-01010120203030405" ], "CreationTimestamp": "2020-11-11T08:06:03.522Z", "OwnerId": "123456789012" } }For more information, see Gateway Load Balancer endpoints in the AWS PrivateLink User Guide.
Example 4: To create a resource endpoint
The following
create-vpc-endpointexample creates a resource endpoint.aws ec2 create-vpc-endpoint \ --vpc-endpoint-typeResource\ --vpc-idvpc-111122223333aabbc\ --subnet-idssubnet-0011aabbcc2233445\ --resource-configuration-arnarn:aws:vpc-lattice-us-east-1:123456789012:resourceconfiguration/rcfg-0123abcde98765432Output:
{ "VpcEndpoint": { "VpcEndpointId": "vpce-00939a7ed9EXAMPLE", "VpcEndpointType": "Resource", "VpcId": "vpc-111122223333aabbc", "State": "Pending", "SubnetIds": [ "subnet-0011aabbcc2233445" ], "Groups": [ { "GroupId": "sg-03e2f15fbfc09b000", "GroupName": "default" } ], "IpAddressType": "IPV4", "PrivateDnsEnabled": false, "CreationTimestamp": "2025-02-06T23:38:49.525000+00:00", "Tags": [], "OwnerId": "123456789012", "ResourceConfigurationArn": "arn:aws:vpc-lattice:us-east-1:123456789012:resourceconfiguration/rcfg-0123abcde98765432" } }For more information, see Resource endpoints in the AWS PrivateLink User Guide.
Example 5: To create a service network endpoint
The following
create-vpc-endpointexample creates a service network endpoint.aws ec2 create-vpc-endpoint \ --vpc-endpoint-typeServiceNetwork\ --vpc-idvpc-111122223333aabbc\ --subnet-idssubnet-0011aabbcc2233445\ --service-network-arnarn:aws:vpc-lattice:us-east-1:123456789012:servicenetwork/sn-0101abcd5432abcd0\ --security-group-idssg-0123456789012abcdOutput:
{ "VpcEndpoint": { "VpcEndpointId": "vpce-0f00567fa8EXAMPLE", "VpcEndpointType": "ServiceNetwork", "VpcId": "vpc-111122223333aabbc", "State": "Pending", "SubnetIds": [ "subnet-0011aabbcc2233445" ], "Groups": [ { "GroupId": "sg-0123456789012abcd", "GroupName": "my-security-group" } ], "IpAddressType": "IPV4", "PrivateDnsEnabled": false, "CreationTimestamp": "2025-02-06T23:44:20.449000+00:00", "Tags": [], "OwnerId": "123456789012", "ServiceNetworkArn": "arn:aws:vpc-lattice:us-east-1:123456789012:servicenetwork/sn-0101abcd5432abcd0" } }For more information, see Service network endpoints in the AWS PrivateLink User Guide.
-
For API details, see CreateVpcEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpc-peering-connection.
- AWS CLI
-
To create a VPC peering connection between your VPCs
This example requests a peering connection between your VPCs vpc-1a2b3c4d and vpc-11122233.
Command:
aws ec2 create-vpc-peering-connection --vpc-idvpc-1a2b3c4d--peer-vpc-idvpc-11122233Output:
{ "VpcPeeringConnection": { "Status": { "Message": "Initiating Request to 444455556666", "Code": "initiating-request" }, "Tags": [], "RequesterVpcInfo": { "OwnerId": "444455556666", "VpcId": "vpc-1a2b3c4d", "CidrBlock": "10.0.0.0/28" }, "VpcPeeringConnectionId": "pcx-111aaa111", "ExpirationTime": "2014-04-02T16:13:36.000Z", "AccepterVpcInfo": { "OwnerId": "444455556666", "VpcId": "vpc-11122233" } } }To create a VPC peering connection with a VPC in another account
This example requests a peering connection between your VPC (vpc-1a2b3c4d), and a VPC (vpc-11122233) that belongs AWS account 123456789012.
Command:
aws ec2 create-vpc-peering-connection --vpc-idvpc-1a2b3c4d--peer-vpc-idvpc-11122233--peer-owner-id123456789012To create a VPC peering connection with a VPC in a different region
This example requests a peering connection between your VPC in the current region (vpc-1a2b3c4d), and a VPC (vpc-11122233) in your account in the
us-west-2region.Command:
aws ec2 create-vpc-peering-connection --vpc-idvpc-1a2b3c4d--peer-vpc-idvpc-11122233--peer-regionus-west-2This example requests a peering connection between your VPC in the current region (vpc-1a2b3c4d), and a VPC (vpc-11122233) that belongs AWS account 123456789012 that's in the
us-west-2region.Command:
aws ec2 create-vpc-peering-connection --vpc-idvpc-1a2b3c4d--peer-vpc-idvpc-11122233--peer-owner-id123456789012--peer-regionus-west-2-
For API details, see CreateVpcPeeringConnection
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpc.
- AWS CLI
-
Example 1: To create a VPC
The following
create-vpcexample creates a VPC with the specified IPv4 CIDR block and a Name tag.aws ec2 create-vpc \ --cidr-block10.0.0.0/16\ --tag-specificationsResourceType=vpc,Tags=[{Key=Name,Value=MyVpc}]Output:
{ "Vpc": { "CidrBlock": "10.0.0.0/16", "DhcpOptionsId": "dopt-5EXAMPLE", "State": "pending", "VpcId": "vpc-0a60eb65b4EXAMPLE", "OwnerId": "123456789012", "InstanceTenancy": "default", "Ipv6CidrBlockAssociationSet": [], "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-07501b79ecEXAMPLE", "CidrBlock": "10.0.0.0/16", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false, "Tags": [ { "Key": "Name", "Value": MyVpc" } ] } }Example 2: To create a VPC with dedicated tenancy
The following
create-vpcexample creates a VPC with the specified IPv4 CIDR block and dedicated tenancy.aws ec2 create-vpc \ --cidr-block10.0.0.0/16\ --instance-tenancydedicatedOutput:
{ "Vpc": { "CidrBlock": "10.0.0.0/16", "DhcpOptionsId": "dopt-19edf471", "State": "pending", "VpcId": "vpc-0a53287fa4EXAMPLE", "OwnerId": "111122223333", "InstanceTenancy": "dedicated", "Ipv6CidrBlockAssociationSet": [], "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-00b24cc1c2EXAMPLE", "CidrBlock": "10.0.0.0/16", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false } }Example 3: To create a VPC with an IPv6 CIDR block
The following
create-vpcexample creates a VPC with an Amazon-provided IPv6 CIDR block.aws ec2 create-vpc \ --cidr-block10.0.0.0/16\ --amazon-provided-ipv6-cidr-blockOutput:
{ "Vpc": { "CidrBlock": "10.0.0.0/16", "DhcpOptionsId": "dopt-dEXAMPLE", "State": "pending", "VpcId": "vpc-0fc5e3406bEXAMPLE", "OwnerId": "123456789012", "InstanceTenancy": "default", "Ipv6CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-068432c60bEXAMPLE", "Ipv6CidrBlock": "", "Ipv6CidrBlockState": { "State": "associating" }, "Ipv6Pool": "Amazon", "NetworkBorderGroup": "us-west-2" } ], "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-0669f8f9f5EXAMPLE", "CidrBlock": "10.0.0.0/16", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false } }Example 4: To create a VPC with a CIDR from an IPAM pool
The following
create-vpcexample creates a VPC with a CIDR from an Amazon VPC IP Address Manager (IPAM) pool.Linux and macOS:
aws ec2 create-vpc \ --ipv4-ipam-pool-idipam-pool-0533048da7d823723\ --tag-specifications ResourceType=vpc,Tags='[{Key=Environment,Value="Preprod"},{Key=Owner,Value="Build Team"}]'Windows:
aws ec2 create-vpc^--ipv4-ipam-pool-idipam-pool-0533048da7d823723^--tag-specifications ResourceType=vpc,Tags=[{Key=Environment,Value="Preprod"},{Key=Owner,Value="Build Team"}]Output:
{ "Vpc": { "CidrBlock": "10.0.1.0/24", "DhcpOptionsId": "dopt-2afccf50", "State": "pending", "VpcId": "vpc-010e1791024eb0af9", "OwnerId": "123456789012", "InstanceTenancy": "default", "Ipv6CidrBlockAssociationSet": [], "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-0a77de1d803226d4b", "CidrBlock": "10.0.1.0/24", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false, "Tags": [ { "Key": "Environment", "Value": "Preprod" }, { "Key": "Owner", "Value": "Build Team" } ] } }For more information, see Create a VPC that uses an IPAM pool CIDR in the Amazon VPC IPAM User Guide.
-
For API details, see CreateVpc
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpn-connection-route.
- AWS CLI
-
To create a static route for a VPN connection
This example creates a static route for the specified VPN connection. If the command succeeds, no output is returned.
Command:
aws ec2 create-vpn-connection-route --vpn-connection-idvpn-40f41529--destination-cidr-block11.12.0.0/16-
For API details, see CreateVpnConnectionRoute
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpn-connection.
- AWS CLI
-
Example 1: To create a VPN connection with dynamic routing
The following
create-vpn-connectionexample creates a VPN connection between the specified virtual private gateway and the specified customer gateway, and applies tags to the VPN connection. The output includes the configuration information for your customer gateway device, in XML format.aws ec2 create-vpn-connection \ --typeipsec.1\ --customer-gateway-idcgw-001122334455aabbc\ --vpn-gateway-idvgw-1a1a1a1a1a1a2b2b2\ --tag-specification 'ResourceType=vpn-connection,Tags=[{Key=Name,Value=BGP-VPN}]'Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": "...configuration information...", "CustomerGatewayId": "cgw-001122334455aabbc", "Category": "VPN", "State": "pending", "VpnConnectionId": "vpn-123123123123abcab", "VpnGatewayId": "vgw-1a1a1a1a1a1a2b2b2", "Options": { "EnableAcceleration": false, "StaticRoutesOnly": false, "LocalIpv4NetworkCidr": "0.0.0.0/0", "RemoteIpv4NetworkCidr": "0.0.0.0/0", "TunnelInsideIpVersion": "ipv4", "TunnelOptions": [ {}, {} ] }, "Routes": [], "Tags": [ { "Key": "Name", "Value": "BGP-VPN" } ] } }For more information, see How AWS Site-to-Site VPN works in the AWS Site-to-Site VPN User Guide.
Example 2: To create a VPN connection with static routing
The following
create-vpn-connectionexample creates a VPN connection between the specified virtual private gateway and the specified customer gateway. The options specify static routing. The output includes the configuration information for your customer gateway device, in XML format.aws ec2 create-vpn-connection \ --typeipsec.1\ --customer-gateway-idcgw-001122334455aabbc\ --vpn-gateway-idvgw-1a1a1a1a1a1a2b2b2\ --options "{\"StaticRoutesOnly\":true}"Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": "..configuration information...", "CustomerGatewayId": "cgw-001122334455aabbc", "Category": "VPN", "State": "pending", "VpnConnectionId": "vpn-123123123123abcab", "VpnGatewayId": "vgw-1a1a1a1a1a1a2b2b2", "Options": { "EnableAcceleration": false, "StaticRoutesOnly": true, "LocalIpv4NetworkCidr": "0.0.0.0/0", "RemoteIpv4NetworkCidr": "0.0.0.0/0", "TunnelInsideIpVersion": "ipv4", "TunnelOptions": [ {}, {} ] }, "Routes": [], "Tags": [] } }For more information, see How AWS Site-to-Site VPN works in the AWS Site-to-Site VPN User Guide.
Example 3: To create a VPN connection and specify your own inside CIDR and pre-shared key
The following
create-vpn-connectionexample creates a VPN connection and specifies the inside IP address CIDR block and a custom pre-shared key for each tunnel. The specified values are returned in theCustomerGatewayConfigurationinformation.aws ec2 create-vpn-connection \ --typeipsec.1\ --customer-gateway-idcgw-001122334455aabbc\ --vpn-gateway-idvgw-1a1a1a1a1a1a2b2b2\ --options TunnelOptions='[{TunnelInsideCidr=169.254.12.0/30,PreSharedKey=ExamplePreSharedKey1},{TunnelInsideCidr=169.254.13.0/30,PreSharedKey=ExamplePreSharedKey2}]'Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": "..configuration information...", "CustomerGatewayId": "cgw-001122334455aabbc", "Category": "VPN", "State": "pending", "VpnConnectionId": "vpn-123123123123abcab", "VpnGatewayId": "vgw-1a1a1a1a1a1a2b2b2", "Options": { "EnableAcceleration": false, "StaticRoutesOnly": false, "LocalIpv4NetworkCidr": "0.0.0.0/0", "RemoteIpv4NetworkCidr": "0.0.0.0/0", "TunnelInsideIpVersion": "ipv4", "TunnelOptions": [ { "OutsideIpAddress": "203.0.113.3", "TunnelInsideCidr": "169.254.12.0/30", "PreSharedKey": "ExamplePreSharedKey1" }, { "OutsideIpAddress": "203.0.113.5", "TunnelInsideCidr": "169.254.13.0/30", "PreSharedKey": "ExamplePreSharedKey2" } ] }, "Routes": [], "Tags": [] } }For more information, see How AWS Site-to-Site VPN works in the AWS Site-to-Site VPN User Guide.
Example 4: To create a VPN connection that supports IPv6 traffic
The following
create-vpn-connectionexample creates a VPN connection that supports IPv6 traffic between the specified transit gateway and specified customer gateway. The tunnel options for both tunnels specify that AWS must initiate the IKE negotiation.aws ec2 create-vpn-connection \ --typeipsec.1\ --transit-gateway-idtgw-12312312312312312\ --customer-gateway-idcgw-001122334455aabbc\ --optionsTunnelInsideIpVersion=ipv6,TunnelOptions=[{StartupAction=start},{StartupAction=start}]Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": "..configuration information...", "CustomerGatewayId": "cgw-001122334455aabbc", "Category": "VPN", "State": "pending", "VpnConnectionId": "vpn-11111111122222222", "TransitGatewayId": "tgw-12312312312312312", "Options": { "EnableAcceleration": false, "StaticRoutesOnly": false, "LocalIpv6NetworkCidr": "::/0", "RemoteIpv6NetworkCidr": "::/0", "TunnelInsideIpVersion": "ipv6", "TunnelOptions": [ { "OutsideIpAddress": "203.0.113.3", "StartupAction": "start" }, { "OutsideIpAddress": "203.0.113.5", "StartupAction": "start" } ] }, "Routes": [], "Tags": [] } }For more information, see How AWS Site-to-Site VPN works in the AWS Site-to-Site VPN User Guide.
-
For API details, see CreateVpnConnection
in AWS CLI Command Reference.
-
The following code example shows how to use create-vpn-gateway.
- AWS CLI
-
To create a virtual private gateway
This example creates a virtual private gateway.
Command:
aws ec2 create-vpn-gateway --typeipsec.1Output:
{ "VpnGateway": { "AmazonSideAsn": 64512, "State": "available", "Type": "ipsec.1", "VpnGatewayId": "vgw-9a4cacf3", "VpcAttachments": [] } }To create a virtual private gateway with a specific Amazon-side ASN
This example creates a virtual private gateway and specifies the Autonomous System Number (ASN) for the Amazon side of the BGP session.
Command:
aws ec2 create-vpn-gateway --typeipsec.1--amazon-side-asn65001Output:
{ "VpnGateway": { "AmazonSideAsn": 65001, "State": "available", "Type": "ipsec.1", "VpnGatewayId": "vgw-9a4cacf3", "VpcAttachments": [] } }-
For API details, see CreateVpnGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-carrier-gateway.
- AWS CLI
-
To delete your carrier gateway
The following
delete-carrier-gatewayexample deletes the specified carrier gateway.aws ec2 delete-carrier-gateway \ --carrier-gateway-idcagw-0465cdEXAMPLE1111Output:
{ "CarrierGateway": { "CarrierGatewayId": "cagw-0465cdEXAMPLE1111", "VpcId": "vpc-0c529aEXAMPLE1111", "State": "deleting", "OwnerId": "123456789012" } }For more information, see Carrier gateways in the Amazon Virtual Private Cloud User Guide.
-
For API details, see DeleteCarrierGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-client-vpn-endpoint.
- AWS CLI
-
To delete a Client VPN endpoint
The following
delete-client-vpn-endpointexample deletes the specified Client VPN endpoint.aws ec2 delete-client-vpn-endpoint \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "Status": { "Code": "deleting" } }For more information, see Client VPN Endpoints in the AWS Client VPN Administrator Guide.
-
For API details, see DeleteClientVpnEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use delete-client-vpn-route.
- AWS CLI
-
To delete a route for a Client VPN endpoint
The following
delete-client-vpn-routeexample deletes the0.0.0.0/0route for the specified subnet of a Client VPN endpoint.aws ec2 delete-client-vpn-route \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --destination-cidr-block0.0.0.0/0\ --target-vpc-subnet-idsubnet-0123456789abcabcaOutput:
{ "Status": { "Code": "deleting" } }For more information, see Routes in the AWS Client VPN Administrator Guide.
-
For API details, see DeleteClientVpnRoute
in AWS CLI Command Reference.
-
The following code example shows how to use delete-coip-cidr.
- AWS CLI
-
To delete a range of customer-owned IP (CoIP) addresses
The following
delete-coip-cidrexample deletes the specified range of CoIP addresses in the specified CoIP pool.aws ec2 delete-coip-cidr \ --cidr14.0.0.0/24\ --coip-pool-idipv4pool-coip-1234567890abcdefgOutput:
{ "CoipCidr": { "Cidr": "14.0.0.0/24", "CoipPoolId": "ipv4pool-coip-1234567890abcdefg", "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890" } }For more information, see Customer-owned IP addresses in the AWS Outposts User Guide.
-
For API details, see DeleteCoipCidr
in AWS CLI Command Reference.
-
The following code example shows how to use delete-coip-pool.
- AWS CLI
-
To delete a pool of customer-owned IP (CoIP) addresses
The following
delete-coip-poolexample deletes a CoIP pool of CoIP addresses.aws ec2 delete-coip-pool \ --coip-pool-idipv4pool-coip-1234567890abcdefgOutput:
{ "CoipPool": { "PoolId": "ipv4pool-coip-1234567890abcdefg", "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890", "PoolArn": "arn:aws:ec2:us-west-2:123456789012:coip-pool/ipv4pool-coip-1234567890abcdefg" } }For more information, see Customer-owned IP addresses in the AWS Outposts User Guide.
-
For API details, see DeleteCoipPool
in AWS CLI Command Reference.
-
The following code example shows how to use delete-customer-gateway.
- AWS CLI
-
To delete a customer gateway
This example deletes the specified customer gateway. If the command succeeds, no output is returned.
Command:
aws ec2 delete-customer-gateway --customer-gateway-idcgw-0e11f167-
For API details, see DeleteCustomerGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-dhcp-options.
- AWS CLI
-
To delete a DHCP options set
This example deletes the specified DHCP options set. If the command succeeds, no output is returned.
Command:
aws ec2 delete-dhcp-options --dhcp-options-iddopt-d9070ebb-
For API details, see DeleteDhcpOptions
in AWS CLI Command Reference.
-
The following code example shows how to use delete-egress-only-internet-gateway.
- AWS CLI
-
To delete an egress-only Internet gateway
This example deletes the specified egress-only Internet gateway.
Command:
aws ec2 delete-egress-only-internet-gateway --egress-only-internet-gateway-ideigw-01eadbd45ecd7943fOutput:
{ "ReturnCode": true }-
For API details, see DeleteEgressOnlyInternetGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-fleets.
- AWS CLI
-
Example 1: To delete an EC2 Fleet and terminate the associated instances
The following
delete-fleetsexample deletes the specified EC2 Fleet and terminates the associated On-Demand Instances and Spot Instances.aws ec2 delete-fleets \ --fleet-idsfleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE\ --terminate-instancesOutput:
{ "SuccessfulFleetDeletions": [ { "CurrentFleetState": "deleted_terminating", "PreviousFleetState": "active", "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" } ], "UnsuccessfulFleetDeletions": [] }For more information, see Delete an EC2 Fleet in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
Example 2: To delete an EC2 Fleet without terminating the associated instances
The following
delete-fleetsexample deletes the specified EC2 Fleet without terminating the associated On-Demand Instances and Spot Instances.aws ec2 delete-fleets \ --fleet-idsfleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE\ --no-terminate-instancesOutput:
{ "SuccessfulFleetDeletions": [ { "CurrentFleetState": "deleted_running", "PreviousFleetState": "active", "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" } ], "UnsuccessfulFleetDeletions": [] }For more information, see Delete an EC2 Fleet in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DeleteFleets
in AWS CLI Command Reference.
-
The following code example shows how to use delete-flow-logs.
- AWS CLI
-
To delete a flow log
The following
delete-flow-logsexample deletes the specified flow log.aws ec2 delete-flow-logs --flow-log-idfl-11223344556677889Output:
{ "Unsuccessful": [] }-
For API details, see DeleteFlowLogs
in AWS CLI Command Reference.
-
The following code example shows how to use delete-fpga-image.
- AWS CLI
-
To delete an Amazon FPGA image
This example deletes the specified AFI.
Command:
aws ec2 delete-fpga-image --fpga-image-idafi-06b12350a123fbabcOutput:
{ "Return": true }-
For API details, see DeleteFpgaImage
in AWS CLI Command Reference.
-
The following code example shows how to use delete-instance-connect-endpoint.
- AWS CLI
-
To delete an EC2 Instance Connect Endpoint
The following
delete-instance-connect-endpointexample deletes the specified EC2 Instance Connect Endpoint.aws ec2 delete-instance-connect-endpoint \ --instance-connect-endpoint-ideice-03f5e49b83924bbc7Output:
{ "InstanceConnectEndpoint": { "OwnerId": "111111111111", "InstanceConnectEndpointId": "eice-0123456789example", "InstanceConnectEndpointArn": "arn:aws:ec2:us-east-1:111111111111:instance-connect-endpoint/eice-0123456789example", "State": "delete-in-progress", "StateMessage": "", "NetworkInterfaceIds": [], "VpcId": "vpc-0123abcd", "AvailabilityZone": "us-east-1d", "CreatedAt": "2023-02-07T12:05:37+00:00", "SubnetId": "subnet-0123abcd" } }For more information, see Remove EC2 Instance Connect Endpoint in the Amazon EC2 User Guide.
-
For API details, see DeleteInstanceConnectEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use delete-instance-event-window.
- AWS CLI
-
Example 1: To delete an event window
The following
delete-instance-event-windowexample deletes an event window.aws ec2 delete-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890Output:
{ "InstanceEventWindowState": { "InstanceEventWindowId": "iew-0abcdef1234567890", "State": "deleting" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 2: To force delete an event window
The following
delete-instance-event-windowexample force deletes an event window if the event window is currently associated with targets.aws ec2 delete-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --force-deleteOutput:
{ "InstanceEventWindowState": { "InstanceEventWindowId": "iew-0abcdef1234567890", "State": "deleting" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
-
For API details, see DeleteInstanceEventWindow
in AWS CLI Command Reference.
-
The following code example shows how to use delete-internet-gateway.
- AWS CLI
-
To delete an internet gateway
The following
delete-internet-gatewayexample deletes the specified internet gateway.aws ec2 delete-internet-gateway \ --internet-gateway-idigw-0d0fb496b3EXAMPLEThis command produces no output.
For more information, see Internet gateways in the Amazon VPC User Guide.
-
For API details, see DeleteInternetGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-ipam-pool.
- AWS CLI
-
To delete an IPAM pool
In this example, you're a IPAM delegated admin who wants to delete an IPAM pool that you no longer need, but the pool has a CIDR provisioned to it. You cannot delete a pool if it has CIDRs provisioned to it unless you use the
--cascadeoption, so you'll use--cascade.To complete this request:
You'll need the IPAM pool ID which you can get with describe-ipam-pools.The
--regionmust be the IPAM home Region.The following
delete-ipam-poolexample deletes an IPAM pool in your AWS account.aws ec2 delete-ipam-pool \ --ipam-pool-idipam-pool-050c886a3ca41cd5b\ --cascade \ --regionus-east-1Output:
{ "IpamPool": { "OwnerId": "320805250157", "IpamPoolId": "ipam-pool-050c886a3ca41cd5b", "IpamPoolArn": "arn:aws:ec2::320805250157:ipam-pool/ipam-pool-050c886a3ca41cd5b", "IpamScopeArn": "arn:aws:ec2::320805250157:ipam-scope/ipam-scope-0a158dde35c51107b", "IpamScopeType": "private", "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107", "IpamRegion": "us-east-1", "Locale": "None", "PoolDepth": 1, "State": "delete-in-progress", "Description": "example", "AutoImport": false, "AddressFamily": "ipv4", "AllocationMinNetmaskLength": 0, "AllocationMaxNetmaskLength": 32 } }For more information, see Delete a pool in the Amazon VPC IPAM User Guide.
-
For API details, see DeleteIpamPool
in AWS CLI Command Reference.
-
The following code example shows how to use delete-ipam-resource-discovery.
- AWS CLI
-
To delete a resource discovery
In this example, you're a IPAM delegated admin who wants to delete a non-default resource discovery that you created to share with another IPAM admin during the process of integrating IPAM with accounts outside of your organization.
To complete this request:
The
--regionmust be the Region where you created the resource discovery.You cannot delete a default resource discovery if"IsDefault": true. A default resource discovery is one that is created automatically in the account that creates an IPAM. To delete a default resource discovery, you have to delete the IPAM.The following
delete-ipam-resource-discoveryexample deletes a resource discovery.aws ec2 delete-ipam-resource-discovery \ --ipam-resource-discovery-idipam-res-disco-0e39761475298ee0f\ --regionus-east-1Output:
{ "IpamResourceDiscovery": { "OwnerId": "149977607591", "IpamResourceDiscoveryId": "ipam-res-disco-0e39761475298ee0f", "IpamResourceDiscoveryArn": "arn:aws:ec2::149977607591:ipam-resource-discovery/ipam-res-disco-0e39761475298ee0f", "IpamResourceDiscoveryRegion": "us-east-1", "OperatingRegions": [ { "RegionName": "us-east-1" } ], "IsDefault": false, "State": "delete-in-progress" } }For more information about resource discoveries, see Work with resource discoveries in the Amazon VPC IPAM User Guide.
-
For API details, see DeleteIpamResourceDiscovery
in AWS CLI Command Reference.
-
The following code example shows how to use delete-ipam-scope.
- AWS CLI
-
To delete an IPAM scope
The following
delete-ipam-scopeexample deletes an IPAM.aws ec2 delete-ipam-scope \ --ipam-scope-idipam-scope-01c1ebab2b63bd7e4Output:
{ "IpamScope": { "OwnerId": "123456789012", "IpamScopeId": "ipam-scope-01c1ebab2b63bd7e4", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-01c1ebab2b63bd7e4", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "IpamScopeType": "private", "IsDefault": false, "Description": "Example description", "PoolCount": 0, "State": "delete-in-progress" } }For more information, see Delete a scope in the Amazon VPC IPAM User Guide.
-
For API details, see DeleteIpamScope
in AWS CLI Command Reference.
-
The following code example shows how to use delete-ipam.
- AWS CLI
-
To delete an IPAM
The following
delete-ipamexample deletes an IPAM.aws ec2 delete-ipam \ --ipam-idipam-036486dfa6af58ee0Output:
{ "Ipam": { "OwnerId": "123456789012", "IpamId": "ipam-036486dfa6af58ee0", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-036486dfa6af58ee0", "IpamRegion": "us-east-1", "PublicDefaultScopeId": "ipam-scope-071b8042b0195c183", "PrivateDefaultScopeId": "ipam-scope-0807405dece705a30", "ScopeCount": 2, "OperatingRegions": [ { "RegionName": "us-east-1" }, { "RegionName": "us-east-2" }, { "RegionName": "us-west-1" } ], "State": "delete-in-progress" } }For more information, see Delete an IPAM in the Amazon VPC IPAM User Guide.
-
For API details, see DeleteIpam
in AWS CLI Command Reference.
-
The following code example shows how to use delete-key-pair.
- AWS CLI
-
To delete a key pair
The following
delete-key-pairexample deletes the specified key pair.aws ec2 delete-key-pair \ --key-namemy-key-pairOutput:
{ "Return": true, "KeyPairId": "key-03c8d3aceb53b507" }For more information, see Create and delete key pairs in the AWS Command Line Interface User Guide.
-
For API details, see DeleteKeyPair
in AWS CLI Command Reference.
-
The following code example shows how to use delete-launch-template-versions.
- AWS CLI
-
To delete a launch template version
This example deletes the specified launch template version.
Command:
aws ec2 delete-launch-template-versions --launch-template-idlt-0abcd290751193123--versions1Output:
{ "UnsuccessfullyDeletedLaunchTemplateVersions": [], "SuccessfullyDeletedLaunchTemplateVersions": [ { "LaunchTemplateName": "TestVersion", "VersionNumber": 1, "LaunchTemplateId": "lt-0abcd290751193123" } ] }-
For API details, see DeleteLaunchTemplateVersions
in AWS CLI Command Reference.
-
The following code example shows how to use delete-launch-template.
- AWS CLI
-
To delete a launch template
This example deletes the specified launch template.
Command:
aws ec2 delete-launch-template --launch-template-idlt-0abcd290751193123Output:
{ "LaunchTemplate": { "LatestVersionNumber": 2, "LaunchTemplateId": "lt-0abcd290751193123", "LaunchTemplateName": "TestTemplate", "DefaultVersionNumber": 2, "CreatedBy": "arn:aws:iam::123456789012:root", "CreateTime": "2017-11-23T16:46:25.000Z" } }-
For API details, see DeleteLaunchTemplate
in AWS CLI Command Reference.
-
The following code example shows how to use delete-local-gateway-route-table-virtual-interface-group-association.
- AWS CLI
-
To disassociate a local gateway route table from a virtual interfaces (VIFs) group
The following
delete-local-gateway-route-table-virtual-interface-group-associationexample deletes the association between the specified local gateway route table and VIF group.aws ec2 delete-local-gateway-route-table-virtual-interface-group-association \ --local-gateway-route-table-virtual-interface-group-association-idlgw-vif-grp-assoc-exampleid12345678Output:
{ "LocalGatewayRouteTableVirtualInterfaceGroupAssociation": { "LocalGatewayRouteTableVirtualInterfaceGroupAssociationId": "lgw-vif-grp-assoc-exampleid12345678", "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-exampleid0123abcd", "LocalGatewayId": "lgw-exampleid11223344", "LocalGatewayRouteTableId": "lgw-rtb-exampleidabcd1234", "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:111122223333:local-gateway-route-table/lgw-rtb-exampleidabcd1234", "OwnerId": "111122223333", "State": "disassociating", "Tags": [] } }For more information, see VIF group associations in the AWS Outposts User Guide.
-
For API details, see DeleteLocalGatewayRouteTableVirtualInterfaceGroupAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use delete-local-gateway-route-table-vpc-association.
- AWS CLI
-
To disassociate a local gateway route table from a VPC
The following
delete-local-gateway-route-table-vpc-associationexample deletes the association between the specified local gateway route table and VPC.aws ec2 delete-local-gateway-route-table-vpc-association \ --local-gateway-route-table-vpc-association-idvpc-example0123456789Output:
{ "LocalGatewayRouteTableVpcAssociation": { "LocalGatewayRouteTableVpcAssociationId": "lgw-vpc-assoc-abcd1234wxyz56789", "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890", "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:555555555555:local-gateway-route-table/lgw-rtb-abcdefg1234567890", "LocalGatewayId": "lgw-exampleid01234567", "VpcId": "vpc-example0123456789", "OwnerId": "555555555555", "State": "disassociating" } }For more information, see VPC associations in the AWS Outposts User Guide.
-
For API details, see DeleteLocalGatewayRouteTableVpcAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use delete-local-gateway-route-table.
- AWS CLI
-
To delete a local gateway route table
The following
delete-local-gateway-route-tableexample creates a local gateway route table with the direct VPC routing mode.aws ec2 delete-local-gateway-route-table \ --local-gateway-route-table-idlgw-rtb-abcdefg1234567890Output:
{ "LocalGatewayRouteTable": { "LocalGatewayRouteTableId": "lgw-rtb-abcdefg1234567890", "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:111122223333:local-gateway-route-table/lgw-rtb-abcdefg1234567890", "LocalGatewayId": "lgw-1a2b3c4d5e6f7g8h9", "OutpostArn": "arn:aws:outposts:us-west-2:111122223333:outpost/op-021345abcdef67890", "OwnerId": "111122223333", "State": "deleting", "Tags": [], "Mode": "direct-vpc-routing" } }For more information, see Local gateway route tables in the AWS Outposts User Guide.
-
For API details, see DeleteLocalGatewayRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use delete-local-gateway-route.
- AWS CLI
-
To delete a route from a local gateway route table
The following
delete-local-gateway-routeexample deletes the specified route from the specified local gateway route table.aws ec2 delete-local-gateway-route \ --destination-cidr-block0.0.0.0/0\ --local-gateway-route-table-idlgw-rtb-059615ef7dEXAMPLEOutput:
{ "Route": { "DestinationCidrBlock": "0.0.0.0/0", "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-07145b276bEXAMPLE", "Type": "static", "State": "deleted", "LocalGatewayRouteTableId": "lgw-rtb-059615ef7EXAMPLE" } }-
For API details, see DeleteLocalGatewayRoute
in AWS CLI Command Reference.
-
The following code example shows how to use delete-managed-prefix-list.
- AWS CLI
-
To delete a prefix list
The following
delete-managed-prefix-listexample deletes the specified prefix list.aws ec2 delete-managed-prefix-list \ --prefix-list-idpl-0123456abcabcabc1Output:
{ "PrefixList": { "PrefixListId": "pl-0123456abcabcabc1", "AddressFamily": "IPv4", "State": "delete-in-progress", "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-0123456abcabcabc1", "PrefixListName": "test", "MaxEntries": 10, "Version": 1, "OwnerId": "123456789012" } }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see DeleteManagedPrefixList
in AWS CLI Command Reference.
-
The following code example shows how to use delete-nat-gateway.
- AWS CLI
-
To delete a NAT gateway
This example deletes NAT gateway
nat-04ae55e711cec5680.Command:
aws ec2 delete-nat-gateway --nat-gateway-idnat-04ae55e711cec5680Output:
{ "NatGatewayId": "nat-04ae55e711cec5680" }-
For API details, see DeleteNatGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-acl-entry.
- AWS CLI
-
To delete a network ACL entry
This example deletes ingress rule number 100 from the specified network ACL. If the command succeeds, no output is returned.
Command:
aws ec2 delete-network-acl-entry --network-acl-idacl-5fb85d36--ingress --rule-number100-
For API details, see DeleteNetworkAclEntry
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-acl.
- AWS CLI
-
To delete a network ACL
This example deletes the specified network ACL. If the command succeeds, no output is returned.
Command:
aws ec2 delete-network-acl --network-acl-idacl-5fb85d36-
For API details, see DeleteNetworkAcl
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-insights-access-scope-analysis.
- AWS CLI
-
To delete a Network Access Scope analysis
The following
delete-network-insights-access-scope-analysisexample deletes the specified Network Access Scope analysis.aws ec2 delete-network-insights-access-scope-analysis \ --network-insights-access-scope-analysis-idnisa-01234567891abcdefOutput:
{ "NetworkInsightsAccessScopeAnalysisId": "nisa-01234567891abcdef }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see DeleteNetworkInsightsAccessScopeAnalysis
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-insights-access-scope.
- AWS CLI
-
To delete a Network Access Scope
The following
delete-network-insights-access-scopeexample deletes the specified Network Access Scope.aws ec2 delete-network-insights-access-scope \ --network-insights-access-scope-idnis-123456789abc01234Output:
{ "NetworkInsightsAccessScopeId": "nis-123456789abc01234" }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see DeleteNetworkInsightsAccessScope
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-insights-analysis.
- AWS CLI
-
To delete a path analysis
The following
delete-network-insights-analysisexample deletes the specified analysis.aws ec2 delete-network-insights-analysis \ --network-insights-analysis-idnia-02207aa13eb480c7aOutput:
{ "NetworkInsightsAnalysisId": "nia-02207aa13eb480c7a" }For more information, see Getting started using the AWS CLI in the Reachability Analyzer Guide.
-
For API details, see DeleteNetworkInsightsAnalysis
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-insights-path.
- AWS CLI
-
To delete a path
The following
delete-network-insights-pathexample deletes the specified path. Before you can delete a path, you must delete all its analyses using thedelete-network-insights-analysiscommand.aws ec2 delete-network-insights-path \ --network-insights-path-idnip-0b26f224f1d131fa8Output:
{ "NetworkInsightsPathId": "nip-0b26f224f1d131fa8" }For more information, see Getting started using the AWS CLI in the Reachability Analyzer Guide.
-
For API details, see DeleteNetworkInsightsPath
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-interface-permission.
- AWS CLI
-
To delete a network interface permission
This example deletes the specified network interface permission.
Command:
aws ec2 delete-network-interface-permission --network-interface-permission-ideni-perm-06fd19020ede149eaOutput:
{ "Return": true }-
For API details, see DeleteNetworkInterfacePermission
in AWS CLI Command Reference.
-
The following code example shows how to use delete-network-interface.
- AWS CLI
-
To delete a network interface
This example deletes the specified network interface. If the command succeeds, no output is returned.
Command:
aws ec2 delete-network-interface --network-interface-ideni-e5aa89a3-
For API details, see DeleteNetworkInterface
in AWS CLI Command Reference.
-
The following code example shows how to use delete-placement-group.
- AWS CLI
-
To delete a placement group
This example command deletes the specified placement group.
Command:
aws ec2 delete-placement-group --group-namemy-cluster-
For API details, see DeletePlacementGroup
in AWS CLI Command Reference.
-
The following code example shows how to use delete-queued-reserved-instances.
- AWS CLI
-
To delete a queued purchase
The following
delete-queued-reserved-instancesexample deletes the specified Reserved Instance, which was queued for purchase.aws ec2 delete-queued-reserved-instances \ --reserved-instances-idsaf9f760e-6f91-4559-85f7-4980eexampleOutput:
{ "SuccessfulQueuedPurchaseDeletions": [ { "ReservedInstancesId": "af9f760e-6f91-4559-85f7-4980eexample" } ], "FailedQueuedPurchaseDeletions": [] }-
For API details, see DeleteQueuedReservedInstances
in AWS CLI Command Reference.
-
The following code example shows how to use delete-route-table.
- AWS CLI
-
To delete a route table
This example deletes the specified route table. If the command succeeds, no output is returned.
Command:
aws ec2 delete-route-table --route-table-idrtb-22574640-
For API details, see DeleteRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use delete-route.
- AWS CLI
-
To delete a route
This example deletes the specified route from the specified route table. If the command succeeds, no output is returned.
Command:
aws ec2 delete-route --route-table-idrtb-22574640--destination-cidr-block0.0.0.0/0-
For API details, see DeleteRoute
in AWS CLI Command Reference.
-
The following code example shows how to use delete-security-group.
- AWS CLI
-
[EC2-Classic] To delete a security group
This example deletes the security group named
MySecurityGroup. If the command succeeds, no output is returned.Command:
aws ec2 delete-security-group --group-nameMySecurityGroup[EC2-VPC] To delete a security group
This example deletes the security group with the ID
sg-903004f8. Note that you can't reference a security group for EC2-VPC by name. If the command succeeds, no output is returned.Command:
aws ec2 delete-security-group --group-idsg-903004f8For more information, see Using Security Groups in the AWS Command Line Interface User Guide.
-
For API details, see DeleteSecurityGroup
in AWS CLI Command Reference.
-
The following code example shows how to use delete-snapshot.
- AWS CLI
-
To delete a snapshot
This example command deletes a snapshot with the snapshot ID of
snap-1234567890abcdef0. If the command succeeds, no output is returned.Command:
aws ec2 delete-snapshot --snapshot-idsnap-1234567890abcdef0-
For API details, see DeleteSnapshot
in AWS CLI Command Reference.
-
The following code example shows how to use delete-spot-datafeed-subscription.
- AWS CLI
-
To cancel a Spot Instance data feed subscription
This example command deletes a Spot data feed subscription for the account. If the command succeeds, no output is returned.
Command:
aws ec2 delete-spot-datafeed-subscription-
For API details, see DeleteSpotDatafeedSubscription
in AWS CLI Command Reference.
-
The following code example shows how to use delete-subnet-cidr-reservation.
- AWS CLI
-
To delete a subnet CIDR reservation
The following
delete-subnet-cidr-reservationexample deletes the specified subnet CIDR reservation.aws ec2 delete-subnet-cidr-reservation \ --subnet-cidr-reservation-idscr-044f977c4eEXAMPLEOutput:
{ "DeletedSubnetCidrReservation": { "SubnetCidrReservationId": "scr-044f977c4eEXAMPLE", "SubnetId": "subnet-03c51e2e6cEXAMPLE", "Cidr": "10.1.0.16/28", "ReservationType": "prefix", "OwnerId": "123456789012" } }For more information, see Subnet CIDR reservations in the Amazon VPC User Guide.
-
For API details, see DeleteSubnetCidrReservation
in AWS CLI Command Reference.
-
The following code example shows how to use delete-subnet.
- AWS CLI
-
To delete a subnet
This example deletes the specified subnet. If the command succeeds, no output is returned.
Command:
aws ec2 delete-subnet --subnet-idsubnet-9d4a7b6c-
For API details, see DeleteSubnet
in AWS CLI Command Reference.
-
The following code example shows how to use delete-tags.
- AWS CLI
-
Example 1: To delete a tag from a resource
The following
delete-tagsexample deletes the tagStack=Testfrom the specified image. When you specify both a value and a key name, the tag is deleted only if the tag's value matches the specified value.aws ec2 delete-tags \ --resourcesami-1234567890abcdef0\ --tagsKey=Stack,Value=TestIt's optional to specify the value for a tag. The following
delete-tagsexample deletes the tag with the key namepurposefrom the specified instance, regardless of the tag value for the tag.aws ec2 delete-tags \ --resourcesi-1234567890abcdef0\ --tagsKey=purposeIf you specify the empty string as the tag value, the tag is deleted only if the tag's value is the empty string. The following
delete-tagsexample specifies the empty string as the tag value for the tag to delete.aws ec2 delete-tags \ --resourcesi-1234567890abcdef0\ --tagsKey=Name,Value=Example 2: To delete a tag from multiple resources
The following
delete-tagsexample deletes the tag``Purpose=Test`` from both an instance and an AMI. As shown in the previous example, you can omit the tag value from the command.aws ec2 delete-tags \ --resourcesi-1234567890abcdef0ami-1234567890abcdef0\ --tagsKey=Purpose-
For API details, see DeleteTags
in AWS CLI Command Reference.
-
The following code example shows how to use delete-traffic-mirror-filter-rule.
- AWS CLI
-
To delete a traffic mirror filter rule
The following
delete-traffic-mirror-filter-ruleexample deletes the specified traffic mirror filter rule.aws ec2 delete-traffic-mirror-filter-rule \ --traffic-mirror-filter-rule-idtmfr-081f71283bEXAMPLEOutput:
{ "TrafficMirrorFilterRuleId": "tmfr-081f71283bEXAMPLE" }For more information, see Modify Your Traffic Mirror Filter Rules in the AWS Traffic Mirroring Guide.
-
For API details, see DeleteTrafficMirrorFilterRule
in AWS CLI Command Reference.
-
The following code example shows how to use delete-traffic-mirror-filter.
- AWS CLI
-
To delete a traffic mirror filter
The following
delete-traffic-mirror-filterexample deletes the specified traffic mirror filter.aws ec2 delete-traffic-mirror-filter \ --traffic-mirror-filter-idtmf-0be0b25fcdEXAMPLEOutput:
{ "TrafficMirrorFilterId": "tmf-0be0b25fcdEXAMPLE" }For more information, see Delete a Traffic Mirror Filter in the AWS Traffic Mirroring Guide.
-
For API details, see DeleteTrafficMirrorFilter
in AWS CLI Command Reference.
-
The following code example shows how to use delete-traffic-mirror-session.
- AWS CLI
-
To delete a traffic mirror session
The following
delete-traffic-mirror-sessionexample deletes the specified traffic mirror-session.aws ec2 delete-traffic-mirror-session \ --traffic-mirror-session-idtms-0af3141ce5EXAMPLEOutput:
{ "TrafficMirrorSessionId": "tms-0af3141ce5EXAMPLE" }For more information, see Delete a Traffic Mirror Session in the AWS Traffic Mirroring Guide.
-
For API details, see DeleteTrafficMirrorSession
in AWS CLI Command Reference.
-
The following code example shows how to use delete-traffic-mirror-target.
- AWS CLI
-
To delete a traffic mirror target
The following
delete-traffic-mirror-targetexample deletes the specified traffic mirror target.aws ec2 delete-traffic-mirror-target \ --traffic-mirror-target-idtmt-060f48ce9EXAMPLEOutput:
{ "TrafficMirrorTargetId": "tmt-060f48ce9EXAMPLE" }For more information, see Delete a Traffic Mirror Target in the AWS Traffic Mirroring Guide.
-
For API details, see DeleteTrafficMirrorTarget
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-connect-peer.
- AWS CLI
-
To delete a Transit Gateway Connect peer
The following
delete-transit-gateway-connect-peerexample deletes the specified Connect peer.aws ec2 delete-transit-gateway-connect-peer \ --transit-gateway-connect-peer-idtgw-connect-peer-0666adbac4EXAMPLEOutput:
{ "TransitGatewayConnectPeer": { "TransitGatewayAttachmentId": "tgw-attach-0f0927767cEXAMPLE", "TransitGatewayConnectPeerId": "tgw-connect-peer-0666adbac4EXAMPLE", "State": "deleting", "CreationTime": "2021-10-13T03:35:17.000Z", "ConnectPeerConfiguration": { "TransitGatewayAddress": "10.0.0.234", "PeerAddress": "172.31.1.11", "InsideCidrBlocks": [ "169.254.6.0/29" ], "Protocol": "gre", "BgpConfigurations": [ { "TransitGatewayAsn": 64512, "PeerAsn": 64512, "TransitGatewayAddress": "169.254.6.2", "PeerAddress": "169.254.6.1", "BgpStatus": "down" }, { "TransitGatewayAsn": 64512, "PeerAsn": 64512, "TransitGatewayAddress": "169.254.6.3", "PeerAddress": "169.254.6.1", "BgpStatus": "down" } ] } } }For more information, see Transit gateway Connect attachments and Transit Gateway Connect peers in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayConnectPeer
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-connect.
- AWS CLI
-
To delete a transit gateway Connect attachment
The following
delete-transit-gateway-connectexample deletes the specified Connect attachment.aws ec2 delete-transit-gateway-connect \ --transit-gateway-attachment-idtgw-attach-037012e5dcEXAMPLEOutput:
{ "TransitGatewayConnect": { "TransitGatewayAttachmentId": "tgw-attach-037012e5dcEXAMPLE", "TransportTransitGatewayAttachmentId": "tgw-attach-0a89069f57EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "State": "deleting", "CreationTime": "2021-03-09T19:59:17+00:00", "Options": { "Protocol": "gre" } } }For more information, see Transit gateway Connect attachments and Transit Gateway Connect peers in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayConnect
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-multicast-domain.
- AWS CLI
-
To delete a transit gateway multicast domain
The following
delete-transit-gateway-multicast-domainexample deletes the specified multicast domain.aws ec2 delete-transit-gateway-multicast-domain \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef7EXAMPLEOutput:
{ "TransitGatewayMulticastDomain": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-02bb79002bEXAMPLE", "TransitGatewayId": "tgw-0d88d2d0d5EXAMPLE", "State": "deleting", "CreationTime": "2019-11-20T22:02:03.000Z" } }For more information, see Managing multicast domains in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayMulticastDomain
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-peering-attachment.
- AWS CLI
-
To delete a transit gateway peering attachment
The following
delete-transit-gateway-peering-attachmentexample deletes the specified transit gateway peering attachment.aws ec2 delete-transit-gateway-peering-attachment \ --transit-gateway-attachment-idtgw-attach-4455667788aabbccdOutput:
{ "TransitGatewayPeeringAttachment": { "TransitGatewayAttachmentId": "tgw-attach-4455667788aabbccd", "RequesterTgwInfo": { "TransitGatewayId": "tgw-123abc05e04123abc", "OwnerId": "123456789012", "Region": "us-west-2" }, "AccepterTgwInfo": { "TransitGatewayId": "tgw-11223344aabbcc112", "OwnerId": "123456789012", "Region": "us-east-2" }, "State": "deleting", "CreationTime": "2019-12-09T11:38:31.000Z" } }For more information, see Transit Gateway Peering Attachments in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayPeeringAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-policy-table.
- AWS CLI
-
To delete a transit gateway policy table
The following
delete-transit-gateway-policy-tableexample deletes the specified transit gateway policy table.aws ec2 delete-transit-gateway-policy-table \ --transit-gateway-policy-table-idtgw-ptb-0a16f134b78668a81Output:
{ "TransitGatewayPolicyTables": [ { "TransitGatewayPolicyTableId": "tgw-ptb-0a16f134b78668a81", "TransitGatewayId": "tgw-067f8505c18f0bd6e", "State": "deleting", "CreationTime": "2023-11-28T16:36:43+00:00", "Tags": [] } ] }For more information, see Transit gateway policy tables in the Transit Gateway User Guide.
-
For API details, see DeleteTransitGatewayPolicyTable
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-prefix-list-reference.
- AWS CLI
-
To delete a prefix list reference
The following
delete-transit-gateway-prefix-list-referenceexample deletes the specified prefix list reference.aws ec2 delete-transit-gateway-prefix-list-reference \ --transit-gateway-route-table-idtgw-rtb-0123456789abcd123\ --prefix-list-idpl-11111122222222333Output:
{ "TransitGatewayPrefixListReference": { "TransitGatewayRouteTableId": "tgw-rtb-0123456789abcd123", "PrefixListId": "pl-11111122222222333", "PrefixListOwnerId": "123456789012", "State": "deleting", "Blackhole": false, "TransitGatewayAttachment": { "TransitGatewayAttachmentId": "tgw-attach-aabbccddaabbccaab", "ResourceType": "vpc", "ResourceId": "vpc-112233445566aabbc" } } }For more information, see Prefix list references in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayPrefixListReference
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-route-table.
- AWS CLI
-
To delete a transit gateway route table
The following
delete-transit-gateway-route-tableexample deletes the specified transit gateway route table.aws ec2 delete-transit-gateway-route-table \ --transit-gateway-route-table-idtgw-rtb-0b6f6aaa01EXAMPLEOutput:
{ "TransitGatewayRouteTable": { "TransitGatewayRouteTableId": "tgw-rtb-0b6f6aaa01EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "State": "deleting", "DefaultAssociationRouteTable": false, "DefaultPropagationRouteTable": false, "CreationTime": "2019-07-17T20:27:26.000Z" } }For more information, see Delete a transit gateway route table in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-route.
- AWS CLI
-
To delete a CIDR block from a route table
The following
delete-transit-gateway-routeexample deletes the CIDR block from the specified transit gateway route table.aws ec2 delete-transit-gateway-route \ --transit-gateway-route-table-idtgw-rtb-0b6f6aaa01EXAMPLE\ --destination-cidr-block10.0.2.0/24Output:
{ "Route": { "DestinationCidrBlock": "10.0.2.0/24", "TransitGatewayAttachments": [ { "ResourceId": "vpc-0065acced4EXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-0b5968d3b6EXAMPLE", "ResourceType": "vpc" } ], "Type": "static", "State": "deleted" } }For more information, see Delete a static route in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayRoute
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway-vpc-attachment.
- AWS CLI
-
To delete a transit gateway VPC attachment
The following
delete-transit-gateway-vpc-attachmentexample deletes the specified VPC attachment.aws ec2 delete-transit-gateway-vpc-attachment \ --transit-gateway-attachment-idtgw-attach-0d2c54bdbEXAMPLEOutput:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-0d2c54bdb3EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "VpcId": "vpc-0065acced4f61c651", "VpcOwnerId": "111122223333", "State": "deleting", "CreationTime": "2019-07-17T16:04:27.000Z" } }For more information, see Delete a VPC attachment in the Transit Gateways Guide.
-
For API details, see DeleteTransitGatewayVpcAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use delete-transit-gateway.
- AWS CLI
-
To delete a transit gateway
The following
delete-transit-gatewayexample deletes the specified transit gateway.aws ec2 delete-transit-gateway \ --transit-gateway-idtgw-01f04542b2EXAMPLEOutput:
{ "TransitGateway": { "TransitGatewayId": "tgw-01f04542b2EXAMPLE", "State": "deleting", "OwnerId": "123456789012", "Description": "Example Transit Gateway", "CreationTime": "2019-08-27T15:04:35.000Z", "Options": { "AmazonSideAsn": 64515, "AutoAcceptSharedAttachments": "disable", "DefaultRouteTableAssociation": "enable", "AssociationDefaultRouteTableId": "tgw-rtb-0ce7a6948fEXAMPLE", "DefaultRouteTablePropagation": "enable", "PropagationDefaultRouteTableId": "tgw-rtb-0ce7a6948fEXAMPLE", "VpnEcmpSupport": "enable", "DnsSupport": "enable" } } }For more information, see Delete a transit gateway in the Transit Gateways Guide.
-
For API details, see DeleteTransitGateway
in AWS CLI Command Reference.
-
The following code example shows how to use delete-verified-access-endpoint.
- AWS CLI
-
To delete a Verified Access endpoint
The following
delete-verified-access-endpointexample deletes the specified Verified Access endpoint.aws ec2 delete-verified-access-endpoint \ --verified-access-endpoint-idvae-066fac616d4d546f2Output:
{ "VerifiedAccessEndpoint": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessEndpointId": "vae-066fac616d4d546f2", "ApplicationDomain": "example.com", "EndpointType": "network-interface", "AttachmentType": "vpc", "DomainCertificateArn": "arn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE", "EndpointDomain": "my-ava-app.edge-00c3372d53b1540bb.vai-0ce000c0b7643abea.prod.verified-access.us-east-2.amazonaws.com", "SecurityGroupIds": [ "sg-004915970c4c8f13a" ], "NetworkInterfaceOptions": { "NetworkInterfaceId": "eni-0aec70418c8d87a0f", "Protocol": "https", "Port": 443 }, "Status": { "Code": "deleting" }, "Description": "Testing Verified Access", "CreationTime": "2023-08-25T20:54:43", "LastUpdatedTime": "2023-08-25T22:46:32" } }For more information, see Verified Access endpoints in the AWS Verified Access User Guide.
-
For API details, see DeleteVerifiedAccessEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use delete-verified-access-group.
- AWS CLI
-
To delete a Verified Access group
The following
delete-verified-access-groupexample deletes the specified Verified Access group.aws ec2 delete-verified-access-group \ --verified-access-group-idvagr-0dbe967baf14b7235Output:
{ "VerifiedAccessGroup": { "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "Owner": "123456789012", "VerifiedAccessGroupArn": "arn:aws:ec2:us-east-2:123456789012:verified-access-group/vagr-0dbe967baf14b7235", "CreationTime": "2023-08-25T19:55:19", "LastUpdatedTime": "2023-08-25T22:49:03", "DeletionTime": "2023-08-26T00:58:31" } }For more information, see Verified Access groups in the AWS Verified Access User Guide.
-
For API details, see DeleteVerifiedAccessGroup
in AWS CLI Command Reference.
-
The following code example shows how to use delete-verified-access-instance.
- AWS CLI
-
To delete a Verified Access instance
The following
delete-verified-access-instanceexample deletes the specified Verified Access instance.aws ec2 delete-verified-access-instance \ --verified-access-instance-idvai-0ce000c0b7643abeaOutput:
{ "VerifiedAccessInstance": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "VerifiedAccessTrustProviders": [], "CreationTime": "2023-08-25T18:27:56", "LastUpdatedTime": "2023-08-26T01:00:18" } }For more information, see Verified Access instances in the AWS Verified Access User Guide.
-
For API details, see DeleteVerifiedAccessInstance
in AWS CLI Command Reference.
-
The following code example shows how to use delete-verified-access-trust-provider.
- AWS CLI
-
To delete a Verified Access trust provider
The following
delete-verified-access-trust-providerexample deletes the specified Verified Access trust provider.aws ec2 delete-verified-access-trust-provider \ --verified-access-trust-provider-idvatp-0bb32de759a3e19e7Output:
{ "VerifiedAccessTrustProvider": { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "Description": "Testing Verified Access", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center", "PolicyReferenceName": "idc", "CreationTime": "2023-08-25T18:40:36", "LastUpdatedTime": "2023-08-25T18:40:36" } }For more information, see Trust providers for Verified Access in the AWS Verified Access User Guide.
-
For API details, see DeleteVerifiedAccessTrustProvider
in AWS CLI Command Reference.
-
The following code example shows how to use delete-volume.
- AWS CLI
-
To delete a volume
This example command deletes an available volume with the volume ID of
vol-049df61146c4d7901. If the command succeeds, no output is returned.Command:
aws ec2 delete-volume --volume-idvol-049df61146c4d7901-
For API details, see DeleteVolume
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpc-endpoint-connection-notifications.
- AWS CLI
-
To delete an endpoint connection notification
This example deletes the specified endpoint connection notification.
Command:
aws ec2 delete-vpc-endpoint-connection-notifications --connection-notification-idsvpce-nfn-008776de7e03f5abcOutput:
{ "Unsuccessful": [] }-
For API details, see DeleteVpcEndpointConnectionNotifications
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpc-endpoint-service-configurations.
- AWS CLI
-
To delete an endpoint service configuration
This example deletes the specified endpoint service configuration.
Command:
aws ec2 delete-vpc-endpoint-service-configurations --service-idsvpce-svc-03d5ebb7d9579a2b3Output:
{ "Unsuccessful": [] }-
For API details, see DeleteVpcEndpointServiceConfigurations
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpc-endpoints.
- AWS CLI
-
To delete an endpoint
This example deletes endpoints vpce-aa22bb33 and vpce-1a2b3c4d. If the command is partially successful or unsuccessful, a list of unsuccessful items is returned. If the command succeeds, the returned list is empty.
Command:
aws ec2 delete-vpc-endpoints --vpc-endpoint-idsvpce-aa22bb33vpce-1a2b3c4dOutput:
{ "Unsuccessful": [] }-
For API details, see DeleteVpcEndpoints
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpc-peering-connection.
- AWS CLI
-
To delete a VPC peering connection
This example deletes the specified VPC peering connection.
Command:
aws ec2 delete-vpc-peering-connection --vpc-peering-connection-idpcx-1a2b3c4dOutput:
{ "Return": true }-
For API details, see DeleteVpcPeeringConnection
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpc.
- AWS CLI
-
To delete a VPC
This example deletes the specified VPC. If the command succeeds, no output is returned.
Command:
aws ec2 delete-vpc --vpc-idvpc-a01106c2-
For API details, see DeleteVpc
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpn-connection-route.
- AWS CLI
-
To delete a static route from a VPN connection
This example deletes the specified static route from the specified VPN connection. If the command succeeds, no output is returned.
Command:
aws ec2 delete-vpn-connection-route --vpn-connection-idvpn-40f41529--destination-cidr-block11.12.0.0/16-
For API details, see DeleteVpnConnectionRoute
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpn-connection.
- AWS CLI
-
To delete a VPN connection
This example deletes the specified VPN connection. If the command succeeds, no output is returned.
Command:
aws ec2 delete-vpn-connection --vpn-connection-idvpn-40f41529-
For API details, see DeleteVpnConnection
in AWS CLI Command Reference.
-
The following code example shows how to use delete-vpn-gateway.
- AWS CLI
-
To delete a virtual private gateway
This example deletes the specified virtual private gateway. If the command succeeds, no output is returned.
Command:
aws ec2 delete-vpn-gateway --vpn-gateway-idvgw-9a4cacf3-
For API details, see DeleteVpnGateway
in AWS CLI Command Reference.
-
The following code example shows how to use deprovision-byoip-cidr.
- AWS CLI
-
To remove an IP address range from use
The following example removes the specified address range from use with AWS.
aws ec2 deprovision-byoip-cidr \ --cidr203.0.113.25/24Output:
{ "ByoipCidr": { "Cidr": "203.0.113.25/24", "State": "pending-deprovision" } }-
For API details, see DeprovisionByoipCidr
in AWS CLI Command Reference.
-
The following code example shows how to use deprovision-ipam-pool-cidr.
- AWS CLI
-
To deprovision an IPAM pool CIDR
The following
deprovision-ipam-pool-cidrexample deprovisions a CIDR provisioned to an IPAM pool.(Linux):
aws ec2 deprovision-ipam-pool-cidr \ --ipam-pool-idipam-pool-02ec043a19bbe5d08\ --cidr11.0.0.0/16(Windows):
aws ec2 deprovision-ipam-pool-cidr^--ipam-pool-idipam-pool-02ec043a19bbe5d08^--cidr11.0.0.0/16Output:
{ "IpamPoolCidr": { "Cidr": "11.0.0.0/16", "State": "pending-deprovision" } }For more information, see Deprovision pool CIDRs in the Amazon VPC IPAM User Guide.
-
For API details, see DeprovisionIpamPoolCidr
in AWS CLI Command Reference.
-
The following code example shows how to use deregister-image.
- AWS CLI
-
To deregister an AMI
This example deregisters the specified AMI. If the command succeeds, no output is returned.
Command:
aws ec2 deregister-image --image-idami-4fa54026-
For API details, see DeregisterImage
in AWS CLI Command Reference.
-
The following code example shows how to use deregister-instance-event-notification-attributes.
- AWS CLI
-
Example 1: To remove all tags from event notifications
The following
deregister-instance-event-notification-attributesexample removesIncludeAllTagsOfInstance=true, which has the effect of settingIncludeAllTagsOfInstancetofalse.aws ec2 deregister-instance-event-notification-attributes \ --instance-tag-attributeIncludeAllTagsOfInstance=trueOutput:
{ "InstanceTagAttribute": { "InstanceTagKeys": [], "IncludeAllTagsOfInstance": true } }For more information, see Scheduled events for your instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
Example 2: To remove specific tags from event notifications
The following
deregister-instance-event-notification-attributesexample removes the specified tag from the tags included in event notifications. To describe the remaining tags included in event notifications, usedescribe-instance-event-notification-attributes.aws ec2 deregister-instance-event-notification-attributes \ --instance-tag-attribute InstanceTagKeys="tag-key2"Output:
{ "InstanceTagAttribute": { "InstanceTagKeys": [ "tag-key2" ], "IncludeAllTagsOfInstance": false } }For more information, see Scheduled events for your instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DeregisterInstanceEventNotificationAttributes
in AWS CLI Command Reference.
-
The following code example shows how to use deregister-transit-gateway-multicast-group-members.
- AWS CLI
-
To deregister group members from a multicast group
This example deregisters the specified network interface group member from the transit gateway multicast group.
aws ec2 deregister-transit-gateway-multicast-group-members \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef7EXAMPLE\ --group-ip-address224.0.1.0\ --network-interface-idseni-0e246d3269EXAMPLEOutput:
{ "DeregisteredMulticastGroupMembers": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef7EXAMPLE", "RegisteredNetworkInterfaceIds": [ "eni-0e246d3269EXAMPLE" ], "GroupIpAddress": "224.0.1.0" } }For more information, see Deregister Members from a Multicast Group in the AWS Transit Gateways Users Guide.
-
For API details, see DeregisterTransitGatewayMulticastGroupMembers
in AWS CLI Command Reference.
-
The following code example shows how to use deregister-transit-gateway-multicast-group-source.
- AWS CLI
-
To deregister a source from the transit gateway multicast group
This example deregisters the specified network interface group source from the multicast group.
aws ec2 register-transit-gateway-multicast-group-sources \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef79d6e597\ --group-ip-address224.0.1.0\ --network-interface-idseni-07f290fc3c090cbaeOutput:
{ "DeregisteredMulticastGroupSources": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef79d6e597", "DeregisteredNetworkInterfaceIds": [ "eni-07f290fc3c090cbae" ], "GroupIpAddress": "224.0.1.0" } }For more information, see Deregister Sources from a Multicast Group in the AWS Transit Gateways User Guide.
-
For API details, see DeregisterTransitGatewayMulticastGroupSource
in AWS CLI Command Reference.
-
The following code example shows how to use describe-account-attributes.
- AWS CLI
-
To describe all the attributes for your AWS account
This example describes the attributes for your AWS account.
Command:
aws ec2 describe-account-attributesOutput:
{ "AccountAttributes": [ { "AttributeName": "vpc-max-security-groups-per-interface", "AttributeValues": [ { "AttributeValue": "5" } ] }, { "AttributeName": "max-instances", "AttributeValues": [ { "AttributeValue": "20" } ] }, { "AttributeName": "supported-platforms", "AttributeValues": [ { "AttributeValue": "EC2" }, { "AttributeValue": "VPC" } ] }, { "AttributeName": "default-vpc", "AttributeValues": [ { "AttributeValue": "none" } ] }, { "AttributeName": "max-elastic-ips", "AttributeValues": [ { "AttributeValue": "5" } ] }, { "AttributeName": "vpc-max-elastic-ips", "AttributeValues": [ { "AttributeValue": "5" } ] } ] }To describe a single attribute for your AWS account
This example describes the
supported-platformsattribute for your AWS account.Command:
aws ec2 describe-account-attributes --attribute-namessupported-platformsOutput:
{ "AccountAttributes": [ { "AttributeName": "supported-platforms", "AttributeValues": [ { "AttributeValue": "EC2" }, { "AttributeValue": "VPC" } ] } ] }-
For API details, see DescribeAccountAttributes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-address-transfers.
- AWS CLI
-
To describe an Elastic IP address transfer
The following
describe-address-transfersexample describes the Elastic IP address transfer for the specified Elastic IP address.aws ec2 describe-address-transfers \ --allocation-idseipalloc-09ad461b0d03f6aafOutput:
{ "AddressTransfers": [ { "PublicIp": "100.21.184.216", "AllocationId": "eipalloc-09ad461b0d03f6aaf", "TransferAccountId": "123456789012", "TransferOfferExpirationTimestamp": "2023-02-22T22:51:01.000Z", "AddressTransferStatus": "pending" } ] }For more information, see Transfer Elastic IP addresses in the Amazon VPC User Guide.
-
For API details, see DescribeAddressTransfers
in AWS CLI Command Reference.
-
The following code example shows how to use describe-addresses-attribute.
- AWS CLI
-
To view the attributes of the domain name associated with an elastic IP address
The following
describe-addresses-attributeexamples return the attributes of the domain name associated with the elastic IP address.Linux:
aws ec2 describe-addresses-attribute \ --allocation-idseipalloc-abcdef01234567890\ --attributedomain-nameWindows:
aws ec2 describe-addresses-attribute^--allocation-idseipalloc-abcdef01234567890^--attributedomain-nameOutput:
{ "Addresses": [ { "PublicIp": "192.0.2.0", "AllocationId": "eipalloc-abcdef01234567890", "PtrRecord": "example.com." } ] }To view the attributes of an elastic IP address, you must have first associated a domain name with the elastic IP address. For more information, see Use reverse DNS for email applications in the Amazon EC2 User Guide or modify-address-attribute in the AWS CLI Command Reference.
-
For API details, see DescribeAddressesAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-addresses.
- AWS CLI
-
Example 1: To retrieve details about all of your Elastic IP addresses
The following
describe addressesexample displays details about your Elastic IP addresses.aws ec2 describe-addressesOutput:
{ "Addresses": [ { "InstanceId": "i-1234567890abcdef0", "PublicIp": "198.51.100.0", "PublicIpv4Pool": "amazon", "Domain": "standard" }, { "Domain": "vpc", "PublicIpv4Pool": "amazon", "InstanceId": "i-1234567890abcdef0", "NetworkInterfaceId": "eni-12345678", "AssociationId": "eipassoc-12345678", "NetworkInterfaceOwnerId": "123456789012", "PublicIp": "203.0.113.0", "AllocationId": "eipalloc-12345678", "PrivateIpAddress": "10.0.1.241" } ] }Example 2: To retrieve details your Elastic IP addresses for EC2-VPC
The following
describe-addressesexample displays details about your Elastic IP addresses for use with instances in a VPC.aws ec2 describe-addresses \ --filters"Name=domain,Values=vpc"Output:
{ "Addresses": [ { "Domain": "vpc", "PublicIpv4Pool": "amazon", "InstanceId": "i-1234567890abcdef0", "NetworkInterfaceId": "eni-12345678", "AssociationId": "eipassoc-12345678", "NetworkInterfaceOwnerId": "123456789012", "PublicIp": "203.0.113.0", "AllocationId": "eipalloc-12345678", "PrivateIpAddress": "10.0.1.241" } ] }Example 3: To retrieve details about an Elastic IP address specified by allocation ID
The following
describe-addressesexample displays details about the Elastic IP address with the specified allocation ID, which is associated with an instance in EC2-VPC.aws ec2 describe-addresses \ --allocation-idseipalloc-282d9641Output:
{ "Addresses": [ { "Domain": "vpc", "PublicIpv4Pool": "amazon", "InstanceId": "i-1234567890abcdef0", "NetworkInterfaceId": "eni-1a2b3c4d", "AssociationId": "eipassoc-123abc12", "NetworkInterfaceOwnerId": "1234567891012", "PublicIp": "203.0.113.25", "AllocationId": "eipalloc-282d9641", "PrivateIpAddress": "10.251.50.12" } ] }Example 4: To retrieve details about an Elastic IP address specified by its VPC private IP address
The following
describe-addressesexample displays details about the Elastic IP address associated with a particular private IP address in EC2-VPC.aws ec2 describe-addresses \ --filters"Name=private-ip-address,Values=10.251.50.12"Example 5: To retrieve details about Elastic IP addresses in EC2-Classic
TThe following
describe-addressesexample displays details about your Elastic IP addresses for use in EC2-Classic.aws ec2 describe-addresses \ --filters"Name=domain,Values=standard"Output:
{ "Addresses": [ { "InstanceId": "i-1234567890abcdef0", "PublicIp": "203.0.110.25", "PublicIpv4Pool": "amazon", "Domain": "standard" } ] }Example 6: To retrieve details about an Elastic IP addresses specified by its public IP address
The following
describe-addressesexample displays details about the Elastic IP address with the value203.0.110.25, which is associated with an instance in EC2-Classic.aws ec2 describe-addresses \ --public-ips203.0.110.25Output:
{ "Addresses": [ { "InstanceId": "i-1234567890abcdef0", "PublicIp": "203.0.110.25", "PublicIpv4Pool": "amazon", "Domain": "standard" } ] }-
For API details, see DescribeAddresses
in AWS CLI Command Reference.
-
The following code example shows how to use describe-aggregate-id-format.
- AWS CLI
-
To describe the longer ID format settings for all resource types in a Region
The following
describe-aggregate-id-formatexample describes the overall long ID format status for the current Region. TheDeadlinevalue indicates that the deadlines for these resources to permanently switch from the short ID format to the long ID format expired. TheUseLongIdsAggregatedvalue indicates that all IAM users and IAM roles are configured to use long ID format for all resource types.aws ec2 describe-aggregate-id-formatOutput:
{ "UseLongIdsAggregated": true, "Statuses": [ { "Deadline": "2018-08-13T02:00:00.000Z", "Resource": "network-interface-attachment", "UseLongIds": true }, { "Deadline": "2016-12-13T02:00:00.000Z", "Resource": "instance", "UseLongIds": true }, { "Deadline": "2018-08-13T02:00:00.000Z", "Resource": "elastic-ip-association", "UseLongIds": true }, ... ] }-
For API details, see DescribeAggregateIdFormat
in AWS CLI Command Reference.
-
The following code example shows how to use describe-availability-zones.
- AWS CLI
-
To describe your Availability Zones
The following example
describe-availability-zonesdisplays details for the Availability Zones that are available to you. The response includes Availability Zones only for the current Region. In this example, it uses the profiles defaultus-west-2(Oregon) Region.aws ec2 describe-availability-zonesOutput:
{ "AvailabilityZones": [ { "State": "available", "OptInStatus": "opt-in-not-required", "Messages": [], "RegionName": "us-west-2", "ZoneName": "us-west-2a", "ZoneId": "usw2-az1", "GroupName": "us-west-2", "NetworkBorderGroup": "us-west-2" }, { "State": "available", "OptInStatus": "opt-in-not-required", "Messages": [], "RegionName": "us-west-2", "ZoneName": "us-west-2b", "ZoneId": "usw2-az2", "GroupName": "us-west-2", "NetworkBorderGroup": "us-west-2" }, { "State": "available", "OptInStatus": "opt-in-not-required", "Messages": [], "RegionName": "us-west-2", "ZoneName": "us-west-2c", "ZoneId": "usw2-az3", "GroupName": "us-west-2", "NetworkBorderGroup": "us-west-2" }, { "State": "available", "OptInStatus": "opt-in-not-required", "Messages": [], "RegionName": "us-west-2", "ZoneName": "us-west-2d", "ZoneId": "usw2-az4", "GroupName": "us-west-2", "NetworkBorderGroup": "us-west-2" }, { "State": "available", "OptInStatus": "opted-in", "Messages": [], "RegionName": "us-west-2", "ZoneName": "us-west-2-lax-1a", "ZoneId": "usw2-lax1-az1", "GroupName": "us-west-2-lax-1", "NetworkBorderGroup": "us-west-2-lax-1" } ] }-
For API details, see DescribeAvailabilityZones
in AWS CLI Command Reference.
-
The following code example shows how to use describe-aws-network-performance-metric-subscription.
- AWS CLI
-
To describe your metric subscriptions
The following
describe-aws-network-performance-metric-subscriptionsexample describes your metric subscriptions.aws ec2 describe-aws-network-performance-metric-subscriptionsOutput:
{ "Subscriptions": [ { "Source": "us-east-1", "Destination": "eu-west-1", "Metric": "aggregate-latency", "Statistic": "p50", "Period": "five-minutes" } ] }For more information, see Manage subscriptions in the Infrastructure Performance User Guide.
-
For API details, see DescribeAwsNetworkPerformanceMetricSubscription
in AWS CLI Command Reference.
-
The following code example shows how to use describe-aws-network-performance-metric-subscriptions.
- AWS CLI
-
To describe your metric subscriptions
The following
describe-aws-network-performance-metric-subscriptionsexample describes your metric subscriptions.aws ec2 describe-aws-network-performance-metric-subscriptionsOutput:
{ "Subscriptions": [ { "Source": "us-east-1", "Destination": "eu-west-1", "Metric": "aggregate-latency", "Statistic": "p50", "Period": "five-minutes" } ] }For more information, see Manage subscriptions in the Infrastructure Performance User Guide.
-
For API details, see DescribeAwsNetworkPerformanceMetricSubscriptions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-bundle-tasks.
- AWS CLI
-
To describe your bundle tasks
This example describes all of your bundle tasks.
Command:
aws ec2 describe-bundle-tasksOutput:
{ "BundleTasks": [ { "UpdateTime": "2015-09-15T13:26:54.000Z", "InstanceId": "i-1234567890abcdef0", "Storage": { "S3": { "Prefix": "winami", "Bucket": "bundletasks" } }, "State": "bundling", "StartTime": "2015-09-15T13:24:35.000Z", "Progress": "3%", "BundleId": "bun-2a4e041c" } ] }-
For API details, see DescribeBundleTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-byoip-cidrs.
- AWS CLI
-
To describe your provisioned address ranges
The following
describe-byoip-cidrsexample displays details about the public IPv4 address ranges that you provisioned for use by AWS.aws ec2 describe-byoip-cidrsOutput:
{ "ByoipCidrs": [ { "Cidr": "203.0.113.25/24", "StatusMessage": "ipv4pool-ec2-1234567890abcdef0", "State": "provisioned" } ] }-
For API details, see DescribeByoipCidrs
in AWS CLI Command Reference.
-
The following code example shows how to use describe-capacity-reservation-fleets.
- AWS CLI
-
To view a Capacity Reservation Fleet
The following
describe-capacity-reservation-fleetsexample lists configuration and capacity information for the specified Capacity Reservation Fleet. It also lists details about the individual Capacity Reservations that are inside the Fleet.aws ec2 describe-capacity-reservation-fleets \ --capacity-reservation-fleet-idscrf-abcdef01234567890Output:
{ "CapacityReservationFleets": [ { "State": "active", "EndDate": "2022-12-31T23:59:59.000Z", "InstanceMatchCriteria": "open", "Tags": [], "CapacityReservationFleetId": "crf-abcdef01234567890", "Tenancy": "default", "InstanceTypeSpecifications": [ { "CapacityReservationId": "cr-1234567890abcdef0", "AvailabilityZone": "us-east-1a", "FulfilledCapacity": 5.0, "Weight": 1.0, "CreateDate": "2022-07-02T08:34:33.398Z", "InstancePlatform": "Linux/UNIX", "TotalInstanceCount": 5, "Priority": 1, "EbsOptimized": true, "InstanceType": "m5.xlarge" } ], "TotalTargetCapacity": 5, "TotalFulfilledCapacity": 5.0, "CreateTime": "2022-07-02T08:34:33.397Z", "AllocationStrategy": "prioritized" } ] }For more information about Capacity Reservation Fleets, see Capacity Reservation Fleets in the Amazon EC2 User Guide.
-
For API details, see DescribeCapacityReservationFleets
in AWS CLI Command Reference.
-
The following code example shows how to use describe-capacity-reservations.
- AWS CLI
-
Example 1: To describe one or more of your capacity reservations
The following
describe-capacity-reservationsexample displays details about all of your capacity reservations in the current AWS Region.aws ec2 describe-capacity-reservationsOutput:
{ "CapacityReservations": [ { "CapacityReservationId": "cr-1234abcd56EXAMPLE ", "OwnerId": "123456789111", "CapacityReservationArn": "arn:aws:ec2:us-east-1:123456789111:capacity-reservation/cr-1234abcd56EXAMPLE", "AvailabilityZoneId": "use1-az2", "InstanceType": "c5.large", "InstancePlatform": "Linux/UNIX", "AvailabilityZone": "us-east-1a", "Tenancy": "default", "TotalInstanceCount": 1, "AvailableInstanceCount": 1, "EbsOptimized": true, "EphemeralStorage": false, "State": "active", "StartDate": "2024-10-23T15:00:24+00:00", "EndDateType": "unlimited", "InstanceMatchCriteria": "open", "CreateDate": "2024-10-23T15:00:24+00:00", "Tags": [], "CapacityAllocations": [] }, { "CapacityReservationId": "cr-abcdEXAMPLE9876ef ", "OwnerId": "123456789111", "CapacityReservationArn": "arn:aws:ec2:us-east-1:123456789111:capacity-reservation/cr-abcdEXAMPLE9876ef", "AvailabilityZoneId": "use1-az2", "InstanceType": "c4.large", "InstancePlatform": "Linux/UNIX", "AvailabilityZone": "us-east-1a", "Tenancy": "default", "TotalInstanceCount": 1, "AvailableInstanceCount": 1, "EbsOptimized": true, "EphemeralStorage": false, "State": "cancelled", "StartDate": "2024-10-23T15:01:03+00:00", "EndDateType": "unlimited", "InstanceMatchCriteria": "open", "CreateDate": "2024-10-23T15:01:02+00:00", "Tags": [], "CapacityAllocations": [] } ] }Example 2: To describe one or more of your capacity reservations
The following
describe-capacity-reservationsexample displays details about the specified capacity reservation.aws ec2 describe-capacity-reservations \ --capacity-reservation-idscr-1234abcd56EXAMPLEOutput:
{ "CapacityReservations": [ { "CapacityReservationId": "cr-abcdEXAMPLE9876ef ", "OwnerId": "123456789111", "CapacityReservationArn": "arn:aws:ec2:us-east-1:123456789111:capacity-reservation/cr-abcdEXAMPLE9876ef", "AvailabilityZoneId": "use1-az2", "InstanceType": "c4.large", "InstancePlatform": "Linux/UNIX", "AvailabilityZone": "us-east-1a", "Tenancy": "default", "TotalInstanceCount": 1, "AvailableInstanceCount": 1, "EbsOptimized": true, "EphemeralStorage": false, "State": "active", "StartDate": "2024-10-23T15:01:03+00:00", "EndDateType": "unlimited", "InstanceMatchCriteria": "open", "CreateDate": "2024-10-23T15:01:02+00:00", "Tags": [], "CapacityAllocations": [] } ] }For more information, see Viewing a Capacity Reservation in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeCapacityReservations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-carrier-gateways.
- AWS CLI
-
To describe all carrier gateways
The following
describe-carrier-gatewaysexample lists all your carrier gateways.aws ec2 describe-carrier-gatewaysOutput:
{ "CarrierGateways": [ { "CarrierGatewayId": "cagw-0465cdEXAMPLE1111", "VpcId": "vpc-0c529aEXAMPLE", "State": "available", "OwnerId": "123456789012", "Tags": [ { "Key": "example", "Value": "tag" } ] } ] }For more information, see Carrier gateways<https://docs.aws.amazon.com/vpc/latest/userguide/Carrier_Gateway.html> in the Amazon Virtual Private Cloud User Guide.
-
For API details, see DescribeCarrierGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-classic-link-instances.
- AWS CLI
-
To describe linked EC2-Classic instances
This example lists all of your linked EC2-Classic instances.
Command:
aws ec2 describe-classic-link-instancesOutput:
{ "Instances": [ { "InstanceId": "i-1234567890abcdef0", "VpcId": "vpc-88888888", "Groups": [ { "GroupId": "sg-11122233" } ], "Tags": [ { "Value": "ClassicInstance", "Key": "Name" } ] }, { "InstanceId": "i-0598c7d356eba48d7", "VpcId": "vpc-12312312", "Groups": [ { "GroupId": "sg-aabbccdd" } ], "Tags": [ { "Value": "ClassicInstance2", "Key": "Name" } ] } ] }This example lists all of your linked EC2-Classic instances, and filters the response to include only instances that are linked to VPC vpc-88888888.
Command:
aws ec2 describe-classic-link-instances --filter"Name=vpc-id,Values=vpc-88888888"Output:
{ "Instances": [ { "InstanceId": "i-1234567890abcdef0", "VpcId": "vpc-88888888", "Groups": [ { "GroupId": "sg-11122233" } ], "Tags": [ { "Value": "ClassicInstance", "Key": "Name" } ] } ] }-
For API details, see DescribeClassicLinkInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-client-vpn-authorization-rules.
- AWS CLI
-
To describe the authorization rules for a Client VPN endpoint
The following
describe-client-vpn-authorization-rulesexample displays details about the authorization rules for the specified Client VPN endpoint.aws ec2 describe-client-vpn-authorization-rules \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "AuthorizationRules": [ { "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "GroupId": "", "AccessAll": true, "DestinationCidr": "0.0.0.0/0", "Status": { "Code": "active" } } ] }For more information, see Authorization Rules in the AWS Client VPN Administrator Guide.
-
For API details, see DescribeClientVpnAuthorizationRules
in AWS CLI Command Reference.
-
The following code example shows how to use describe-client-vpn-connections.
- AWS CLI
-
To describe the connections to a Client VPN endpoint
The following
describe-client-vpn-connectionsexample displays details about the client connections to the specified Client VPN endpoint.aws ec2 describe-client-vpn-connections \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "Connections": [ { "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "Timestamp": "2019-08-12 07:58:34", "ConnectionId": "cvpn-connection-0e03eb24267165acd", "ConnectionEstablishedTime": "2019-08-12 07:57:14", "IngressBytes": "32302", "EgressBytes": "5696", "IngressPackets": "332", "EgressPackets": "67", "ClientIp": "172.31.0.225", "CommonName": "client1.domain.tld", "Status": { "Code": "terminated" }, "ConnectionEndTime": "2019-08-12 07:58:34" }, { "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "Timestamp": "2019-08-12 08:02:54", "ConnectionId": "cvpn-connection-00668867a40f18253", "ConnectionEstablishedTime": "2019-08-12 08:02:53", "IngressBytes": "2951", "EgressBytes": "2611", "IngressPackets": "9", "EgressPackets": "6", "ClientIp": "172.31.0.226", "CommonName": "client1.domain.tld", "Status": { "Code": "active" }, "ConnectionEndTime": "-" } ] }For more information, see Client Connections in the AWS Client VPN Administrator Guide.
-
For API details, see DescribeClientVpnConnections
in AWS CLI Command Reference.
-
The following code example shows how to use describe-client-vpn-endpoints.
- AWS CLI
-
To describe your Client VPN endpoints
The following
describe-client-vpn-endpointsexample displays details about all of your Client VPN endpoints.aws ec2 describe-client-vpn-endpointsOutput:
{ "ClientVpnEndpoints": [ { "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "Description": "Endpoint for Admin access", "Status": { "Code": "available" }, "CreationTime": "2020-11-13T11:37:27", "DnsName": "*.cvpn-endpoint-123456789123abcde.prod.clientvpn.ap-south-1.amazonaws.com", "ClientCidrBlock": "172.31.0.0/16", "DnsServers": [ "8.8.8.8" ], "SplitTunnel": false, "VpnProtocol": "openvpn", "TransportProtocol": "udp", "VpnPort": 443, "ServerCertificateArn": "arn:aws:acm:ap-south-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-11111EXAMPLE", "AuthenticationOptions": [ { "Type": "certificate-authentication", "MutualAuthentication": { "ClientRootCertificateChain": "arn:aws:acm:ap-south-1:123456789012:certificate/a1b2c3d4-5678-90ab-cdef-22222EXAMPLE" } } ], "ConnectionLogOptions": { "Enabled": true, "CloudwatchLogGroup": "Client-vpn-connection-logs", "CloudwatchLogStream": "cvpn-endpoint-123456789123abcde-ap-south-1-2020/11/13-FCD8HEMVaCcw" }, "Tags": [ { "Key": "Name", "Value": "Client VPN" } ], "SecurityGroupIds": [ "sg-aabbcc11223344567" ], "VpcId": "vpc-a87f92c1", "SelfServicePortalUrl": "https://self-service.clientvpn.amazonaws.com/endpoints/cvpn-endpoint-123456789123abcde", "ClientConnectOptions": { "Enabled": false } } ] }For more information, see Client VPN Endpoints in the AWS Client VPN Administrator Guide.
-
For API details, see DescribeClientVpnEndpoints
in AWS CLI Command Reference.
-
The following code example shows how to use describe-client-vpn-routes.
- AWS CLI
-
To describe the routes for a Client VPN endpoint
The following
describe-client-vpn-routesexample displays details about the routes for the specified Client VPN endpoint.aws ec2 describe-client-vpn-routes \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "Routes": [ { "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "DestinationCidr": "10.0.0.0/16", "TargetSubnet": "subnet-0123456789abcabca", "Type": "Nat", "Origin": "associate", "Status": { "Code": "active" }, "Description": "Default Route" }, { "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "DestinationCidr": "0.0.0.0/0", "TargetSubnet": "subnet-0123456789abcabca", "Type": "Nat", "Origin": "add-route", "Status": { "Code": "active" } } ] }For more information, see Routes in the AWS Client VPN Administrator Guide.
-
For API details, see DescribeClientVpnRoutes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-client-vpn-target-networks.
- AWS CLI
-
To describe the target networks for a Client VPN endpoint
The following
describe-client-vpn-target-networksexample displays details about the target networks for the specified Client VPN endpoint.aws ec2 describe-client-vpn-target-networks \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "ClientVpnTargetNetworks": [ { "AssociationId": "cvpn-assoc-012e837060753dc3d", "VpcId": "vpc-11111222222333333", "TargetNetworkId": "subnet-0123456789abcabca", "ClientVpnEndpointId": "cvpn-endpoint-123456789123abcde", "Status": { "Code": "associating" }, "SecurityGroups": [ "sg-012345678910abcab" ] } ] }For more information, see Target Networks in the AWS Client VPN Administrator Guide.
-
For API details, see DescribeClientVpnTargetNetworks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-coip-pools.
- AWS CLI
-
To describe customer-owned IP address pools
The following
describe-coip-poolsexample describes the customer-owned IP address pools in your AWS account.aws ec2 describe-coip-poolsOutput:
{ "CoipPools": [ { "PoolId": "ipv4pool-coip-123a45678bEXAMPLE", "PoolCidrs": [ "0.0.0.0/0" ], "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE", "PoolArn": "arn:aws:ec2:us-west-2:123456789012:coip-pool/ipv4pool-coip-123a45678bEXAMPLE" } ] }For more information, see Customer-owned IP addresses in the AWS Outposts User Guide.
-
For API details, see DescribeCoipPools
in AWS CLI Command Reference.
-
The following code example shows how to use describe-conversion-tasks.
- AWS CLI
-
To view the status of a conversion task
This example returns the status of a conversion task with the ID import-i-ffvko9js.
Command:
aws ec2 describe-conversion-tasks --conversion-task-idsimport-i-ffvko9jsOutput:
{ "ConversionTasks": [ { "ConversionTaskId": "import-i-ffvko9js", "ImportInstance": { "InstanceId": "i-1234567890abcdef0", "Volumes": [ { "Volume": { "Id": "vol-049df61146c4d7901", "Size": 16 }, "Status": "completed", "Image": { "Size": 1300687360, "ImportManifestUrl": "https://s3.amazonaws.com/myimportbucket/411443cd-d620-4f1c-9d66-13144EXAMPLE/RHEL5.vmdkmanifest.xml?AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE&Expires=140EXAMPLE&Signature=XYNhznHNgCqsjDxL9wRL%2FJvEXAMPLE", "Format": "VMDK" }, "BytesConverted": 1300682960, "AvailabilityZone": "us-east-1d" } ] }, "ExpirationTime": "2014-05-14T22:06:23Z", "State": "completed" } ] }-
For API details, see DescribeConversionTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-customer-gateways.
- AWS CLI
-
To describe your customer gateways
This example describes your customer gateways.
Command:
aws ec2 describe-customer-gatewaysOutput:
{ "CustomerGateways": [ { "CustomerGatewayId": "cgw-b4dc3961", "IpAddress": "203.0.113.12", "State": "available", "Type": "ipsec.1", "BgpAsn": "65000" }, { "CustomerGatewayId": "cgw-0e11f167", "IpAddress": "12.1.2.3", "State": "available", "Type": "ipsec.1", "BgpAsn": "65534" } ] }To describe a specific customer gateway
This example describes the specified customer gateway.
Command:
aws ec2 describe-customer-gateways --customer-gateway-idscgw-0e11f167Output:
{ "CustomerGateways": [ { "CustomerGatewayId": "cgw-0e11f167", "IpAddress": "12.1.2.3", "State": "available", "Type": "ipsec.1", "BgpAsn": "65534" } ] }-
For API details, see DescribeCustomerGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-dhcp-options.
- AWS CLI
-
Example 1: To describe your DHCP options
The following
describe-dhcp-optionsexample retrieves details about your DHCP options.aws ec2 describe-dhcp-optionsOutput:
{ "DhcpOptions": [ { "DhcpConfigurations": [ { "Key": "domain-name", "Values": [ { "Value": "us-east-2.compute.internal" } ] }, { "Key": "domain-name-servers", "Values": [ { "Value": "AmazonProvidedDNS" } ] } ], "DhcpOptionsId": "dopt-19edf471", "OwnerId": "111122223333" }, { "DhcpConfigurations": [ { "Key": "domain-name", "Values": [ { "Value": "us-east-2.compute.internal" } ] }, { "Key": "domain-name-servers", "Values": [ { "Value": "AmazonProvidedDNS" } ] } ], "DhcpOptionsId": "dopt-fEXAMPLE", "OwnerId": "111122223333" } ] }For more information, see Working with DHCP Option Sets in the AWS VPC User Guide.
Example 2: To describe your DHCP options and filter the output
The following
describe-dhcp-optionsexample describes your DHCP options and uses a filter to return only DHCP options that haveexample.comfor the domain name server. The example uses the--queryparameter to display only the configuration information and ID in the output.aws ec2 describe-dhcp-options \ --filtersName=key,Values=domain-name-serversName=value,Values=example.com\ --query"DhcpOptions[*].[DhcpConfigurations,DhcpOptionsId]"Output:
[ [ [ { "Key": "domain-name", "Values": [ { "Value": "example.com" } ] }, { "Key": "domain-name-servers", "Values": [ { "Value": "172.16.16.16" } ] } ], "dopt-001122334455667ab" ] ]For more information, see Working with DHCP Option Sets in the AWS VPC User Guide.
-
For API details, see DescribeDhcpOptions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-egress-only-internet-gateways.
- AWS CLI
-
To describe your egress-only Internet gateways
This example describes your egress-only Internet gateways.
Command:
aws ec2 describe-egress-only-internet-gatewaysOutput:
{ "EgressOnlyInternetGateways": [ { "EgressOnlyInternetGatewayId": "eigw-015e0e244e24dfe8a", "Attachments": [ { "State": "attached", "VpcId": "vpc-0c62a468" } ] } ] }-
For API details, see DescribeEgressOnlyInternetGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-elastic-gpus.
- AWS CLI
-
To describe an Elastic GPU
Command:
aws ec2 describe-elastic-gpus --elastic-gpu-idsegpu-12345678901234567890abcdefghijkl-
For API details, see DescribeElasticGpus
in AWS CLI Command Reference.
-
The following code example shows how to use describe-export-image-tasks.
- AWS CLI
-
To monitor an export image task
The following
describe-export-image-tasksexample checks the status of the specified export image task. The resulting image file in Amazon S3 ismy-export-bucket/exports/export-ami-1234567890abcdef0.vmdk.aws ec2 describe-export-image-tasks \ --export-image-task-idsexport-ami-1234567890abcdef0Output for an export image task that is in progress.
{ "ExportImageTasks": [ { "ExportImageTaskId": "export-ami-1234567890abcdef0" "Progress": "21", "S3ExportLocation": { "S3Bucket": "my-export-bucket", "S3Prefix": "exports/" }, "Status": "active", "StatusMessage": "updating" } ] }Output for an export image task that is completed.
{ "ExportImageTasks": [ { "ExportImageTaskId": "export-ami-1234567890abcdef0" "S3ExportLocation": { "S3Bucket": "my-export-bucket", "S3Prefix": "exports/" }, "Status": "completed" } ] }For more information, see Export a VM from an AMI in the VM Import/Export User Guide.
-
For API details, see DescribeExportImageTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-export-tasks.
- AWS CLI
-
To list details about an instance export task
This example describes the export task with ID export-i-fh8sjjsq.
Command:
aws ec2 describe-export-tasks --export-task-idsexport-i-fh8sjjsqOutput:
{ "ExportTasks": [ { "State": "active", "InstanceExportDetails": { "InstanceId": "i-1234567890abcdef0", "TargetEnvironment": "vmware" }, "ExportToS3Task": { "S3Bucket": "myexportbucket", "S3Key": "RHEL5export-i-fh8sjjsq.ova", "DiskImageFormat": "vmdk", "ContainerFormat": "ova" }, "Description": "RHEL5 instance", "ExportTaskId": "export-i-fh8sjjsq" } ] }-
For API details, see DescribeExportTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fast-launch-images.
- AWS CLI
-
To describe the details for Windows AMIs that are configured for faster launching
The following
describe-fast-launch-imagesexample describes the details for each of the AMIs in your account that are configured for faster launching, including the resource type, the snapshot configuration, the launch template details, the maximum number of parallel launches, the AMI owner ID, the state of the fast launch configuration, the reason the state was changed, and the time that the state change occurred.aws ec2 describe-fast-launch-imagesOutput:
{ "FastLaunchImages": [ { "ImageId": "ami-01234567890abcedf", "ResourceType": "snapshot", "SnapshotConfiguration": {}, "LaunchTemplate": { "LaunchTemplateId": "lt-01234567890abcedf", "LaunchTemplateName": "EC2FastLaunchDefaultResourceCreation-a8c6215d-94e6-441b-9272-dbd1f87b07e2", "Version": "1" }, "MaxParallelLaunches": 6, "OwnerId": "0123456789123", "State": "enabled", "StateTransitionReason": "Client.UserInitiated", "StateTransitionTime": "2022-01-27T22:20:06.552000+00:00" } ] }For more information about configuring a Windows AMI for faster launching, see Configure your AMI for faster launching in the Amazon EC2 User Guide.
-
For API details, see DescribeFastLaunchImages
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fast-snapshot-restores.
- AWS CLI
-
To describe fast snapshot restores
The following
describe-fast-snapshot-restoresexample displays details for all fast snapshot restores with a state ofdisabled.aws ec2 describe-fast-snapshot-restores \ --filtersName=state,Values=disabledOutput:
{ "FastSnapshotRestores": [ { "SnapshotId": "snap-1234567890abcdef0", "AvailabilityZone": "us-west-2c", "State": "disabled", "StateTransitionReason": "Client.UserInitiated - Lifecycle state transition", "OwnerId": "123456789012", "EnablingTime": "2020-01-25T23:57:49.596Z", "OptimizingTime": "2020-01-25T23:58:25.573Z", "EnabledTime": "2020-01-25T23:59:29.852Z", "DisablingTime": "2020-01-26T00:40:56.069Z", "DisabledTime": "2020-01-26T00:41:27.390Z" } ] }The following
describe-fast-snapshot-restoresexample describes all fast snapshot restores.aws ec2 describe-fast-snapshot-restores-
For API details, see DescribeFastSnapshotRestores
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fleet-history.
- AWS CLI
-
To describe EC2 Fleet history
The following
describe-fleet-historyexample returns the history for the specified EC2 Fleet starting at the specified time. The output is for an EC2 Fleet with two running instances.aws ec2 describe-fleet-history \ --fleet-idfleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE\ --start-time2020-09-01T00:00:00ZOutput:
{ "HistoryRecords": [ { "EventInformation": { "EventSubType": "submitted" }, "EventType": "fleetRequestChange", "Timestamp": "2020-09-01T18:26:05.000Z" }, { "EventInformation": { "EventSubType": "active" }, "EventType": "fleetRequestChange", "Timestamp": "2020-09-01T18:26:15.000Z" }, { "EventInformation": { "EventDescription": "t2.small, ami-07c8bc5c1ce9598c3, ...", "EventSubType": "progress" }, "EventType": "fleetRequestChange", "Timestamp": "2020-09-01T18:26:17.000Z" }, { "EventInformation": { "EventDescription": "{\"instanceType\":\"t2.small\", ...}", "EventSubType": "launched", "InstanceId": "i-083a1c446e66085d2" }, "EventType": "instanceChange", "Timestamp": "2020-09-01T18:26:17.000Z" }, { "EventInformation": { "EventDescription": "{\"instanceType\":\"t2.small\", ...}", "EventSubType": "launched", "InstanceId": "i-090db02406cc3c2d6" }, "EventType": "instanceChange", "Timestamp": "2020-09-01T18:26:17.000Z" } ], "LastEvaluatedTime": "2020-09-01T19:10:19.000Z", "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE", "StartTime": "2020-08-31T23:53:20.000Z" }For more information, see Managing an EC2 Fleet in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeFleetHistory
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fleet-instances.
- AWS CLI
-
To describe the running instances for an EC2 Fleet
The following
describe-fleet-instancesexample describes the running instances for the specified EC2 Fleet.aws ec2 describe-fleet-instances \ --fleet-id12a34b55-67cd-8ef9-ba9b-9208dEXAMPLEOutput:
{ "ActiveInstances": [ { "InstanceId": "i-090db02406cc3c2d6", "InstanceType": "t2.small", "SpotInstanceRequestId": "sir-a43gtpfk", "InstanceHealth": "healthy" }, { "InstanceId": "i-083a1c446e66085d2", "InstanceType": "t2.small", "SpotInstanceRequestId": "sir-iwcit2nj", "InstanceHealth": "healthy" } ], "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE" }For more information, see Managing an EC2 Fleet in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeFleetInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fleets.
- AWS CLI
-
To describe an EC2 Fleet
The following
describe-fleetsexample describes the specified EC2 Fleet.aws ec2 describe-fleets \ --fleet-idsfleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLEOutput:
{ "Fleets": [ { "ActivityStatus": "pending_fulfillment", "CreateTime": "2020-09-01T18:26:05.000Z", "FleetId": "fleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE", "FleetState": "active", "ExcessCapacityTerminationPolicy": "termination", "FulfilledCapacity": 0.0, "FulfilledOnDemandCapacity": 0.0, "LaunchTemplateConfigs": [ { "LaunchTemplateSpecification": { "LaunchTemplateId": "lt-0e632f2855a979cd5", "Version": "1" } } ], "TargetCapacitySpecification": { "TotalTargetCapacity": 2, "OnDemandTargetCapacity": 0, "SpotTargetCapacity": 2, "DefaultTargetCapacityType": "spot" }, "TerminateInstancesWithExpiration": false, "Type": "maintain", "ReplaceUnhealthyInstances": false, "SpotOptions": { "AllocationStrategy": "lowestPrice", "InstanceInterruptionBehavior": "terminate", "InstancePoolsToUseCount": 1 }, "OnDemandOptions": { "AllocationStrategy": "lowestPrice" } } ] }For more information, see Managing an EC2 Fleet in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeFleets
in AWS CLI Command Reference.
-
The following code example shows how to use describe-flow-logs.
- AWS CLI
-
Example 1: To describe all of your flow logs
The following
describe-flow-logsexample displays details for all of your flow logs.aws ec2 describe-flow-logsOutput:
{ "FlowLogs": [ { "CreationTime": "2018-02-21T13:22:12.644Z", "DeliverLogsPermissionArn": "arn:aws:iam::123456789012:role/flow-logs-role", "DeliverLogsStatus": "SUCCESS", "FlowLogId": "fl-aabbccdd112233445", "MaxAggregationInterval": 600, "FlowLogStatus": "ACTIVE", "LogGroupName": "FlowLogGroup", "ResourceId": "subnet-12345678901234567", "TrafficType": "ALL", "LogDestinationType": "cloud-watch-logs", "LogFormat": "${version} ${account-id} ${interface-id} ${srcaddr} ${dstaddr} ${srcport} ${dstport} ${protocol} ${packets} ${bytes} ${start} ${end} ${action} ${log-status}" }, { "CreationTime": "2020-02-04T15:22:29.986Z", "DeliverLogsStatus": "SUCCESS", "FlowLogId": "fl-01234567890123456", "MaxAggregationInterval": 60, "FlowLogStatus": "ACTIVE", "ResourceId": "vpc-00112233445566778", "TrafficType": "ACCEPT", "LogDestinationType": "s3", "LogDestination": "arn:aws:s3:::my-flow-log-bucket/custom", "LogFormat": "${version} ${vpc-id} ${subnet-id} ${instance-id} ${interface-id} ${account-id} ${type} ${srcaddr} ${dstaddr} ${srcport} ${dstport} ${pkt-srcaddr} ${pkt-dstaddr} ${protocol} ${bytes} ${packets} ${start} ${end} ${action} ${tcp-flags} ${log-status}" } ] }Example 2: To describe a subset of your flow logs
The following
describe-flow-logsexample uses a filter to display details for only those flow logs that are in the specified log group in Amazon CloudWatch Logs.aws ec2 describe-flow-logs \ --filter"Name=log-group-name,Values=MyFlowLogs"-
For API details, see DescribeFlowLogs
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fpga-image-attribute.
- AWS CLI
-
To describe the attributes of an Amazon FPGA image
This example describes the load permissions for the specified AFI.
Command:
aws ec2 describe-fpga-image-attribute --fpga-image-idafi-0d123e123bfc85abc--attributeloadPermissionOutput:
{ "FpgaImageAttribute": { "FpgaImageId": "afi-0d123e123bfc85abc", "LoadPermissions": [ { "UserId": "123456789012" } ] } }-
For API details, see DescribeFpgaImageAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-fpga-images.
- AWS CLI
-
To describe Amazon FPGA images
This example describes AFIs that are owned by account
123456789012.Command:
aws ec2 describe-fpga-images --filtersName=owner-id,Values=123456789012Output:
{ "FpgaImages": [ { "UpdateTime": "2017-12-22T12:09:14.000Z", "Name": "my-afi", "PciId": { "SubsystemVendorId": "0xfedd", "VendorId": "0x1d0f", "DeviceId": "0xf000", "SubsystemId": "0x1d51" }, "FpgaImageGlobalId": "agfi-123cb27b5e84a0abc", "Public": false, "State": { "Code": "available" }, "ShellVersion": "0x071417d3", "OwnerId": "123456789012", "FpgaImageId": "afi-0d123e123bfc85abc", "CreateTime": "2017-12-22T11:43:33.000Z", "Description": "my-afi" } ] }-
For API details, see DescribeFpgaImages
in AWS CLI Command Reference.
-
The following code example shows how to use describe-host-reservation-offerings.
- AWS CLI
-
To describe Dedicated Host Reservation offerings
This example describes the Dedicated Host Reservations for the M4 instance family that are available to purchase.
Command:
aws ec2 describe-host-reservation-offerings --filterName=instance-family,Values=m4Output:
{ "OfferingSet": [ { "HourlyPrice": "1.499", "OfferingId": "hro-03f707bf363b6b324", "InstanceFamily": "m4", "PaymentOption": "NoUpfront", "UpfrontPrice": "0.000", "Duration": 31536000 }, { "HourlyPrice": "1.045", "OfferingId": "hro-0ef9181cabdef7a02", "InstanceFamily": "m4", "PaymentOption": "NoUpfront", "UpfrontPrice": "0.000", "Duration": 94608000 }, { "HourlyPrice": "0.714", "OfferingId": "hro-04567a15500b92a51", "InstanceFamily": "m4", "PaymentOption": "PartialUpfront", "UpfrontPrice": "6254.000", "Duration": 31536000 }, { "HourlyPrice": "0.484", "OfferingId": "hro-0d5d7a9d23ed7fbfe", "InstanceFamily": "m4", "PaymentOption": "PartialUpfront", "UpfrontPrice": "12720.000", "Duration": 94608000 }, { "HourlyPrice": "0.000", "OfferingId": "hro-05da4108ca998c2e5", "InstanceFamily": "m4", "PaymentOption": "AllUpfront", "UpfrontPrice": "23913.000", "Duration": 94608000 }, { "HourlyPrice": "0.000", "OfferingId": "hro-0a9f9be3b95a3dc8f", "InstanceFamily": "m4", "PaymentOption": "AllUpfront", "UpfrontPrice": "12257.000", "Duration": 31536000 } ] }-
For API details, see DescribeHostReservationOfferings
in AWS CLI Command Reference.
-
The following code example shows how to use describe-host-reservations.
- AWS CLI
-
To describe Dedicated Host Reservations in your account
This example describes the Dedicated Host Reservations in your account.
Command:
aws ec2 describe-host-reservationsOutput:
{ "HostReservationSet": [ { "Count": 1, "End": "2019-01-10T12:14:09Z", "HourlyPrice": "1.499", "InstanceFamily": "m4", "OfferingId": "hro-03f707bf363b6b324", "PaymentOption": "NoUpfront", "State": "active", "HostIdSet": [ "h-013abcd2a00cbd123" ], "Start": "2018-01-10T12:14:09Z", "HostReservationId": "hr-0d418a3a4ffc669ae", "UpfrontPrice": "0.000", "Duration": 31536000 } ] }-
For API details, see DescribeHostReservations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-hosts.
- AWS CLI
-
To view details about Dedicated Hosts
The following
describe-hostsexample displays details for theavailableDedicated Hosts in your AWS account.aws ec2 describe-hosts --filter"Name=state,Values=available"Output:
{ "Hosts": [ { "HostId": "h-07879acf49EXAMPLE", "Tags": [ { "Value": "production", "Key": "purpose" } ], "HostProperties": { "Cores": 48, "TotalVCpus": 96, "InstanceType": "m5.large", "Sockets": 2 }, "Instances": [], "State": "available", "AvailabilityZone": "eu-west-1a", "AvailableCapacity": { "AvailableInstanceCapacity": [ { "AvailableCapacity": 48, "InstanceType": "m5.large", "TotalCapacity": 48 } ], "AvailableVCpus": 96 }, "HostRecovery": "on", "AllocationTime": "2019-08-19T08:57:44.000Z", "AutoPlacement": "off" } ] }For more information, see Viewing Dedicated Hosts in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeHosts
in AWS CLI Command Reference.
-
The following code example shows how to use describe-iam-instance-profile-associations.
- AWS CLI
-
To describe IAM instance profile associations
This example describes all of your IAM instance profile associations.
Command:
aws ec2 describe-iam-instance-profile-associationsOutput:
{ "IamInstanceProfileAssociations": [ { "InstanceId": "i-09eb09efa73ec1dee", "State": "associated", "AssociationId": "iip-assoc-0db249b1f25fa24b8", "IamInstanceProfile": { "Id": "AIPAJVQN4F5WVLGCJDRGM", "Arn": "arn:aws:iam::123456789012:instance-profile/admin-role" } }, { "InstanceId": "i-0402909a2f4dffd14", "State": "associating", "AssociationId": "iip-assoc-0d1ec06278d29f44a", "IamInstanceProfile": { "Id": "AGJAJVQN4F5WVLGCJABCM", "Arn": "arn:aws:iam::123456789012:instance-profile/user1-role" } } ] }-
For API details, see DescribeIamInstanceProfileAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-id-format.
- AWS CLI
-
Example 1: To describe the ID format of a resource
The following
describe-id-formatexample describes the ID format for security groups.aws ec2 describe-id-format \ --resourcesecurity-groupIn the following example output, the
Deadlinevalue indicates that the deadline for this resource type to permanently switch from the short ID format to the long ID format expired at 00:00 UTC on August 15, 2018.{ "Statuses": [ { "Deadline": "2018-08-15T00:00:00.000Z", "Resource": "security-group", "UseLongIds": true } ] }Example 2: To describe the ID format for all resources
The following
describe-id-formatexample describes the ID format for all resource types. All resource types that supported the short ID format were switched to use the long ID format.aws ec2 describe-id-format-
For API details, see DescribeIdFormat
in AWS CLI Command Reference.
-
The following code example shows how to use describe-identity-id-format.
- AWS CLI
-
To describe the ID format for an IAM role
The following
describe-identity-id-formatexample describes the ID format received by instances created by the IAM roleEC2Rolein your AWS account.aws ec2 describe-identity-id-format \ --principal-arnarn:aws:iam::123456789012:role/my-iam-role\ --resourceinstanceThe following output indicates that instances created by this role receive IDs in long ID format.
{ "Statuses": [ { "Deadline": "2016-12-15T00:00:00Z", "Resource": "instance", "UseLongIds": true } ] }To describe the ID format for an IAM user
The following
describe-identity-id-formatexample describes the ID format received by snapshots created by the IAM userAdminUserin your AWS account.aws ec2 describe-identity-id-format \ --principal-arnarn:aws:iam::123456789012:user/AdminUser\ --resourcesnapshotThe output indicates that snapshots created by this user receive IDs in long ID format.
{ "Statuses": [ { "Deadline": "2016-12-15T00:00:00Z", "Resource": "snapshot", "UseLongIds": true } ] }-
For API details, see DescribeIdentityIdFormat
in AWS CLI Command Reference.
-
The following code example shows how to use describe-image-attribute.
- AWS CLI
-
To describe the launch permissions for an AMI
This example describes the launch permissions for the specified AMI.
Command:
aws ec2 describe-image-attribute --image-idami-5731123e--attributelaunchPermissionOutput:
{ "LaunchPermissions": [ { "UserId": "123456789012" } ], "ImageId": "ami-5731123e", }To describe the product codes for an AMI
This example describes the product codes for the specified AMI. Note that this AMI has no product codes.
Command:
aws ec2 describe-image-attribute --image-idami-5731123e--attributeproductCodesOutput:
{ "ProductCodes": [], "ImageId": "ami-5731123e", }-
For API details, see DescribeImageAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-images.
- AWS CLI
-
Example 1: To describe an AMI
The following
describe-imagesexample describes the specified AMI in the specified Region.aws ec2 describe-images \ --regionus-east-1\ --image-idsami-1234567890EXAMPLEOutput:
{ "Images": [ { "VirtualizationType": "hvm", "Description": "Provided by Red Hat, Inc.", "PlatformDetails": "Red Hat Enterprise Linux", "EnaSupport": true, "Hypervisor": "xen", "State": "available", "SriovNetSupport": "simple", "ImageId": "ami-1234567890EXAMPLE", "UsageOperation": "RunInstances:0010", "BlockDeviceMappings": [ { "DeviceName": "/dev/sda1", "Ebs": { "SnapshotId": "snap-111222333444aaabb", "DeleteOnTermination": true, "VolumeType": "gp2", "VolumeSize": 10, "Encrypted": false } } ], "Architecture": "x86_64", "ImageLocation": "123456789012/RHEL-8.0.0_HVM-20190618-x86_64-1-Hourly2-GP2", "RootDeviceType": "ebs", "OwnerId": "123456789012", "RootDeviceName": "/dev/sda1", "CreationDate": "2019-05-10T13:17:12.000Z", "Public": true, "ImageType": "machine", "Name": "RHEL-8.0.0_HVM-20190618-x86_64-1-Hourly2-GP2" } ] }For more information, see Amazon Machine Images (AMI) in the Amazon EC2 User Guide.
Example 2: To describe AMIs based on filters
The following
describe-imagesexample describes Windows AMIs provided by Amazon that are backed by Amazon EBS.aws ec2 describe-images \ --ownersamazon\ --filters"Name=platform,Values=windows""Name=root-device-type,Values=ebs"For an example of the output for
describe-images, see Example 1.For additional examples using filters, see Listing and filtering your resources in the Amazon EC2 User Guide.
Example 3: To describe AMIs based on tags
The following
describe-imagesexample describes all AMIs that have the tagType=Custom. The example uses the--queryparameter to display only the AMI IDs.aws ec2 describe-images \ --filters"Name=tag:Type,Values=Custom"\ --query 'Images[*].[ImageId]' \ --outputtextOutput:
ami-1234567890EXAMPLE ami-0abcdef1234567890For additional examples using tag filters, see Working with tags in the Amazon EC2 User Guide.
-
For API details, see DescribeImages
in AWS CLI Command Reference.
-
The following code example shows how to use describe-import-image-tasks.
- AWS CLI
-
To monitor an import image task
The following
describe-import-image-tasksexample checks the status of the specified import image task.aws ec2 describe-import-image-tasks \ --import-task-idsimport-ami-1234567890abcdef0Output for an import image task that is in progress.
{ "ImportImageTasks": [ { "ImportTaskId": "import-ami-1234567890abcdef0", "Progress": "28", "SnapshotDetails": [ { "DiskImageSize": 705638400.0, "Format": "ova", "Status": "completed", "UserBucket": { "S3Bucket": "my-import-bucket", "S3Key": "vms/my-server-vm.ova" } } ], "Status": "active", "StatusMessage": "converting" } ] }Output for an import image task that is completed. The ID of the resulting AMI is provided by
ImageId.{ "ImportImageTasks": [ { "ImportTaskId": "import-ami-1234567890abcdef0", "ImageId": "ami-1234567890abcdef0", "SnapshotDetails": [ { "DiskImageSize": 705638400.0, "Format": "ova", "SnapshotId": "snap-1234567890abcdef0" "Status": "completed", "UserBucket": { "S3Bucket": "my-import-bucket", "S3Key": "vms/my-server-vm.ova" } } ], "Status": "completed" } ] }-
For API details, see DescribeImportImageTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-import-snapshot-tasks.
- AWS CLI
-
To monitor an import snapshot task
The following
describe-import-snapshot-tasksexample checks the status of the specified import snapshot task.aws ec2 describe-import-snapshot-tasks \ --import-task-idsimport-snap-1234567890abcdef0Output for an import snapshot task that is in progress:
{ "ImportSnapshotTasks": [ { "Description": "My server VMDK", "ImportTaskId": "import-snap-1234567890abcdef0", "SnapshotTaskDetail": { "Description": "My server VMDK", "DiskImageSize": "705638400.0", "Format": "VMDK", "Progress": "42", "Status": "active", "StatusMessage": "downloading/converting", "UserBucket": { "S3Bucket": "my-import-bucket", "S3Key": "vms/my-server-vm.vmdk" } } } ] }Output for an import snapshot task that is completed. The ID of the resulting snapshot is provided by
SnapshotId.{ "ImportSnapshotTasks": [ { "Description": "My server VMDK", "ImportTaskId": "import-snap-1234567890abcdef0", "SnapshotTaskDetail": { "Description": "My server VMDK", "DiskImageSize": "705638400.0", "Format": "VMDK", "SnapshotId": "snap-1234567890abcdef0" "Status": "completed", "UserBucket": { "S3Bucket": "my-import-bucket", "S3Key": "vms/my-server-vm.vmdk" } } } ] }-
For API details, see DescribeImportSnapshotTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-attribute.
- AWS CLI
-
To describe the instance type
This example describes the instance type of the specified instance.
Command:
aws ec2 describe-instance-attribute --instance-idi-1234567890abcdef0--attributeinstanceTypeOutput:
{ "InstanceId": "i-1234567890abcdef0" "InstanceType": { "Value": "t1.micro" } }To describe the disableApiTermination attribute
This example describes the
disableApiTerminationattribute of the specified instance.Command:
aws ec2 describe-instance-attribute --instance-idi-1234567890abcdef0--attributedisableApiTerminationOutput:
{ "InstanceId": "i-1234567890abcdef0" "DisableApiTermination": { "Value": "false" } }To describe the block device mapping for an instance
This example describes the
blockDeviceMappingattribute of the specified instance.Command:
aws ec2 describe-instance-attribute --instance-idi-1234567890abcdef0--attributeblockDeviceMappingOutput:
{ "InstanceId": "i-1234567890abcdef0" "BlockDeviceMappings": [ { "DeviceName": "/dev/sda1", "Ebs": { "Status": "attached", "DeleteOnTermination": true, "VolumeId": "vol-049df61146c4d7901", "AttachTime": "2013-05-17T22:42:34.000Z" } }, { "DeviceName": "/dev/sdf", "Ebs": { "Status": "attached", "DeleteOnTermination": false, "VolumeId": "vol-049df61146c4d7901", "AttachTime": "2013-09-10T23:07:00.000Z" } } ], }-
For API details, see DescribeInstanceAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-connect-endpoints.
- AWS CLI
-
To describe an EC2 Instance Connect Endpoint
The following
describe-instance-connect-endpointsexample describes the specified EC2 Instance Connect Endpoint.aws ec2 describe-instance-connect-endpoints \ --regionus-east-1\ --instance-connect-endpoint-idseice-0123456789exampleOutput:
{ "InstanceConnectEndpoints": [ { "OwnerId": "111111111111", "InstanceConnectEndpointId": "eice-0123456789example", "InstanceConnectEndpointArn": "arn:aws:ec2:us-east-1:111111111111:instance-connect-endpoint/eice-0123456789example", "State": "create-complete", "StateMessage": "", "DnsName": "eice-0123456789example.b67b86ba.ec2-instance-connect-endpoint.us-east-1.amazonaws.com", "NetworkInterfaceIds": [ "eni-0123456789example" ], "VpcId": "vpc-0123abcd", "AvailabilityZone": "us-east-1d", "CreatedAt": "2023-02-07T12:05:37+00:00", "SubnetId": "subnet-0123abcd", "Tags": [] } ] }For more information, see Create an EC2 Instance Connect Endpoint in the Amazon EC2 User Guide.
-
For API details, see DescribeInstanceConnectEndpoints
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-credit-specifications.
- AWS CLI
-
To describe the credit option for CPU usage of one or more instances
The following
describe-instance-credit-specificationsexample describes the CPU credit option for the specified instance.aws ec2 describe-instance-credit-specifications \ --instance-idsi-1234567890abcdef0Output:
{ "InstanceCreditSpecifications": [ { "InstanceId": "i-1234567890abcdef0", "CpuCredits": "unlimited" } ] }For more information, see Work with burstable performance instances in the Amazon EC2 User Guide.
-
For API details, see DescribeInstanceCreditSpecifications
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-event-notification-attributes.
- AWS CLI
-
To describe the tags for scheduled event notifications
The following
describe-instance-event-notification-attributesexample describes the tags to appear in scheduled event notifications.aws ec2 describe-instance-event-notification-attributesOutput:
{ "InstanceTagAttribute": { "InstanceTagKeys": [], "IncludeAllTagsOfInstance": true } }For more information, see Scheduled events for your instances in the Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeInstanceEventNotificationAttributes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-event-windows.
- AWS CLI
-
Example 1: To describe all event windows
The following
describe-instance-event-windowsexample describes all event windows in the specified Region.aws ec2 describe-instance-event-windows \ --regionus-east-1Output:
{ "InstanceEventWindows": [ { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [ "i-1234567890abcdef0", "i-0598c7d356eba48d7" ], "Tags": [], "DedicatedHostIds": [] }, "State": "active", "Tags": [] } ... ], "NextToken": "9d624e0c-388b-4862-a31e-a85c64fc1d4a" }Example 2: To describe a specific event window
The following
describe-instance-event-windowsexample describes a specific event by using theinstance-event-windowparameter to describe a specific event window.aws ec2 describe-instance-event-windows \ --regionus-east-1\ --instance-event-window-idsiew-0abcdef1234567890Output:
{ "InstanceEventWindows": [ { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [ "i-1234567890abcdef0", "i-0598c7d356eba48d7" ], "Tags": [], "DedicatedHostIds": [] }, "State": "active", "Tags": [] } }Example 3: To describe event windows that match one or more filters
The following
describe-instance-event-windowsexample describes event windows that match one or more filters using thefilterparameter. Theinstance-idfilter is used to describe all of the event windows that are associated with the specified instance. When a filter is used, it performs a direct match. However, theinstance-idfilter is different. If there is no direct match to the instance ID, then it falls back to indirect associations with the event window, such as the tags of the instance or Dedicated Host ID (if the instance is a Dedicated Host).aws ec2 describe-instance-event-windows \ --regionus-east-1\ --filtersName=instance-id,Values=i-1234567890abcdef0\ --max-results100\ --next-token<next-token-value>Output:
{ "InstanceEventWindows": [ { "InstanceEventWindowId": "iew-0dbc0adb66f235982", "TimeRanges": [ { "StartWeekDay": "sunday", "StartHour": 2, "EndWeekDay": "sunday", "EndHour": 8 } ], "Name": "myEventWindowName", "AssociationTarget": { "InstanceIds": [], "Tags": [], "DedicatedHostIds": [ "h-0140d9a7ecbd102dd" ] }, "State": "active", "Tags": [] } ] }In the example output, the instance is on a Dedicated Host, which is associated with the event window.
For event window constraints, see Considerations in the Amazon EC2 User Guide.
-
For API details, see DescribeInstanceEventWindows
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-image-metadata.
- AWS CLI
-
Example 1: To describe the AMI metadata for all instances
The following
describe-instance-image-metadataexample describes the AMI metadata of all the instances in your AWS account in the specified Region.aws ec2 describe-instance-image-metadata \ --regionus-east-1Output:
{ "InstanceImageMetadata": [ { "InstanceId": "i-1234567890EXAMPLE", "InstanceType": "t2.micro", "LaunchTime": "2024-08-28T11:25:45+00:00", "AvailabilityZone": "us-east-1a", "State": { "Code": 16, "Name": "running" }, "OwnerId": "123412341234", "Tags": [ { "Key": "MyTagName", "Value": "my-tag-value" } ], "ImageMetadata": { "ImageId": "ami-0b752bf1df193a6c4", "Name": "al2023-ami-2023.5.20240819.0-kernel-6.1-x86_64", "OwnerId": "137112412989", "State": "available", "ImageOwnerAlias": "amazon", "CreationDate": "2023-01-25T17:20:40Z", "DeprecationTime": "2025-01-25T17:20:40Z", "IsPublic": true } } ], "NextToken": "...EXAMPLEwIAABAA2JHaFxLnEXAMPLE..." }For more information, see Amazon Machine Images in Amazon EC2 in the Amazon EC2 User Guide.
Example 2: To describe the AMI metadata for the specified instances
The following
describe-instance-image-metadataexample describes the AMI metadata for the specified instances.aws ec2 describe-instance-image-metadata \ --regionus-east-1\ --instance-idsi-1234567890EXAMPLEi-0987654321EXAMPLEOutput:
{ "InstanceImageMetadata": [ { "InstanceId": "i-1234567890EXAMPLE", "InstanceType": "t2.micro", "LaunchTime": "2024-08-28T11:25:45+00:00", "AvailabilityZone": "us-east-1a", "State": { "Code": 16, "Name": "running" }, "OwnerId": "123412341234", "Tags": [ { "Key": "MyTagName", "Value": "my-tag-value" } ], "ImageMetadata": { "ImageId": "ami-0b752bf1df193a6c4", "Name": "al2023-ami-2023.5.20240819.0-kernel-6.1-x86_64", "OwnerId": "137112412989", "State": "available", "ImageOwnerAlias": "amazon", "CreationDate": "2023-01-25T17:20:40Z", "DeprecationTime": "2025-01-25T17:20:40Z", "IsPublic": true } }, { "InstanceId": "i-0987654321EXAMPLE", "InstanceType": "t2.micro", "LaunchTime": "2024-08-28T11:25:45+00:00", "AvailabilityZone": "us-east-1a", "State": { "Code": 16, "Name": "running" }, "OwnerId": "123412341234", "Tags": [ { "Key": "MyTagName", "Value": "my-tag-value" } ], "ImageMetadata": { "ImageId": "ami-0b752bf1df193a6c4", "Name": "al2023-ami-2023.5.20240819.0-kernel-6.1-x86_64", "OwnerId": "137112412989", "State": "available", "ImageOwnerAlias": "amazon", "CreationDate": "2023-01-25T17:20:40Z", "DeprecationTime": "2025-01-25T17:20:40Z", "IsPublic": true } } ] }For more information, see Amazon Machine Images in Amazon EC2 in the Amazon EC2 User Guide.
Example 3: To describe the AMI metadata for instances based on filters
The following
describe-instance-image-metadataexample describes the AMI metadata fort2.nanoandt2.microinstances in theus-east-1aAvailability Zone.aws ec2 describe-instance-image-metadata \ --regionus-east-1\ --filtersName=availability-zone,Values=us-east-1aName=instance-type,Values=t2.nano,t2.microOutput:
{ "InstanceImageMetadata": [ { "InstanceId": "i-1234567890EXAMPLE", "InstanceType": "t2.micro", "LaunchTime": "2024-08-28T11:25:45+00:00", "AvailabilityZone": "us-east-1a", "State": { "Code": 16, "Name": "running" }, "OwnerId": "123412341234", "Tags": [ { "Key": "MyTagName", "Value": "my-tag-value" } ], "ImageMetadata": { "ImageId": "ami-0b752bf1df193a6c4", "Name": "al2023-ami-2023.5.20240819.0-kernel-6.1-x86_64", "OwnerId": "137112412989", "State": "available", "ImageOwnerAlias": "amazon", "CreationDate": "2023-01-25T17:20:40Z", "DeprecationTime": "2025-01-25T17:20:40Z", "IsPublic": true } }, { "InstanceId": "i-0987654321EXAMPLE", "InstanceType": "t2.micro", "LaunchTime": "2024-08-28T11:25:45+00:00", "AvailabilityZone": "us-east-1a", "State": { "Code": 16, "Name": "running" }, "OwnerId": "123412341234", "Tags": [ { "Key": "MyTagName", "Value": "my-tag-value" } ], "ImageMetadata": { "ImageId": "ami-0b752bf1df193a6c4", "Name": "al2023-ami-2023.5.20240819.0-kernel-6.1-x86_64", "OwnerId": "137112412989", "State": "available", "ImageOwnerAlias": "amazon", "CreationDate": "2023-01-25T17:20:40Z", "DeprecationTime": "2025-01-25T17:20:40Z", "IsPublic": true } } ], "NextToken": "...EXAMPLEV7ixRYHwIAABAA2JHaFxLnDAzpatfEXAMPLE..." }For more information, see Amazon Machine Images in Amazon EC2 in the Amazon EC2 User Guide.
-
For API details, see DescribeInstanceImageMetadata
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-status.
- AWS CLI
-
To describe the status of an instance
The following
describe-instance-statusexample describes the current status of the specified instance.aws ec2 describe-instance-status \ --instance-idsi-1234567890abcdef0Output:
{ "InstanceStatuses": [ { "InstanceId": "i-1234567890abcdef0", "InstanceState": { "Code": 16, "Name": "running" }, "AvailabilityZone": "us-east-1d", "SystemStatus": { "Status": "ok", "Details": [ { "Status": "passed", "Name": "reachability" } ] }, "InstanceStatus": { "Status": "ok", "Details": [ { "Status": "passed", "Name": "reachability" } ] } } ] }For more information, see Monitor the status of your instances in the Amazon EC2 User Guide.
-
For API details, see DescribeInstanceStatus
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-topology.
- AWS CLI
-
To describe the instance topology of all your instances
The following
describe-instance-topologyexample describes the topology of all your instances that match the supported instance types for this command.aws ec2 describe-instance-topology \ --regionus-west-2Output:
{ "Instances": [ { "InstanceId": "i-1111111111example", "InstanceType": "p4d.24xlarge", "GroupName": "my-ml-cpg", "NetworkNodes": [ "nn-1111111111example", "nn-2222222222example", "nn-3333333333example" ], "ZoneId": "usw2-az2", "AvailabilityZone": "us-west-2a" }, { "InstanceId": "i-2222222222example", "InstanceType": "p4d.24xlarge", "NetworkNodes": [ "nn-1111111111example", "nn-2222222222example", "nn-3333333333example" ], "ZoneId": "usw2-az2", "AvailabilityZone": "us-west-2a" }, { "InstanceId": "i-3333333333example", "InstanceType": "trn1.32xlarge", "NetworkNodes": [ "nn-1212121212example", "nn-1211122211example", "nn-1311133311example" ], "ZoneId": "usw2-az4", "AvailabilityZone": "us-west-2d" }, { "InstanceId": "i-444444444example", "InstanceType": "trn1.2xlarge", "NetworkNodes": [ "nn-1111111111example", "nn-5434334334example", "nn-1235301234example" ], "ZoneId": "usw2-az2", "AvailabilityZone": "us-west-2a" } ], "NextToken": "SomeEncryptedToken" }For more information, including more examples, see Amazon EC2 instance topology in the Amazon EC2 User Guide.
-
For API details, see DescribeInstanceTopology
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-type-offerings.
- AWS CLI
-
Example 1: To list the instance types offered in a Region
The following
describe-instance-type-offeringsexample lists the instance types offered in the Region configured as the default Region for the AWS CLI.aws ec2 describe-instance-type-offeringsTo list the instance types offered in a different Region, specify the Region using the
--regionparameter.aws ec2 describe-instance-type-offerings \ --regionus-east-2Output:
{ "InstanceTypeOfferings": [ { "InstanceType": "m5.2xlarge", "LocationType": "region", "Location": "us-east-2" }, { "InstanceType": "t3.micro", "LocationType": "region", "Location": "us-east-2" }, ... ] }Example 2: To list the instance types offered in an Availability Zone
The following
describe-instance-type-offeringsexample lists the instance types offered in the specified Availability Zone. The Availability Zone must be in the specified Region.aws ec2 describe-instance-type-offerings \ --location-typeavailability-zone\ --filtersName=location,Values=us-east-2a\ --regionus-east-2Example 3: To check whether an instance type is supported
The following
describe-instance-type-offeringscommand indicates whether thec5.xlargeinstance type is supported in the specified Region.aws ec2 describe-instance-type-offerings \ --filtersName=instance-type,Values=c5.xlarge\ --regionus-east-2The following
describe-instance-type-offeringsexample lists all C5 instance types that are supported in the specified Region.aws ec2 describe-instance-type-offerings \ --filtersName=instance-type,Values=c5*\ --query"InstanceTypeOfferings[].InstanceType"\ --regionus-east-2Output:
[ "c5d.12xlarge", "c5d.9xlarge", "c5n.xlarge", "c5.xlarge", "c5d.metal", "c5n.metal", "c5.large", "c5d.2xlarge", "c5n.4xlarge", "c5.2xlarge", "c5n.large", "c5n.9xlarge", "c5d.large", "c5.18xlarge", "c5d.18xlarge", "c5.12xlarge", "c5n.18xlarge", "c5.metal", "c5d.4xlarge", "c5.24xlarge", "c5d.xlarge", "c5n.2xlarge", "c5d.24xlarge", "c5.9xlarge", "c5.4xlarge" ]-
For API details, see DescribeInstanceTypeOfferings
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instance-types.
- AWS CLI
-
Example 1: To describe an instance type
The following
describe-instance-typesexample displays details for the specified instance type.aws ec2 describe-instance-types \ --instance-typest2.microOutput:
{ "InstanceTypes": [ { "InstanceType": "t2.micro", "CurrentGeneration": true, "FreeTierEligible": true, "SupportedUsageClasses": [ "on-demand", "spot" ], "SupportedRootDeviceTypes": [ "ebs" ], "BareMetal": false, "Hypervisor": "xen", "ProcessorInfo": { "SupportedArchitectures": [ "i386", "x86_64" ], "SustainedClockSpeedInGhz": 2.5 }, "VCpuInfo": { "DefaultVCpus": 1, "DefaultCores": 1, "DefaultThreadsPerCore": 1, "ValidCores": [ 1 ], "ValidThreadsPerCore": [ 1 ] }, "MemoryInfo": { "SizeInMiB": 1024 }, "InstanceStorageSupported": false, "EbsInfo": { "EbsOptimizedSupport": "unsupported", "EncryptionSupport": "supported" }, "NetworkInfo": { "NetworkPerformance": "Low to Moderate", "MaximumNetworkInterfaces": 2, "Ipv4AddressesPerInterface": 2, "Ipv6AddressesPerInterface": 2, "Ipv6Supported": true, "EnaSupport": "unsupported" }, "PlacementGroupInfo": { "SupportedStrategies": [ "partition", "spread" ] }, "HibernationSupported": false, "BurstablePerformanceSupported": true, "DedicatedHostsSupported": false, "AutoRecoverySupported": true } ] }For more information, see Instance Types in Amazon Elastic Compute Cloud User Guide for Linux Instances.
Example 2: To filter the available instance types
You can specify a filter to scope the results to instance types that have a specific characteristic. The following
describe-instance-typesexample lists the instance types that support hibernation.aws ec2 describe-instance-types \ --filtersName=hibernation-supported,Values=true--query 'InstanceTypes[*].InstanceType'Output:
[ "m5.8xlarge", "r3.large", "c3.8xlarge", "r5.large", "m4.4xlarge", "c4.large", "m5.xlarge", "m4.xlarge", "c3.large", "c4.8xlarge", "c4.4xlarge", "c5.xlarge", "c5.12xlarge", "r5.4xlarge", "c5.4xlarge" ]For more information, see Instance Types in Amazon Elastic Compute Cloud User Guide for Linux Instances.
-
For API details, see DescribeInstanceTypes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-instances.
- AWS CLI
-
Example 1: To describe an instance
The following
describe-instancesexample describes the specified instance.aws ec2 describe-instances \ --instance-idsi-1234567890abcdef0Output:
{ "Reservations": [ { "Groups": [], "Instances": [ { "AmiLaunchIndex": 0, "ImageId": "ami-0abcdef1234567890", "InstanceId": "i-1234567890abcdef0", "InstanceType": "t3.nano", "KeyName": "my-key-pair", "LaunchTime": "2022-11-15T10:48:59+00:00", "Monitoring": { "State": "disabled" }, "Placement": { "AvailabilityZone": "us-east-2a", "GroupName": "", "Tenancy": "default" }, "PrivateDnsName": "ip-10-0-0-157.us-east-2.compute.internal", "PrivateIpAddress": "10-0-0-157", "ProductCodes": [], "PublicDnsName": "ec2-34-253-223-13.us-east-2.compute.amazonaws.com", "PublicIpAddress": "34.253.223.13", "State": { "Code": 16, "Name": "running" }, "StateTransitionReason": "", "SubnetId": "subnet-04a636d18e83cfacb", "VpcId": "vpc-1234567890abcdef0", "Architecture": "x86_64", "BlockDeviceMappings": [ { "DeviceName": "/dev/xvda", "Ebs": { "AttachTime": "2022-11-15T10:49:00+00:00", "DeleteOnTermination": true, "Status": "attached", "VolumeId": "vol-02e6ccdca7de29cf2" } } ], "ClientToken": "1234abcd-1234-abcd-1234-d46a8903e9bc", "EbsOptimized": true, "EnaSupport": true, "Hypervisor": "xen", "IamInstanceProfile": { "Arn": "arn:aws:iam::111111111111:instance-profile/AmazonSSMRoleForInstancesQuickSetup", "Id": "111111111111111111111" }, "NetworkInterfaces": [ { "Association": { "IpOwnerId": "amazon", "PublicDnsName": "ec2-34-253-223-13.us-east-2.compute.amazonaws.com", "PublicIp": "34.253.223.13" }, "Attachment": { "AttachTime": "2022-11-15T10:48:59+00:00", "AttachmentId": "eni-attach-1234567890abcdefg", "DeleteOnTermination": true, "DeviceIndex": 0, "Status": "attached", "NetworkCardIndex": 0 }, "Description": "", "Groups": [ { "GroupName": "launch-wizard-146", "GroupId": "sg-1234567890abcdefg" } ], "Ipv6Addresses": [], "MacAddress": "00:11:22:33:44:55", "NetworkInterfaceId": "eni-1234567890abcdefg", "OwnerId": "104024344472", "PrivateDnsName": "ip-10-0-0-157.us-east-2.compute.internal", "PrivateIpAddress": "10-0-0-157", "PrivateIpAddresses": [ { "Association": { "IpOwnerId": "amazon", "PublicDnsName": "ec2-34-253-223-13.us-east-2.compute.amazonaws.com", "PublicIp": "34.253.223.13" }, "Primary": true, "PrivateDnsName": "ip-10-0-0-157.us-east-2.compute.internal", "PrivateIpAddress": "10-0-0-157" } ], "SourceDestCheck": true, "Status": "in-use", "SubnetId": "subnet-1234567890abcdefg", "VpcId": "vpc-1234567890abcdefg", "InterfaceType": "interface" } ], "RootDeviceName": "/dev/xvda", "RootDeviceType": "ebs", "SecurityGroups": [ { "GroupName": "launch-wizard-146", "GroupId": "sg-1234567890abcdefg" } ], "SourceDestCheck": true, "Tags": [ { "Key": "Name", "Value": "my-instance" } ], "VirtualizationType": "hvm", "CpuOptions": { "CoreCount": 1, "ThreadsPerCore": 2 }, "CapacityReservationSpecification": { "CapacityReservationPreference": "open" }, "HibernationOptions": { "Configured": false }, "MetadataOptions": { "State": "applied", "HttpTokens": "optional", "HttpPutResponseHopLimit": 1, "HttpEndpoint": "enabled", "HttpProtocolIpv6": "disabled", "InstanceMetadataTags": "enabled" }, "EnclaveOptions": { "Enabled": false }, "PlatformDetails": "Linux/UNIX", "UsageOperation": "RunInstances", "UsageOperationUpdateTime": "2022-11-15T10:48:59+00:00", "PrivateDnsNameOptions": { "HostnameType": "ip-name", "EnableResourceNameDnsARecord": true, "EnableResourceNameDnsAAAARecord": false }, "MaintenanceOptions": { "AutoRecovery": "default" } } ], "OwnerId": "111111111111", "ReservationId": "r-1234567890abcdefg" } ] }Example 2: To filter for instances with the specified type
The following
describe-instancesexample uses filters to scope the results to instances of the specified type.aws ec2 describe-instances \ --filtersName=instance-type,Values=m5.largeFor example output, see Example 1.
For more information, see List and filter using the CLI in the Amazon EC2 User Guide.
Example 3: To filter for instances with the specified type and Availability Zone
The following
describe-instancesexample uses multiple filters to scope the results to instances with the specified type that are also in the specified Availability Zone.aws ec2 describe-instances \ --filtersName=instance-type,Values=t2.micro,t3.microName=availability-zone,Values=us-east-2cFor example output, see Example 1.
Example 4: To filter for instances with the specified type and Availability Zone using a JSON file
The following
describe-instancesexample uses a JSON input file to perform the same filtering as the previous example. When filters get more complicated, they can be easier to specify in a JSON file.aws ec2 describe-instances \ --filtersfile://filters.jsonContents of
filters.json:[ { "Name": "instance-type", "Values": ["t2.micro", "t3.micro"] }, { "Name": "availability-zone", "Values": ["us-east-2c"] } ]For example output, see Example 1.
Example 5: To filter for instances with the specified Owner tag
The following
describe-instancesexample uses tag filters to scope the results to instances that have a tag with the specified tag key (Owner), regardless of the tag value.aws ec2 describe-instances \ --filters"Name=tag-key,Values=Owner"For example output, see Example 1.
Example 6: To filter for instances with the specified my-team tag value
The following
describe-instancesexample uses tag filters to scope the results to instances that have a tag with the specified tag value (my-team), regardless of the tag key.aws ec2 describe-instances \ --filters"Name=tag-value,Values=my-team"For example output, see Example 1.
Example 7: To filter for instances with the specified Owner tag and my-team value
The following
describe-instancesexample uses tag filters to scope the results to instances that have the specified tag (Owner=my-team).aws ec2 describe-instances \ --filters"Name=tag:Owner,Values=my-team"For example output, see Example 1.
Example 8: To display only instance and subnet IDs for all instances
The following
describe-instancesexamples use the--queryparameter to display only the instance and subnet IDs for all instances, in JSON format.Linux and macOS:
aws ec2 describe-instances \ --query 'Reservations[*].Instances[*].{Instance:InstanceId,Subnet:SubnetId}' \ --outputjsonWindows:
aws ec2 describe-instances^--query"Reservations[*].Instances[*].{Instance:InstanceId,Subnet:SubnetId}"^--outputjsonOutput:
[ { "Instance": "i-057750d42936e468a", "Subnet": "subnet-069beee9b12030077" }, { "Instance": "i-001efd250faaa6ffa", "Subnet": "subnet-0b715c6b7db68927a" }, { "Instance": "i-027552a73f021f3bd", "Subnet": "subnet-0250c25a1f4e15235" } ... ]Example 9: To filter instances of the specified type and only display their instance IDs
The following
describe-instancesexample uses filters to scope the results to instances of the specified type and the--queryparameter to display only the instance IDs.aws ec2 describe-instances \ --filters"Name=instance-type,Values=t2.micro"\ --query"Reservations[*].Instances[*].[InstanceId]"\ --outputtextOutput:
i-031c0dc19de2fb70c i-00d8bff789a736b75 i-0b715c6b7db68927a i-0626d4edd54f1286d i-00b8ae04f9f99908e i-0fc71c25d2374130cExample 10: To filter instances of the specified type and only display their instance IDs, Availability Zone, and the specified tag value
The following
describe-instancesexamples display the instance ID, Availability Zone, and the value of theNametag for instances that have a tag with the nametag-key, in table format.Linux and macOS:
aws ec2 describe-instances \ --filtersName=tag-key,Values=Name\ --query 'Reservations[*].Instances[*].{Instance:InstanceId,AZ:Placement.AvailabilityZone,Name:Tags[?Key==`Name`]|[0].Value}' \ --outputtableWindows:
aws ec2 describe-instances^--filtersName=tag-key,Values=Name^--query"Reservations[*].Instances[*].{Instance:InstanceId,AZ:Placement.AvailabilityZone,Name:Tags[?Key=='Name']|[0].Value}"^--outputtableOutput:
------------------------------------------------------------- | DescribeInstances | +--------------+-----------------------+--------------------+ | AZ | Instance | Name | +--------------+-----------------------+--------------------+ | us-east-2b | i-057750d42936e468a | my-prod-server | | us-east-2a | i-001efd250faaa6ffa | test-server-1 | | us-east-2a | i-027552a73f021f3bd | test-server-2 | +--------------+-----------------------+--------------------+Example 11: To describe instances in a partition placement group
The following
describe-instancesexample describes the specified instance. The output includes the placement information for the instance, which contains the placement group name and the partition number for the instance.aws ec2 describe-instances \ --instance-idsi-0123a456700123456\ --query"Reservations[*].Instances[*].Placement"Output:
[ [ { "AvailabilityZone": "us-east-1c", "GroupName": "HDFS-Group-A", "PartitionNumber": 3, "Tenancy": "default" } ] ]For more information, see Describing instances in a placement group in the Amazon EC2 User Guide.
Example 12: To filter to instances with the specified placement group and partition number
The following
describe-instancesexample filters the results to only those instances with the specified placement group and partition number.aws ec2 describe-instances \ --filters"Name=placement-group-name,Values=HDFS-Group-A""Name=placement-partition-number,Values=7"The following shows only the relevant information from the output.
"Instances": [ { "InstanceId": "i-0123a456700123456", "InstanceType": "r4.large", "Placement": { "AvailabilityZone": "us-east-1c", "GroupName": "HDFS-Group-A", "PartitionNumber": 7, "Tenancy": "default" } }, { "InstanceId": "i-9876a543210987654", "InstanceType": "r4.large", "Placement": { "AvailabilityZone": "us-east-1c", "GroupName": "HDFS-Group-A", "PartitionNumber": 7, "Tenancy": "default" } ],For more information, see Describing instances in a placement group in the Amazon EC2 User Guide.
Example 13: To filter to instances that are configured to allow access to tags from instance metadata
The following
describe-instancesexample filters the results to only those instances that are configured to allow access to instance tags from instance metadata.aws ec2 describe-instances \ --filters"Name=metadata-options.instance-metadata-tags,Values=enabled"\ --query"Reservations[*].Instances[*].InstanceId"\ --outputtextThe following shows the expected output.
i-1234567890abcdefg i-abcdefg1234567890 i-11111111aaaaaaaaa i-aaaaaaaa111111111For more information, see Work with instance tags in instance metadata in the Amazon EC2 User Guide.
-
For API details, see DescribeInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-internet-gateways.
- AWS CLI
-
To describe an internet gateway
The following
describe-internet-gatewaysexample describes the specified internet gateway.aws ec2 describe-internet-gateways \ --internet-gateway-idsigw-0d0fb496b3EXAMPLEOutput:
{ "InternetGateways": [ { "Attachments": [ { "State": "available", "VpcId": "vpc-0a60eb65b4EXAMPLE" } ], "InternetGatewayId": "igw-0d0fb496b3EXAMPLE", "OwnerId": "123456789012", "Tags": [ { "Key": "Name", "Value": "my-igw" } ] } ] }For more information, see Internet gateways in the Amazon VPC User Guide.
-
For API details, see DescribeInternetGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-ipam-pools.
- AWS CLI
-
To view the details for an IPAM pool
The following
describe-ipam-poolsexample shows the details for pools.(Linux):
aws ec2 describe-ipam-pools \ --filtersName=owner-id,Values=123456789012Name=ipam-scope-id,Values=ipam-scope-02fc38cd4c48e7d38(Windows):
aws ec2 describe-ipam-pools^--filtersName=owner-id,Values=123456789012Name=ipam-scope-id,Values=ipam-scope-02fc38cd4c48e7d38Output:
{ "IpamPools": [ { "OwnerId": "123456789012", "IpamPoolId": "ipam-pool-02ec043a19bbe5d08", "IpamPoolArn": "arn:aws:ec2::123456789012:ipam-pool/ipam-pool-02ec043a19bbe5d08", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-02fc38cd4c48e7d38", "IpamScopeType": "private", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "Locale": "None", "PoolDepth": 1, "State": "create-complete", "AutoImport": true, "AddressFamily": "ipv4", "AllocationMinNetmaskLength": 16, "AllocationMaxNetmaskLength": 26, "AllocationDefaultNetmaskLength": 24, "AllocationResourceTags": [ { "Key": "Environment", "Value": "Preprod" } ], "Tags": [ { "Key": "Name", "Value": "Preprod pool" } ] } ] }-
For API details, see DescribeIpamPools
in AWS CLI Command Reference.
-
The following code example shows how to use describe-ipam-resource-discoveries.
- AWS CLI
-
Example 1: View complete details of resource discoveries
In this example, you're a delegated IPAM admin who wants to create and share a resource discovery with the IPAM admin in another AWS Organization so that the admin can manage and monitor the IP addresses of resources in your organization.
This example may be useful if:
You tried to create a resource discovery, but you got an error that you've reached your limit of 1. You realize that you may have already created a resource discovery and you want to view it in your account.You have resources in a Region that are not being discovered by the IPAM. You want to view the
--operating-regionsdefined for the resource and ensure that you've added the right Region as an operating Region so that the resources there can be discovered.The following
describe-ipam-resource-discoveriesexample lists the details of the resource discovery in your AWS account. You can have one resource discovery per AWS Region.aws ec2 describe-ipam-resource-discoveries \ --regionus-east-1Output:
{ "IpamResourceDiscoveries": [ { "OwnerId": "149977607591", "IpamResourceDiscoveryId": "ipam-res-disco-0f8bdee9067137c0d", "IpamResourceDiscoveryArn": "arn:aws:ec2::149977607591:ipam-resource-discovery/ipam-res-disco-0f8bdee9067137c0d", "IpamResourceDiscoveryRegion": "us-east-1", "OperatingRegions": [ { "RegionName": "us-east-1" } ], "IsDefault": false, "State": "create-complete", "Tags": [] } ] }For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
Example 2: View only resource discovery IDs
The following
describe-ipam-resource-discoveriesexample lists the ID of the resource discovery in your AWS account. You can have one resource discovery per AWS Region.aws ec2 describe-ipam-resource-discoveries \ --query"IpamResourceDiscoveries[*].IpamResourceDiscoveryId"\ --outputtextOutput:
ipam-res-disco-0481e39b242860333For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
-
For API details, see DescribeIpamResourceDiscoveries
in AWS CLI Command Reference.
-
The following code example shows how to use describe-ipam-resource-discovery-associations.
- AWS CLI
-
To view all resource discovery associations with your IPAM
In this example, you're a IPAM delegated admin who has associated resource discoveries with your IPAM to integrate other accounts with your IPAM. You've noticed that your IPAM is not discovering the resources in the operating Regions of the resource discovery as expected. You want to check the status and state of the resource discovery to ensure that the account that created it is still active and the resource discovery is still being shared.
The
--regionmust be the home Region of your IPAM.The following
describe-ipam-resource-discovery-associationsexample lists the resource discovery associations in your AWS account.aws ec2 describe-ipam-resource-discovery-associations \ --regionus-east-1Output:
{ "IpamResourceDiscoveryAssociations": [ { "OwnerId": "320805250157", "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-05e6b45eca5bf5cf7", "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::320805250157:ipam-resource-discovery-association/ipam-res-disco-assoc-05e6b45eca5bf5cf7", "IpamResourceDiscoveryId": "ipam-res-disco-0f4ef577a9f37a162", "IpamId": "ipam-005f921c17ebd5107", "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107", "IpamRegion": "us-east-1", "IsDefault": true, "ResourceDiscoveryStatus": "active", "State": "associate-complete", "Tags": [] }, { "OwnerId": "149977607591", "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-0dfd21ae189ab5f62", "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::149977607591:ipam-resource-discovery-association/ipam-res-disco-assoc-0dfd21ae189ab5f62", "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "IpamId": "ipam-005f921c17ebd5107", "IpamArn": "arn:aws:ec2::149977607591:ipam/ipam-005f921c17ebd5107", "IpamRegion": "us-east-1", "IsDefault": false, "ResourceDiscoveryStatus": "active", "State": "create-complete", "Tags": [] } ] }In this example, after running this command, you notice that you have one non-default resource discovery (
"IsDefault": false ``) that is ``"ResourceDiscoveryStatus": "not-found"and"State": "create-complete". The resource discovery owner's account has been closed. If, in another case, you notice that is"ResourceDiscoveryStatus": "not-found"and"State": "associate-complete", this indicates that one of the following has happened:The resource discovery was deleted by the resource discovery owner.The resource discovery owner unshared the resource discovery.
For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
-
For API details, see DescribeIpamResourceDiscoveryAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-ipam-scopes.
- AWS CLI
-
To view the details for an IPAM scope
The following
describe-ipam-scopesexample shows the details for scopes.aws ec2 describe-ipam-scopes \ --filtersName=owner-id,Values=123456789012Name=ipam-id,Values=ipam-08440e7a3acde3908Output:
{ "IpamScopes": [ { "OwnerId": "123456789012", "IpamScopeId": "ipam-scope-02fc38cd4c48e7d38", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-02fc38cd4c48e7d38", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "IpamScopeType": "private", "IsDefault": true, "PoolCount": 2, "State": "create-complete", "Tags": [] }, { "OwnerId": "123456789012", "IpamScopeId": "ipam-scope-0b9eed026396dbc16", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-0b9eed026396dbc16", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "IpamScopeType": "public", "IsDefault": true, "PoolCount": 0, "State": "create-complete", "Tags": [] }, { "OwnerId": "123456789012", "IpamScopeId": "ipam-scope-0f1aff29486355c22", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-0f1aff29486355c22", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "IpamScopeType": "private", "IsDefault": false, "Description": "Example description", "PoolCount": 0, "State": "create-complete", "Tags": [ { "Key": "Name", "Value": "Example name value" } ] } ] }-
For API details, see DescribeIpamScopes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-ipams.
- AWS CLI
-
To view the details for an IPAM
The following
describe-ipamsexample shows the details of an IPAM.aws ec2 describe-ipams \ --filtersName=owner-id,Values=123456789012Output:
{ "Ipams": [ { "OwnerId": "123456789012", "IpamId": "ipam-08440e7a3acde3908", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "PublicDefaultScopeId": "ipam-scope-0b9eed026396dbc16", "PrivateDefaultScopeId": "ipam-scope-02fc38cd4c48e7d38", "ScopeCount": 3, "OperatingRegions": [ { "RegionName": "us-east-1" }, { "RegionName": "us-east-2" }, { "RegionName": "us-west-1" } ], "State": "create-complete", "Tags": [ { "Key": "Name", "Value": "ExampleIPAM" } ] } ] }-
For API details, see DescribeIpams
in AWS CLI Command Reference.
-
The following code example shows how to use describe-ipv6-pools.
- AWS CLI
-
To describe your IPv6 address pools
The following
describe-ipv6-poolsexample displays details for all of your IPv6 address pools.aws ec2 describe-ipv6-poolsOutput:
{ "Ipv6Pools": [ { "PoolId": "ipv6pool-ec2-012345abc12345abc", "PoolCidrBlocks": [ { "Cidr": "2001:db8:123::/48" } ], "Tags": [ { "Key": "pool-1", "Value": "public" } ] } ] }-
For API details, see DescribeIpv6Pools
in AWS CLI Command Reference.
-
The following code example shows how to use describe-key-pairs.
- AWS CLI
-
To display a key pair
The following
describe-key-pairsexample displays information about the specified key pair.aws ec2 describe-key-pairs \ --key-namesmy-key-pairOutput:
{ "KeyPairs": [ { "KeyPairId": "key-0b94643da6EXAMPLE", "KeyFingerprint": "1f:51:ae:28:bf:89:e9:d8:1f:25:5d:37:2d:7d:b8:ca:9f:f5:f1:6f", "KeyName": "my-key-pair", "KeyType": "rsa", "Tags": [], "CreateTime": "2022-05-27T21:51:16.000Z" } ] }For more information, see Describe public keys in the Amazon EC2 User Guide.
-
For API details, see DescribeKeyPairs
in AWS CLI Command Reference.
-
The following code example shows how to use describe-launch-template-versions.
- AWS CLI
-
To describe launch template versions
This example describes the versions of the specified launch template.
Command:
aws ec2 describe-launch-template-versions --launch-template-idlt-068f72b72934aff71Output:
{ "LaunchTemplateVersions": [ { "LaunchTemplateId": "lt-068f72b72934aff71", "LaunchTemplateName": "Webservers", "VersionNumber": 3, "CreatedBy": "arn:aws:iam::123456789102:root", "LaunchTemplateData": { "KeyName": "kp-us-east", "ImageId": "ami-6057e21a", "InstanceType": "t2.small", "NetworkInterfaces": [ { "SubnetId": "subnet-7b16de0c", "DeviceIndex": 0, "Groups": [ "sg-7c227019" ] } ] }, "DefaultVersion": false, "CreateTime": "2017-11-20T13:19:54.000Z" }, { "LaunchTemplateId": "lt-068f72b72934aff71", "LaunchTemplateName": "Webservers", "VersionNumber": 2, "CreatedBy": "arn:aws:iam::123456789102:root", "LaunchTemplateData": { "KeyName": "kp-us-east", "ImageId": "ami-6057e21a", "InstanceType": "t2.medium", "NetworkInterfaces": [ { "SubnetId": "subnet-1a2b3c4d", "DeviceIndex": 0, "Groups": [ "sg-7c227019" ] } ] }, "DefaultVersion": false, "CreateTime": "2017-11-20T13:12:32.000Z" }, { "LaunchTemplateId": "lt-068f72b72934aff71", "LaunchTemplateName": "Webservers", "VersionNumber": 1, "CreatedBy": "arn:aws:iam::123456789102:root", "LaunchTemplateData": { "UserData": "", "KeyName": "kp-us-east", "ImageId": "ami-aabbcc11", "InstanceType": "t2.medium", "NetworkInterfaces": [ { "SubnetId": "subnet-7b16de0c", "DeviceIndex": 0, "DeleteOnTermination": false, "Groups": [ "sg-7c227019" ], "AssociatePublicIpAddress": true } ] }, "DefaultVersion": true, "CreateTime": "2017-11-20T12:52:33.000Z" } ] }-
For API details, see DescribeLaunchTemplateVersions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-launch-templates.
- AWS CLI
-
To describe launch templates
This example describes your launch templates.
Command:
aws ec2 describe-launch-templatesOutput:
{ "LaunchTemplates": [ { "LatestVersionNumber": 2, "LaunchTemplateId": "lt-0e06d290751193123", "LaunchTemplateName": "TemplateForWebServer", "DefaultVersionNumber": 2, "CreatedBy": "arn:aws:iam::123456789012:root", "CreateTime": "2017-11-27T09:30:23.000Z" }, { "LatestVersionNumber": 6, "LaunchTemplateId": "lt-0c45b5e061ec98456", "LaunchTemplateName": "DBServersTemplate", "DefaultVersionNumber": 1, "CreatedBy": "arn:aws:iam::123456789012:root", "CreateTime": "2017-11-20T09:25:22.000Z" }, { "LatestVersionNumber": 1, "LaunchTemplateId": "lt-0d47d774e8e52dabc", "LaunchTemplateName": "MyLaunchTemplate2", "DefaultVersionNumber": 1, "CreatedBy": "arn:aws:iam::123456789012:root", "CreateTime": "2017-11-02T12:06:21.000Z" }, { "LatestVersionNumber": 3, "LaunchTemplateId": "lt-01e5f948eb4f589d6", "LaunchTemplateName": "testingtemplate2", "DefaultVersionNumber": 1, "CreatedBy": "arn:aws:sts::123456789012:assumed-role/AdminRole/i-03ee35176e2e5aabc", "CreateTime": "2017-12-01T08:19:48.000Z" }, ] }-
For API details, see DescribeLaunchTemplates
in AWS CLI Command Reference.
-
The following code example shows how to use describe-local-gateway-route-table-virtual-interface-group-associations.
- AWS CLI
-
To describe associations between virtual interface groups and local gateway route tables
The following
describe-local-gateway-route-table-virtual-interface-group-associationsexample describes the associations between virtual interface groups and local gateway route tables in your AWS account.aws ec2 describe-local-gateway-route-table-virtual-interface-group-associationsOutput:
{ "LocalGatewayRouteTableVirtualInterfaceGroupAssociations": [ { "LocalGatewayRouteTableVirtualInterfaceGroupAssociationId": "lgw-vif-grp-assoc-07145b276bEXAMPLE", "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-07145b276bEXAMPLE", "LocalGatewayId": "lgw-0ab1c23d4eEXAMPLE", "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE", "LocalGatewayRouteTableArn": "arn:aws:ec2:us-west-2:123456789012:local-gateway-route-table/lgw-rtb-059615ef7dEXAMPLE", "OwnerId": "123456789012", "State": "associated", "Tags": [] } ] }For more information, see Working with local gateways in the AWS Outposts User Guide.
-
For API details, see DescribeLocalGatewayRouteTableVirtualInterfaceGroupAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-local-gateway-route-table-vpc-associations.
- AWS CLI
-
To describe the associations between VPCs and local gateway route tables
The following
describe-local-gateway-route-table-vpc-associationsexample displays information about the specified association between VPCs and local gateway route tables.aws ec2 describe-local-gateway-route-table-vpc-associations \ --local-gateway-route-table-vpc-association-idslgw-vpc-assoc-0e0f27af15EXAMPLEOutput:
{ "LocalGatewayRouteTableVpcAssociation": { "LocalGatewayRouteTableVpcAssociationId": "lgw-vpc-assoc-0e0f27af1EXAMPLE", "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE", "LocalGatewayId": "lgw-09b493aa7cEXAMPLE", "VpcId": "vpc-0efe9bde08EXAMPLE", "State": "associated" } }For more information, see Local gateway route tables in the Outposts User Guide.
-
For API details, see DescribeLocalGatewayRouteTableVpcAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-local-gateway-route-tables.
- AWS CLI
-
To describe your Local Gateway Route Tables
The following
describe-local-gateway-route-tablesexample displays details about the local gateway route tables.aws ec2 describe-local-gateway-route-tablesOutput:
{ "LocalGatewayRouteTables": [ { "LocalGatewayRouteTableId": "lgw-rtb-059615ef7deEXAMPLE", "LocalGatewayId": "lgw-09b493aa7cEXAMPLE", "OutpostArn": "arn:aws:outposts:us-west-2:111122223333:outpost/op-0dc11b66edEXAMPLE", "State": "available" } ] }-
For API details, see DescribeLocalGatewayRouteTables
in AWS CLI Command Reference.
-
The following code example shows how to use describe-local-gateway-virtual-interface-groups.
- AWS CLI
-
To describe local gateway virtual interface groups
The following
describe-local-gateway-virtual-interface-groupsexample describes the local gateway virtual interface groups in your AWS account.aws ec2 describe-local-gateway-virtual-interface-groupsOutput:
{ "LocalGatewayVirtualInterfaceGroups": [ { "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-07145b276bEXAMPLE", "LocalGatewayVirtualInterfaceIds": [ "lgw-vif-01a23bc4d5EXAMPLE", "lgw-vif-543ab21012EXAMPLE" ], "LocalGatewayId": "lgw-0ab1c23d4eEXAMPLE", "OwnerId": "123456789012", "Tags": [] } ] }For more information, see Working with local gateways in the AWS Outposts User Guide.
-
For API details, see DescribeLocalGatewayVirtualInterfaceGroups
in AWS CLI Command Reference.
-
The following code example shows how to use describe-local-gateway-virtual-interfaces.
- AWS CLI
-
To describe local gateway virtual interfaces
The following
describe-local-gateway-virtual-interfacesexample describes the local gateway virtual interfaces in your AWS account.aws ec2 describe-local-gateway-virtual-interfacesOutput:
{ "LocalGatewayVirtualInterfaces": [ { "LocalGatewayVirtualInterfaceId": "lgw-vif-01a23bc4d5EXAMPLE", "LocalGatewayId": "lgw-0ab1c23d4eEXAMPLE", "Vlan": 2410, "LocalAddress": "0.0.0.0/0", "PeerAddress": "0.0.0.0/0", "LocalBgpAsn": 65010, "PeerBgpAsn": 65000, "OwnerId": "123456789012", "Tags": [] }, { "LocalGatewayVirtualInterfaceId": "lgw-vif-543ab21012EXAMPLE", "LocalGatewayId": "lgw-0ab1c23d4eEXAMPLE", "Vlan": 2410, "LocalAddress": "0.0.0.0/0", "PeerAddress": "0.0.0.0/0", "LocalBgpAsn": 65010, "PeerBgpAsn": 65000, "OwnerId": "123456789012", "Tags": [] } ] }For more information, see Working with local gateways in the AWS Outposts User Guide.
-
For API details, see DescribeLocalGatewayVirtualInterfaces
in AWS CLI Command Reference.
-
The following code example shows how to use describe-local-gateways.
- AWS CLI
-
To describe your Local Gateways
The following
describe-local-gatewaysexample displays details for the local gateways that are available to you.aws ec2 describe-local-gatewaysOutput:
{ "LocalGateways": [ { "LocalGatewayId": "lgw-09b493aa7cEXAMPLE", "OutpostArn": "arn:aws:outposts:us-west-2:123456789012:outpost/op-0dc11b66ed59f995a", "OwnerId": "123456789012", "State": "available" } ] }-
For API details, see DescribeLocalGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-locked-snapshots.
- AWS CLI
-
To describe the lock status of a snapshot
The following
describe-locked-snapshotsexample describes the lock status of the specified snapshot.aws ec2 describe-locked-snapshots \ --snapshot-idssnap-0b5e733b4a8df6e0dOutput:
{ "Snapshots": [ { "OwnerId": "123456789012", "SnapshotId": "snap-0b5e733b4a8df6e0d", "LockState": "governance", "LockDuration": 365, "LockCreatedOn": "2024-05-05T00:56:06.208000+00:00", "LockDurationStartTime": "2024-05-05T00:56:06.208000+00:00", "LockExpiresOn": "2025-05-05T00:56:06.208000+00:00" } ] }For more information, see Snapshot lock in the Amazon EBS User Guide.
-
For API details, see DescribeLockedSnapshots
in AWS CLI Command Reference.
-
The following code example shows how to use describe-managed-prefix-lists.
- AWS CLI
-
To describe managed prefix lists
The following
describe-managed-prefix-listsexample describes the prefix lists owned by AWS account123456789012.aws ec2 describe-managed-prefix-lists \ --filtersName=owner-id,Values=123456789012Output:
{ "PrefixLists": [ { "PrefixListId": "pl-11223344556677aab", "AddressFamily": "IPv6", "State": "create-complete", "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-11223344556677aab", "PrefixListName": "vpc-ipv6-cidrs", "MaxEntries": 25, "Version": 1, "Tags": [], "OwnerId": "123456789012" }, { "PrefixListId": "pl-0123456abcabcabc1", "AddressFamily": "IPv4", "State": "active", "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-0123456abcabcabc1", "PrefixListName": "vpc-cidrs", "MaxEntries": 10, "Version": 1, "Tags": [], "OwnerId": "123456789012" } ] }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see DescribeManagedPrefixLists
in AWS CLI Command Reference.
-
The following code example shows how to use describe-moving-addresses.
- AWS CLI
-
To describe your moving addresses
This example describes all of your moving Elastic IP addresses.
Command:
aws ec2 describe-moving-addressesOutput:
{ "MovingAddressStatuses": [ { "PublicIp": "198.51.100.0", "MoveStatus": "MovingToVpc" } ] }This example describes all addresses that are moving to the EC2-VPC platform.
Command:
aws ec2 describe-moving-addresses --filtersName=moving-status,Values=MovingToVpc-
For API details, see DescribeMovingAddresses
in AWS CLI Command Reference.
-
The following code example shows how to use describe-nat-gateways.
- AWS CLI
-
Example 1: To describe a public NAT gateway
The following
describe-nat-gatewaysexample describes the specified public NAT gateway.aws ec2 describe-nat-gateways \ --nat-gateway-idnat-01234567890abcdefOutput:
{ "NatGateways": [ { "CreateTime": "2023-08-25T01:56:51.000Z", "NatGatewayAddresses": [ { "AllocationId": "eipalloc-0790180cd2EXAMPLE", "NetworkInterfaceId": "eni-09cc4b2558794f7f9", "PrivateIp": "10.0.0.211", "PublicIp": "54.85.121.213", "AssociationId": "eipassoc-04d295cc9b8815b24", "IsPrimary": true, "Status": "succeeded" }, { "AllocationId": "eipalloc-0be6ecac95EXAMPLE", "NetworkInterfaceId": "eni-09cc4b2558794f7f9", "PrivateIp": "10.0.0.74", "PublicIp": "3.211.231.218", "AssociationId": "eipassoc-0f96bdca17EXAMPLE", "IsPrimary": false, "Status": "succeeded" } ], "NatGatewayId": "nat-01234567890abcdef", "State": "available", "SubnetId": "subnet-655eab5f08EXAMPLE", "VpcId": "vpc-098eb5ef58EXAMPLE", "Tags": [ { "Key": "Name", "Value": "public-nat" } ], "ConnectivityType": "public" } ] }Example 2: To describe a private NAT gateway
The following
describe-nat-gatewaysexample describes the specified private NAT gateway.aws ec2 describe-nat-gateways \ --nat-gateway-idnat-1234567890abcdef0Output:
{ "NatGateways": [ { "CreateTime": "2023-08-25T00:50:05.000Z", "NatGatewayAddresses": [ { "NetworkInterfaceId": "eni-0065a61b324d1897a", "PrivateIp": "10.0.20.240", "IsPrimary": true, "Status": "succeeded" }, { "NetworkInterfaceId": "eni-0065a61b324d1897a", "PrivateIp": "10.0.20.33", "IsPrimary": false, "Status": "succeeded" }, { "NetworkInterfaceId": "eni-0065a61b324d1897a", "PrivateIp": "10.0.20.197", "IsPrimary": false, "Status": "succeeded" } ], "NatGatewayId": "nat-1234567890abcdef0", "State": "available", "SubnetId": "subnet-08fc749671EXAMPLE", "VpcId": "vpc-098eb5ef58EXAMPLE", "Tags": [ { "Key": "Name", "Value": "private-nat" } ], "ConnectivityType": "private" } ] }For more information, see NAT gateways in the Amazon VPC User Guide.
-
For API details, see DescribeNatGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-acls.
- AWS CLI
-
To describe your network ACLs
The following
describe-network-aclsexample retrieves details about your network ACLs.aws ec2 describe-network-aclsOutput:
{ "NetworkAcls": [ { "Associations": [ { "NetworkAclAssociationId": "aclassoc-0c1679dc41EXAMPLE", "NetworkAclId": "acl-0ea1f54ca7EXAMPLE", "SubnetId": "subnet-0931fc2fa5EXAMPLE" } ], "Entries": [ { "CidrBlock": "0.0.0.0/0", "Egress": true, "Protocol": "-1", "RuleAction": "allow", "RuleNumber": 100 }, { "CidrBlock": "0.0.0.0/0", "Egress": true, "Protocol": "-1", "RuleAction": "deny", "RuleNumber": 32767 }, { "CidrBlock": "0.0.0.0/0", "Egress": false, "Protocol": "-1", "RuleAction": "allow", "RuleNumber": 100 }, { "CidrBlock": "0.0.0.0/0", "Egress": false, "Protocol": "-1", "RuleAction": "deny", "RuleNumber": 32767 } ], "IsDefault": true, "NetworkAclId": "acl-0ea1f54ca7EXAMPLE", "Tags": [], "VpcId": "vpc-06e4ab6c6cEXAMPLE", "OwnerId": "111122223333" }, { "Associations": [], "Entries": [ { "CidrBlock": "0.0.0.0/0", "Egress": true, "Protocol": "-1", "RuleAction": "allow", "RuleNumber": 100 }, { "Egress": true, "Ipv6CidrBlock": "::/0", "Protocol": "-1", "RuleAction": "allow", "RuleNumber": 101 }, { "CidrBlock": "0.0.0.0/0", "Egress": true, "Protocol": "-1", "RuleAction": "deny", "RuleNumber": 32767 }, { "Egress": true, "Ipv6CidrBlock": "::/0", "Protocol": "-1", "RuleAction": "deny", "RuleNumber": 32768 }, { "CidrBlock": "0.0.0.0/0", "Egress": false, "Protocol": "-1", "RuleAction": "allow", "RuleNumber": 100 }, { "Egress": false, "Ipv6CidrBlock": "::/0", "Protocol": "-1", "RuleAction": "allow", "RuleNumber": 101 }, { "CidrBlock": "0.0.0.0/0", "Egress": false, "Protocol": "-1", "RuleAction": "deny", "RuleNumber": 32767 }, { "Egress": false, "Ipv6CidrBlock": "::/0", "Protocol": "-1", "RuleAction": "deny", "RuleNumber": 32768 } ], "IsDefault": true, "NetworkAclId": "acl-0e2a78e4e2EXAMPLE", "Tags": [], "VpcId": "vpc-03914afb3eEXAMPLE", "OwnerId": "111122223333" } ] }For more information, see Network ACLs in the AWS VPC User Guide.
-
For API details, see DescribeNetworkAcls
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-insights-access-scope-analyses.
- AWS CLI
-
To describe Network Insights access scope analyses
The following
describe-network-insights-access-scope-analysesexample describes the access scope analysis in your AWS account.aws ec2 describe-network-insights-access-scope-analyses \ --regionus-east-1Output:
{ "NetworkInsightsAccessScopeAnalyses": [ { "NetworkInsightsAccessScopeAnalysisId": "nisa-123456789111", "NetworkInsightsAccessScopeAnalysisArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-access-scope-analysis/nisa-123456789111", "NetworkInsightsAccessScopeId": "nis-123456789222", "Status": "succeeded", "StartDate": "2022-01-25T19:45:36.842000+00:00", "FindingsFound": "true", "Tags": [] } ] }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see DescribeNetworkInsightsAccessScopeAnalyses
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-insights-access-scopes.
- AWS CLI
-
To describe Network Insights access scopes
The following
describe-network-insights-access-scopesexample describes the access-scope analyses in your AWS account.aws ec2 describe-network-insights-access-scopes \ --regionus-east-1Output:
{ "NetworkInsightsAccessScopes": [ { "NetworkInsightsAccessScopeId": "nis-123456789111", "NetworkInsightsAccessScopeArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-access-scope/nis-123456789111", "CreatedDate": "2021-11-29T21:12:41.416000+00:00", "UpdatedDate": "2021-11-29T21:12:41.416000+00:00", "Tags": [] } ] }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see DescribeNetworkInsightsAccessScopes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-insights-analyses.
- AWS CLI
-
To view the results of a path analysis
The following
describe-network-insights-analysesexample describes the specified analysis. In this example, the source is an internet gateway, the destination is an EC2 instance, and the protocol is TCP. The analysis succeeded (Statusissucceeded) and the path is not reachable (NetworkPathFoundisfalse). The explanation codeENI_SG_RULES_MISMATCHindicates that the security group for the instance does not contain a rule that allows traffic on the destination port.aws ec2 describe-network-insights-analyses \ --network-insights-analysis-idsnia-02207aa13eb480c7aOutput:
{ "NetworkInsightsAnalyses": [ { "NetworkInsightsAnalysisId": "nia-02207aa13eb480c7a", "NetworkInsightsAnalysisArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-analysis/nia-02207aa13eb480c7a", "NetworkInsightsPathId": "nip-0b26f224f1d131fa8", "StartDate": "2021-01-20T22:58:37.495Z", "Status": "succeeded", "NetworkPathFound": false, "Explanations": [ { "Direction": "ingress", "ExplanationCode": "ENI_SG_RULES_MISMATCH", "NetworkInterface": { "Id": "eni-0a25edef15a6cc08c", "Arn": "arn:aws:ec2:us-east-1:123456789012:network-interface/eni-0a25edef15a6cc08c" }, "SecurityGroups": [ { "Id": "sg-02f0d35a850ba727f", "Arn": "arn:aws:ec2:us-east-1:123456789012:security-group/sg-02f0d35a850ba727f" } ], "Subnet": { "Id": "subnet-004ff41eccb4d1194", "Arn": "arn:aws:ec2:us-east-1:123456789012:subnet/subnet-004ff41eccb4d1194" }, "Vpc": { "Id": "vpc-f1663d98ad28331c7", "Arn": "arn:aws:ec2:us-east-1:123456789012:vpc/vpc-f1663d98ad28331c7" } } ], "Tags": [] } ] }For more information, see Getting started using the AWS CLI in the Reachability Analyzer Guide.
-
For API details, see DescribeNetworkInsightsAnalyses
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-insights-paths.
- AWS CLI
-
To describe a path
The following
describe-network-insights-pathsexample describes the specified path.aws ec2 describe-network-insights-paths \ --network-insights-path-idsnip-0b26f224f1d131fa8Output:
{ "NetworkInsightsPaths": [ { "NetworkInsightsPathId": "nip-0b26f224f1d131fa8", "NetworkInsightsPathArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-path/nip-0b26f224f1d131fa8", "CreatedDate": "2021-01-20T22:43:46.933Z", "Source": "igw-0797cccdc9d73b0e5", "Destination": "i-0495d385ad28331c7", "Protocol": "tcp" } ] }For more information, see Getting started using the AWS CLI in the Reachability Analyzer Guide.
-
For API details, see DescribeNetworkInsightsPaths
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-interface-attribute.
- AWS CLI
-
To describe the attachment attribute of a network interface
This example command describes the
attachmentattribute of the specified network interface.Command:
aws ec2 describe-network-interface-attribute --network-interface-ideni-686ea200--attributeattachmentOutput:
{ "NetworkInterfaceId": "eni-686ea200", "Attachment": { "Status": "attached", "DeviceIndex": 0, "AttachTime": "2015-05-21T20:02:20.000Z", "InstanceId": "i-1234567890abcdef0", "DeleteOnTermination": true, "AttachmentId": "eni-attach-43348162", "InstanceOwnerId": "123456789012" } }To describe the description attribute of a network interface
This example command describes the
descriptionattribute of the specified network interface.Command:
aws ec2 describe-network-interface-attribute --network-interface-ideni-686ea200--attributedescriptionOutput:
{ "NetworkInterfaceId": "eni-686ea200", "Description": { "Value": "My description" } }To describe the groupSet attribute of a network interface
This example command describes the
groupSetattribute of the specified network interface.Command:
aws ec2 describe-network-interface-attribute --network-interface-ideni-686ea200--attributegroupSetOutput:
{ "NetworkInterfaceId": "eni-686ea200", "Groups": [ { "GroupName": "my-security-group", "GroupId": "sg-903004f8" } ] }To describe the sourceDestCheck attribute of a network interface
This example command describes the
sourceDestCheckattribute of the specified network interface.Command:
aws ec2 describe-network-interface-attribute --network-interface-ideni-686ea200--attributesourceDestCheckOutput:
{ "NetworkInterfaceId": "eni-686ea200", "SourceDestCheck": { "Value": true } }-
For API details, see DescribeNetworkInterfaceAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-interface-permissions.
- AWS CLI
-
To describe your network interface permissions
This example describes all of your network interface permissions.
Command:
aws ec2 describe-network-interface-permissionsOutput:
{ "NetworkInterfacePermissions": [ { "PermissionState": { "State": "GRANTED" }, "NetworkInterfacePermissionId": "eni-perm-06fd19020ede149ea", "NetworkInterfaceId": "eni-b909511a", "Permission": "INSTANCE-ATTACH", "AwsAccountId": "123456789012" } ] }-
For API details, see DescribeNetworkInterfacePermissions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-network-interfaces.
- AWS CLI
-
To describe your network interfaces
This example describes all your network interfaces.
Command:
aws ec2 describe-network-interfacesOutput:
{ "NetworkInterfaces": [ { "Status": "in-use", "MacAddress": "02:2f:8f:b0:cf:75", "SourceDestCheck": true, "VpcId": "vpc-a01106c2", "Description": "my network interface", "Association": { "PublicIp": "203.0.113.12", "AssociationId": "eipassoc-0fbb766a", "PublicDnsName": "ec2-203-0-113-12.compute-1.amazonaws.com", "IpOwnerId": "123456789012" }, "NetworkInterfaceId": "eni-e5aa89a3", "PrivateIpAddresses": [ { "PrivateDnsName": "ip-10-0-1-17.ec2.internal", "Association": { "PublicIp": "203.0.113.12", "AssociationId": "eipassoc-0fbb766a", "PublicDnsName": "ec2-203-0-113-12.compute-1.amazonaws.com", "IpOwnerId": "123456789012" }, "Primary": true, "PrivateIpAddress": "10.0.1.17" } ], "RequesterManaged": false, "Ipv6Addresses": [], "PrivateDnsName": "ip-10-0-1-17.ec2.internal", "AvailabilityZone": "us-east-1d", "Attachment": { "Status": "attached", "DeviceIndex": 1, "AttachTime": "2013-11-30T23:36:42.000Z", "InstanceId": "i-1234567890abcdef0", "DeleteOnTermination": false, "AttachmentId": "eni-attach-66c4350a", "InstanceOwnerId": "123456789012" }, "Groups": [ { "GroupName": "default", "GroupId": "sg-8637d3e3" } ], "SubnetId": "subnet-b61f49f0", "OwnerId": "123456789012", "TagSet": [], "PrivateIpAddress": "10.0.1.17" }, { "Status": "in-use", "MacAddress": "02:58:f5:ef:4b:06", "SourceDestCheck": true, "VpcId": "vpc-a01106c2", "Description": "Primary network interface", "Association": { "PublicIp": "198.51.100.0", "IpOwnerId": "amazon" }, "NetworkInterfaceId": "eni-f9ba99bf", "PrivateIpAddresses": [ { "Association": { "PublicIp": "198.51.100.0", "IpOwnerId": "amazon" }, "Primary": true, "PrivateIpAddress": "10.0.1.149" } ], "RequesterManaged": false, "Ipv6Addresses": [], "AvailabilityZone": "us-east-1d", "Attachment": { "Status": "attached", "DeviceIndex": 0, "AttachTime": "2013-11-30T23:35:33.000Z", "InstanceId": "i-0598c7d356eba48d7", "DeleteOnTermination": true, "AttachmentId": "eni-attach-1b9db777", "InstanceOwnerId": "123456789012" }, "Groups": [ { "GroupName": "default", "GroupId": "sg-8637d3e3" } ], "SubnetId": "subnet-b61f49f0", "OwnerId": "123456789012", "TagSet": [], "PrivateIpAddress": "10.0.1.149" } ] }This example describes network interfaces that have a tag with the key
Purposeand the valueProd.Command:
aws ec2 describe-network-interfaces --filtersName=tag:Purpose,Values=ProdOutput:
{ "NetworkInterfaces": [ { "Status": "available", "MacAddress": "12:2c:bd:f9:bf:17", "SourceDestCheck": true, "VpcId": "vpc-8941ebec", "Description": "ProdENI", "NetworkInterfaceId": "eni-b9a5ac93", "PrivateIpAddresses": [ { "PrivateDnsName": "ip-10-0-1-55.ec2.internal", "Primary": true, "PrivateIpAddress": "10.0.1.55" }, { "PrivateDnsName": "ip-10-0-1-117.ec2.internal", "Primary": false, "PrivateIpAddress": "10.0.1.117" } ], "RequesterManaged": false, "PrivateDnsName": "ip-10-0-1-55.ec2.internal", "AvailabilityZone": "us-east-1d", "Ipv6Addresses": [], "Groups": [ { "GroupName": "MySG", "GroupId": "sg-905002f5" } ], "SubnetId": "subnet-31d6c219", "OwnerId": "123456789012", "TagSet": [ { "Value": "Prod", "Key": "Purpose" } ], "PrivateIpAddress": "10.0.1.55" } ] }-
For API details, see DescribeNetworkInterfaces
in AWS CLI Command Reference.
-
The following code example shows how to use describe-placement-groups.
- AWS CLI
-
To describe your placement groups
This example command describes all of your placement groups.
Command:
aws ec2 describe-placement-groupsOutput:
{ "PlacementGroups": [ { "GroupName": "my-cluster", "State": "available", "Strategy": "cluster" }, ... ] }-
For API details, see DescribePlacementGroups
in AWS CLI Command Reference.
-
The following code example shows how to use describe-prefix-lists.
- AWS CLI
-
To describe prefix lists
This example lists all available prefix lists for the region.
Command:
aws ec2 describe-prefix-listsOutput:
{ "PrefixLists": [ { "PrefixListName": "com.amazonaws.us-east-1.s3", "Cidrs": [ "54.231.0.0/17" ], "PrefixListId": "pl-63a5400a" } ] }-
For API details, see DescribePrefixLists
in AWS CLI Command Reference.
-
The following code example shows how to use describe-principal-id-format.
- AWS CLI
-
To describe the ID format for IAM users and roles with long ID format enabled
The following
describe-principal-id-formatexample describes the ID format for the root user, all IAM roles, and all IAM users with long ID format enabled.aws ec2 describe-principal-id-format \ --resourceinstanceOutput:
{ "Principals": [ { "Arn": "arn:aws:iam::123456789012:root", "Statuses": [ { "Deadline": "2016-12-15T00:00:00.000Z", "Resource": "reservation", "UseLongIds": true }, { "Deadline": "2016-12-15T00:00:00.000Z", "Resource": "instance", "UseLongIds": true }, { "Deadline": "2016-12-15T00:00:00.000Z", "Resource": "volume", "UseLongIds": true }, ] }, ... ] }-
For API details, see DescribePrincipalIdFormat
in AWS CLI Command Reference.
-
The following code example shows how to use describe-public-ipv4-pools.
- AWS CLI
-
To describe your public IPv4 address pools
The following
describe-public-ipv4-poolsexample displays details about the address pools that were created when you provisioned public IPv4 address ranges using Bring Your Own IP Addresses (BYOIP).aws ec2 describe-public-ipv4-poolsOutput:
{ "PublicIpv4Pools": [ { "PoolId": "ipv4pool-ec2-1234567890abcdef0", "PoolAddressRanges": [ { "FirstAddress": "203.0.113.0", "LastAddress": "203.0.113.255", "AddressCount": 256, "AvailableAddressCount": 256 } ], "TotalAddressCount": 256, "TotalAvailableAddressCount": 256 } ] }-
For API details, see DescribePublicIpv4Pools
in AWS CLI Command Reference.
-
The following code example shows how to use describe-regions.
- AWS CLI
-
Example 1: To describe all of your enabled Regions
The following
describe-regionsexample describes all of the Regions that are enabled for your account.aws ec2 describe-regionsOutput:
{ "Regions": [ { "Endpoint": "ec2.eu-north-1.amazonaws.com", "RegionName": "eu-north-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-south-1.amazonaws.com", "RegionName": "ap-south-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-west-3.amazonaws.com", "RegionName": "eu-west-3", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-west-2.amazonaws.com", "RegionName": "eu-west-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-west-1.amazonaws.com", "RegionName": "eu-west-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-northeast-3.amazonaws.com", "RegionName": "ap-northeast-3", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-northeast-2.amazonaws.com", "RegionName": "ap-northeast-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-northeast-1.amazonaws.com", "RegionName": "ap-northeast-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.sa-east-1.amazonaws.com", "RegionName": "sa-east-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ca-central-1.amazonaws.com", "RegionName": "ca-central-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-southeast-1.amazonaws.com", "RegionName": "ap-southeast-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-southeast-2.amazonaws.com", "RegionName": "ap-southeast-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-central-1.amazonaws.com", "RegionName": "eu-central-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-east-1.amazonaws.com", "RegionName": "us-east-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-east-2.amazonaws.com", "RegionName": "us-east-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-west-1.amazonaws.com", "RegionName": "us-west-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-west-2.amazonaws.com", "RegionName": "us-west-2", "OptInStatus": "opt-in-not-required" } ] }For more information, see Regions and Zones in the Amazon EC2 User Guide.
Example 2: To describe enabled Regions with an endpoint whose name contains a specific string
The following
describe-regionsexample describes all Regions that you have enabled that have the string "us" in the endpoint.aws ec2 describe-regions \ --filters"Name=endpoint,Values=*us*"Output:
{ "Regions": [ { "Endpoint": "ec2.us-east-1.amazonaws.com", "RegionName": "us-east-1" }, { "Endpoint": "ec2.us-east-2.amazonaws.com", "RegionName": "us-east-2" }, { "Endpoint": "ec2.us-west-1.amazonaws.com", "RegionName": "us-west-1" }, { "Endpoint": "ec2.us-west-2.amazonaws.com", "RegionName": "us-west-2" } ] }For more information, see Regions and Zones in the Amazon EC2 User Guide.
Example 3: To describe all Regions
The following
describe-regionsexample describes all available Regions, including Regions that are disabled.aws ec2 describe-regions \ --all-regionsOutput:
{ "Regions": [ { "Endpoint": "ec2.eu-north-1.amazonaws.com", "RegionName": "eu-north-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-south-1.amazonaws.com", "RegionName": "ap-south-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-west-3.amazonaws.com", "RegionName": "eu-west-3", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-west-2.amazonaws.com", "RegionName": "eu-west-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-west-1.amazonaws.com", "RegionName": "eu-west-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-northeast-3.amazonaws.com", "RegionName": "ap-northeast-3", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.me-south-1.amazonaws.com", "RegionName": "me-south-1", "OptInStatus": "not-opted-in" }, { "Endpoint": "ec2.ap-northeast-2.amazonaws.com", "RegionName": "ap-northeast-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-northeast-1.amazonaws.com", "RegionName": "ap-northeast-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.sa-east-1.amazonaws.com", "RegionName": "sa-east-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ca-central-1.amazonaws.com", "RegionName": "ca-central-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-east-1.amazonaws.com", "RegionName": "ap-east-1", "OptInStatus": "not-opted-in" }, { "Endpoint": "ec2.ap-southeast-1.amazonaws.com", "RegionName": "ap-southeast-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.ap-southeast-2.amazonaws.com", "RegionName": "ap-southeast-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.eu-central-1.amazonaws.com", "RegionName": "eu-central-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-east-1.amazonaws.com", "RegionName": "us-east-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-east-2.amazonaws.com", "RegionName": "us-east-2", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-west-1.amazonaws.com", "RegionName": "us-west-1", "OptInStatus": "opt-in-not-required" }, { "Endpoint": "ec2.us-west-2.amazonaws.com", "RegionName": "us-west-2", "OptInStatus": "opt-in-not-required" } ] }For more information, see Regions and Zones in the Amazon EC2 User Guide.
Example 4: To list the Region names only
The following
describe-regionsexample uses the--queryparameter to filter the output and return only the names of the Regions as text.aws ec2 describe-regions \ --all-regions \ --query"Regions[].{Name:RegionName}"\ --outputtextOutput:
eu-north-1 ap-south-1 eu-west-3 eu-west-2 eu-west-1 ap-northeast-3 ap-northeast-2 me-south-1 ap-northeast-1 sa-east-1 ca-central-1 ap-east-1 ap-southeast-1 ap-southeast-2 eu-central-1 us-east-1 us-east-2 us-west-1 us-west-2For more information, see Regions and Zones in the Amazon EC2 User Guide.
-
For API details, see DescribeRegions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-replace-root-volume-tasks.
- AWS CLI
-
Example 1: To view information about a specific root volume replacement task
The following
describe-replace-root-volume-tasksexample describes root volume replacement task replacevol-0111122223333abcd.aws ec2 describe-replace-root-volume-tasks \ --replace-root-volume-task-idsreplacevol-0111122223333abcdOutput:
{ "ReplaceRootVolumeTasks": [ { "ReplaceRootVolumeTaskId": "replacevol-0111122223333abcd", "Tags": [], "InstanceId": "i-0123456789abcdefa", "TaskState": "succeeded", "StartTime": "2022-03-14T15:16:28Z", "CompleteTime": "2022-03-14T15:16:52Z" } ] }For more information, see Replace a root volume in the Amazon Elastic Compute Cloud User Guide.
Example 2: To view information about all root volume replacement tasks for a specific instance
The following
describe-replace-root-volume-tasksexample describes all of the root volume replacement tasks for instance i-0123456789abcdefa.aws ec2 describe-replace-root-volume-tasks \ --filtersName=instance-id,Values=i-0123456789abcdefaOutput:
{ "ReplaceRootVolumeTasks": [ { "ReplaceRootVolumeTaskId": "replacevol-0111122223333abcd", "Tags": [], "InstanceId": "i-0123456789abcdefa", "TaskState": "succeeded", "StartTime": "2022-03-14T15:06:38Z", "CompleteTime": "2022-03-14T15:07:03Z" }, { "ReplaceRootVolumeTaskId": "replacevol-0444455555555abcd", "Tags": [], "InstanceId": "i-0123456789abcdefa", "TaskState": "succeeded", "StartTime": "2022-03-14T15:16:28Z", "CompleteTime": "2022-03-14T15:16:52Z" } ] }For more information, see Replace a root volume in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see DescribeReplaceRootVolumeTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-reserved-instances-listings.
- AWS CLI
-
To describe a Reserved Instance listing
The following
describe-reserved-instances-listingsexample retrieves information about the specified Reserved Instance listing.aws ec2 describe-reserved-instances-listings \ --reserved-instances-listing-id5ec28771-05ff-4b9b-aa31-9e57dexampleThis command produces no output.
-
For API details, see DescribeReservedInstancesListings
in AWS CLI Command Reference.
-
The following code example shows how to use describe-reserved-instances-modifications.
- AWS CLI
-
To describe Reserved Instances modifications
This example command describes all the Reserved Instances modification requests that have been submitted for your account.
Command:
aws ec2 describe-reserved-instances-modificationsOutput:
{ "ReservedInstancesModifications": [ { "Status": "fulfilled", "ModificationResults": [ { "ReservedInstancesId": "93bbbca2-62f1-4d9d-b225-16bada29e6c7", "TargetConfiguration": { "AvailabilityZone": "us-east-1b", "InstanceType": "m1.large", "InstanceCount": 3 } }, { "ReservedInstancesId": "1ba8e2e3-aabb-46c3-bcf5-3fe2fda922e6", "TargetConfiguration": { "AvailabilityZone": "us-east-1d", "InstanceType": "m1.xlarge", "InstanceCount": 1 } } ], "EffectiveDate": "2015-08-12T17:00:00.000Z", "CreateDate": "2015-08-12T17:52:52.630Z", "UpdateDate": "2015-08-12T18:08:06.698Z", "ClientToken": "c9adb218-3222-4889-8216-0cf0e52dc37e: "ReservedInstancesModificationId": "rimod-d3ed4335-b1d3-4de6-ab31-0f13aaf46687", "ReservedInstancesIds": [ { "ReservedInstancesId": "b847fa93-e282-4f55-b59a-1342f5bd7c02" } ] } ] }-
For API details, see DescribeReservedInstancesModifications
in AWS CLI Command Reference.
-
The following code example shows how to use describe-reserved-instances-offerings.
- AWS CLI
-
To describe Reserved Instances offerings
This example command describes all Reserved Instances available for purchase in the region.
Command:
aws ec2 describe-reserved-instances-offeringsOutput:
{ "ReservedInstancesOfferings": [ { "OfferingType": "Partial Upfront", "AvailabilityZone": "us-east-1b", "InstanceTenancy": "default", "PricingDetails": [], "ProductDescription": "Red Hat Enterprise Linux", "UsagePrice": 0.0, "RecurringCharges": [ { "Amount": 0.088, "Frequency": "Hourly" } ], "Marketplace": false, "CurrencyCode": "USD", "FixedPrice": 631.0, "Duration": 94608000, "ReservedInstancesOfferingId": "9a06095a-bdc6-47fe-a94a-2a382f016040", "InstanceType": "c1.medium" }, { "OfferingType": "PartialUpfront", "AvailabilityZone": "us-east-1b", "InstanceTenancy": "default", "PricingDetails": [], "ProductDescription": "Linux/UNIX", "UsagePrice": 0.0, "RecurringCharges": [ { "Amount": 0.028, "Frequency": "Hourly" } ], "Marketplace": false, "CurrencyCode": "USD", "FixedPrice": 631.0, "Duration": 94608000, "ReservedInstancesOfferingId": "bfbefc6c-0d10-418d-b144-7258578d329d", "InstanceType": "c1.medium" }, ... }To describe your Reserved Instances offerings using options
This example lists Reserved Instances offered by AWS with the following specifications: t1.micro instance types, Windows (Amazon VPC) product, and Heavy Utilization offerings.
Command:
aws ec2 describe-reserved-instances-offerings --no-include-marketplace --instance-type"t1.micro"--product-description"Windows (Amazon VPC)"--offering-type"no upfront"Output:
{ "ReservedInstancesOfferings": [ { "OfferingType": "No Upfront", "AvailabilityZone": "us-east-1b", "InstanceTenancy": "default", "PricingDetails": [], "ProductDescription": "Windows", "UsagePrice": 0.0, "RecurringCharges": [ { "Amount": 0.015, "Frequency": "Hourly" } ], "Marketplace": false, "CurrencyCode": "USD", "FixedPrice": 0.0, "Duration": 31536000, "ReservedInstancesOfferingId": "c48ab04c-fe69-4f94-8e39-a23842292823", "InstanceType": "t1.micro" }, ... { "OfferingType": "No Upfront", "AvailabilityZone": "us-east-1d", "InstanceTenancy": "default", "PricingDetails": [], "ProductDescription": "Windows (Amazon VPC)", "UsagePrice": 0.0, "RecurringCharges": [ { "Amount": 0.015, "Frequency": "Hourly" } ], "Marketplace": false, "CurrencyCode": "USD", "FixedPrice": 0.0, "Duration": 31536000, "ReservedInstancesOfferingId": "3a98bf7d-2123-42d4-b4f5-8dbec4b06dc6", "InstanceType": "t1.micro" } ] }-
For API details, see DescribeReservedInstancesOfferings
in AWS CLI Command Reference.
-
The following code example shows how to use describe-reserved-instances.
- AWS CLI
-
To describe your Reserved Instances
This example command describes the Reserved Instances that you own.
Command:
aws ec2 describe-reserved-instancesOutput:
{ "ReservedInstances": [ { "ReservedInstancesId": "b847fa93-e282-4f55-b59a-1342fexample", "OfferingType": "No Upfront", "AvailabilityZone": "us-west-1c", "End": "2016-08-14T21:34:34.000Z", "ProductDescription": "Linux/UNIX", "UsagePrice": 0.00, "RecurringCharges": [ { "Amount": 0.104, "Frequency": "Hourly" } ], "Start": "2015-08-15T21:34:35.086Z", "State": "active", "FixedPrice": 0.0, "CurrencyCode": "USD", "Duration": 31536000, "InstanceTenancy": "default", "InstanceType": "m3.medium", "InstanceCount": 2 }, ... ] }To describe your Reserved Instances using filters
This example filters the response to include only three-year, t2.micro Linux/UNIX Reserved Instances in us-west-1c.
Command:
aws ec2 describe-reserved-instances --filtersName=duration,Values=94608000Name=instance-type,Values=t2.microName=product-description,Values=Linux/UNIXName=availability-zone,Values=us-east-1eOutput:
{ "ReservedInstances": [ { "ReservedInstancesId": "f127bd27-edb7-44c9-a0eb-0d7e09259af0", "OfferingType": "All Upfront", "AvailabilityZone": "us-east-1e", "End": "2018-03-26T21:34:34.000Z", "ProductDescription": "Linux/UNIX", "UsagePrice": 0.00, "RecurringCharges": [], "Start": "2015-03-27T21:34:35.848Z", "State": "active", "FixedPrice": 151.0, "CurrencyCode": "USD", "Duration": 94608000, "InstanceTenancy": "default", "InstanceType": "t2.micro", "InstanceCount": 1 } ] }For more information, see Using Amazon EC2 Instances in the AWS Command Line Interface User Guide.
-
For API details, see DescribeReservedInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-route-tables.
- AWS CLI
-
To describe your route tables
The following
describe-route-tablesexample retrieves the details about your route tablesaws ec2 describe-route-tablesOutput:
{ "RouteTables": [ { "Associations": [ { "Main": true, "RouteTableAssociationId": "rtbassoc-0df3f54e06EXAMPLE", "RouteTableId": "rtb-09ba434c1bEXAMPLE" } ], "PropagatingVgws": [], "RouteTableId": "rtb-09ba434c1bEXAMPLE", "Routes": [ { "DestinationCidrBlock": "10.0.0.0/16", "GatewayId": "local", "Origin": "CreateRouteTable", "State": "active" }, { "DestinationCidrBlock": "0.0.0.0/0", "NatGatewayId": "nat-06c018cbd8EXAMPLE", "Origin": "CreateRoute", "State": "blackhole" } ], "Tags": [], "VpcId": "vpc-0065acced4EXAMPLE", "OwnerId": "111122223333" }, { "Associations": [ { "Main": true, "RouteTableAssociationId": "rtbassoc-9EXAMPLE", "RouteTableId": "rtb-a1eec7de" } ], "PropagatingVgws": [], "RouteTableId": "rtb-a1eec7de", "Routes": [ { "DestinationCidrBlock": "172.31.0.0/16", "GatewayId": "local", "Origin": "CreateRouteTable", "State": "active" }, { "DestinationCidrBlock": "0.0.0.0/0", "GatewayId": "igw-fEXAMPLE", "Origin": "CreateRoute", "State": "active" } ], "Tags": [], "VpcId": "vpc-3EXAMPLE", "OwnerId": "111122223333" }, { "Associations": [ { "Main": false, "RouteTableAssociationId": "rtbassoc-0b100c28b2EXAMPLE", "RouteTableId": "rtb-07a98f76e5EXAMPLE", "SubnetId": "subnet-0d3d002af8EXAMPLE" } ], "PropagatingVgws": [], "RouteTableId": "rtb-07a98f76e5EXAMPLE", "Routes": [ { "DestinationCidrBlock": "10.0.0.0/16", "GatewayId": "local", "Origin": "CreateRouteTable", "State": "active" }, { "DestinationCidrBlock": "0.0.0.0/0", "GatewayId": "igw-06cf664d80EXAMPLE", "Origin": "CreateRoute", "State": "active" } ], "Tags": [], "VpcId": "vpc-0065acced4EXAMPLE", "OwnerId": "111122223333" } ] }For more information, see Working with Route Tables in the AWS VPC User Guide.
-
For API details, see DescribeRouteTables
in AWS CLI Command Reference.
-
The following code example shows how to use describe-scheduled-instance-availability.
- AWS CLI
-
To describe an available schedule
This example describes a schedule that occurs every week on Sunday, starting on the specified date.
Command:
aws ec2 describe-scheduled-instance-availability --recurrenceFrequency=Weekly,Interval=1,OccurrenceDays=[1]--first-slot-start-time-rangeEarliestTime=2016-01-31T00:00:00Z,LatestTime=2016-01-31T04:00:00ZOutput:
{ "ScheduledInstanceAvailabilitySet": [ { "AvailabilityZone": "us-west-2b", "TotalScheduledInstanceHours": 1219, "PurchaseToken": "eyJ2IjoiMSIsInMiOjEsImMiOi...", "MinTermDurationInDays": 366, "AvailableInstanceCount": 20, "Recurrence": { "OccurrenceDaySet": [ 1 ], "Interval": 1, "Frequency": "Weekly", "OccurrenceRelativeToEnd": false }, "Platform": "Linux/UNIX", "FirstSlotStartTime": "2016-01-31T00:00:00Z", "MaxTermDurationInDays": 366, "SlotDurationInHours": 23, "NetworkPlatform": "EC2-VPC", "InstanceType": "c4.large", "HourlyPrice": "0.095" }, ... ] }To narrow the results, you can add filters that specify the operating system, network, and instance type.
Command:
--filters Name=platform,Values=Linux/UNIX Name=network-platform,Values=EC2-VPC Name=instance-type,Values=c4.large
-
For API details, see DescribeScheduledInstanceAvailability
in AWS CLI Command Reference.
-
The following code example shows how to use describe-scheduled-instances.
- AWS CLI
-
To describe your Scheduled Instances
This example describes the specified Scheduled Instance.
Command:
aws ec2 describe-scheduled-instances --scheduled-instance-idssci-1234-1234-1234-1234-123456789012Output:
{ "ScheduledInstanceSet": [ { "AvailabilityZone": "us-west-2b", "ScheduledInstanceId": "sci-1234-1234-1234-1234-123456789012", "HourlyPrice": "0.095", "CreateDate": "2016-01-25T21:43:38.612Z", "Recurrence": { "OccurrenceDaySet": [ 1 ], "Interval": 1, "Frequency": "Weekly", "OccurrenceRelativeToEnd": false, "OccurrenceUnit": "" }, "Platform": "Linux/UNIX", "TermEndDate": "2017-01-31T09:00:00Z", "InstanceCount": 1, "SlotDurationInHours": 32, "TermStartDate": "2016-01-31T09:00:00Z", "NetworkPlatform": "EC2-VPC", "TotalScheduledInstanceHours": 1696, "NextSlotStartTime": "2016-01-31T09:00:00Z", "InstanceType": "c4.large" } ] }This example describes all your Scheduled Instances.
Command:
aws ec2 describe-scheduled-instances-
For API details, see DescribeScheduledInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-security-group-references.
- AWS CLI
-
To describe security group references
This example describes the security group references for
sg-bbbb2222. The response indicates that security groupsg-bbbb2222is being referenced by a security group in VPCvpc-aaaaaaaa.Command:
aws ec2 describe-security-group-references --group-idsg-bbbbb22222Output:
{ "SecurityGroupsReferenceSet": [ { "ReferencingVpcId": "vpc-aaaaaaaa ", "GroupId": "sg-bbbbb22222", "VpcPeeringConnectionId": "pcx-b04deed9" } ] }-
For API details, see DescribeSecurityGroupReferences
in AWS CLI Command Reference.
-
The following code example shows how to use describe-security-group-rules.
- AWS CLI
-
Example 1: To describe the security group rules for a security group
The following
describe-security-group-rulesexample describes the security group rules of a specified security group. Use thefiltersoption to scope the results to a specific security group.aws ec2 describe-security-group-rules \ --filters Name="group-id",Values="sg-1234567890abcdef0"Output:
{ "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-abcdef01234567890", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "111122223333", "IsEgress": false, "IpProtocol": "-1", "FromPort": -1, "ToPort": -1, "ReferencedGroupInfo": { "GroupId": "sg-1234567890abcdef0", "UserId": "111122223333" }, "Tags": [] }, { "SecurityGroupRuleId": "sgr-bcdef01234567890a", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "111122223333", "IsEgress": true, "IpProtocol": "-1", "FromPort": -1, "ToPort": -1, "CidrIpv6": "::/0", "Tags": [] }, { "SecurityGroupRuleId": "sgr-cdef01234567890ab", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "111122223333", "IsEgress": true, "IpProtocol": "-1", "FromPort": -1, "ToPort": -1, "CidrIpv4": "0.0.0.0/0", "Tags": [] } ] }Example 2: To describe a security group rule
The following
describe-security-group-rulesexample describes the specified security group rule.aws ec2 describe-security-group-rules \ --security-group-rule-idssgr-cdef01234567890abOutput:
{ "SecurityGroupRules": [ { "SecurityGroupRuleId": "sgr-cdef01234567890ab", "GroupId": "sg-1234567890abcdef0", "GroupOwnerId": "111122223333", "IsEgress": true, "IpProtocol": "-1", "FromPort": -1, "ToPort": -1, "CidrIpv4": "0.0.0.0/0", "Tags": [] } ] }For more information, see Security group rules in the Amazon VPC User Guide.
-
For API details, see DescribeSecurityGroupRules
in AWS CLI Command Reference.
-
The following code example shows how to use describe-security-group-vpc-associations.
- AWS CLI
-
To describe VPC associations
The following
describe-security-group-vpc-associationsexample describes the VPC associations for the specified security group.aws ec2 describe-security-group-vpc-associations \ --filtersName=group-id,Values=sg-04dbb43907d3f8a78Output:
{ "SecurityGroupVpcAssociations": [ { "GroupId": "sg-04dbb43907d3f8a78", "VpcId": "vpc-0bf4c2739bc05a694", "VpcOwnerId": "123456789012", "State": "associated" } ] }For more information, see Associate security groups with multiple VPCs in the Amazon VPC User Guide.
-
For API details, see DescribeSecurityGroupVpcAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-security-groups.
- AWS CLI
-
Example 1: To describe a security group
The following
describe-security-groupsexample describes the specified security group.aws ec2 describe-security-groups \ --group-idssg-903004f8Output:
{ "SecurityGroups": [ { "IpPermissionsEgress": [ { "IpProtocol": "-1", "IpRanges": [ { "CidrIp": "0.0.0.0/0" } ], "UserIdGroupPairs": [], "PrefixListIds": [] } ], "Description": "My security group", "Tags": [ { "Value": "SG1", "Key": "Name" } ], "IpPermissions": [ { "IpProtocol": "-1", "IpRanges": [], "UserIdGroupPairs": [ { "UserId": "123456789012", "GroupId": "sg-903004f8" } ], "PrefixListIds": [] }, { "PrefixListIds": [], "FromPort": 22, "IpRanges": [ { "Description": "Access from NY office", "CidrIp": "203.0.113.0/24" } ], "ToPort": 22, "IpProtocol": "tcp", "UserIdGroupPairs": [] } ], "GroupName": "MySecurityGroup", "VpcId": "vpc-1a2b3c4d", "OwnerId": "123456789012", "GroupId": "sg-903004f8", } ] }Example 2: To describe security groups that have specific rules
The following
describe-security-groupsexample uses filters to scope the results to security groups that have a rule that allows SSH traffic (port 22) and a rule that allows traffic from all addresses (0.0.0.0/0). The example uses the--queryparameter to display only the names of the security groups. Security groups must match all filters to be returned in the results; however, a single rule does not have to match all filters. For example, the output returns a security group with a rule that allows SSH traffic from a specific IP address and another rule that allows HTTP traffic from all addresses.aws ec2 describe-security-groups \ --filtersName=ip-permission.from-port,Values=22Name=ip-permission.to-port,Values=22Name=ip-permission.cidr,Values='0.0.0.0/0' \ --query"SecurityGroups[*].[GroupName]"\ --outputtextOutput:
default my-security-group web-servers launch-wizard-1Example 3: To describe security groups based on tags
The following
describe-security-groupsexample uses filters to scope the results to security groups that includetestin the security group name, and that have the tagTest=To-delete. The example uses the--queryparameter to display only the names and IDs of the security groups.aws ec2 describe-security-groups \ --filtersName=group-name,Values=*test*Name=tag:Test,Values=To-delete\ --query"SecurityGroups[*].{Name:GroupName,ID:GroupId}"Output:
[ { "Name": "testfornewinstance", "ID": "sg-33bb22aa" }, { "Name": "newgrouptest", "ID": "sg-1a2b3c4d" } ]For additional examples using tag filters, see Working with tags in the Amazon EC2 User Guide.
-
For API details, see DescribeSecurityGroups
in AWS CLI Command Reference.
-
The following code example shows how to use describe-snapshot-attribute.
- AWS CLI
-
To describe the snapshot attributes for a snapshot
The following
describe-snapshot-attributeexample lists the accounts with which a snapshot is shared.aws ec2 describe-snapshot-attribute \ --snapshot-idsnap-01234567890abcedf\ --attributecreateVolumePermissionOutput:
{ "SnapshotId": "snap-01234567890abcedf", "CreateVolumePermissions": [ { "UserId": "123456789012" } ] }For more information, see Share an Amazon EBS snapshot in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see DescribeSnapshotAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-snapshot-tier-status.
- AWS CLI
-
To view archival information about an archived snapshot
The following
describe-snapshot-tier-statusexample provides archival information about an archived snapshot.aws ec2 describe-snapshot-tier-status \ --filters"Name=snapshot-id, Values=snap-01234567890abcedf"Output:
{ "SnapshotTierStatuses": [ { "Status": "completed", "ArchivalCompleteTime": "2021-09-15T17:33:16.147Z", "LastTieringProgress": 100, "Tags": [], "VolumeId": "vol-01234567890abcedf", "LastTieringOperationState": "archival-completed", "StorageTier": "archive", "OwnerId": "123456789012", "SnapshotId": "snap-01234567890abcedf", "LastTieringStartTime": "2021-09-15T16:44:37.574Z" } ] }For more information, see View archived snapshots in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see DescribeSnapshotTierStatus
in AWS CLI Command Reference.
-
The following code example shows how to use describe-snapshots.
- AWS CLI
-
Example 1: To describe a snapshot
The following
describe-snapshotsexample describes the specified snapshot.aws ec2 describe-snapshots \ --snapshot-idssnap-1234567890abcdef0Output:
{ "Snapshots": [ { "Description": "This is my snapshot", "Encrypted": false, "VolumeId": "vol-049df61146c4d7901", "State": "completed", "VolumeSize": 8, "StartTime": "2019-02-28T21:28:32.000Z", "Progress": "100%", "OwnerId": "012345678910", "SnapshotId": "snap-01234567890abcdef", "Tags": [ { "Key": "Stack", "Value": "test" } ] } ] }For more information, see Amazon EBS snapshots in the Amazon EC2 User Guide.
Example 2: To describe snapshots based on filters
The following
describe-snapshotsexample uses filters to scope the results to snapshots owned by your AWS account that are in thependingstate. The example uses the--queryparameter to display only the snapshot IDs and the time the snapshot was started.aws ec2 describe-snapshots \ --owner-idsself\ --filtersName=status,Values=pending\ --query"Snapshots[*].{ID:SnapshotId,Time:StartTime}"Output:
[ { "ID": "snap-1234567890abcdef0", "Time": "2019-08-04T12:48:18.000Z" }, { "ID": "snap-066877671789bd71b", "Time": "2019-08-04T02:45:16.000Z }, ... ]The following
describe-snapshotsexample uses filters to scope the results to snapshots created from the specified volume. The example uses the--queryparameter to display only the snapshot IDs.aws ec2 describe-snapshots \ --filtersName=volume-id,Values=049df61146c4d7901\ --query"Snapshots[*].[SnapshotId]"\ --outputtextOutput:
snap-1234567890abcdef0 snap-08637175a712c3fb9 ...For additional examples using filters, see Listing and filtering your resources in the Amazon EC2 User Guide.
Example 3: To describe snapshots based on tags
The following
describe-snapshotsexample uses tag filters to scope the results to snapshots that have the tagStack=Prod.aws ec2 describe-snapshots \ --filtersName=tag:Stack,Values=prodFor an example of the output for
describe-snapshots, see Example 1.For additional examples using tag filters, see Working with tags in the Amazon EC2 User Guide.
Example 4: To describe snapshots based on age
The following
describe-snapshotsexample uses JMESPath expressions to describe all snapshots created by your AWS account before the specified date. It displays only the snapshot IDs.aws ec2 describe-snapshots \ --owner-ids012345678910\ --query"Snapshots[?(StartTime<='2020-03-31')].[SnapshotId]"For additional examples using filters, see Listing and filtering your resources in the Amazon EC2 User Guide.
Example 5: To view only archived snapshots
The following
describe-snapshotsexample lists only snapshots that are stored in the archive tier.aws ec2 describe-snapshots \ --filters"Name=storage-tier,Values=archive"Output:
{ "Snapshots": [ { "Description": "Snap A", "Encrypted": false, "VolumeId": "vol-01234567890aaaaaa", "State": "completed", "VolumeSize": 8, "StartTime": "2021-09-07T21:00:00.000Z", "Progress": "100%", "OwnerId": "123456789012", "SnapshotId": "snap-01234567890aaaaaa", "StorageTier": "archive", "Tags": [] }, ] }For more information, see View archived snapshots in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see DescribeSnapshots
in AWS CLI Command Reference.
-
The following code example shows how to use describe-spot-datafeed-subscription.
- AWS CLI
-
To describe Spot Instance datafeed subscription for an account
This example command describes the data feed for the account.
Command:
aws ec2 describe-spot-datafeed-subscriptionOutput:
{ "SpotDatafeedSubscription": { "OwnerId": "123456789012", "Prefix": "spotdata", "Bucket": "amzn-s3-demo-bucket", "State": "Active" } }-
For API details, see DescribeSpotDatafeedSubscription
in AWS CLI Command Reference.
-
The following code example shows how to use describe-spot-fleet-instances.
- AWS CLI
-
To describe the Spot Instances associated with a Spot fleet
This example command lists the Spot instances associated with the specified Spot fleet.
Command:
aws ec2 describe-spot-fleet-instances --spot-fleet-request-idsfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLEOutput:
{ "ActiveInstances": [ { "InstanceId": "i-1234567890abcdef0", "InstanceType": "m3.medium", "SpotInstanceRequestId": "sir-08b93456" }, ... ], "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE" }-
For API details, see DescribeSpotFleetInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-spot-fleet-request-history.
- AWS CLI
-
To describe Spot fleet history
This example command returns the history for the specified Spot fleet starting at the specified time.
Command:
aws ec2 describe-spot-fleet-request-history --spot-fleet-request-idsfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE--start-time2015-05-26T00:00:00ZThe following example output shows the successful launches of two Spot Instances for the Spot fleet.
Output:
{ "HistoryRecords": [ { "Timestamp": "2015-05-26T23:17:20.697Z", "EventInformation": { "EventSubType": "submitted" }, "EventType": "fleetRequestChange" }, { "Timestamp": "2015-05-26T23:17:20.873Z", "EventInformation": { "EventSubType": "active" }, "EventType": "fleetRequestChange" }, { "Timestamp": "2015-05-26T23:21:21.712Z", "EventInformation": { "InstanceId": "i-1234567890abcdef0", "EventSubType": "launched" }, "EventType": "instanceChange" }, { "Timestamp": "2015-05-26T23:21:21.816Z", "EventInformation": { "InstanceId": "i-1234567890abcdef1", "EventSubType": "launched" }, "EventType": "instanceChange" } ], "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE", "NextToken": "CpHNsscimcV5oH7bSbub03CI2Qms5+ypNpNm+53MNlR0YcXAkp0xFlfKf91yVxSExmbtma3awYxMFzNA663ZskT0AHtJ6TCb2Z8bQC2EnZgyELbymtWPfpZ1ZbauVg+P+TfGlWxWWB/Vr5dk5d4LfdgA/DRAHUrYgxzrEXAMPLE=", "StartTime": "2015-05-26T00:00:00Z" }-
For API details, see DescribeSpotFleetRequestHistory
in AWS CLI Command Reference.
-
The following code example shows how to use describe-spot-fleet-requests.
- AWS CLI
-
To describe your Spot fleet requests
This example describes all of your Spot fleet requests.
Command:
aws ec2 describe-spot-fleet-requestsOutput:
{ "SpotFleetRequestConfigs": [ { "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE", "SpotFleetRequestConfig": { "TargetCapacity": 20, "LaunchSpecifications": [ { "EbsOptimized": false, "NetworkInterfaces": [ { "SubnetId": "subnet-a61dafcf", "DeviceIndex": 0, "DeleteOnTermination": false, "AssociatePublicIpAddress": true, "SecondaryPrivateIpAddressCount": 0 } ], "InstanceType": "cc2.8xlarge", "ImageId": "ami-1a2b3c4d" }, { "EbsOptimized": false, "NetworkInterfaces": [ { "SubnetId": "subnet-a61dafcf", "DeviceIndex": 0, "DeleteOnTermination": false, "AssociatePublicIpAddress": true, "SecondaryPrivateIpAddressCount": 0 } ], "InstanceType": "r3.8xlarge", "ImageId": "ami-1a2b3c4d" } ], "SpotPrice": "0.05", "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role" }, "SpotFleetRequestState": "active" }, { "SpotFleetRequestId": "sfr-306341ed-9739-402e-881b-ce47bEXAMPLE", "SpotFleetRequestConfig": { "TargetCapacity": 20, "LaunchSpecifications": [ { "EbsOptimized": false, "NetworkInterfaces": [ { "SubnetId": "subnet-6e7f829e", "DeviceIndex": 0, "DeleteOnTermination": false, "AssociatePublicIpAddress": true, "SecondaryPrivateIpAddressCount": 0 } ], "InstanceType": "m3.medium", "ImageId": "ami-1a2b3c4d" } ], "SpotPrice": "0.05", "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role" }, "SpotFleetRequestState": "active" } ] }To describe a Spot fleet request
This example describes the specified Spot fleet request.
Command:
aws ec2 describe-spot-fleet-requests --spot-fleet-request-idssfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLEOutput:
{ "SpotFleetRequestConfigs": [ { "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE", "SpotFleetRequestConfig": { "TargetCapacity": 20, "LaunchSpecifications": [ { "EbsOptimized": false, "NetworkInterfaces": [ { "SubnetId": "subnet-a61dafcf", "DeviceIndex": 0, "DeleteOnTermination": false, "AssociatePublicIpAddress": true, "SecondaryPrivateIpAddressCount": 0 } ], "InstanceType": "cc2.8xlarge", "ImageId": "ami-1a2b3c4d" }, { "EbsOptimized": false, "NetworkInterfaces": [ { "SubnetId": "subnet-a61dafcf", "DeviceIndex": 0, "DeleteOnTermination": false, "AssociatePublicIpAddress": true, "SecondaryPrivateIpAddressCount": 0 } ], "InstanceType": "r3.8xlarge", "ImageId": "ami-1a2b3c4d" } ], "SpotPrice": "0.05", "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role" }, "SpotFleetRequestState": "active" } ] }-
For API details, see DescribeSpotFleetRequests
in AWS CLI Command Reference.
-
The following code example shows how to use describe-spot-instance-requests.
- AWS CLI
-
Example 1: To describe a Spot Instance request
The following
describe-spot-instance-requestsexample describes the specified Spot Instance request.aws ec2 describe-spot-instance-requests \ --spot-instance-request-idssir-08b93456Output:
{ "SpotInstanceRequests": [ { "CreateTime": "2018-04-30T18:14:55.000Z", "InstanceId": "i-1234567890abcdef1", "LaunchSpecification": { "InstanceType": "t2.micro", "ImageId": "ami-003634241a8fcdec0", "KeyName": "my-key-pair", "SecurityGroups": [ { "GroupName": "default", "GroupId": "sg-e38f24a7" } ], "BlockDeviceMappings": [ { "DeviceName": "/dev/sda1", "Ebs": { "DeleteOnTermination": true, "SnapshotId": "snap-0e54a519c999adbbd", "VolumeSize": 8, "VolumeType": "standard", "Encrypted": false } } ], "NetworkInterfaces": [ { "DeleteOnTermination": true, "DeviceIndex": 0, "SubnetId": "subnet-049df61146c4d7901" } ], "Placement": { "AvailabilityZone": "us-east-2b", "Tenancy": "default" }, "Monitoring": { "Enabled": false } }, "LaunchedAvailabilityZone": "us-east-2b", "ProductDescription": "Linux/UNIX", "SpotInstanceRequestId": "sir-08b93456", "SpotPrice": "0.010000" "State": "active", "Status": { "Code": "fulfilled", "Message": "Your Spot request is fulfilled.", "UpdateTime": "2018-04-30T18:16:21.000Z" }, "Tags": [], "Type": "one-time", "InstanceInterruptionBehavior": "terminate" } ] }Example 2: To describe Spot Instance requests based on filters
The following
describe-spot-instance-requestsexample uses filters to scope the results to Spot Instance requests with the specified instance type in the specified Availability Zone. The example uses the--queryparameter to display only the instance IDs.aws ec2 describe-spot-instance-requests \ --filtersName=launch.instance-type,Values=m3.mediumName=launched-availability-zone,Values=us-east-2a\ --query"SpotInstanceRequests[*].[InstanceId]"\ --outputtextOutput:
i-057750d42936e468a i-001efd250faaa6ffa i-027552a73f021f3bd ...For additional examples using filters, see Listing and filtering your resources in the Amazon Elastic Compute Cloud User Guide.
Example 3: To describe Spot Instance requests based on tags
The following
describe-spot-instance-requestsexample uses tag filters to scope the results to Spot Instance requests that have the tagcost-center=cc123.aws ec2 describe-spot-instance-requests \ --filtersName=tag:cost-center,Values=cc123For an example of the output for
describe-spot-instance-requests, see Example 1.For additional examples using tag filters, see Working with tags in the Amazon EC2 User Guide.
-
For API details, see DescribeSpotInstanceRequests
in AWS CLI Command Reference.
-
The following code example shows how to use describe-spot-price-history.
- AWS CLI
-
To describe Spot price history
This example command returns the Spot Price history for m1.xlarge instances for a particular day in January.
Command:
aws ec2 describe-spot-price-history --instance-typesm1.xlarge--start-time2014-01-06T07:08:09--end-time2014-01-06T08:09:10Output:
{ "SpotPriceHistory": [ { "Timestamp": "2014-01-06T07:10:55.000Z", "ProductDescription": "SUSE Linux", "InstanceType": "m1.xlarge", "SpotPrice": "0.087000", "AvailabilityZone": "us-west-1b" }, { "Timestamp": "2014-01-06T07:10:55.000Z", "ProductDescription": "SUSE Linux", "InstanceType": "m1.xlarge", "SpotPrice": "0.087000", "AvailabilityZone": "us-west-1c" }, { "Timestamp": "2014-01-06T05:42:36.000Z", "ProductDescription": "SUSE Linux (Amazon VPC)", "InstanceType": "m1.xlarge", "SpotPrice": "0.087000", "AvailabilityZone": "us-west-1a" }, ... }To describe Spot price history for Linux/UNIX Amazon VPC
This example command returns the Spot Price history for m1.xlarge, Linux/UNIX Amazon VPC instances for a particular day in January.
Command:
aws ec2 describe-spot-price-history --instance-typesm1.xlarge--product-description"Linux/UNIX (Amazon VPC)"--start-time2014-01-06T07:08:09--end-time2014-01-06T08:09:10Output:
{ "SpotPriceHistory": [ { "Timestamp": "2014-01-06T04:32:53.000Z", "ProductDescription": "Linux/UNIX (Amazon VPC)", "InstanceType": "m1.xlarge", "SpotPrice": "0.080000", "AvailabilityZone": "us-west-1a" }, { "Timestamp": "2014-01-05T11:28:26.000Z", "ProductDescription": "Linux/UNIX (Amazon VPC)", "InstanceType": "m1.xlarge", "SpotPrice": "0.080000", "AvailabilityZone": "us-west-1c" } ] }-
For API details, see DescribeSpotPriceHistory
in AWS CLI Command Reference.
-
The following code example shows how to use describe-stale-security-groups.
- AWS CLI
-
To describe stale security groups
This example describes stale security group rules for
vpc-11223344. The response shows that sg-5fa68d3a in your account has a stale ingress SSH rule that referencessg-279ab042in the peer VPC, and thatsg-fe6fba9ain your account has a stale egress SSH rule that referencessg-ef6fba8bin the peer VPC.Command:
aws ec2 describe-stale-security-groups --vpc-idvpc-11223344Output:
{ "StaleSecurityGroupSet": [ { "VpcId": "vpc-11223344", "StaleIpPermissionsEgress": [ { "ToPort": 22, "FromPort": 22, "UserIdGroupPairs": [ { "VpcId": "vpc-7a20e51f", "GroupId": "sg-ef6fba8b", "VpcPeeringConnectionId": "pcx-b04deed9", "PeeringStatus": "active" } ], "IpProtocol": "tcp" } ], "GroupName": "MySG1", "StaleIpPermissions": [], "GroupId": "sg-fe6fba9a", "Description": MySG1" }, { "VpcId": "vpc-11223344", "StaleIpPermissionsEgress": [], "GroupName": "MySG2", "StaleIpPermissions": [ { "ToPort": 22, "FromPort": 22, "UserIdGroupPairs": [ { "VpcId": "vpc-7a20e51f", "GroupId": "sg-279ab042", "Description": "Access from pcx-b04deed9", "VpcPeeringConnectionId": "pcx-b04deed9", "PeeringStatus": "active" } ], "IpProtocol": "tcp" } ], "GroupId": "sg-5fa68d3a", "Description": "MySG2" } ] }-
For API details, see DescribeStaleSecurityGroups
in AWS CLI Command Reference.
-
The following code example shows how to use describe-store-image-tasks.
- AWS CLI
-
To describe the progress of an AMI store task
The following
describe-store-image-tasksexample describes the progress of an AMI store task.aws ec2 describe-store-image-tasksOutput:
{ "StoreImageTaskResults": [ { "AmiId": "ami-1234567890abcdef0", "Bucket": "my-ami-bucket", "ProgressPercentage": 17, "S3objectKey": "ami-1234567890abcdef0.bin", "StoreTaskState": "InProgress", "StoreTaskFailureReason": null, "TaskStartTime": "2022-01-01T01:01:01.001Z" } ] }For more information about storing and restoring an AMI using S3, see Store and restore an AMI using S3 <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ami-store-restore.html> in the Amazon EC2 User Guide.
-
For API details, see DescribeStoreImageTasks
in AWS CLI Command Reference.
-
The following code example shows how to use describe-subnets.
- AWS CLI
-
Example 1: To describe all your subnets
The following
describe-subnetsexample displays the details of your subnets.aws ec2 describe-subnetsOutput:
{ "Subnets": [ { "AvailabilityZone": "us-east-1d", "AvailabilityZoneId": "use1-az2", "AvailableIpAddressCount": 4089, "CidrBlock": "172.31.80.0/20", "DefaultForAz": true, "MapPublicIpOnLaunch": false, "MapCustomerOwnedIpOnLaunch": true, "State": "available", "SubnetId": "subnet-0bb1c79de3EXAMPLE", "VpcId": "vpc-0ee975135dEXAMPLE", "OwnerId": "111122223333", "AssignIpv6AddressOnCreation": false, "Ipv6CidrBlockAssociationSet": [], "CustomerOwnedIpv4Pool:": 'pool-2EXAMPLE', "SubnetArn": "arn:aws:ec2:us-east-2:111122223333:subnet/subnet-0bb1c79de3EXAMPLE", "EnableDns64": false, "Ipv6Native": false, "PrivateDnsNameOptionsOnLaunch": { "HostnameType": "ip-name", "EnableResourceNameDnsARecord": false, "EnableResourceNameDnsAAAARecord": false } }, { "AvailabilityZone": "us-east-1d", "AvailabilityZoneId": "use1-az2", "AvailableIpAddressCount": 4089, "CidrBlock": "172.31.80.0/20", "DefaultForAz": true, "MapPublicIpOnLaunch": true, "MapCustomerOwnedIpOnLaunch": false, "State": "available", "SubnetId": "subnet-8EXAMPLE", "VpcId": "vpc-3EXAMPLE", "OwnerId": "1111222233333", "AssignIpv6AddressOnCreation": false, "Ipv6CidrBlockAssociationSet": [], "Tags": [ { "Key": "Name", "Value": "MySubnet" } ], "SubnetArn": "arn:aws:ec2:us-east-1:111122223333:subnet/subnet-8EXAMPLE", "EnableDns64": false, "Ipv6Native": false, "PrivateDnsNameOptionsOnLaunch": { "HostnameType": "ip-name", "EnableResourceNameDnsARecord": false, "EnableResourceNameDnsAAAARecord": false } } ] }For more information, see Working with VPCs and Subnets in the AWS VPC User Guide.
Example 2: To describe the subnets of a specific VPC
The following
describe-subnetsexample uses a filter to retrieve details for the subnets of the specified VPC.aws ec2 describe-subnets \ --filters"Name=vpc-id,Values=vpc-3EXAMPLE"Output:
{ "Subnets": [ { "AvailabilityZone": "us-east-1d", "AvailabilityZoneId": "use1-az2", "AvailableIpAddressCount": 4089, "CidrBlock": "172.31.80.0/20", "DefaultForAz": true, "MapPublicIpOnLaunch": true, "MapCustomerOwnedIpOnLaunch": false, "State": "available", "SubnetId": "subnet-8EXAMPLE", "VpcId": "vpc-3EXAMPLE", "OwnerId": "1111222233333", "AssignIpv6AddressOnCreation": false, "Ipv6CidrBlockAssociationSet": [], "Tags": [ { "Key": "Name", "Value": "MySubnet" } ], "SubnetArn": "arn:aws:ec2:us-east-1:111122223333:subnet/subnet-8EXAMPLE", "EnableDns64": false, "Ipv6Native": false, "PrivateDnsNameOptionsOnLaunch": { "HostnameType": "ip-name", "EnableResourceNameDnsARecord": false, "EnableResourceNameDnsAAAARecord": false } } ] }For more information, see Working with VPCs and Subnets in the AWS VPC User Guide.
Example 3: To describe the subnets with a specific tag
The following
describe-subnetsexample uses a filter to retrieve the details of those subnets with the tagCostCenter=123and the--queryparameter to display the subnet IDs of the subnets with this tag.aws ec2 describe-subnets \ --filters"Name=tag:CostCenter,Values=123"\ --query"Subnets[*].SubnetId"\ --outputtextOutput:
subnet-0987a87c8b37348ef subnet-02a95061c45f372ee subnet-03f720e7de2788d73For more information, see Working with VPCs and Subnets in the Amazon VPC User Guide.
-
For API details, see DescribeSubnets
in AWS CLI Command Reference.
-
The following code example shows how to use describe-tags.
- AWS CLI
-
Example 1: To describe all tags for a single resource
The following
describe-tagsexample describes the tags for the specified instance.aws ec2 describe-tags \ --filters"Name=resource-id,Values=i-1234567890abcdef8"Output:
{ "Tags": [ { "ResourceType": "instance", "ResourceId": "i-1234567890abcdef8", "Value": "Test", "Key": "Stack" }, { "ResourceType": "instance", "ResourceId": "i-1234567890abcdef8", "Value": "Beta Server", "Key": "Name" } ] }Example 2: To describe all tags for a resource type
The following
describe-tagsexample describes the tags for your volumes.aws ec2 describe-tags \ --filters"Name=resource-type,Values=volume"Output:
{ "Tags": [ { "ResourceType": "volume", "ResourceId": "vol-1234567890abcdef0", "Value": "Project1", "Key": "Purpose" }, { "ResourceType": "volume", "ResourceId": "vol-049df61146c4d7901", "Value": "Logs", "Key": "Purpose" } ] }Example 3: To describe all your tags
The following
describe-tagsexample describes the tags for all your resources.aws ec2 describe-tagsExample 4: To describe the tags for your resources based on a tag key
The following
describe-tagsexample describes the tags for your resources that have a tag with the keyStack.aws ec2 describe-tags \ --filtersName=key,Values=StackOutput:
{ "Tags": [ { "ResourceType": "volume", "ResourceId": "vol-027552a73f021f3b", "Value": "Production", "Key": "Stack" }, { "ResourceType": "instance", "ResourceId": "i-1234567890abcdef8", "Value": "Test", "Key": "Stack" } ] }Example 5: To describe the tags for your resources based on a tag key and tag value
The following
describe-tagsexample describes the tags for your resources that have the tagStack=Test.aws ec2 describe-tags \ --filtersName=key,Values=StackName=value,Values=TestOutput:
{ "Tags": [ { "ResourceType": "image", "ResourceId": "ami-3ac336533f021f3bd", "Value": "Test", "Key": "Stack" }, { "ResourceType": "instance", "ResourceId": "i-1234567890abcdef8", "Value": "Test", "Key": "Stack" } ] }The following
describe-tagsexample uses alternate syntax to describe resources with the tagStack=Test.aws ec2 describe-tags \ --filters"Name=tag:Stack,Values=Test"The following
describe-tagsexample describes the tags for all your instances that have a tag with the keyPurposeand no value.aws ec2 describe-tags \ --filters"Name=resource-type,Values=instance""Name=key,Values=Purpose""Name=value,Values="Output:
{ "Tags": [ { "ResourceType": "instance", "ResourceId": "i-1234567890abcdef5", "Value": null, "Key": "Purpose" } ] }-
For API details, see DescribeTags
in AWS CLI Command Reference.
-
The following code example shows how to use describe-traffic-mirror-filters.
- AWS CLI
-
To view your traffic mirror filters
The following
describe-traffic-mirror-filtersexample displays details for all of your traffic mirror filters.aws ec2 describe-traffic-mirror-filtersOutput:
{ "TrafficMirrorFilters": [ { "TrafficMirrorFilterId": "tmf-0293f26e86EXAMPLE", "IngressFilterRules": [ { "TrafficMirrorFilterRuleId": "tmfr-0ca76e0e08EXAMPLE", "TrafficMirrorFilterId": "tmf-0293f26e86EXAMPLE", "TrafficDirection": "ingress", "RuleNumber": 100, "RuleAction": "accept", "Protocol": 6, "DestinationCidrBlock": "10.0.0.0/24", "SourceCidrBlock": "10.0.0.0/24", "Description": "TCP Rule" } ], "EgressFilterRules": [], "NetworkServices": [], "Description": "Example filter", "Tags": [] } ] }For more information, see View your traffic mirror filters in the Traffic Mirroring Guide.
-
For API details, see DescribeTrafficMirrorFilters
in AWS CLI Command Reference.
-
The following code example shows how to use describe-traffic-mirror-sessions.
- AWS CLI
-
To describe a Traffic Mirror Session
The following
describe-traffic-mirror-sessionsexample displays details of the your Traffic Mirror sessions.aws ec2 describe-traffic-mirror-sessionsOutput:
{ "TrafficMirrorSessions": [ { "Tags": [], "VirtualNetworkId": 42, "OwnerId": "111122223333", "Description": "TCP Session", "NetworkInterfaceId": "eni-0a471a5cf3EXAMPLE", "TrafficMirrorTargetId": "tmt-0dabe9b0a6EXAMPLE", "TrafficMirrorFilterId": "tmf-083e18f985EXAMPLE", "PacketLength": 20, "SessionNumber": 1, "TrafficMirrorSessionId": "tms-0567a4c684EXAMPLE" }, { "Tags": [ { "Key": "Name", "Value": "tag test" } ], "VirtualNetworkId": 13314501, "OwnerId": "111122223333", "Description": "TCP Session", "NetworkInterfaceId": "eni-0a471a5cf3EXAMPLE", "TrafficMirrorTargetId": "tmt-03665551cbEXAMPLE", "TrafficMirrorFilterId": "tmf-06c787846cEXAMPLE", "SessionNumber": 2, "TrafficMirrorSessionId": "tms-0060101cf8EXAMPLE" } ] }For more information, see View Traffic Mirror Session Details in the AWS Traffic Mirroring Guide.
-
For API details, see DescribeTrafficMirrorSessions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-traffic-mirror-targets.
- AWS CLI
-
To describe a traffic mirror target
The following
describe-traffic-mirror-targetsexample displays information about the specified traffic mirror target.aws ec2 describe-traffic-mirror-targets \ --traffic-mirror-target-idstmt-0dabe9b0a6EXAMPLEOutput:
{ "TrafficMirrorTargets": [ { "TrafficMirrorTargetId": "tmt-0dabe9b0a6EXAMPLE", "NetworkLoadBalancerArn": "arn:aws:elasticloadbalancing:us-east-1:111122223333:loadbalancer/net/NLB/7cdec873fEXAMPLE", "Type": "network-load-balancer", "Description": "Example Network Load Balancer target", "OwnerId": "111122223333", "Tags": [] } ] }For more information, see Traffic mirror targets in the Amazon VPC Traffic Mirroring Guide.
-
For API details, see DescribeTrafficMirrorTargets
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-attachments.
- AWS CLI
-
To view your transit gateway attachments
The following
describe-transit-gateway-attachmentsexample displays details for your transit gateway attachments.aws ec2 describe-transit-gateway-attachmentsOutput:
{ "TransitGatewayAttachments": [ { "TransitGatewayAttachmentId": "tgw-attach-01f8100bc7EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "TransitGatewayOwnerId": "123456789012", "ResourceOwnerId": "123456789012", "ResourceType": "vpc", "ResourceId": "vpc-3EXAMPLE", "State": "available", "Association": { "TransitGatewayRouteTableId": "tgw-rtb-002573ed1eEXAMPLE", "State": "associated" }, "CreationTime": "2019-08-26T14:59:25.000Z", "Tags": [ { "Key": "Name", "Value": "Example" } ] }, { "TransitGatewayAttachmentId": "tgw-attach-0b5968d3b6EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "TransitGatewayOwnerId": "123456789012", "ResourceOwnerId": "123456789012", "ResourceType": "vpc", "ResourceId": "vpc-0065acced4EXAMPLE", "State": "available", "Association": { "TransitGatewayRouteTableId": "tgw-rtb-002573ed1eEXAMPLE", "State": "associated" }, "CreationTime": "2019-08-07T17:03:07.000Z", "Tags": [] }, { "TransitGatewayAttachmentId": "tgw-attach-08e0bc912cEXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "TransitGatewayOwnerId": "123456789012", "ResourceOwnerId": "123456789012", "ResourceType": "direct-connect-gateway", "ResourceId": "11460968-4ac1-4fd3-bdb2-00599EXAMPLE", "State": "available", "Association": { "TransitGatewayRouteTableId": "tgw-rtb-002573ed1eEXAMPLE", "State": "associated" }, "CreationTime": "2019-08-14T20:27:44.000Z", "Tags": [] }, { "TransitGatewayAttachmentId": "tgw-attach-0a89069f57EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "TransitGatewayOwnerId": "123456789012", "ResourceOwnerId": "123456789012", "ResourceType": "direct-connect-gateway", "ResourceId": "8384da05-13ce-4a91-aada-5a1baEXAMPLE", "State": "available", "Association": { "TransitGatewayRouteTableId": "tgw-rtb-002573ed1eEXAMPLE", "State": "associated" }, "CreationTime": "2019-08-14T20:33:02.000Z", "Tags": [] } ] }For more information, see Work with transit gateways in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayAttachments
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-connect-peers.
- AWS CLI
-
To describe a Transit Gateway Connect peer
The following
describe-transit-gateway-connect-peersexample describes the specified Connect peer.aws ec2 describe-transit-gateway-connect-peers \ --transit-gateway-connect-peer-idstgw-connect-peer-0666adbac4EXAMPLEOutput:
{ "TransitGatewayConnectPeers": [ { "TransitGatewayAttachmentId": "tgw-attach-0f0927767cEXAMPLE", "TransitGatewayConnectPeerId": "tgw-connect-peer-0666adbac4EXAMPLE", "State": "available", "CreationTime": "2021-10-13T03:35:17.000Z", "ConnectPeerConfiguration": { "TransitGatewayAddress": "10.0.0.234", "PeerAddress": "172.31.1.11", "InsideCidrBlocks": [ "169.254.6.0/29" ], "Protocol": "gre", "BgpConfigurations": [ { "TransitGatewayAsn": 64512, "PeerAsn": 64512, "TransitGatewayAddress": "169.254.6.2", "PeerAddress": "169.254.6.1", "BgpStatus": "down" }, { "TransitGatewayAsn": 64512, "PeerAsn": 64512, "TransitGatewayAddress": "169.254.6.3", "PeerAddress": "169.254.6.1", "BgpStatus": "down" } ] }, "Tags": [] } ] }For more information, see Transit gateway Connect attachments and Transit Gateway Connect peers in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayConnectPeers
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-connects.
- AWS CLI
-
To describe a transit gateway Connect attachment
The following
describe-transit-gateway-connectsexample describes the specified Connect attachment.aws ec2 describe-transit-gateway-connects \ --transit-gateway-attachment-idstgw-attach-037012e5dcEXAMPLEOutput:
{ "TransitGatewayConnects": [ { "TransitGatewayAttachmentId": "tgw-attach-037012e5dcEXAMPLE", "TransportTransitGatewayAttachmentId": "tgw-attach-0a89069f57EXAMPLE", "TransitGatewayId": "tgw-02f776b1a7EXAMPLE", "State": "available", "CreationTime": "2021-03-09T19:59:17+00:00", "Options": { "Protocol": "gre" }, "Tags": [] } ] }For more information, see Transit gateway Connect attachments and Transit Gateway Connect peers in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayConnects
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-multicast-domains.
- AWS CLI
-
To describe your transit gateway multicast domains
The following
describe-transit-gateway-multicast-domainsexample displays details for all of your transit gateway multicast domains.aws ec2 describe-transit-gateway-multicast-domainsOutput:
{ "TransitGatewayMulticastDomains": [ { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-000fb24d04EXAMPLE", "TransitGatewayId": "tgw-0bf0bffefaEXAMPLE", "TransitGatewayMulticastDomainArn": "arn:aws:ec2:us-east-1:123456789012:transit-gateway-multicast-domain/tgw-mcast-domain-000fb24d04EXAMPLE", "OwnerId": "123456789012", "Options": { "Igmpv2Support": "disable", "StaticSourcesSupport": "enable", "AutoAcceptSharedAssociations": "disable" }, "State": "available", "CreationTime": "2019-12-10T18:32:50+00:00", "Tags": [ { "Key": "Name", "Value": "mc1" } ] } ] }For more information, see Managing multicast domains in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayMulticastDomains
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-peering-attachments.
- AWS CLI
-
To describe your transit gateway peering attachments
The following
describe-transit-gateway-peering-attachmentsexample displays details for all of your transit gateway peering attachments.aws ec2 describe-transit-gateway-peering-attachmentsOutput:
{ "TransitGatewayPeeringAttachments": [ { "TransitGatewayAttachmentId": "tgw-attach-4455667788aabbccd", "RequesterTgwInfo": { "TransitGatewayId": "tgw-123abc05e04123abc", "OwnerId": "123456789012", "Region": "us-west-2" }, "AccepterTgwInfo": { "TransitGatewayId": "tgw-11223344aabbcc112", "OwnerId": "123456789012", "Region": "us-east-2" }, "State": "pendingAcceptance", "CreationTime": "2019-12-09T11:38:05.000Z", "Tags": [] } ] }For more information, see Transit Gateway Peering Attachments in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayPeeringAttachments
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-policy-tables.
- AWS CLI
-
To describe a transit gateway policy table
The following
describe-transit-gateway-policy-tablesexample describes the specified transit gateway policy table.aws ec2 describe-transit-gateway-policy-tables \ --transit-gateway-policy-table-idstgw-ptb-0a16f134b78668a81Output:
{ "TransitGatewayPolicyTables": [ { "TransitGatewayPolicyTableId": "tgw-ptb-0a16f134b78668a81", "TransitGatewayId": "tgw-067f8505c18f0bd6e", "State": "available", "CreationTime": "2023-11-28T16:36:43+00:00", "Tags": [] } ] }For more information, see Transit gateway policy tables in the Transit Gateway User Guide.
-
For API details, see DescribeTransitGatewayPolicyTables
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-route-tables.
- AWS CLI
-
To describe your transit gateway route tables
The following
describe-transit-gateway-route-tablesexample displays details for your transit gateway route tables.aws ec2 describe-transit-gateway-route-tablesOutput:
{ "TransitGatewayRouteTables": [ { "TransitGatewayRouteTableId": "tgw-rtb-0ca78a549EXAMPLE", "TransitGatewayId": "tgw-0bc994abffEXAMPLE", "State": "available", "DefaultAssociationRouteTable": true, "DefaultPropagationRouteTable": true, "CreationTime": "2018-11-28T14:24:49.000Z", "Tags": [] }, { "TransitGatewayRouteTableId": "tgw-rtb-0e8f48f148EXAMPLE", "TransitGatewayId": "tgw-0043d72bb4EXAMPLE", "State": "available", "DefaultAssociationRouteTable": true, "DefaultPropagationRouteTable": true, "CreationTime": "2018-11-28T14:24:00.000Z", "Tags": [] } ] }For more information, see View transit gateway route tables in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayRouteTables
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateway-vpc-attachments.
- AWS CLI
-
To describe your transit gateway VPC attachments
The following
describe-transit-gateway-vpc-attachmentsexample displays details for your transit gateway VPC attachments.aws ec2 describe-transit-gateway-vpc-attachmentsOutput:
{ "TransitGatewayVpcAttachments": [ { "TransitGatewayAttachmentId": "tgw-attach-0a08e88308EXAMPLE", "TransitGatewayId": "tgw-0043d72bb4EXAMPLE", "VpcId": "vpc-0f501f7ee8EXAMPLE", "VpcOwnerId": "111122223333", "State": "available", "SubnetIds": [ "subnet-045d586432EXAMPLE", "subnet-0a0ad478a6EXAMPLE" ], "CreationTime": "2019-02-13T11:04:02.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" }, "Tags": [ { "Key": "Name", "Value": "attachment name" } ] } ] }For more information, see View your VPC attachments in the Transit Gateways Guide.
-
For API details, see DescribeTransitGatewayVpcAttachments
in AWS CLI Command Reference.
-
The following code example shows how to use describe-transit-gateways.
- AWS CLI
-
To describe your transit gateways
The following
describe-transit-gatewaysexample retrieves details about your transit gateways.aws ec2 describe-transit-gatewaysOutput:
{ "TransitGateways": [ { "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "TransitGatewayArn": "arn:aws:ec2:us-east-2:111122223333:transit-gateway/tgw-0262a0e521EXAMPLE", "State": "available", "OwnerId": "111122223333", "Description": "MyTGW", "CreationTime": "2019-07-10T14:02:12.000Z", "Options": { "AmazonSideAsn": 64516, "AutoAcceptSharedAttachments": "enable", "DefaultRouteTableAssociation": "enable", "AssociationDefaultRouteTableId": "tgw-rtb-018774adf3EXAMPLE", "DefaultRouteTablePropagation": "enable", "PropagationDefaultRouteTableId": "tgw-rtb-018774adf3EXAMPLE", "VpnEcmpSupport": "enable", "DnsSupport": "enable" }, "Tags": [] }, { "TransitGatewayId": "tgw-0fb8421e2dEXAMPLE", "TransitGatewayArn": "arn:aws:ec2:us-east-2:111122223333:transit-gateway/tgw-0fb8421e2da853bf3", "State": "available", "OwnerId": "111122223333", "CreationTime": "2019-03-15T22:57:33.000Z", "Options": { "AmazonSideAsn": 65412, "AutoAcceptSharedAttachments": "disable", "DefaultRouteTableAssociation": "enable", "AssociationDefaultRouteTableId": "tgw-rtb-06a241a3d8EXAMPLE", "DefaultRouteTablePropagation": "enable", "PropagationDefaultRouteTableId": "tgw-rtb-06a241a3d8EXAMPLE", "VpnEcmpSupport": "enable", "DnsSupport": "enable" }, "Tags": [ { "Key": "Name", "Value": "TGW1" } ] } ] }-
For API details, see DescribeTransitGateways
in AWS CLI Command Reference.
-
The following code example shows how to use describe-verified-access-endpoints.
- AWS CLI
-
To describe a Verified Access endpoint
The following
describe-verified-access-endpointsexample describes the specified Verified Access endpoint.aws ec2 describe-verified-access-endpoints \ --verified-access-endpoint-idsvae-066fac616d4d546f2Output:
{ "VerifiedAccessEndpoints": [ { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessEndpointId": "vae-066fac616d4d546f2", "ApplicationDomain": "example.com", "EndpointType": "network-interface", "AttachmentType": "vpc", "DomainCertificateArn": "arn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE", "EndpointDomain": "my-ava-app.edge-00c3372d53b1540bb.vai-0ce000c0b7643abea.prod.verified-access.us-east-2.amazonaws.com", "SecurityGroupIds": [ "sg-004915970c4c8f13a" ], "NetworkInterfaceOptions": { "NetworkInterfaceId": "eni-0aec70418c8d87a0f", "Protocol": "https", "Port": 443 }, "Status": { "Code": "active" }, "Description": "", "CreationTime": "2023-08-25T20:54:43", "LastUpdatedTime": "2023-08-25T22:17:26", "Tags": [ { "Key": "Name", "Value": "my-va-endpoint" } ] } ] }For more information, see Verified Access endpoints in the AWS Verified Access User Guide.
-
For API details, see DescribeVerifiedAccessEndpoints
in AWS CLI Command Reference.
-
The following code example shows how to use describe-verified-access-groups.
- AWS CLI
-
To describe a Verified Access group
The following
describe-verified-access-groupsexample describes the specified Verified Access group.aws ec2 describe-verified-access-groups \ --verified-access-group-idsvagr-0dbe967baf14b7235Output:
{ "VerifiedAccessGroups": [ { "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "Owner": "123456789012", "VerifiedAccessGroupArn": "arn:aws:ec2:us-east-2:123456789012:verified-access-group/vagr-0dbe967baf14b7235", "CreationTime": "2023-08-25T19:55:19", "LastUpdatedTime": "2023-08-25T22:17:25", "Tags": [ { "Key": "Name", "Value": "my-va-group" } ] } ] }For more information, see Verified Access groups in the AWS Verified Access User Guide.
-
For API details, see DescribeVerifiedAccessGroups
in AWS CLI Command Reference.
-
The following code example shows how to use describe-verified-access-instance-logging-configurations.
- AWS CLI
-
To describe the logging configuration for a Verified Access instance
The following
describe-verified-access-instance-logging-configurationsexample describes the logging configuration for the specified Verified Access instance.aws ec2 describe-verified-access-instance-logging-configurations \ --verified-access-instance-idsvai-0ce000c0b7643abeaOutput:
{ "LoggingConfigurations": [ { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "AccessLogs": { "S3": { "Enabled": false }, "CloudWatchLogs": { "Enabled": true, "DeliveryStatus": { "Code": "success" }, "LogGroup": "my-log-group" }, "KinesisDataFirehose": { "Enabled": false }, "LogVersion": "ocsf-1.0.0-rc.2", "IncludeTrustContext": false } } ] }For more information, see Verified Access logs in the AWS Verified Access User Guide.
-
For API details, see DescribeVerifiedAccessInstanceLoggingConfigurations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-verified-access-instances.
- AWS CLI
-
To describe a Verified Access instance
The following
describe-verified-access-instancesexample describes the specified Verified Access instance.aws ec2 describe-verified-access-instances \ --verified-access-instance-idsvai-0ce000c0b7643abeaOutput:
{ "VerifiedAccessInstances": [ { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "VerifiedAccessTrustProviders": [ { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center" } ], "CreationTime": "2023-08-25T18:27:56", "LastUpdatedTime": "2023-08-25T19:03:32", "Tags": [ { "Key": "Name", "Value": "my-ava-instance" } ] } ] }For more information, see Verified Access instances in the AWS Verified Access User Guide.
-
For API details, see DescribeVerifiedAccessInstances
in AWS CLI Command Reference.
-
The following code example shows how to use describe-verified-access-trust-providers.
- AWS CLI
-
To describe a Verified Access trust provider
The following
describe-verified-access-trust-providersexample describes the specified Verified Access trust provider.aws ec2 describe-verified-access-trust-providers \ --verified-access-trust-provider-idsvatp-0bb32de759a3e19e7Output:
{ "VerifiedAccessTrustProviders": [ { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "Description": "Testing Verified Access", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center", "PolicyReferenceName": "idc", "CreationTime": "2023-08-25T19:00:38", "LastUpdatedTime": "2023-08-25T19:03:32", "Tags": [ { "Key": "Name", "Value": "my-va-trust-provider" } ] } ] }For more information, see Trust providers for Verified Access in the AWS Verified Access User Guide.
-
For API details, see DescribeVerifiedAccessTrustProviders
in AWS CLI Command Reference.
-
The following code example shows how to use describe-volume-attribute.
- AWS CLI
-
To describe a volume attribute
This example command describes the
autoEnableIoattribute of the volume with the IDvol-049df61146c4d7901.Command:
aws ec2 describe-volume-attribute --volume-idvol-049df61146c4d7901--attributeautoEnableIOOutput:
{ "AutoEnableIO": { "Value": false }, "VolumeId": "vol-049df61146c4d7901" }-
For API details, see DescribeVolumeAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-volume-status.
- AWS CLI
-
To describe the status of a single volume
This example command describes the status for the volume
vol-1234567890abcdef0.Command:
aws ec2 describe-volume-status --volume-idsvol-1234567890abcdef0Output:
{ "VolumeStatuses": [ { "VolumeStatus": { "Status": "ok", "Details": [ { "Status": "passed", "Name": "io-enabled" }, { "Status": "not-applicable", "Name": "io-performance" } ] }, "AvailabilityZone": "us-east-1a", "VolumeId": "vol-1234567890abcdef0", "Actions": [], "Events": [] } ] }To describe the status of impaired volumes
This example command describes the status for all volumes that are impaired. In this example output, there are no impaired volumes.
Command:
aws ec2 describe-volume-status --filtersName=volume-status.status,Values=impairedOutput:
{ "VolumeStatuses": [] }If you have a volume with a failed status check (status is impaired), see Working with an Impaired Volume in the Amazon EC2 User Guide.
-
For API details, see DescribeVolumeStatus
in AWS CLI Command Reference.
-
The following code example shows how to use describe-volumes-modifications.
- AWS CLI
-
To describe the modification status for a volume
The following
describe-volumes-modificationsexample describes the volume modification status of the specified volume.aws ec2 describe-volumes-modifications \ --volume-idsvol-1234567890abcdef0Output:
{ "VolumeModification": { "TargetSize": 150, "TargetVolumeType": "io1", "ModificationState": "optimizing", "VolumeId": " vol-1234567890abcdef0", "TargetIops": 100, "StartTime": "2019-05-17T11:27:19.000Z", "Progress": 70, "OriginalVolumeType": "io1", "OriginalIops": 100, "OriginalSize": 100 } }-
For API details, see DescribeVolumesModifications
in AWS CLI Command Reference.
-
The following code example shows how to use describe-volumes.
- AWS CLI
-
Example 1: To describe a volume
The following
describe-volumesexample describes the specified volumes in the current Region.aws ec2 describe-volumes \ --volume-idsvol-049df61146c4d7901vol-1234567890abcdef0Output:
{ "Volumes": [ { "AvailabilityZone": "us-east-1a", "Attachments": [ { "AttachTime": "2013-12-18T22:35:00.000Z", "InstanceId": "i-1234567890abcdef0", "VolumeId": "vol-049df61146c4d7901", "State": "attached", "DeleteOnTermination": true, "Device": "/dev/sda1" } ], "Encrypted": true, "KmsKeyId": "arn:aws:kms:us-east-2a:123456789012:key/8c5b2c63-b9bc-45a3-a87a-5513eEXAMPLE, "VolumeType": "gp2", "VolumeId": "vol-049df61146c4d7901", "State": "in-use", "Iops": 100, "SnapshotId": "snap-1234567890abcdef0", "CreateTime": "2019-12-18T22:35:00.084Z", "Size": 8 }, { "AvailabilityZone": "us-east-1a", "Attachments": [], "Encrypted": false, "VolumeType": "gp2", "VolumeId": "vol-1234567890abcdef0", "State": "available", "Iops": 300, "SnapshotId": "", "CreateTime": "2020-02-27T00:02:41.791Z", "Size": 100 } ] }Example 2: To describe volumes that are attached to a specific instance
The following
describe-volumesexample describes all volumes that are both attached to the specified instance and set to delete when the instance terminates.aws ec2 describe-volumes \ --regionus-east-1\ --filtersName=attachment.instance-id,Values=i-1234567890abcdef0Name=attachment.delete-on-termination,Values=trueFor an example of the output for
describe-volumes, see Example 1.Example 3: To describe available volumes in a specific Availability Zone
The following
describe-volumesexample describes all volumes that have a status ofavailableand are in the specified Availability Zone.aws ec2 describe-volumes \ --filtersName=status,Values=availableName=availability-zone,Values=us-east-1aFor an example of the output for
describe-volumes, see Example 1.Example 4: To describe volumes based on tags
The following
describe-volumesexample describes all volumes that have the tag keyNameand a value that begins withTest. The output is then filtered with a query that displays only the tags and IDs of the volumes.aws ec2 describe-volumes \ --filtersName=tag:Name,Values=Test*\ --query"Volumes[*].{ID:VolumeId,Tag:Tags}"Output:
[ { "Tag": [ { "Value": "Test2", "Key": "Name" } ], "ID": "vol-1234567890abcdef0" }, { "Tag": [ { "Value": "Test1", "Key": "Name" } ], "ID": "vol-049df61146c4d7901" } ]For additional examples using tag filters, see Working with tags in the Amazon EC2 User Guide.
-
For API details, see DescribeVolumes
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-attribute.
- AWS CLI
-
To describe the enableDnsSupport attribute
This example describes the
enableDnsSupportattribute. This attribute indicates whether DNS resolution is enabled for the VPC. If this attribute istrue, the Amazon DNS server resolves DNS hostnames for your instances to their corresponding IP addresses; otherwise, it does not.Command:
aws ec2 describe-vpc-attribute --vpc-idvpc-a01106c2--attributeenableDnsSupportOutput:
{ "VpcId": "vpc-a01106c2", "EnableDnsSupport": { "Value": true } }To describe the enableDnsHostnames attribute
This example describes the
enableDnsHostnamesattribute. This attribute indicates whether the instances launched in the VPC get DNS hostnames. If this attribute istrue, instances in the VPC get DNS hostnames; otherwise, they do not.Command:
aws ec2 describe-vpc-attribute --vpc-idvpc-a01106c2--attributeenableDnsHostnamesOutput:
{ "VpcId": "vpc-a01106c2", "EnableDnsHostnames": { "Value": true } }-
For API details, see DescribeVpcAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-classic-link-dns-support.
- AWS CLI
-
To describe ClassicLink DNS support for your VPCs
This example describes the ClassicLink DNS support status of all of your VPCs.
Command:
aws ec2 describe-vpc-classic-link-dns-supportOutput:
{ "Vpcs": [ { "VpcId": "vpc-88888888", "ClassicLinkDnsSupported": true }, { "VpcId": "vpc-1a2b3c4d", "ClassicLinkDnsSupported": false } ] }-
For API details, see DescribeVpcClassicLinkDnsSupport
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-classic-link.
- AWS CLI
-
To describe the ClassicLink status of your VPCs
This example lists the ClassicLink status of vpc-88888888.
Command:
aws ec2 describe-vpc-classic-link --vpc-idvpc-88888888Output:
{ "Vpcs": [ { "ClassicLinkEnabled": true, "VpcId": "vpc-88888888", "Tags": [ { "Value": "classiclinkvpc", "Key": "Name" } ] } ] }This example lists only VPCs that are enabled for Classiclink (the filter value of
is-classic-link-enabledis set totrue).Command:
aws ec2 describe-vpc-classic-link --filter"Name=is-classic-link-enabled,Values=true"-
For API details, see DescribeVpcClassicLink
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoint-associations.
- AWS CLI
-
To describe VPC endpoint associations
The following
describe-vpc-endpoint-associationsexample describes your VPC endpoint associations.aws ec2 describe-vpc-endpoint-associationsOutput:
{ "VpcEndpointAssociations": [ { "Id": "vpce-rsc-asc-0a810ca6ac8866bf9", "VpcEndpointId": "vpce-019b90d6f16d4f958", "AssociatedResourceAccessibility": "Accessible", "DnsEntry": { "DnsName": "vpce-019b90d6f16d4f958.rcfg-07129f3acded87625.4232ccc.vpc-lattice-rsc.us-east-2.on.aws", "HostedZoneId": "Z03265862FOUNWMZOKUF4" }, "AssociatedResourceArn": "arn:aws:vpc-lattice:us-east-1:123456789012:resourceconfiguration/rcfg-07129f3acded87625" } ] }For more information, see Manage VPC endpoint associations in the AWS PrivateLink User Guide.
-
For API details, see DescribeVpcEndpointAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoint-connection-notifications.
- AWS CLI
-
To describe endpoint connection notifications
The following
describe-vpc-endpoint-connection-notificationsexample describes all of your endpoint connection notifications.aws ec2 describe-vpc-endpoint-connection-notificationsOutput:
{ "ConnectionNotificationSet": [ { "ConnectionNotificationState": "Enabled", "ConnectionNotificationType": "Topic", "ConnectionEvents": [ "Accept", "Reject", "Delete", "Connect" ], "ConnectionNotificationId": "vpce-nfn-04bcb952bc8af7abc", "ConnectionNotificationArn": "arn:aws:sns:us-east-1:123456789012:VpceNotification", "VpcEndpointId": "vpce-0324151a02f327123" } ] }-
For API details, see DescribeVpcEndpointConnectionNotifications
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoint-connections.
- AWS CLI
-
To describe VPC endpoint connections
This example describes the interface endpoint connections to your endpoint service and filters the results to display endpoints that are
PendingAcceptance.Command:
aws ec2 describe-vpc-endpoint-connections --filtersName=vpc-endpoint-state,Values=pendingAcceptanceOutput:
{ "VpcEndpointConnections": [ { "VpcEndpointId": "vpce-0abed31004e618123", "ServiceId": "vpce-svc-0abced088d20def56", "CreationTimestamp": "2017-11-30T10:00:24.350Z", "VpcEndpointState": "pendingAcceptance", "VpcEndpointOwner": "123456789012" } ] }-
For API details, see DescribeVpcEndpointConnections
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoint-service-configurations.
- AWS CLI
-
To describe endpoint service configurations
The following
describe-vpc-endpoint-service-configurationsexample describes your endpoint service configurations.aws ec2 describe-vpc-endpoint-service-configurationsOutput:
{ "ServiceConfigurations": [ { "ServiceType": [ { "ServiceType": "GatewayLoadBalancer" } ], "ServiceId": "vpce-svc-012d33a1c4321cabc", "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-012d33a1c4321cabc", "ServiceState": "Available", "AvailabilityZones": [ "us-east-1d" ], "AcceptanceRequired": false, "ManagesVpcEndpoints": false, "GatewayLoadBalancerArns": [ "arn:aws:elasticloadbalancing:us-east-1:123456789012:loadbalancer/gwy/GWLBService/123210844e429123" ], "Tags": [] }, { "ServiceType": [ { "ServiceType": "Interface" } ], "ServiceId": "vpce-svc-123cabc125efa123", "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-123cabc125efa123", "ServiceState": "Available", "AvailabilityZones": [ "us-east-1a" ], "AcceptanceRequired": true, "ManagesVpcEndpoints": false, "NetworkLoadBalancerArns": [ "arn:aws:elasticloadbalancing:us-east-1:123456789012:loadbalancer/net/NLBforService/1238753950b25123" ], "BaseEndpointDnsNames": [ "vpce-svc-123cabc125efa123.us-east-1.vpce.amazonaws.com" ], "PrivateDnsName": "example.com", "PrivateDnsNameConfiguration": { "State": "failed", "Type": "TXT", "Value": "vpce:qUAth3FdeABCApUiXabc", "Name": "_1d367jvbg34znqvyefrj" }, "Tags": [] } ] }For more information, see Concepts in the AWS PrivateLink User Guide.
-
For API details, see DescribeVpcEndpointServiceConfigurations
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoint-service-permissions.
- AWS CLI
-
To describe endpoint service permissions
This example describes the permissions for the specified endpoint service.
Command:
aws ec2 describe-vpc-endpoint-service-permissions --service-idvpce-svc-03d5ebb7d9579a2b3Output:
{ "AllowedPrincipals": [ { "PrincipalType": "Account", "Principal": "arn:aws:iam::123456789012:root" } ] }-
For API details, see DescribeVpcEndpointServicePermissions
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoint-services.
- AWS CLI
-
Example 1: To describe all VPC endpoint services
The following
describe-vpc-endpoint-servicesexample lists all VPC endpoint services for an AWS Region.aws ec2 describe-vpc-endpoint-servicesOutput:
{ "ServiceDetails": [ { "ServiceType": [ { "ServiceType": "Gateway" } ], "AcceptanceRequired": false, "ServiceName": "com.amazonaws.us-east-1.dynamodb", "VpcEndpointPolicySupported": true, "Owner": "amazon", "AvailabilityZones": [ "us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d", "us-east-1e", "us-east-1f" ], "BaseEndpointDnsNames": [ "dynamodb.us-east-1.amazonaws.com" ] }, { "ServiceType": [ { "ServiceType": "Interface" } ], "PrivateDnsName": "ec2.us-east-1.amazonaws.com", "ServiceName": "com.amazonaws.us-east-1.ec2", "VpcEndpointPolicySupported": false, "Owner": "amazon", "AvailabilityZones": [ "us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d", "us-east-1e", "us-east-1f" ], "AcceptanceRequired": false, "BaseEndpointDnsNames": [ "ec2.us-east-1.vpce.amazonaws.com" ] }, { "ServiceType": [ { "ServiceType": "Interface" } ], "PrivateDnsName": "ssm.us-east-1.amazonaws.com", "ServiceName": "com.amazonaws.us-east-1.ssm", "VpcEndpointPolicySupported": true, "Owner": "amazon", "AvailabilityZones": [ "us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d", "us-east-1e" ], "AcceptanceRequired": false, "BaseEndpointDnsNames": [ "ssm.us-east-1.vpce.amazonaws.com" ] } ], "ServiceNames": [ "com.amazonaws.us-east-1.dynamodb", "com.amazonaws.us-east-1.ec2", "com.amazonaws.us-east-1.ec2messages", "com.amazonaws.us-east-1.elasticloadbalancing", "com.amazonaws.us-east-1.kinesis-streams", "com.amazonaws.us-east-1.s3", "com.amazonaws.us-east-1.ssm" ] }Example 2: To describe the details about an endpoint service
The following
describe-vpc-endpoint-servicesexample lists the details of the Amazon S3 interface endpoint service.aws ec2 describe-vpc-endpoint-services \ --filter 'Name=service-type,Values=Interface'Name=service-name,Values=com.amazonaws.us-east-1.s3Output:
{ "ServiceDetails": [ { "ServiceName": "com.amazonaws.us-east-1.s3", "ServiceId": "vpce-svc-081d84efcdEXAMPLE", "ServiceType": [ { "ServiceType": "Interface" } ], "AvailabilityZones": [ "us-east-1a", "us-east-1b", "us-east-1c", "us-east-1d", "us-east-1e", "us-east-1f" ], "Owner": "amazon", "BaseEndpointDnsNames": [ "s3.us-east-1.vpce.amazonaws.com" ], "VpcEndpointPolicySupported": true, "AcceptanceRequired": false, "ManagesVpcEndpoints": false, "Tags": [] } ], "ServiceNames": [ "com.amazonaws.us-east-1.s3" ] }For more information, see View available AWS service names in the AWS PrivateLink User Guide.
-
For API details, see DescribeVpcEndpointServices
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-endpoints.
- AWS CLI
-
To describe your VPC endpoints
The following
describe-vpc-endpointsexample displays details for all of your VPC endpoints.aws ec2 describe-vpc-endpointsOutput:
{ "VpcEndpoints": [ { "PolicyDocument": "{\"Version\":\"2008-10-17\",\"Statement\":[{\"Effect\":\"Allow\",\"Principal\":\"*\",\"Action\":\"*\",\"Resource\":\"*\"}]}", "VpcId": "vpc-aabb1122", "NetworkInterfaceIds": [], "SubnetIds": [], "PrivateDnsEnabled": true, "State": "available", "ServiceName": "com.amazonaws.us-east-1.dynamodb", "RouteTableIds": [ "rtb-3d560345" ], "Groups": [], "VpcEndpointId": "vpce-032a826a", "VpcEndpointType": "Gateway", "CreationTimestamp": "2017-09-05T20:41:28Z", "DnsEntries": [], "OwnerId": "123456789012" }, { "PolicyDocument": "{\n \"Statement\": [\n {\n \"Action\": \"*\", \n \"Effect\": \"Allow\", \n \"Principal\": \"*\", \n \"Resource\": \"*\"\n }\n ]\n}", "VpcId": "vpc-1a2b3c4d", "NetworkInterfaceIds": [ "eni-2ec2b084", "eni-1b4a65cf" ], "SubnetIds": [ "subnet-d6fcaa8d", "subnet-7b16de0c" ], "PrivateDnsEnabled": false, "State": "available", "ServiceName": "com.amazonaws.us-east-1.elasticloadbalancing", "RouteTableIds": [], "Groups": [ { "GroupName": "default", "GroupId": "sg-54e8bf31" } ], "VpcEndpointId": "vpce-0f89a33420c1931d7", "VpcEndpointType": "Interface", "CreationTimestamp": "2017-09-05T17:55:27.583Z", "DnsEntries": [ { "HostedZoneId": "Z7HUB22UULQXV", "DnsName": "vpce-0f89a33420c1931d7-bluzidnv.elasticloadbalancing.us-east-1.vpce.amazonaws.com" }, { "HostedZoneId": "Z7HUB22UULQXV", "DnsName": "vpce-0f89a33420c1931d7-bluzidnv-us-east-1b.elasticloadbalancing.us-east-1.vpce.amazonaws.com" }, { "HostedZoneId": "Z7HUB22UULQXV", "DnsName": "vpce-0f89a33420c1931d7-bluzidnv-us-east-1a.elasticloadbalancing.us-east-1.vpce.amazonaws.com" } ], "OwnerId": "123456789012" }, { "VpcEndpointId": "vpce-aabbaabbaabbaabba", "VpcEndpointType": "GatewayLoadBalancer", "VpcId": "vpc-111122223333aabbc", "ServiceName": "com.amazonaws.vpce.us-east-1.vpce-svc-123123a1c43abc123", "State": "available", "SubnetIds": [ "subnet-0011aabbcc2233445" ], "RequesterManaged": false, "NetworkInterfaceIds": [ "eni-01010120203030405" ], "CreationTimestamp": "2020-11-11T08:06:03.522Z", "Tags": [], "OwnerId": "123456789012" } ] }For more information, see Concepts in the AWS PrivateLink User Guide.
-
For API details, see DescribeVpcEndpoints
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpc-peering-connections.
- AWS CLI
-
To describe your VPC peering connections
This example describes all of your VPC peering connections.
Command:
aws ec2 describe-vpc-peering-connectionsOutput:
{ "VpcPeeringConnections": [ { "Status": { "Message": "Active", "Code": "active" }, "Tags": [ { "Value": "Peering-1", "Key": "Name" } ], "AccepterVpcInfo": { "OwnerId": "111122223333", "VpcId": "vpc-1a2b3c4d", "CidrBlock": "10.0.1.0/28" }, "VpcPeeringConnectionId": "pcx-11122233", "RequesterVpcInfo": { "PeeringOptions": { "AllowEgressFromLocalVpcToRemoteClassicLink": false, "AllowEgressFromLocalClassicLinkToRemoteVpc": false }, "OwnerId": "444455556666", "VpcId": "vpc-123abc45", "CidrBlock": "192.168.0.0/16" } }, { "Status": { "Message": "Pending Acceptance by 444455556666", "Code": "pending-acceptance" }, "Tags": [], "RequesterVpcInfo": { "PeeringOptions": { "AllowEgressFromLocalVpcToRemoteClassicLink": false, "AllowEgressFromLocalClassicLinkToRemoteVpc": false }, "OwnerId": "444455556666", "VpcId": "vpc-11aa22bb", "CidrBlock": "10.0.0.0/28" }, "VpcPeeringConnectionId": "pcx-abababab", "ExpirationTime": "2014-04-03T09:12:43.000Z", "AccepterVpcInfo": { "OwnerId": "444455556666", "VpcId": "vpc-33cc44dd" } } ] }To describe specific VPC peering connections
This example describes all of your VPC peering connections that are in the pending-acceptance state.
Command:
aws ec2 describe-vpc-peering-connections --filtersName=status-code,Values=pending-acceptanceThis example describes all of your VPC peering connections that have the tag Owner=Finance.
Command:
aws ec2 describe-vpc-peering-connections --filtersName=tag:Owner,Values=FinanceThis example describes all of the VPC peering connections you requested for the specified VPC, vpc-1a2b3c4d.
Command:
aws ec2 describe-vpc-peering-connections --filtersName=requester-vpc-info.vpc-id,Values=vpc-1a2b3c4d-
For API details, see DescribeVpcPeeringConnections
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpcs.
- AWS CLI
-
Example 1: To describe all of your VPCs
The following
describe-vpcsexample retrieves details about your VPCs.aws ec2 describe-vpcsOutput:
{ "Vpcs": [ { "CidrBlock": "30.1.0.0/16", "DhcpOptionsId": "dopt-19edf471", "State": "available", "VpcId": "vpc-0e9801d129EXAMPLE", "OwnerId": "111122223333", "InstanceTenancy": "default", "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-062c64cfafEXAMPLE", "CidrBlock": "30.1.0.0/16", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false, "Tags": [ { "Key": "Name", "Value": "Not Shared" } ] }, { "CidrBlock": "10.0.0.0/16", "DhcpOptionsId": "dopt-19edf471", "State": "available", "VpcId": "vpc-06e4ab6c6cEXAMPLE", "OwnerId": "222222222222", "InstanceTenancy": "default", "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-00b17b4eddEXAMPLE", "CidrBlock": "10.0.0.0/16", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false, "Tags": [ { "Key": "Name", "Value": "Shared VPC" } ] } ] }Example 2: To describe a specified VPC
The following
describe-vpcsexample retrieves details for the specified VPC.aws ec2 describe-vpcs \ --vpc-idsvpc-06e4ab6c6cEXAMPLEOutput:
{ "Vpcs": [ { "CidrBlock": "10.0.0.0/16", "DhcpOptionsId": "dopt-19edf471", "State": "available", "VpcId": "vpc-06e4ab6c6cEXAMPLE", "OwnerId": "111122223333", "InstanceTenancy": "default", "CidrBlockAssociationSet": [ { "AssociationId": "vpc-cidr-assoc-00b17b4eddEXAMPLE", "CidrBlock": "10.0.0.0/16", "CidrBlockState": { "State": "associated" } } ], "IsDefault": false, "Tags": [ { "Key": "Name", "Value": "Shared VPC" } ] } ] }-
For API details, see DescribeVpcs
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpn-connections.
- AWS CLI
-
Example 1: To describe your VPN connections
The following
describe-vpn-connectionsexample describes all of your Site-to-Site VPN connections.aws ec2 describe-vpn-connectionsOutput:
{ "VpnConnections": [ { "CustomerGatewayConfiguration": "...configuration information...", "CustomerGatewayId": "cgw-01234567abcde1234", "Category": "VPN", "State": "available", "Type": "ipsec.1", "VpnConnectionId": "vpn-1122334455aabbccd", "TransitGatewayId": "tgw-00112233445566aab", "Options": { "EnableAcceleration": false, "StaticRoutesOnly": true, "LocalIpv4NetworkCidr": "0.0.0.0/0", "RemoteIpv4NetworkCidr": "0.0.0.0/0", "TunnelInsideIpVersion": "ipv4" }, "Routes": [], "Tags": [ { "Key": "Name", "Value": "CanadaVPN" } ], "VgwTelemetry": [ { "AcceptedRouteCount": 0, "LastStatusChange": "2020-07-29T10:35:11.000Z", "OutsideIpAddress": "203.0.113.3", "Status": "DOWN", "StatusMessage": "" }, { "AcceptedRouteCount": 0, "LastStatusChange": "2020-09-02T09:09:33.000Z", "OutsideIpAddress": "203.0.113.5", "Status": "UP", "StatusMessage": "" } ] } ] }For more information, see How AWS Site-to-Site VPN works in the AWS Site-to-Site VPN User Guide.
Example 2: To describe your available VPN connections
The following
describe-vpn-connectionsexample describes your Site-to-Site VPN connections with a state ofavailable.aws ec2 describe-vpn-connections \ --filters"Name=state,Values=available"For more information, see How AWS Site-to-Site VPN works in the AWS Site-to-Site VPN User Guide.
-
For API details, see DescribeVpnConnections
in AWS CLI Command Reference.
-
The following code example shows how to use describe-vpn-gateways.
- AWS CLI
-
To describe your virtual private gateways
This example describes your virtual private gateways.
Command:
aws ec2 describe-vpn-gatewaysOutput:
{ "VpnGateways": [ { "State": "available", "Type": "ipsec.1", "VpnGatewayId": "vgw-f211f09b", "VpcAttachments": [ { "State": "attached", "VpcId": "vpc-98eb5ef5" } ] }, { "State": "available", "Type": "ipsec.1", "VpnGatewayId": "vgw-9a4cacf3", "VpcAttachments": [ { "State": "attaching", "VpcId": "vpc-a01106c2" } ] } ] }-
For API details, see DescribeVpnGateways
in AWS CLI Command Reference.
-
The following code example shows how to use detach-classic-link-vpc.
- AWS CLI
-
To unlink (detach) an EC2-Classic instance from a VPC
This example unlinks instance i-0598c7d356eba48d7 from VPC vpc-88888888.
Command:
aws ec2 detach-classic-link-vpc --instance-idi-0598c7d356eba48d7--vpc-idvpc-88888888Output:
{ "Return": true }-
For API details, see DetachClassicLinkVpc
in AWS CLI Command Reference.
-
The following code example shows how to use detach-internet-gateway.
- AWS CLI
-
To detach an internet gateway from your VPC
The following
detach-internet-gatewayexample detaches the specified internet gateway from the specific VPC.aws ec2 detach-internet-gateway \ --internet-gateway-idigw-0d0fb496b3EXAMPLE\ --vpc-idvpc-0a60eb65b4EXAMPLEThis command produces no output.
For more information, see Internet gateways in the Amazon VPC User Guide.
-
For API details, see DetachInternetGateway
in AWS CLI Command Reference.
-
The following code example shows how to use detach-network-interface.
- AWS CLI
-
To detach a network interface from your instance
This example detaches the specified network interface from the specified instance. If the command succeeds, no output is returned.
Command:
aws ec2 detach-network-interface --attachment-ideni-attach-66c4350a-
For API details, see DetachNetworkInterface
in AWS CLI Command Reference.
-
The following code example shows how to use detach-verified-access-trust-provider.
- AWS CLI
-
To detach a trust provider from an instance
The following
detach-verified-access-trust-providerexample detaches the specified Verified Access trust provider from the specified Verified Access instance.aws ec2 detach-verified-access-trust-provider \ --verified-access-instance-idvai-0ce000c0b7643abea\ --verified-access-trust-provider-idvatp-0bb32de759a3e19e7Output:
{ "VerifiedAccessTrustProvider": { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "Description": "Testing Verified Access", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center", "PolicyReferenceName": "idc", "CreationTime": "2023-08-25T19:00:38", "LastUpdatedTime": "2023-08-25T19:00:38" }, "VerifiedAccessInstance": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "VerifiedAccessTrustProviders": [], "CreationTime": "2023-08-25T18:27:56", "LastUpdatedTime": "2023-08-25T18:27:56" } }For more information, see Verified Access instances in the AWS Verified Access User Guide.
-
For API details, see DetachVerifiedAccessTrustProvider
in AWS CLI Command Reference.
-
The following code example shows how to use detach-volume.
- AWS CLI
-
To detach a volume from an instance
This example command detaches the volume (
vol-049df61146c4d7901) from the instance it is attached to.Command:
aws ec2 detach-volume --volume-idvol-1234567890abcdef0Output:
{ "AttachTime": "2014-02-27T19:23:06.000Z", "InstanceId": "i-1234567890abcdef0", "VolumeId": "vol-049df61146c4d7901", "State": "detaching", "Device": "/dev/sdb" }-
For API details, see DetachVolume
in AWS CLI Command Reference.
-
The following code example shows how to use detach-vpn-gateway.
- AWS CLI
-
To detach a virtual private gateway from your VPC
This example detaches the specified virtual private gateway from the specified VPC. If the command succeeds, no output is returned.
Command:
aws ec2 detach-vpn-gateway --vpn-gateway-idvgw-9a4cacf3--vpc-idvpc-a01106c2-
For API details, see DetachVpnGateway
in AWS CLI Command Reference.
-
The following code example shows how to use disable-address-transfer.
- AWS CLI
-
To disable an Elastic IP address transfer
The following
disable-address-transferexample disables Elastic IP address transfer for the specified Elastic IP address.aws ec2 disable-address-transfer \ --allocation-ideipalloc-09ad461b0d03f6aafOutput:
{ "AddressTransfer": { "PublicIp": "100.21.184.216", "AllocationId": "eipalloc-09ad461b0d03f6aaf", "AddressTransferStatus": "disabled" } }For more information, see Transfer Elastic IP addresses in the Amazon VPC User Guide.
-
For API details, see DisableAddressTransfer
in AWS CLI Command Reference.
-
The following code example shows how to use disable-aws-network-performance-metric-subscription.
- AWS CLI
-
To disable a metric subscription
The following
disable-aws-network-performance-metric-subscriptionexample disables the monitoring of aggregate network latency between the specified source and destination Regions.aws ec2 disable-aws-network-performance-metric-subscription \ --sourceus-east-1\ --destinationeu-west-1\ --metricaggregate-latency\ --statisticp50Output:
{ "Output": true }For more information, see Manage CloudWatch subscriptions using the CLI in the Infrastructure Performance User Guide.
-
For API details, see DisableAwsNetworkPerformanceMetricSubscription
in AWS CLI Command Reference.
-
The following code example shows how to use disable-ebs-encryption-by-default.
- AWS CLI
-
To disable EBS encryption by default
The following
disable-ebs-encryption-by-defaultexample disables EBS encryption by default for your AWS account in the current Region.aws ec2 disable-ebs-encryption-by-defaultOutput:
{ "EbsEncryptionByDefault": false }-
For API details, see DisableEbsEncryptionByDefault
in AWS CLI Command Reference.
-
The following code example shows how to use disable-fast-launch.
- AWS CLI
-
To discontinue fast launching for an image
The following
disable-fast-launchexample discontinues Fast Launch for the specified AMI, and cleans up existing pre-provisioned snapshots.aws ec2 disable-fast-launch \ --image-idami-01234567890abcedfOutput:
{ "ImageId": "ami-01234567890abcedf", "ResourceType": "snapshot", "SnapshotConfiguration": {}, "LaunchTemplate": { "LaunchTemplateId": "lt-01234567890abcedf", "LaunchTemplateName": "EC2FastLaunchDefaultResourceCreation-a8c6215d-94e6-441b-9272-dbd1f87b07e2", "Version": "1" }, "MaxParallelLaunches": 6, "OwnerId": "0123456789123", "State": "disabling", "StateTransitionReason": "Client.UserInitiated", "StateTransitionTime": "2022-01-27T22:47:29.265000+00:00" }For more information, see Configure EC2 Fast Launch settings for your Windows AMI in the Amazon EC2 User Guide.
-
For API details, see DisableFastLaunch
in AWS CLI Command Reference.
-
The following code example shows how to use disable-fast-snapshot-restores.
- AWS CLI
-
To disable fast snapshot restore
The following
disable-fast-snapshot-restoresexample disables fast snapshot restore for the specified snapshot in the specified Availability Zone.aws ec2 disable-fast-snapshot-restores \ --availability-zonesus-east-2a\ --source-snapshot-idssnap-1234567890abcdef0Output:
{ "Successful": [ { "SnapshotId": "snap-1234567890abcdef0" "AvailabilityZone": "us-east-2a", "State": "disabling", "StateTransitionReason": "Client.UserInitiated", "OwnerId": "123456789012", "EnablingTime": "2020-01-25T23:57:49.602Z" } ], "Unsuccessful": [] }-
For API details, see DisableFastSnapshotRestores
in AWS CLI Command Reference.
-
The following code example shows how to use disable-image-block-public-access.
- AWS CLI
-
To disable block public access for AMIs in the specified Region
The following
disable-image-block-public-accessexample disables block public access for AMIs at the account level in the specified Region.aws ec2 disable-image-block-public-access \ --regionus-east-1Output:
{ "ImageBlockPublicAccessState": "unblocked" }For more information, see Block public access to your AMIs in the Amazon EC2 User Guide.
-
For API details, see DisableImageBlockPublicAccess
in AWS CLI Command Reference.
-
The following code example shows how to use disable-image-deprecation.
- AWS CLI
-
To cancel the deprecation of an AMI
The following
disable-image-deprecationexample cancels the deprecation of an AMI, which removes theDeprecationTimefield from thedescribe-imagesoutput. You must be the AMI owner to perform this procedure.aws ec2 disable-image-deprecation \ --image-idami-1234567890abcdef0Output:
{ "RequestID": "11aabb229-4eac-35bd-99ed-be587EXAMPLE", "Return": "true" }For more information, see Deprecate an AMI in the Amazon EC2 User Guide.
-
For API details, see DisableImageDeprecation
in AWS CLI Command Reference.
-
The following code example shows how to use disable-image-deregistration-protection.
- AWS CLI
-
To disable deregistration protection
The following
disable-image-deregistration-protectionexample disables deregistration protection for the specified image.aws ec2 disable-image-deregistration-protection \ --image-idami-0b1a928a144a74ec9Output:
{ "Return": "disabled" }For more information, see Protect an AMI from deregistration in the Amazon EC2 User Guide.
-
For API details, see DisableImageDeregistrationProtection
in AWS CLI Command Reference.
-
The following code example shows how to use disable-image.
- AWS CLI
-
To disable an AMI
The following
disable-imageexample disables the specified AMI.aws ec2 disable-image \ --image-idami-1234567890abcdef0Output:
{ "Return": "true" }For more information, see Disable an AMI in the Amazon EC2 User Guide.
-
For API details, see DisableImage
in AWS CLI Command Reference.
-
The following code example shows how to use disable-ipam-organization-admin-account.
- AWS CLI
-
To disable the delegated IPAM admin
In certain scenarios, you'll integrate IPAM with AWS Organizations. When you do that, the AWS Organizations management account delegates an AWS Organizations member account as the IPAM admin.
In this example, you are the AWS Organizations management account that delegated the IPAM admin account and you want to disable that account from being the IPAM admin.
You can use any AWS Region for
--regionwhen making this request. You don't have to use the Region where you originally delegated the admin, where the IPAM was created, or an IPAM operating Region. If you disable the delegated admin account, you can re-enable it at any time or delegate a new account as IPAM admin.The following
disable-ipam-organization-admin-accountexample disables the delegated IPAM admin in your AWS account.aws ec2 disable-ipam-organization-admin-account \ --delegated-admin-account-id320805250157\ --regionap-south-1Output:
{ "Success": true }For more information, see Integrate IPAM with accounts in an AWS Organization in the Amazon VPC IPAM User Guide.
-
For API details, see DisableIpamOrganizationAdminAccount
in AWS CLI Command Reference.
-
The following code example shows how to use disable-serial-console-access.
- AWS CLI
-
To disable access to the EC2 serial console for your account
The following
disable-serial-console-accessexample disables account access to the serial console.aws ec2 disable-serial-console-accessOutput:
{ "SerialConsoleAccessEnabled": false }For more information, see EC2 Serial Console in the Amazon EC2 User Guide.
-
For API details, see DisableSerialConsoleAccess
in AWS CLI Command Reference.
-
The following code example shows how to use disable-snapshot-block-public-access.
- AWS CLI
-
To disable block public access for snapshots
The following
disable-snapshot-block-public-accessexample disables block public access for snapshots to allow public sharing of your snapshots.aws ec2 disable-snapshot-block-public-accessOutput:
{ "State": "unblocked" }For more information, see Block public access for snapshots in the Amazon EBS User Guide.
-
For API details, see DisableSnapshotBlockPublicAccess
in AWS CLI Command Reference.
-
The following code example shows how to use disable-transit-gateway-route-table-propagation.
- AWS CLI
-
To disable a transit gateway attachment to propagate routes to the specified propagation route table
The following
disable-transit-gateway-route-table-propagationexample disables the specified attachment to propagate routes to the specified propagation route table.aws ec2 disable-transit-gateway-route-table-propagation \ --transit-gateway-route-table-idtgw-rtb-0a823edbdeEXAMPLE\ --transit-gateway-attachment-idtgw-attach-09b52ccdb5EXAMPLEOutput:
{ "Propagation": { "TransitGatewayAttachmentId": "tgw-attach-09b52ccdb5EXAMPLE", "ResourceId": "vpc-4d7de228", "ResourceType": "vpc", "TransitGatewayRouteTableId": "tgw-rtb-0a823edbdeEXAMPLE", "State": "disabled" } }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see DisableTransitGatewayRouteTablePropagation
in AWS CLI Command Reference.
-
The following code example shows how to use disable-vgw-route-propagation.
- AWS CLI
-
To disable route propagation
This example disables the specified virtual private gateway from propagating static routes to the specified route table. If the command succeeds, no output is returned.
Command:
aws ec2 disable-vgw-route-propagation --route-table-idrtb-22574640--gateway-idvgw-9a4cacf3-
For API details, see DisableVgwRoutePropagation
in AWS CLI Command Reference.
-
The following code example shows how to use disable-vpc-classic-link-dns-support.
- AWS CLI
-
To disable ClassicLink DNS support for a VPC
This example disables ClassicLink DNS support for
vpc-88888888.Command:
aws ec2 disable-vpc-classic-link-dns-support --vpc-idvpc-88888888Output:
{ "Return": true }-
For API details, see DisableVpcClassicLinkDnsSupport
in AWS CLI Command Reference.
-
The following code example shows how to use disable-vpc-classic-link.
- AWS CLI
-
To disable ClassicLink for a VPC
This example disables ClassicLink for vpc-8888888.
Command:
aws ec2 disable-vpc-classic-link --vpc-idvpc-88888888Output:
{ "Return": true }-
For API details, see DisableVpcClassicLink
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-address.
- AWS CLI
-
To disassociate an Elastic IP addresses in EC2-Classic
This example disassociates an Elastic IP address from an instance in EC2-Classic. If the command succeeds, no output is returned.
Command:
aws ec2 disassociate-address --public-ip198.51.100.0To disassociate an Elastic IP address in EC2-VPC
This example disassociates an Elastic IP address from an instance in a VPC. If the command succeeds, no output is returned.
Command:
aws ec2 disassociate-address --association-ideipassoc-2bebb745-
For API details, see DisassociateAddress
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-client-vpn-target-network.
- AWS CLI
-
To disassociate a network from a Client VPN endpoint
The following
disassociate-client-vpn-target-networkexample disassociates the target network that's associated with thecvpn-assoc-12312312312312312association ID for the specified Client VPN endpoint.aws ec2 disassociate-client-vpn-target-network \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --association-idcvpn-assoc-12312312312312312Output:
{ "AssociationId": "cvpn-assoc-12312312312312312", "Status": { "Code": "disassociating" } }For more information, see Target Networks in the AWS Client VPN Administrator Guide.
-
For API details, see DisassociateClientVpnTargetNetwork
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-iam-instance-profile.
- AWS CLI
-
To disassociate an IAM instance profile
This example disassociates an IAM instance profile with the association ID
iip-assoc-05020b59952902f5f.Command:
aws ec2 disassociate-iam-instance-profile --association-idiip-assoc-05020b59952902f5fOutput:
{ "IamInstanceProfileAssociation": { "InstanceId": "i-123456789abcde123", "State": "disassociating", "AssociationId": "iip-assoc-05020b59952902f5f", "IamInstanceProfile": { "Id": "AIPAI5IVIHMFFYY2DKV5Y", "Arn": "arn:aws:iam::123456789012:instance-profile/admin-role" } } }-
For API details, see DisassociateIamInstanceProfile
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-instance-event-window.
- AWS CLI
-
Example 1: To disassociate one or more instances from an event window
The following
disassociate-instance-event-windowexample disassociates one or more instances from an event window. Specify theinstance-event-window-idparameter to specify the event window. To disassociate instances, specify theassociation-targetparameter, and for the parameter values, specify one or more instance IDs.aws ec2 disassociate-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --association-target"InstanceIds=i-1234567890abcdef0,i-0598c7d356eba48d7"Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [], "Tags": [], "DedicatedHostIds": [] }, "State": "creating" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 2: To disassociate instance tags from an event window
The following
disassociate-instance-event-windowexample disassociates instance tags from an event window. Specify theinstance-event-window-idparameter to specify the event window. To disassociate instance tags, specify theassociation-targetparameter, and for the parameter values, specify one or more tags.aws ec2 disassociate-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --association-target"InstanceTags=[{Key=k2,Value=v2},{Key=k1,Value=v1}]"Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [], "Tags": [], "DedicatedHostIds": [] }, "State": "creating" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 3: To disassociate a Dedicated Host from an event window
The following
disassociate-instance-event-windowexample disassociates a Dedicated Host from an event window. Specify theinstance-event-window-idparameter to specify the event window. To disassociate a Dedicated Host, specify theassociation-targetparameter, and for the parameter values, specify one or more Dedicated Host IDs.aws ec2 disassociate-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --association-targetDedicatedHostIds=h-029fa35a02b99801dOutput:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [], "Tags": [], "DedicatedHostIds": [] }, "State": "creating" } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
-
For API details, see DisassociateInstanceEventWindow
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-ipam-resource-discovery.
- AWS CLI
-
To disassociate a resource discovery from an IPAM
In this example, you are an IPAM delegated admin account and you want to disassociate an IPAM resource discovery from your IPAM. You ran the describe command and noticed that the
"ResourceDiscoveryStatus": "not-found"and you want to disassociate it from your IPAM to make room for other associations.The following
disassociate-ipam-resource-discoveryexample disassociates an IPAM resource discovery in your AWS account.aws ec2 disassociate-ipam-resource-discovery \ --ipam-resource-discovery-association-idipam-res-disco-assoc-04382a6346357cf82\ --regionus-east-1Output:
{ "IpamResourceDiscoveryAssociation": { "OwnerId": "320805250157", "IpamResourceDiscoveryAssociationId": "ipam-res-disco-assoc-04382a6346357cf82", "IpamResourceDiscoveryAssociationArn": "arn:aws:ec2::320805250157:ipam-resource-discovery-association/ipam-res-disco-assoc-04382a6346357cf82", "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "IpamId": "ipam-005f921c17ebd5107", "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107", "IpamRegion": "us-east-1", "IsDefault": false, "ResourceDiscoveryStatus": "not-found", "State": "disassociate-in-progress" } }For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
-
For API details, see DisassociateIpamResourceDiscovery
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-nat-gateway-address.
- AWS CLI
-
To disassociate an Elastic IP address from a public NAT gateway
The following
disassociate-nat-gateway-addressexample disassociates the specified Elastic IP address from the specified public NAT gateway.aws ec2 disassociate-nat-gateway-address \ --nat-gateway-idnat-1234567890abcdef0\ --association-idseipassoc-0f96bdca17EXAMPLEOutput:
{ "NatGatewayId": "nat-1234567890abcdef0", "NatGatewayAddresses": [ { "AllocationId": "eipalloc-0be6ecac95EXAMPLE", "NetworkInterfaceId": "eni-09cc4b2558794f7f9", "PrivateIp": "10.0.0.74", "PublicIp": "3.211.231.218", "AssociationId": "eipassoc-0f96bdca17EXAMPLE", "IsPrimary": false, "Status": "disassociating" } ] }For more information, see NAT gateways in the Amazon VPC User Guide.
-
For API details, see DisassociateNatGatewayAddress
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-route-table.
- AWS CLI
-
To disassociate a route table
This example disassociates the specified route table from the specified subnet. If the command succeeds, no output is returned.
Command:
aws ec2 disassociate-route-table --association-idrtbassoc-781d0d1a-
For API details, see DisassociateRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-security-group-vpc.
- AWS CLI
-
To disassociate a security group from a VPC
The following
disassociate-security-group-vpcexample disassociates the specified security group from the specified VPC.aws ec2 disassociate-security-group-vpc \ --group-idsg-04dbb43907d3f8a78\ --vpc-idvpc-0bf4c2739bc05a694Output:
{ "State": "disassociating" }For more information, see Associate security groups with multiple VPCs in the Amazon VPC User Guide.
-
For API details, see DisassociateSecurityGroupVpc
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-subnet-cidr-block.
- AWS CLI
-
To disassociate an IPv6 CIDR block from a subnet
This example disassociates an IPv6 CIDR block from a subnet using the association ID for the CIDR block.
Command:
aws ec2 disassociate-subnet-cidr-block --association-idsubnet-cidr-assoc-3aa54053Output:
{ "SubnetId": "subnet-5f46ec3b", "Ipv6CidrBlockAssociation": { "Ipv6CidrBlock": "2001:db8:1234:1a00::/64", "AssociationId": "subnet-cidr-assoc-3aa54053", "Ipv6CidrBlockState": { "State": "disassociating" } } }-
For API details, see DisassociateSubnetCidrBlock
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-transit-gateway-multicast-domain.
- AWS CLI
-
To disassociate subnets from a multicast domain
The following
disassociate-transit-gateway-multicast-domainexample disassociates a subnet from the specified multicast domain.aws ec2 disassociate-transit-gateway-multicast-domain \ --transit-gateway-attachment-idtgw-attach-070e571cd1EXAMPLE\ --subnet-idsubnet-000de86e3bEXAMPLE\ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef7EXAMPLEOutput:
{ "Associations": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef7EXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-070e571cd1EXAMPLE", "ResourceId": "vpc-7EXAMPLE", "ResourceType": "vpc", "Subnets": [ { "SubnetId": "subnet-000de86e3bEXAMPLE", "State": "disassociating" } ] } }For more information, see Multicast domains in the Transit Gateways Guide'.
-
For API details, see DisassociateTransitGatewayMulticastDomain
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-transit-gateway-route-table.
- AWS CLI
-
To disassociate a transit gateway route table from a resource attachment
The following
disassociate-transit-gateway-route-tableexample disassociates the specified attachment from the transit gateway route table.aws ec2 disassociate-transit-gateway-route-table \ --transit-gateway-route-table-idtgw-rtb-002573ed1eEXAMPLE\ --transit-gateway-attachment-idtgw-attach-08e0bc912cEXAMPLEOutput:
{ "Association": { "TransitGatewayRouteTableId": "tgw-rtb-002573ed1eEXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-08e0bc912cEXAMPLE", "ResourceId": "11460968-4ac1-4fd3-bdb2-00599EXAMPLE", "ResourceType": "direct-connect-gateway", "State": "disassociating" } }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see DisassociateTransitGatewayRouteTable
in AWS CLI Command Reference.
-
The following code example shows how to use disassociate-vpc-cidr-block.
- AWS CLI
-
To disassociate an IPv6 CIDR block from a VPC
This example disassociates an IPv6 CIDR block from a VPC using the association ID for the CIDR block.
Command:
aws ec2 disassociate-vpc-cidr-block --association-idvpc-cidr-assoc-eca54085Output:
{ "Ipv6CidrBlockAssociation": { "Ipv6CidrBlock": "2001:db8:1234:1a00::/56", "AssociationId": "vpc-cidr-assoc-eca54085", "Ipv6CidrBlockState": { "State": "disassociating" } }, "VpcId": "vpc-a034d6c4" }To disassociate an IPv4 CIDR block from a VPC
This example disassociates an IPv4 CIDR block from a VPC.
Command:
aws ec2 disassociate-vpc-cidr-block --association-idvpc-cidr-assoc-0287ac6bOutput:
{ "CidrBlockAssociation": { "AssociationId": "vpc-cidr-assoc-0287ac6b", "CidrBlock": "172.18.0.0/16", "CidrBlockState": { "State": "disassociating" } }, "VpcId": "vpc-27621243" }-
For API details, see DisassociateVpcCidrBlock
in AWS CLI Command Reference.
-
The following code example shows how to use enable-address-transfer.
- AWS CLI
-
To enable an Elastic IP address transfer
The following
enable-address-transferexample enables Elastic IP address transfer for the specified Elastic IP address to the specified account.aws ec2 enable-address-transfer \ --allocation-ideipalloc-09ad461b0d03f6aaf\ --transfer-account-id123456789012Output:
{ "AddressTransfer": { "PublicIp": "100.21.184.216", "AllocationId": "eipalloc-09ad461b0d03f6aaf", "TransferAccountId": "123456789012", "TransferOfferExpirationTimestamp": "2023-02-22T20:51:01.000Z", "AddressTransferStatus": "pending" } }For more information, see Transfer Elastic IP addresses in the Amazon VPC User Guide.
-
For API details, see EnableAddressTransfer
in AWS CLI Command Reference.
-
The following code example shows how to use enable-aws-network-performance-metric-subscription.
- AWS CLI
-
To enable a metric subscription
The following
enable-aws-network-performance-metric-subscriptionexample enables the monitoring of aggregate network latency between the specified source and destination Regions.aws ec2 enable-aws-network-performance-metric-subscription \ --sourceus-east-1\ --destinationeu-west-1\ --metricaggregate-latency\ --statisticp50Output:
{ "Output": true }For more information, see Manage subscriptions in the Infrastructure Performance User Guide.
-
For API details, see EnableAwsNetworkPerformanceMetricSubscription
in AWS CLI Command Reference.
-
The following code example shows how to use enable-ebs-encryption-by-default.
- AWS CLI
-
To enable EBS encryption by default
The following
enable-ebs-encryption-by-defaultexample enables EBS encryption by default for your AWS account in the current Region.aws ec2 enable-ebs-encryption-by-defaultOutput:
{ "EbsEncryptionByDefault": true }-
For API details, see EnableEbsEncryptionByDefault
in AWS CLI Command Reference.
-
The following code example shows how to use enable-fast-launch.
- AWS CLI
-
To start fast launching for an image
The following
enable-fast-launchexample configures the specified AMI for Fast Launch and sets the maximum number of parallel instances to launch to 6. The type of resource to use to pre-provision the AMI is set tosnapshot, which is also the default value.aws ec2 enable-fast-launch \ --image-idami-01234567890abcedf\ --max-parallel-launches6\ --resource-typesnapshotOutput:
{ "ImageId": "ami-01234567890abcedf", "ResourceType": "snapshot", "SnapshotConfiguration": { "TargetResourceCount": 10 }, "LaunchTemplate": {}, "MaxParallelLaunches": 6, "OwnerId": "0123456789123", "State": "enabling", "StateTransitionReason": "Client.UserInitiated", "StateTransitionTime": "2022-01-27T22:16:03.199000+00:00" }For more information, see Configure EC2 Fast Launch settings for your Windows AMI in the Amazon EC2 User Guide.
-
For API details, see EnableFastLaunch
in AWS CLI Command Reference.
-
The following code example shows how to use enable-fast-snapshot-restores.
- AWS CLI
-
To enable fast snapshot restore
The following
enable-fast-snapshot-restoresexample enables fast snapshot restore for the specified snapshot in the specified Availability Zones.aws ec2 enable-fast-snapshot-restores \ --availability-zonesus-east-2aus-east-2b\ --source-snapshot-idssnap-1234567890abcdef0Output:
{ "Successful": [ { "SnapshotId": "snap-1234567890abcdef0" "AvailabilityZone": "us-east-2a", "State": "enabling", "StateTransitionReason": "Client.UserInitiated", "OwnerId": "123456789012", "EnablingTime": "2020-01-25T23:57:49.602Z" }, { "SnapshotId": "snap-1234567890abcdef0" "AvailabilityZone": "us-east-2b", "State": "enabling", "StateTransitionReason": "Client.UserInitiated", "OwnerId": "123456789012", "EnablingTime": "2020-01-25T23:57:49.596Z" } ], "Unsuccessful": [] }-
For API details, see EnableFastSnapshotRestores
in AWS CLI Command Reference.
-
The following code example shows how to use enable-image-block-public-access.
- AWS CLI
-
To enable block public access for AMIs in the specified Region
The following
enable-image-block-public-accessexample enables block public access for AMIs at the account level in the specified Region.aws ec2 enable-image-block-public-access \ --regionus-east-1\ --image-block-public-access-stateblock-new-sharingOutput:
{ "ImageBlockPublicAccessState": "block-new-sharing" }For more information, see Block public access to your AMIs in the Amazon EC2 User Guide.
-
For API details, see EnableImageBlockPublicAccess
in AWS CLI Command Reference.
-
The following code example shows how to use enable-image-deprecation.
- AWS CLI
-
To deprecate an AMI
The following
enable-image-deprecationexample deprecates an AMI on a specific date and time. If you specify a value for seconds, Amazon EC2 rounds the seconds to the nearest minute. You must be the AMI owner to perform this procedure.aws ec2 enable-image-deprecation \ --image-idami-1234567890abcdef0\ --deprecate-at '2022-10-15T13:17:12.000Z'Output:
{ "RequestID": "59dbff89-35bd-4eac-99ed-be587EXAMPLE", "Return": "true" }For more information, see Deprecate an AMI in the Amazon EC2 User Guide.
-
For API details, see EnableImageDeprecation
in AWS CLI Command Reference.
-
The following code example shows how to use enable-image-deregistration-protection.
- AWS CLI
-
To enable deregistration protection
The following
enable-image-deregistration-protectionexample enables deregistration protection for the specified image.aws ec2 enable-image-deregistration-protection \ --image-idami-0b1a928a144a74ec9Output:
{ "Return": "enabled-without-cooldown" }For more information, see Protect an EC2 AMI from deregistration in the Amazon EC2 User Guide.
-
For API details, see EnableImageDeregistrationProtection
in AWS CLI Command Reference.
-
The following code example shows how to use enable-image.
- AWS CLI
-
To enable an AMI
The following
enable-imageexample enables the specified AMI.aws ec2 enable-image \ --image-idami-1234567890abcdef0Output:
{ "Return": "true" }For more information, see Disable an AMI in the Amazon EC2 User Guide.
-
For API details, see EnableImage
in AWS CLI Command Reference.
-
The following code example shows how to use enable-ipam-organization-admin-account.
- AWS CLI
-
To integrate with AWS Organizations and delegate a member account as the IPAM account
The following
enable-ipam-organization-admin-accountexample integrates IPAM with AWS Organizations and delegates a member account as the IPAM account.aws ec2 enable-ipam-organization-admin-account \ --delegated-admin-account-id320805250157Output:
{ "Success": true }For more information, see Integrate IPAM with AWS Organizations in the Amazon VPC IPAM User Guide.
-
For API details, see EnableIpamOrganizationAdminAccount
in AWS CLI Command Reference.
-
The following code example shows how to use enable-reachability-analyzer-organization-sharing.
- AWS CLI
-
To enable trusted access for Reachability Analyzer
The following
enable-reachability-analyzer-organization-sharingexample enables trusted access for Reachability Analyzer.aws ec2 enable-reachability-analyzer-organization-sharingThis command produces no output.
For more information, see Cross-account analyses in the Reachability Analyzer User Guide.
-
For API details, see EnableReachabilityAnalyzerOrganizationSharing
in AWS CLI Command Reference.
-
The following code example shows how to use enable-serial-console-access.
- AWS CLI
-
To enable access to the serial console for your account
The following
enable-serial-console-accessexample enables account access to the serial console.aws ec2 enable-serial-console-accessOutput:
{ "SerialConsoleAccessEnabled": true }For more information, see EC2 Serial Console in the Amazon EC2 User Guide.
-
For API details, see EnableSerialConsoleAccess
in AWS CLI Command Reference.
-
The following code example shows how to use enable-snapshot-block-public-access.
- AWS CLI
-
To enable block public access for snapshots
The following
enable-snapshot-block-public-accessexample blocks all public sharing of your snapshots.aws ec2 enable-snapshot-block-public-access \ --stateblock-all-sharingOutput:
{ "State": "block-all-sharing" }For more information, see Block public access for snapshots in the Amazon EBS User Guide.
-
For API details, see EnableSnapshotBlockPublicAccess
in AWS CLI Command Reference.
-
The following code example shows how to use enable-transit-gateway-route-table-propagation.
- AWS CLI
-
To enable a transit gateway attachment to propagate routes to the specified propagation route table
The following
enable-transit-gateway-route-table-propagationexample enables the specified attachment to propagate routes to the specified propagation route table.aws ec2 enable-transit-gateway-route-table-propagation \ --transit-gateway-route-table-idtgw-rtb-0a823edbdeEXAMPLE\ --transit-gateway-attachment-idtgw-attach-09b52ccdb5EXAMPLEOutput:
{ "Propagation": { "TransitGatewayAttachmentId": "tgw-attach-09b52ccdb5EXAMPLE", "ResourceId": "vpc-4d7de228", "ResourceType": "vpc", "TransitGatewayRouteTableId": "tgw-rtb-0a823edbdeEXAMPLE", "State": "disabled" } }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see EnableTransitGatewayRouteTablePropagation
in AWS CLI Command Reference.
-
The following code example shows how to use enable-vgw-route-propagation.
- AWS CLI
-
To enable route propagation
This example enables the specified virtual private gateway to propagate static routes to the specified route table. If the command succeeds, no output is returned.
Command:
aws ec2 enable-vgw-route-propagation --route-table-idrtb-22574640--gateway-idvgw-9a4cacf3-
For API details, see EnableVgwRoutePropagation
in AWS CLI Command Reference.
-
The following code example shows how to use enable-volume-io.
- AWS CLI
-
To enable I/O for a volume
This example enables I/O on volume
vol-1234567890abcdef0.Command:
aws ec2 enable-volume-io --volume-idvol-1234567890abcdef0Output:
{ "Return": true }-
For API details, see EnableVolumeIo
in AWS CLI Command Reference.
-
The following code example shows how to use enable-vpc-classic-link-dns-support.
- AWS CLI
-
To enable ClassicLink DNS support for a VPC
This example enables ClassicLink DNS support for
vpc-88888888.Command:
aws ec2 enable-vpc-classic-link-dns-support --vpc-idvpc-88888888Output:
{ "Return": true }-
For API details, see EnableVpcClassicLinkDnsSupport
in AWS CLI Command Reference.
-
The following code example shows how to use enable-vpc-classic-link.
- AWS CLI
-
To enable a VPC for ClassicLink
This example enables vpc-8888888 for ClassicLink.
Command:
aws ec2 enable-vpc-classic-link --vpc-idvpc-88888888Output:
{ "Return": true }-
For API details, see EnableVpcClassicLink
in AWS CLI Command Reference.
-
The following code example shows how to use export-client-vpn-client-certificate-revocation-list.
- AWS CLI
-
To export a client certificate revocation list
The following
export-client-vpn-client-certificate-revocation-listexample exports the client certificate revocation list for the specified Client VPN endpoint. In this example, the output is returned in text format to make it easier to read.aws ec2 export-client-vpn-client-certificate-revocation-list \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --outputtextOutput:
-----BEGIN X509 CRL----- MIICiTCCAfICCQD6m7oRw0uXOjANBgkqhkiG9w0BAQUFADCBiDELMAkGA1UEBhMC VVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdTZWF0dGxlMQ8wDQYDVQQKEwZBbWF6 b24xFDASBgNVBAsTC0lBTSBDb25zb2xlMRIwEAYDVQQDEwlUZXN0Q2lsYWMxHzAd BgkqhkiG9w0BCQEWEG5vb25lQGFtYXpvbi5jb20wHhcNMTEwNDI1MjA0NTIxWhcN MTIwNDI0MjA0NTIxWjCBiDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYD VQQHEwdTZWF0dGxlMQ8wDQYDVQQKEwZBbWF6b24xFDASBgNVBAsTC0lBTSBDb25z b2xlMRIwEAYDVQQDEwlUZXN0Q2lsYWMxHzAdBgkqhkiG9w0BCQEWEG5vb25lQGFt YXpvbi5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMaK0dn+a4GmWIWJ 21uUSfwfEvySWtC2XADZ4nB+BLYgVIk60CpiwsZ3G93vUEIO3IyNoH/f0wYK8m9T rDHudUZg3qX4waLG5M43q7Wgc/MbQITxOUSQv7c7ugFFDzQGBzZswY6786m86gpE Ibb3OhjZnzcvQAaRHhdlQWIMm2nrAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAtCu4 nUhVVxYUntneD9+h8Mg9q6q+auNKyExzyLwaxlAoo7TJHidbtS4J5iNmZgXL0Fkb FFBjvSfpJIlJ00zbhNYS5f6GuoEDmFJl0ZxBHjJnyp378OD8uTs7fLvjx79LjSTb NYiytVbZPQUQ5Yaxu2jXnimvw3rrszlaEXAMPLE= -----END X509 CRL----- STATUS pendingFor more information, see Client Certificate Revocation Lists in the AWS Client VPN Administrator Guide.
-
For API details, see ExportClientVpnClientCertificateRevocationList
in AWS CLI Command Reference.
-
The following code example shows how to use export-client-vpn-client-configuration.
- AWS CLI
-
To export the client configuration
The following
export-client-vpn-client-configurationexample exports the client configuration for the specified Client VPN endpoint. In this example, the output is returned in text format to make it easier to read.aws ec2 export-client-vpn-client-configuration \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --outputtextOutput:
client dev tun proto udp remote cvpn-endpoint-123456789123abcde.prod.clientvpn.ap-south-1.amazonaws.com 443 remote-random-hostname resolv-retry infinite nobind persist-key persist-tun remote-cert-tls server cipher AES-256-GCM verb 3 <ca> -----BEGIN CERTIFICATE----- MIICiTCCAfICCQD6m7oRw0uXOjANBgkqhkiG9w0BAQUFADCBiDELMAkGA1UEBhMC VVMxCzAJBgNVBAgTAldBMRAwDgYDVQQHEwdTZWF0dGxlMQ8wDQYDVQQKEwZBbWF6 b24xFDASBgNVBAsTC0lBTSBDb25zb2xlMRIwEAYDVQQDEwlUZXN0Q2lsYWMxHzAd BgkqhkiG9w0BCQEWEG5vb25lQGFtYXpvbi5jb20wHhcNMTEwNDI1MjA0NTIxWhcN MTIwNDI0MjA0NTIxWjCBiDELMAkGA1UEBhMCVVMxCzAJBgNVBAgTAldBMRAwDgYD VQQHEwdTZWF0dGxlMQ8wDQYDVQQKEwZBbWF6b24xFDASBgNVBAsTC0lBTSBDb25z b2xlMRIwEAYDVQQDEwlUZXN0Q2lsYWMxHzAdBgkqhkiG9w0BCQEWEG5vb25lQGFt YXpvbi5jb20wgZ8wDQYJKoZIhvcNAQEBBQADgY0AMIGJAoGBAMaK0dn+a4GmWIWJ 21uUSfwfEvySWtC2XADZ4nB+BLYgVIk60CpiwsZ3G93vUEIO3IyNoH/f0wYK8m9T rDHudUZg3qX4waLG5M43q7Wgc/MbQITxOUSQv7c7ugFFDzQGBzZswY6786m86gpE Ibb3OhjZnzcvQAaRHhdlQWIMm2nrAgMBAAEwDQYJKoZIhvcNAQEFBQADgYEAtCu4 nUhVVxYUntneD9+h8Mg9q6q+auNKyExzyLwaxlAoo7TJHidbtS4J5iNmZgXL0Fkb FFBjvSfpJIlJ00zbhNYS5f6GuoEDmFJl0ZxBHjJnyp378OD8uTs7fLvjx79LjSTb NYiytVbZPQUQ5Yaxu2jXnimvw3rrszlaEXAMPLE= -----END CERTIFICATE----- </ca> reneg-sec 0For more information, see Client VPN endpoint configuration file export in the AWS Client VPN Administrator Guide.
-
For API details, see ExportClientVpnClientConfiguration
in AWS CLI Command Reference.
-
The following code example shows how to use export-image.
- AWS CLI
-
To export a VM from an AMI
The following
export-imageexample exports the specified AMI to the specified bucket in the specified format.aws ec2 export-image \ --image-idami-1234567890abcdef0\ --disk-image-formatVMDK\ --s3-export-locationS3Bucket=my-export-bucket,S3Prefix=exports/Output:
{ "DiskImageFormat": "vmdk", "ExportImageTaskId": "export-ami-1234567890abcdef0" "ImageId": "ami-1234567890abcdef0", "RoleName": "vmimport", "Progress": "0", "S3ExportLocation": { "S3Bucket": "my-export-bucket", "S3Prefix": "exports/" }, "Status": "active", "StatusMessage": "validating" }-
For API details, see ExportImage
in AWS CLI Command Reference.
-
The following code example shows how to use get-associated-ipv6-pool-cidrs.
- AWS CLI
-
To get the associations for an IPv6 address pool
The following
get-associated-ipv6-pool-cidrsexample gets the associations for the specified IPv6 address pool.aws ec2 get-associated-ipv6-pool-cidrs \ --pool-idipv6pool-ec2-012345abc12345abcOutput:
{ "Ipv6CidrAssociations": [ { "Ipv6Cidr": "2001:db8:1234:1a00::/56", "AssociatedResource": "vpc-111111222222333ab" } ] }-
For API details, see GetAssociatedIpv6PoolCidrs
in AWS CLI Command Reference.
-
The following code example shows how to use get-aws-network-performance-data.
- AWS CLI
-
To get network performance data
The following
get-aws-network-performance-dataexample retrieves data about the network performance between the specified Regions in the specified time period.aws ec2 get-aws-network-performance-data \ --start-time2022-10-26T12:00:00.000Z\ --end-time2022-10-26T12:30:00.000Z\ --data-queriesId=my-query,Source=us-east-1,Destination=eu-west-1,Metric=aggregate-latency,Statistic=p50,Period=five-minutesOutput:
{ "DataResponses": [ { "Id": "my-query", "Source": "us-east-1", "Destination": "eu-west-1", "Metric": "aggregate-latency", "Statistic": "p50", "Period": "five-minutes", "MetricPoints": [ { "StartDate": "2022-10-26T12:00:00+00:00", "EndDate": "2022-10-26T12:05:00+00:00", "Value": 62.44349, "Status": "OK" }, { "StartDate": "2022-10-26T12:05:00+00:00", "EndDate": "2022-10-26T12:10:00+00:00", "Value": 62.483498, "Status": "OK" }, { "StartDate": "2022-10-26T12:10:00+00:00", "EndDate": "2022-10-26T12:15:00+00:00", "Value": 62.51248, "Status": "OK" }, { "StartDate": "2022-10-26T12:15:00+00:00", "EndDate": "2022-10-26T12:20:00+00:00", "Value": 62.635475, "Status": "OK" }, { "StartDate": "2022-10-26T12:20:00+00:00", "EndDate": "2022-10-26T12:25:00+00:00", "Value": 62.733974, "Status": "OK" }, { "StartDate": "2022-10-26T12:25:00+00:00", "EndDate": "2022-10-26T12:30:00+00:00", "Value": 62.773975, "Status": "OK" }, { "StartDate": "2022-10-26T12:30:00+00:00", "EndDate": "2022-10-26T12:35:00+00:00", "Value": 62.75349, "Status": "OK" } ] } ] }For more information, see Monitor network performance in the Infrastructure Performance User Guide.
-
For API details, see GetAwsNetworkPerformanceData
in AWS CLI Command Reference.
-
The following code example shows how to use get-capacity-reservation-usage.
- AWS CLI
-
To view capacity reservation usage across AWS accounts
The following
get-capacity-reservation-usageexample displays usage information for the specified capacity reservation.aws ec2 get-capacity-reservation-usage \ --capacity-reservation-idcr-1234abcd56EXAMPLEOutput:
{ "CapacityReservationId": "cr-1234abcd56EXAMPLE ", "InstanceUsages": [ { "UsedInstanceCount": 1, "AccountId": "123456789012" } ], "AvailableInstanceCount": 4, "TotalInstanceCount": 5, "State": "active", "InstanceType": "t2.medium" }For more information, see Shared Capacity Reservations in the Amazon EC2 User Guide.
-
For API details, see GetCapacityReservationUsage
in AWS CLI Command Reference.
-
The following code example shows how to use get-coip-pool-usage.
- AWS CLI
-
To get customer-owned IP address pool usage
The following
get-coip-pool-usageexample gets the usage details for the specified customer-owned IP address pool.aws ec2 get-coip-pool-usage \ --pool-idipv4pool-coip-123a45678bEXAMPLEOutput:
{ "CoipPoolId": "ipv4pool-coip-123a45678bEXAMPLE", "CoipAddressUsages": [ { "CoIp": "0.0.0.0" }, { "AllocationId": "eipalloc-123ab45c6dEXAMPLE", "AwsAccountId": "123456789012", "CoIp": "0.0.0.0" }, { "AllocationId": "eipalloc-123ab45c6dEXAMPLE", "AwsAccountId": "123456789111", "CoIp": "0.0.0.0" } ], "LocalGatewayRouteTableId": "lgw-rtb-059615ef7dEXAMPLE" }For more information, see Customer-owned IP addresses in the AWS Outposts User Guide for Outposts racks.
-
For API details, see GetCoipPoolUsage
in AWS CLI Command Reference.
-
The following code example shows how to use get-console-output.
- AWS CLI
-
Example 1: To get the console output
The following
get-console-outputexample gets the console output for the specified Linux instance.aws ec2 get-console-output \ --instance-idi-1234567890abcdef0Output:
{ "InstanceId": "i-1234567890abcdef0", "Timestamp": "2013-07-25T21:23:53.000Z", "Output": "..." }For more information, see Instance console output in the Amazon EC2 User Guide.
Example 2: To get the latest console output
The following
get-console-outputexample gets the latest console output for the specified Linux instance.aws ec2 get-console-output \ --instance-idi-1234567890abcdef0\ --latest \ --outputtextOutput:
i-1234567890abcdef0 [ 0.000000] Command line: root=LABEL=/ console=tty1 console=ttyS0 selinux=0 nvme_core.io_timeout=4294967295 [ 0.000000] x86/fpu: Supporting XSAVE feature 0x001: 'x87 floating point registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x002: 'SSE registers' [ 0.000000] x86/fpu: Supporting XSAVE feature 0x004: 'AVX registers' ... Cloud-init v. 0.7.6 finished at Wed, 09 May 2018 19:01:13 +0000. Datasource DataSourceEc2. Up 21.50 seconds Amazon Linux AMI release 2018.03 Kernel 4.14.26-46.32.amzn1.xFor more information, see Instance console output in the Amazon EC2 User Guide.
-
For API details, see GetConsoleOutput
in AWS CLI Command Reference.
-
The following code example shows how to use get-console-screenshot.
- AWS CLI
-
To retrieve a screenshot of a running instance
The following
get-console-screenshotexample retrieves a screenshot of the specified instance in .jpg format. The screenshot is returned as a Base64-encoded string.aws ec2 get-console-screenshot \ --instance-idi-1234567890abcdef0Output:
{ "ImageData": "997987/8kgj49ikjhewkwwe0008084EXAMPLE", "InstanceId": "i-1234567890abcdef0" }-
For API details, see GetConsoleScreenshot
in AWS CLI Command Reference.
-
The following code example shows how to use get-default-credit-specification.
- AWS CLI
-
To describe the default credit option
The following
get-default-credit-specificationexample describes the default credit option for T2 instances.aws ec2 get-default-credit-specification \ --instance-familyt2Output:
{ "InstanceFamilyCreditSpecification": { "InstanceFamily": "t2", "CpuCredits": "standard" } }-
For API details, see GetDefaultCreditSpecification
in AWS CLI Command Reference.
-
The following code example shows how to use get-ebs-default-kms-key-id.
- AWS CLI
-
To describe your default CMK for EBS encryption
The following
get-ebs-default-kms-key-idexample describes the default CMK for EBS encryption for your AWS account.aws ec2 get-ebs-default-kms-key-idThe output shows the default CMK for EBS encryption, which is an AWS managed CMK with the alias
alias/aws/ebs.{ "KmsKeyId": "alias/aws/ebs" }The following output shows a custom CMK for EBS encryption.
{ "KmsKeyId": "arn:aws:kms:us-west-2:123456789012:key/0ea3fef3-80a7-4778-9d8c-1c0c6EXAMPLE" }-
For API details, see GetEbsDefaultKmsKeyId
in AWS CLI Command Reference.
-
The following code example shows how to use get-ebs-encryption-by-default.
- AWS CLI
-
To describe whether EBS encryption by default is enabled
The following
get-ebs-encryption-by-defaultexample indicates whether EBS encryption by default is enabled for your AWS account in the current Region.aws ec2 get-ebs-encryption-by-defaultThe following output indicates that EBS encryption by default is disabled.
{ "EbsEncryptionByDefault": false }The following output indicates that EBS encryption by default is enabled.
{ "EbsEncryptionByDefault": true }-
For API details, see GetEbsEncryptionByDefault
in AWS CLI Command Reference.
-
The following code example shows how to use get-flow-logs-integration-template.
- AWS CLI
-
To create a CloudFormation template to automate the integration of VPC flow logs with Amazon Athena
The following
get-flow-logs-integration-templateexamples create a CloudFormation template to automate the integration of VPC flow logs with Amazon Athena.Linux:
aws ec2 get-flow-logs-integration-template \ --flow-log-idfl-1234567890abcdef0\ --config-delivery-s3-destination-arnarn:aws:s3:::amzn-s3-demo-bucket\ --integrate-services AthenaIntegrations='[{IntegrationResultS3DestinationArn=arn:aws:s3:::amzn-s3-demo-bucket,PartitionLoadFrequency=none,PartitionStartDate=2021-07-21T00:40:00,PartitionEndDate=2021-07-21T00:42:00},{IntegrationResultS3DestinationArn=arn:aws:s3:::amzn-s3-demo-bucket,PartitionLoadFrequency=none,PartitionStartDate=2021-07-21T00:40:00,PartitionEndDate=2021-07-21T00:42:00}]'Windows:
aws ec2 get-flow-logs-integration-template^--flow-log-idfl-1234567890abcdef0^--config-delivery-s3-destination-arnarn:aws:s3:::amzn-s3-demo-bucket^--integrate-servicesAthenaIntegrations=[{IntegrationResultS3DestinationArn=arn:aws:s3:::amzn-s3-demo-bucket,PartitionLoadFrequency=none,PartitionStartDate=2021-07-21T00:40:00,PartitionEndDate=2021-07-21T00:42:00},{IntegrationResultS3DestinationArn=arn:aws:s3:::amzn-s3-demo-bucket,PartitionLoadFrequency=none,PartitionStartDate=2021-07-21T00:40:00,PartitionEndDate=2021-07-21T00:42:00}]Output:
{ "Result": "https://amzn-s3-demo-bucket.s3.us-east-2.amazonaws.com/VPCFlowLogsIntegrationTemplate_fl-1234567890abcdef0_Wed%20Jul%2021%2000%3A57%3A56%20UTC%202021.yml" }For information on using CloudFormation templates, see Working with AWS CloudFormation templates in the AWS CloudFormation User Guide.
For information on using Amazon Athena and flow logs, see Query flow logs using Amazon Athena in the Amazon Virtual Private Cloud User Guide.
-
For API details, see GetFlowLogsIntegrationTemplate
in AWS CLI Command Reference.
-
The following code example shows how to use get-groups-for-capacity-reservation.
- AWS CLI
-
To list the resource groups with a Capacity Reservation
The following
get-groups-for-capacity-reservationexample lists the resource groups to which the specified Capacity Reservation was added.aws ec2 get-groups-for-capacity-reservation \ --capacity-reservation-idcr-1234abcd56EXAMPLEOutput:
{ "CapacityReservationsGroup": [ { "GroupArn": "arn:aws:resource-groups:us-west-2:123456789012:group/my-resource-group", "OwnerId": "123456789012" } ] }For more information, see Capacity Reservation groups in the Amazon EC2 User Guide.
-
For API details, see GetGroupsForCapacityReservation
in AWS CLI Command Reference.
-
The following code example shows how to use get-host-reservation-purchase-preview.
- AWS CLI
-
To get a purchase preview for a Dedicated Host Reservation
This example provides a preview of the costs for a specified Dedicated Host Reservation for the specified Dedicated Host in your account.
Command:
aws ec2 get-host-reservation-purchase-preview --offering-idhro-03f707bf363b6b324--host-id-seth-013abcd2a00cbd123Output:
{ "TotalHourlyPrice": "1.499", "Purchase": [ { "HourlyPrice": "1.499", "InstanceFamily": "m4", "PaymentOption": "NoUpfront", "HostIdSet": [ "h-013abcd2a00cbd123" ], "UpfrontPrice": "0.000", "Duration": 31536000 } ], "TotalUpfrontPrice": "0.000" }-
For API details, see GetHostReservationPurchasePreview
in AWS CLI Command Reference.
-
The following code example shows how to use get-image-block-public-access-state.
- AWS CLI
-
To get the block public access state for AMIs in the specified Region
The following
get-image-block-public-access-stateexample gets the block public access state for AMIs at the account level in the specified Region.aws ec2 get-image-block-public-access-state \ --regionus-east-1Output:
{ "ImageBlockPublicAccessState": "block-new-sharing" }For more information, see Block public access to your AMIs in the Amazon EC2 User Guide.
-
For API details, see GetImageBlockPublicAccessState
in AWS CLI Command Reference.
-
The following code example shows how to use get-instance-types-from-instance-requirements.
- AWS CLI
-
To preview the instance types that match specified attributes
The following
get-instance-types-from-instance-requirementsexample first generates a list of all of the possible attributes that can be specified using the--generate-cli-skeletonparameter, and saves the list to a JSON file. Then, the JSON file is used to customize the attributes for which to preview matched instance types.To generate all possible attributes and save the output directly to a JSON file, use the following command.
aws ec2 get-instance-types-from-instance-requirements \ --regionus-east-1\ --generate-cli-skeletoninput>attributes.jsonOutput:
{ "DryRun": true, "ArchitectureTypes": [ "x86_64_mac" ], "VirtualizationTypes": [ "paravirtual" ], "InstanceRequirements": { "VCpuCount": { "Min": 0, "Max": 0 }, "MemoryMiB": { "Min": 0, "Max": 0 }, "CpuManufacturers": [ "intel" ], "MemoryGiBPerVCpu": { "Min": 0.0, "Max": 0.0 }, "ExcludedInstanceTypes": [ "" ], "InstanceGenerations": [ "current" ], "SpotMaxPricePercentageOverLowestPrice": 0, "OnDemandMaxPricePercentageOverLowestPrice": 0, "BareMetal": "included", "BurstablePerformance": "excluded", "RequireHibernateSupport": true, "NetworkInterfaceCount": { "Min": 0, "Max": 0 }, "LocalStorage": "required", "LocalStorageTypes": [ "hdd" ], "TotalLocalStorageGB": { "Min": 0.0, "Max": 0.0 }, "BaselineEbsBandwidthMbps": { "Min": 0, "Max": 0 }, "AcceleratorTypes": [ "inference" ], "AcceleratorCount": { "Min": 0, "Max": 0 }, "AcceleratorManufacturers": [ "xilinx" ], "AcceleratorNames": [ "t4" ], "AcceleratorTotalMemoryMiB": { "Min": 0, "Max": 0 } }, "MaxResults": 0, "NextToken": "" }Configure the JSON file. You must provide values for
ArchitectureTypes,VirtualizationTypes,VCpuCount, andMemoryMiB. You can omit the other attributes. When omitted, default values are used. For a description of each attribute and their default values, see get-instance-types-from-instance-requirements <https://docs.aws.amazon.com/cli/latest/reference/ec2/get-instance-types-from-instance-requirements.html>.Preview the instance types that have the attributes specified in
attributes.json. Specify the name and path to your JSON file by using the--cli-input-jsonparameter. In the following request, the output is formatted as a table.aws ec2 get-instance-types-from-instance-requirements \ --cli-input-jsonfile://attributes.json\ --outputtableContents of
attributes.jsonfile:{ "ArchitectureTypes": [ "x86_64" ], "VirtualizationTypes": [ "hvm" ], "InstanceRequirements": { "VCpuCount": { "Min": 4, "Max": 6 }, "MemoryMiB": { "Min": 2048 }, "InstanceGenerations": [ "current" ] } }Output:
------------------------------------------ |GetInstanceTypesFromInstanceRequirements| +----------------------------------------+ || InstanceTypes || |+--------------------------------------+| || InstanceType || |+--------------------------------------+| || c4.xlarge || || c5.xlarge || || c5a.xlarge || || c5ad.xlarge || || c5d.xlarge || || c5n.xlarge || || d2.xlarge || ...For more information about attribute-based instance type selection, see How attribute-based instance type selection works in the Amazon EC2 User Guide.
-
For API details, see GetInstanceTypesFromInstanceRequirements
in AWS CLI Command Reference.
-
The following code example shows how to use get-instance-uefi-data.
- AWS CLI
-
To retrieve UEFI data from an instance
The following
get-instance-uefi-dataexample retrieves UEFI data from an instance. If the output is empty, the instance does not contain UEFI data.aws ec2 get-instance-uefi-data \ --instance-idi-0123456789exampleOutput:
{ "InstanceId": "i-0123456789example", "UefiData": "QU1aTlVFRkkf+uLXAAAAAHj5a7fZ9+3dBzxXb/. <snipped> AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAD4L/J/AODshho=" }For more information, see UEFI Secure Boot in the Amazon EC2 User Guide.
-
For API details, see GetInstanceUefiData
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-address-history.
- AWS CLI
-
To get the history of a CIDR
The following
get-ipam-address-historyexample gets the history of a CIDR.(Linux):
aws ec2 get-ipam-address-history \ --cidr10.0.0.0/16\ --ipam-scope-idipam-scope-02fc38cd4c48e7d38\ --start-time2021-12-08T01:00:00.000Z\ --end-time2021-12-10T01:00:00.000Z(Windows):
aws ec2 get-ipam-address-history^--cidr10.0.0.0/16^--ipam-scope-idipam-scope-02fc38cd4c48e7d38^--start-time2021-12-08T01:00:00.000Z^--end-time2021-12-10T01:00:00.000ZOutput:
{ "HistoryRecords": [ { "ResourceOwnerId": "123456789012", "ResourceRegion": "us-west-1", "ResourceType": "vpc", "ResourceId": "vpc-06cbefa9ee907e1c0", "ResourceCidr": "10.0.0.0/16", "ResourceName": "Demo", "ResourceComplianceStatus": "unmanaged", "ResourceOverlapStatus": "overlapping", "VpcId": "vpc-06cbefa9ee907e1c0", "SampledStartTime": "2021-12-08T19:54:57.675000+00:00" }, { "ResourceOwnerId": "123456789012", "ResourceRegion": "us-east-2", "ResourceType": "vpc", "ResourceId": "vpc-042702f474812c9ad", "ResourceCidr": "10.0.0.0/16", "ResourceName": "test", "ResourceComplianceStatus": "unmanaged", "ResourceOverlapStatus": "overlapping", "VpcId": "vpc-042702f474812c9ad", "SampledStartTime": "2021-12-08T19:54:59.019000+00:00" }, { "ResourceOwnerId": "123456789012", "ResourceRegion": "us-east-2", "ResourceType": "vpc", "ResourceId": "vpc-042b8a44f64267d67", "ResourceCidr": "10.0.0.0/16", "ResourceName": "tester", "ResourceComplianceStatus": "unmanaged", "ResourceOverlapStatus": "overlapping", "VpcId": "vpc-042b8a44f64267d67", "SampledStartTime": "2021-12-08T19:54:59.019000+00:00" } ] }For more information, see View the history of IP addresses in the Amazon VPC IPAM User Guide.
-
For API details, see GetIpamAddressHistory
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-discovered-accounts.
- AWS CLI
-
To view the accounts discovered by an IPAM
In this scenario, you're a IPAM delegated admin who wants to view the AWS accounts that own resources that the IPAM is discovering.
The
--discovery-regionis the IPAM operating Region you want to view the monitored account statuses in. For example, if you have three IPAM operating Regions, you may want to make this request three times to view the timestamps specific to discovery in each of those particular Regions.The following
get-ipam-discovered-accountsexample lists the AWS accounts that own resources that the IPAM is discovering.aws ec2 get-ipam-discovered-accounts \ --ipam-resource-discovery-idipam-res-disco-0365d2977fc1672fe\ --discovery-regionus-east-1Output:
{ "IpamDiscoveredAccounts": [ { "AccountId": "149977607591", "DiscoveryRegion": "us-east-1", "LastAttemptedDiscoveryTime": "2024-02-09T19:04:31.379000+00:00", "LastSuccessfulDiscoveryTime": "2024-02-09T19:04:31.379000+00:00" } ] }For more information, see Integrate IPAM with accounts outside of your organization in the Amazon VPC IPAM User Guide.
-
For API details, see GetIpamDiscoveredAccounts
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-discovered-public-addresses.
- AWS CLI
-
To view discovered public IP addresses
In this example, you are an IPAM delegated admin and you want to view the IP addresses of resources discovered by IPAM. You can get the resource discovery ID with describe-ipam-resource-discoveries.
The following
get-ipam-discovered-public-addressesexample shows the discovered public IP addresses for a resource discovery.aws ec2 get-ipam-discovered-public-addresses \ --ipam-resource-discovery-idipam-res-disco-0f4ef577a9f37a162\ --address-regionus-east-1\ --regionus-east-1Output:
{ "IpamDiscoveredPublicAddresses": [ { "IpamResourceDiscoveryId": "ipam-res-disco-0f4ef577a9f37a162", "AddressRegion": "us-east-1", "Address": "54.208.155.7", "AddressOwnerId": "320805250157", "AssociationStatus": "associated", "AddressType": "ec2-public-ip", "VpcId": "vpc-073b294916198ce49", "SubnetId": "subnet-0b6c8a8839e9a4f15", "NetworkInterfaceId": "eni-081c446b5284a5e06", "NetworkInterfaceDescription": "", "InstanceId": "i-07459a6fca5b35823", "Tags": {}, "NetworkBorderGroup": "us-east-1c", "SecurityGroups": [ { "GroupName": "launch-wizard-2", "GroupId": "sg-0a489dd6a65c244ce" } ], "SampleTime": "2024-04-05T15:13:59.228000+00:00" }, { "IpamResourceDiscoveryId": "ipam-res-disco-0f4ef577a9f37a162", "AddressRegion": "us-east-1", "Address": "44.201.251.218", "AddressOwnerId": "470889052923", "AssociationStatus": "associated", "AddressType": "ec2-public-ip", "VpcId": "vpc-6c31a611", "SubnetId": "subnet-062f47608b99834b1", "NetworkInterfaceId": "eni-024845359c2c3ae9b", "NetworkInterfaceDescription": "", "InstanceId": "i-04ef786d9c4e03f41", "Tags": {}, "NetworkBorderGroup": "us-east-1a", "SecurityGroups": [ { "GroupName": "launch-wizard-32", "GroupId": "sg-0ed1a426e96a68374" } ], "SampleTime": "2024-04-05T15:13:59.145000+00:00" } }For more information, see View public IP insights in the Amazon VPC IPAM User Guide.
-
For API details, see GetIpamDiscoveredPublicAddresses
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-discovered-resource-cidrs.
- AWS CLI
-
To view the IP address CIDRs discovered by an IPAM
In this example, you're a IPAM delegated admin who wants to view details related to the IP address CIDRs for resources that the IPAM is discovering.
To complete this request:
The resource discovery you choose must be associated with the IPAM.The
--resource-regionis the AWS Region where resource was created.The following
get-ipam-discovered-resource-cidrsexample lists the IP addresses for resources that the IPAM is discovering.aws ec2 get-ipam-discovered-resource-cidrs \ --ipam-resource-discovery-idipam-res-disco-0365d2977fc1672fe\ --resource-regionus-east-1Output:
{ { "IpamDiscoveredResourceCidrs": [ { "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "ResourceRegion": "us-east-1", "ResourceId": "vpc-0c974c95ca7ceef4a", "ResourceOwnerId": "149977607591", "ResourceCidr": "172.31.0.0/16", "ResourceType": "vpc", "ResourceTags": [], "IpUsage": 0.375, "VpcId": "vpc-0c974c95ca7ceef4a", "SampleTime": "2024-02-09T19:15:16.529000+00:00" }, { "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "ResourceRegion": "us-east-1", "ResourceId": "subnet-07fe028119082a8c1", "ResourceOwnerId": "149977607591", "ResourceCidr": "172.31.0.0/20", "ResourceType": "subnet", "ResourceTags": [], "IpUsage": 0.0012, "VpcId": "vpc-0c974c95ca7ceef4a", "SampleTime": "2024-02-09T19:15:16.529000+00:00" }, { "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "ResourceRegion": "us-east-1", "ResourceId": "subnet-0a96893763984cc4e", "ResourceOwnerId": "149977607591", "ResourceCidr": "172.31.64.0/20", "ResourceType": "subnet", "ResourceTags": [], "IpUsage": 0.0012, "VpcId": "vpc-0c974c95ca7ceef4a", "SampleTime": "2024-02-09T19:15:16.529000+00:00" } } }For more information, see Monitor CIDR usage by resource in the Amazon VPC IPAM User Guide.
-
For API details, see GetIpamDiscoveredResourceCidrs
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-pool-allocations.
- AWS CLI
-
To get the CIDRs allocated from an IPAM pool
The following
get-ipam-pool-allocationsexample gets the CIDRs allocated from an IPAM pool.(Linux):
aws ec2 get-ipam-pool-allocations \ --ipam-pool-idipam-pool-0533048da7d823723\ --filtersName=ipam-pool-allocation-id,Values=ipam-pool-alloc-0e6186d73999e47389266a5d6991e6220(Windows):
aws ec2 get-ipam-pool-allocations^--ipam-pool-idipam-pool-0533048da7d823723^--filtersName=ipam-pool-allocation-id,Values=ipam-pool-alloc-0e6186d73999e47389266a5d6991e6220Output:
{ "IpamPoolAllocations": [ { "Cidr": "10.0.0.0/16", "IpamPoolAllocationId": "ipam-pool-alloc-0e6186d73999e47389266a5d6991e6220", "ResourceType": "custom", "ResourceOwner": "123456789012" } ] }-
For API details, see GetIpamPoolAllocations
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-pool-cidrs.
- AWS CLI
-
To get the CIDRs provisioned to an IPAM pool
The following
get-ipam-pool-cidrsexample gets the CIDRs provisioned to an IPAM pool.(Linux):
aws ec2 get-ipam-pool-cidrs \ --ipam-pool-idipam-pool-0533048da7d823723\ --filters 'Name=cidr,Values=10.*'(Windows):
aws ec2 get-ipam-pool-cidrs^--ipam-pool-idipam-pool-0533048da7d823723^--filtersName=cidr,Values=10.*Output:
{ "IpamPoolCidr": { "Cidr": "10.0.0.0/24", "State": "provisioned" } }-
For API details, see GetIpamPoolCidrs
in AWS CLI Command Reference.
-
The following code example shows how to use get-ipam-resource-cidrs.
- AWS CLI
-
To get the CIDRs allocated to a resource
The following
get-ipam-resource-cidrsexample gets the CIDRs allocated to a resource.(Linux):
aws ec2 get-ipam-resource-cidrs \ --ipam-scope-idipam-scope-02fc38cd4c48e7d38\ --filtersName=management-state,Values=unmanaged(Windows):
aws ec2 get-ipam-resource-cidrs^--ipam-scope-idipam-scope-02fc38cd4c48e7d38^--filtersName=management-state,Values=unmanagedOutput:
{ "IpamResourceCidrs": [ { "IpamId": "ipam-08440e7a3acde3908", "IpamScopeId": "ipam-scope-02fc38cd4c48e7d38", "ResourceRegion": "us-east-2", "ResourceOwnerId": "123456789012", "ResourceId": "vpc-621b8709", "ResourceName": "Default AWS VPC", "ResourceCidr": "172.33.0.0/16", "ResourceType": "vpc", "ResourceTags": [ { "Key": "Environment", "Value": "Test" }, { "Key": "Name", "Value": "Default AWS VPC" } ], "IpUsage": 0.0039, "ComplianceStatus": "unmanaged", "ManagementState": "unmanaged", "OverlapStatus": "nonoverlapping", "VpcId": "vpc-621b8709" } ] }For more information, see Monitor CIDR usage by resource in the Amazon VPC IPAM User Guide.
-
For API details, see GetIpamResourceCidrs
in AWS CLI Command Reference.
-
The following code example shows how to use get-launch-template-data.
- AWS CLI
-
To get instance data for a launch template
This example gets data about the specified instance and uses the
--queryoption to return the contents inLaunchTemplateData. You can use the output as a base to create a new launch template or launch template version.Command:
aws ec2 get-launch-template-data --instance-idi-0123d646e8048babc--query 'LaunchTemplateData'Output:
{ "Monitoring": {}, "ImageId": "ami-8c1be5f6", "BlockDeviceMappings": [ { "DeviceName": "/dev/xvda", "Ebs": { "DeleteOnTermination": true } } ], "EbsOptimized": false, "Placement": { "Tenancy": "default", "GroupName": "", "AvailabilityZone": "us-east-1a" }, "InstanceType": "t2.micro", "NetworkInterfaces": [ { "Description": "", "NetworkInterfaceId": "eni-35306abc", "PrivateIpAddresses": [ { "Primary": true, "PrivateIpAddress": "10.0.0.72" } ], "SubnetId": "subnet-7b16de0c", "Groups": [ "sg-7c227019" ], "Ipv6Addresses": [ { "Ipv6Address": "2001:db8:1234:1a00::123" } ], "PrivateIpAddress": "10.0.0.72" } ] }-
For API details, see GetLaunchTemplateData
in AWS CLI Command Reference.
-
The following code example shows how to use get-managed-prefix-list-associations.
- AWS CLI
-
To get prefix list associations
The following
get-managed-prefix-list-associationsexample gets the resources that are associated with the specified prefix list.aws ec2 get-managed-prefix-list-associations \ --prefix-list-idpl-0123456abcabcabc1Output:
{ "PrefixListAssociations": [ { "ResourceId": "sg-0abc123456abc12345", "ResourceOwner": "123456789012" } ] }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see GetManagedPrefixListAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use get-managed-prefix-list-entries.
- AWS CLI
-
To get the entries for a prefix list
The following
get-managed-prefix-list-entriesgets the entries for the specified prefix list.aws ec2 get-managed-prefix-list-entries \ --prefix-list-idpl-0123456abcabcabc1Output:
{ "Entries": [ { "Cidr": "10.0.0.0/16", "Description": "vpc-a" }, { "Cidr": "10.2.0.0/16", "Description": "vpc-b" } ] }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see GetManagedPrefixListEntries
in AWS CLI Command Reference.
-
The following code example shows how to use get-network-insights-access-scope-analysis-findings.
- AWS CLI
-
To get the findings of Network Insights access scope analysis
The following
get-network-insights-access-scope-analysis-findingsexample gets the selected scope analysis findings in your AWS account.aws ec2 get-network-insights-access-scope-analysis-findings \ --regionus-east-1\ --network-insights-access-scope-analysis-idnis\ --nis-123456789111Output:
{ "NetworkInsightsAccessScopeAnalysisId": "nisa-123456789222", "AnalysisFindings": [ { "NetworkInsightsAccessScopeAnalysisId": "nisa-123456789222", "NetworkInsightsAccessScopeId": "nis-123456789111", "FindingComponents": [ { "SequenceNumber": 1, "Component": { "Id": "eni-02e3d42d5cceca67d", "Arn": "arn:aws:ec2:us-east-1:936459623503:network-interface/eni-02e3d32d9cceca17d" }, "OutboundHeader": { "DestinationAddresses": [ "0.0.0.0/5", "11.0.0.0/8", "12.0.0.0/6", "128.0.0.0/3", "16.0.0.0/4", "160.0.0.0/5", "168.0.0.0/6", "172.0.0.0/12" "8.0.0.0/7" ], "DestinationPortRanges": [ { "From": 0, "To": 65535 } ], "Protocol": "6", "SourceAddresses": [ "10.0.2.253/32" ], "SourcePortRanges": [ { "From": 0, "To": 65535 } ] }, [etc] ] } } ] }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see GetNetworkInsightsAccessScopeAnalysisFindings
in AWS CLI Command Reference.
-
The following code example shows how to use get-network-insights-access-scope-content.
- AWS CLI
-
To get Network Insights access scope content
The following
get-network-insights-access-scope-contentexample gets the content of the selected scope analysis ID in your AWS account.aws ec2 get-network-insights-access-scope-content \ --regionus-east-1\ --network-insights-access-scope-idnis-123456789222Output:
{ "NetworkInsightsAccessScopeContent": { "NetworkInsightsAccessScopeId": "nis-123456789222", "MatchPaths": [ { "Source": { "ResourceStatement": { "ResourceTypes": [ "AWS::EC2::NetworkInterface" ] } }, "Destination": { "ResourceStatement": { "ResourceTypes": [ "AWS::EC2::InternetGateway" ] } } } ] } }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see GetNetworkInsightsAccessScopeContent
in AWS CLI Command Reference.
-
The following code example shows how to use get-password-data.
- AWS CLI
-
To get the encrypted password
This example gets the encrypted password.
Command:
aws ec2 get-password-data --instance-idi-1234567890abcdef0Output:
{ "InstanceId": "i-1234567890abcdef0", "Timestamp": "2013-08-07T22:18:38.000Z", "PasswordData": "gSlJFq+VpcZXqy+iktxMF6NyxQ4qCrT4+gaOuNOenX1MmgXPTj7XEXAMPLE UQ+YeFfb+L1U4C4AKv652Ux1iRB3CPTYP7WmU3TUnhsuBd+p6LVk7T2lKUml6OXbk6WPW1VYYm/TRPB1 e1DQ7PY4an/DgZT4mwcpRFigzhniQgDDeO1InvSDcwoUTwNs0Y1S8ouri2W4n5GNlriM3Q0AnNVelVz/ 53TkDtxbNoU606M1gK9zUWSxqEgwvbV2j8c5rP0WCuaMWSFl4ziDu4bd7q+4RSyi8NUsVWnKZ4aEZffu DPGzKrF5yLlf3etP2L4ZR6CvG7K1hx7VKOQVN32Dajw==" }To get the decrypted password
This example gets the decrypted password.
Command:
aws ec2 get-password-data --instance-idi-1234567890abcdef0--priv-launch-key C:\Keys\MyKeyPair.pemOutput:
{ "InstanceId": "i-1234567890abcdef0", "Timestamp": "2013-08-30T23:18:05.000Z", "PasswordData": "&ViJ652e*u" }-
For API details, see GetPasswordData
in AWS CLI Command Reference.
-
The following code example shows how to use get-reserved-instances-exchange-quote.
- AWS CLI
-
To get a quote for exchanging a Convertible Reserved Instance
This example gets the exchange information for the specified Convertible Reserved Instances.
Command:
aws ec2 get-reserved-instances-exchange-quote --reserved-instance-ids7b8750c3-397e-4da4-bbcb-a45ebexample--target-configurationsOfferingId=6fea5434-b379-434c-b07b-a7abexampleOutput:
{ "CurrencyCode": "USD", "ReservedInstanceValueSet": [ { "ReservedInstanceId": "7b8750c3-397e-4da4-bbcb-a45ebexample", "ReservationValue": { "RemainingUpfrontValue": "0.000000", "HourlyPrice": "0.027800", "RemainingTotalValue": "730.556200" } } ], "PaymentDue": "424.983828", "TargetConfigurationValueSet": [ { "TargetConfiguration": { "InstanceCount": 5, "OfferingId": "6fea5434-b379-434c-b07b-a7abexample" }, "ReservationValue": { "RemainingUpfrontValue": "424.983828", "HourlyPrice": "0.016000", "RemainingTotalValue": "845.447828" } } ], "IsValidExchange": true, "OutputReservedInstancesWillExpireAt": "2020-10-01T13:03:39Z", "ReservedInstanceValueRollup": { "RemainingUpfrontValue": "0.000000", "HourlyPrice": "0.027800", "RemainingTotalValue": "730.556200" }, "TargetConfigurationValueRollup": { "RemainingUpfrontValue": "424.983828", "HourlyPrice": "0.016000", "RemainingTotalValue": "845.447828" } }-
For API details, see GetReservedInstancesExchangeQuote
in AWS CLI Command Reference.
-
The following code example shows how to use get-security-groups-for-vpc.
- AWS CLI
-
To view security groups that can be associated with network interfaces in a specified VPC.
The following
get-security-groups-for-vpcexample shows the security groups that can be associated with network interfaces in the VPC.aws ec2 get-security-groups-for-vpc \ --vpc-idvpc-6c31a611\ --regionus-east-1Output:
{ "SecurityGroupForVpcs": [ { "Description": "launch-wizard-36 created 2022-08-29T15:59:35.338Z", "GroupName": "launch-wizard-36", "OwnerId": "470889052923", "GroupId": "sg-007e0c3027ee885f5", "Tags": [], "PrimaryVpcId": "vpc-6c31a611" }, { "Description": "launch-wizard-18 created 2024-01-19T20:22:27.527Z", "GroupName": "launch-wizard-18", "OwnerId": "470889052923", "GroupId": "sg-0147193bef51c9eef", "Tags": [], "PrimaryVpcId": "vpc-6c31a611" } }-
For API details, see GetSecurityGroupsForVpc
in AWS CLI Command Reference.
-
The following code example shows how to use get-serial-console-access-status.
- AWS CLI
-
To view the status of account access to the serial console
The following
get-serial-console-access-statusexample determines whether serial console access is enabled for your account.aws ec2 get-serial-console-access-statusOutput:
{ "SerialConsoleAccessEnabled": true }For more information, see EC2 Serial Console in the Amazon EC2 User Guide.
-
For API details, see GetSerialConsoleAccessStatus
in AWS CLI Command Reference.
-
The following code example shows how to use get-snapshot-block-public-access-state.
- AWS CLI
-
To get the current state of block public access for snapshots
The following
get-snapshot-block-public-access-stateexample gets the current state of block public access for snapshots.aws ec2 get-snapshot-block-public-access-stateOutput:
{ "State": "block-all-sharing" }For more information, see Block public access for snapshots in the Amazon EBS User Guide.
-
For API details, see GetSnapshotBlockPublicAccessState
in AWS CLI Command Reference.
-
The following code example shows how to use get-spot-placement-scores.
- AWS CLI
-
To calculate the Spot placement score for specified requirements
The following
get-spot-placement-scoresexample first generates a list of all of the possible parameters that can be specified for the Spot placement score configuration using the--generate-cli-skeletonparameter, and saves the list to a JSON file. Then, the JSON file is used to configure the requirements to use to calculate the Spot placement score.To generate all possible parameters that can be specified for the Spot placement score configuration, and save the output directly to a JSON file.
aws ec2 get-spot-placement-scores \ --regionus-east-1\ --generate-cli-skeletoninput>attributes.jsonOutput:
{ "InstanceTypes": [ "" ], "TargetCapacity": 0, "TargetCapacityUnitType": "vcpu", "SingleAvailabilityZone": true, "RegionNames": [ "" ], "InstanceRequirementsWithMetadata": { "ArchitectureTypes": [ "x86_64_mac" ], "VirtualizationTypes": [ "hvm" ], "InstanceRequirements": { "VCpuCount": { "Min": 0, "Max": 0 }, "MemoryMiB": { "Min": 0, "Max": 0 }, "CpuManufacturers": [ "amd" ], "MemoryGiBPerVCpu": { "Min": 0.0, "Max": 0.0 }, "ExcludedInstanceTypes": [ "" ], "InstanceGenerations": [ "previous" ], "SpotMaxPricePercentageOverLowestPrice": 0, "OnDemandMaxPricePercentageOverLowestPrice": 0, "BareMetal": "excluded", "BurstablePerformance": "excluded", "RequireHibernateSupport": true, "NetworkInterfaceCount": { "Min": 0, "Max": 0 }, "LocalStorage": "included", "LocalStorageTypes": [ "hdd" ], "TotalLocalStorageGB": { "Min": 0.0, "Max": 0.0 }, "BaselineEbsBandwidthMbps": { "Min": 0, "Max": 0 }, "AcceleratorTypes": [ "fpga" ], "AcceleratorCount": { "Min": 0, "Max": 0 }, "AcceleratorManufacturers": [ "amd" ], "AcceleratorNames": [ "vu9p" ], "AcceleratorTotalMemoryMiB": { "Min": 0, "Max": 0 } } }, "DryRun": true, "MaxResults": 0, "NextToken": "" }Configure the JSON file. You must provide a value for
TargetCapacity. For a description of each parameter and their default values, see Calculate the Spot placement score (AWS CLI) <https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/spot-placement-score.html#calculate-sps-cli>.Calculate the Spot placement score for the requirements specified in
attributes.json. Specify the name and path to your JSON file by using the--cli-input-jsonparameter.aws ec2 get-spot-placement-scores \ --regionus-east-1\ --cli-input-jsonfile://attributes.jsonOutput if
SingleAvailabilityZoneis set tofalseor omitted (if omitted, it defaults tofalse). A scored list of Regions is returned."Recommendation": [ { "Region": "us-east-1", "Score": 7 }, { "Region": "us-west-1", "Score": 5 }, ...Output if
SingleAvailabilityZoneis set totrue. A scored list of SingleAvailability Zones is returned."Recommendation": [ { "Region": "us-east-1", "AvailabilityZoneId": "use1-az1" "Score": 8 }, { "Region": "us-east-1", "AvailabilityZoneId": "usw2-az3" "Score": 6 }, ...For more information about calculating a Spot placement score, and for example configurations, see Calculate a Spot placement score in the Amazon EC2 User Guide.
-
For API details, see GetSpotPlacementScores
in AWS CLI Command Reference.
-
The following code example shows how to use get-subnet-cidr-reservations.
- AWS CLI
-
To get information about a subnet CIDR reservation
The following
get-subnet-cidr-reservationsexample displays information about the specified subnet CIDR reservation.aws ec2 get-subnet-cidr-reservations \ --subnet-idsubnet-03c51e2e6cEXAMPLEOutput:
{ "SubnetIpv4CidrReservations": [ { "SubnetCidrReservationId": "scr-044f977c4eEXAMPLE", "SubnetId": "subnet-03c51e2e6cEXAMPLE", "Cidr": "10.1.0.16/28", "ReservationType": "prefix", "OwnerId": "123456789012" } ], "SubnetIpv6CidrReservations": [] }For more information, see Subnet CIDR reservations in the Amazon VPC User Guide.
-
For API details, see GetSubnetCidrReservations
in AWS CLI Command Reference.
-
The following code example shows how to use get-transit-gateway-attachment-propagations.
- AWS CLI
-
To list the route tables to which the specified resource attachment propagates routes
The following
get-transit-gateway-attachment-propagationsexample lists the route table to which the specified resource attachment propagates routes.aws ec2 get-transit-gateway-attachment-propagations \ --transit-gateway-attachment-idtgw-attach-09fbd47ddfEXAMPLEOutput:
{ "TransitGatewayAttachmentPropagations": [ { "TransitGatewayRouteTableId": "tgw-rtb-0882c61b97EXAMPLE", "State": "enabled" } ] }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see GetTransitGatewayAttachmentPropagations
in AWS CLI Command Reference.
-
The following code example shows how to use get-transit-gateway-multicast-domain-associations.
- AWS CLI
-
To view the information about the transit gateway multicast domain associations
The following
get-transit-gateway-multicast-domain-associationsexample returns the associations for the specified multicast domain.aws ec2 get-transit-gateway-multicast-domain-associations \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef7EXAMPLEOutput:
{ "MulticastDomainAssociations": [ { "TransitGatewayAttachmentId": "tgw-attach-028c1dd0f8EXAMPLE", "ResourceId": "vpc-01128d2c24EXAMPLE", "ResourceType": "vpc", "Subnet": { "SubnetId": "subnet-000de86e3bEXAMPLE", "State": "associated" } }, { "TransitGatewayAttachmentId": "tgw-attach-070e571cd1EXAMPLE", "ResourceId": "vpc-7EXAMPLE", "ResourceType": "vpc", "Subnet": { "SubnetId": "subnet-4EXAMPLE", "State": "associated" } }, { "TransitGatewayAttachmentId": "tgw-attach-070e571cd1EXAMPLE", "ResourceId": "vpc-7EXAMPLE", "ResourceType": "vpc", "Subnet": { "SubnetId": "subnet-5EXAMPLE", "State": "associated" } }, { "TransitGatewayAttachmentId": "tgw-attach-070e571cd1EXAMPLE", "ResourceId": "vpc-7EXAMPLE", "ResourceType": "vpc", "Subnet": { "SubnetId": "subnet-aEXAMPLE", "State": "associated" } }, { "TransitGatewayAttachmentId": "tgw-attach-070e571cd1EXAMPLE", "ResourceId": "vpc-7EXAMPLE", "ResourceType": "vpc", "Subnet": { "SubnetId": "subnet-fEXAMPLE", "State": "associated" } } ] }For more information, see Multicast domains in the Transit Gateways Guide.
-
For API details, see GetTransitGatewayMulticastDomainAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use get-transit-gateway-prefix-list-references.
- AWS CLI
-
To get prefix list references in a transit gateway route table
The following
get-transit-gateway-prefix-list-referencesexample gets the prefix list references for the specified transit gateway route table, and filters by the ID of a specific prefix list.aws ec2 get-transit-gateway-prefix-list-references \ --transit-gateway-route-table-idtgw-rtb-0123456789abcd123\ --filtersName=prefix-list-id,Values=pl-11111122222222333Output:
{ "TransitGatewayPrefixListReferences": [ { "TransitGatewayRouteTableId": "tgw-rtb-0123456789abcd123", "PrefixListId": "pl-11111122222222333", "PrefixListOwnerId": "123456789012", "State": "available", "Blackhole": false, "TransitGatewayAttachment": { "TransitGatewayAttachmentId": "tgw-attach-aabbccddaabbccaab", "ResourceType": "vpc", "ResourceId": "vpc-112233445566aabbc" } } ] }For more information, see Prefix list references in the Transit Gateways Guide.
-
For API details, see GetTransitGatewayPrefixListReferences
in AWS CLI Command Reference.
-
The following code example shows how to use get-transit-gateway-route-table-associations.
- AWS CLI
-
To get information about the associations for the specified transit gateway route table
The following
get-transit-gateway-route-table-associationsexample displays information about the associations for the specified transit gateway route table.aws ec2 get-transit-gateway-route-table-associations \ --transit-gateway-route-table-idtgw-rtb-0a823edbdeEXAMPLEOutput:
{ "Associations": [ { "TransitGatewayAttachmentId": "tgw-attach-09b52ccdb5EXAMPLE", "ResourceId": "vpc-4d7de228", "ResourceType": "vpc", "State": "associating" } ] }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see GetTransitGatewayRouteTableAssociations
in AWS CLI Command Reference.
-
The following code example shows how to use get-transit-gateway-route-table-propagations.
- AWS CLI
-
To display information about the route table propagations for the specified transit gateway route table
The following
get-transit-gateway-route-table-propagationsexample returns the route table propagations for the specified route table.aws ec2 get-transit-gateway-route-table-propagations \ --transit-gateway-route-table-idtgw-rtb-002573ed1eEXAMPLEOutput:
{ "TransitGatewayRouteTablePropagations": [ { "TransitGatewayAttachmentId": "tgw-attach-01f8100bc7EXAMPLE", "ResourceId": "vpc-3EXAMPLE", "ResourceType": "vpc", "State": "enabled" }, { "TransitGatewayAttachmentId": "tgw-attach-08e0bc912cEXAMPLE", "ResourceId": "11460968-4ac1-4fd3-bdb2-00599EXAMPLE", "ResourceType": "direct-connect-gateway", "State": "enabled" }, { "TransitGatewayAttachmentId": "tgw-attach-0a89069f57EXAMPLE", "ResourceId": "8384da05-13ce-4a91-aada-5a1baEXAMPLE", "ResourceType": "direct-connect-gateway", "State": "enabled" } ] }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see GetTransitGatewayRouteTablePropagations
in AWS CLI Command Reference.
-
The following code example shows how to use get-verified-access-endpoint-policy.
- AWS CLI
-
To get the Verified Access policy of an endpoint
The following
get-verified-access-endpoint-policyexample gets the Verified Access policy of the specified endpoint.aws ec2 get-verified-access-endpoint-policy \ --verified-access-endpoint-idvae-066fac616d4d546f2Output:
{ "PolicyEnabled": true, "PolicyDocument": "permit(principal,action,resource)\nwhen {\n context.identity.groups.contains(\"finance\") &&\n context.identity.email_verified == true\n};" }For more information, see Verified Access policies in the AWS Verified Access User Guide.
-
For API details, see GetVerifiedAccessEndpointPolicy
in AWS CLI Command Reference.
-
The following code example shows how to use get-verified-access-group-policy.
- AWS CLI
-
To get the Verified Access policy of a group
The following
get-verified-access-group-policyexample gets the Verified Access policy of the specified group.aws ec2 get-verified-access-group-policy \ --verified-access-group-idvagr-0dbe967baf14b7235Output:
{ "PolicyEnabled": true, "PolicyDocument": "permit(principal,action,resource)\nwhen {\n context.identity.groups.contains(\"finance\") &&\n context.identity.email_verified == true\n};" }For more information, see Verified Access groups in the AWS Verified Access User Guide.
-
For API details, see GetVerifiedAccessGroupPolicy
in AWS CLI Command Reference.
-
The following code example shows how to use get-vpn-connection-device-sample-configuration.
- AWS CLI
-
To download a sample configuration file
The following
get-vpn-connection-device-sample-configurationexample downloads the specified sample configuration file. To list the gateway devices with a sample configuration file, call theget-vpn-connection-device-typescommand.aws ec2 get-vpn-connection-device-sample-configuration \ --vpn-connection-idvpn-123456789abc01234\ --vpn-connection-device-type-id5fb390baOutput:
{ "VpnConnectionDeviceSampleConfiguration": "contents-of-the-sample-configuration-file" }For more information, see Download the configuration file in the AWS Site-to-Site VPN User Guide.
-
For API details, see GetVpnConnectionDeviceSampleConfiguration
in AWS CLI Command Reference.
-
The following code example shows how to use get-vpn-connection-device-types.
- AWS CLI
-
To list gateway devices with a sample configuration file
The following
get-vpn-connection-device-typesexample lists the gateway devices from Palo Alto Networks that have sample configuration files.aws ec2 get-vpn-connection-device-types \ --query"VpnConnectionDeviceTypes[?Vendor==`Palo Alto Networks`]"Output:
[ { "VpnConnectionDeviceTypeId": "754a6372", "Vendor": "Palo Alto Networks", "Platform": "PA Series", "Software": "PANOS 4.1.2+" }, { "VpnConnectionDeviceTypeId": "9612cbed", "Vendor": "Palo Alto Networks", "Platform": "PA Series", "Software": "PANOS 4.1.2+ (GUI)" }, { "VpnConnectionDeviceTypeId": "5fb390ba", "Vendor": "Palo Alto Networks", "Platform": "PA Series", "Software": "PANOS 7.0+" } ]For more information, see Download the configuration file in the AWS Site-to-Site VPN user Guide.
-
For API details, see GetVpnConnectionDeviceTypes
in AWS CLI Command Reference.
-
The following code example shows how to use import-client-vpn-client-certificate-revocation-list.
- AWS CLI
-
To import a client certificate revocation list
The following
import-client-vpn-client-certificate-revocation-listexample imports a client certificate revocation list to the Client VPN endpoint by specifying the location of the file on the local computer.aws ec2 import-client-vpn-client-certificate-revocation-list \ --certificate-revocation-listfile:///path/to/crl.pem\ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcdeOutput:
{ "Return": true }For more information, see Client Certificate Revocation Lists in the AWS Client VPN Administrator Guide.
-
For API details, see ImportClientVpnClientCertificateRevocationList
in AWS CLI Command Reference.
-
The following code example shows how to use import-image.
- AWS CLI
-
To import a VM image file as an AMI
The following
import-imageexample imports the specified OVA.aws ec2 import-image \ --disk-containers Format=ova,UserBucket="{S3Bucket=my-import-bucket,S3Key=vms/my-server-vm.ova}"Output:
{ "ImportTaskId": "import-ami-1234567890abcdef0", "Progress": "2", "SnapshotDetails": [ { "DiskImageSize": 0.0, "Format": "ova", "UserBucket": { "S3Bucket": "my-import-bucket", "S3Key": "vms/my-server-vm.ova" } } ], "Status": "active", "StatusMessage": "pending" }-
For API details, see ImportImage
in AWS CLI Command Reference.
-
The following code example shows how to use import-key-pair.
- AWS CLI
-
To import a public key
First, generate a key pair with the tool of your choice. For example, use this ssh-keygen command:
Command:
ssh-keygen -t rsa -C "my-key" -f ~/.ssh/my-keyOutput:
Generating public/private rsa key pair. Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/ec2-user/.ssh/my-key. Your public key has been saved in /home/ec2-user/.ssh/my-key.pub. ...This example command imports the specified public key.
Command:
aws ec2 import-key-pair --key-name"my-key"--public-key-materialfileb://~/.ssh/my-key.pubOutput:
{ "KeyName": "my-key", "KeyFingerprint": "1f:51:ae:28:bf:89:e9:d8:1f:25:5d:37:2d:7d:b8:ca" }-
For API details, see ImportKeyPair
in AWS CLI Command Reference.
-
The following code example shows how to use import-snapshot.
- AWS CLI
-
To import a snapshot
The following
import-snapshotexample imports the specified disk as a snapshot.aws ec2 import-snapshot \ --description"My server VMDK"\ --disk-container Format=VMDK,UserBucket={'S3Bucket=my-import-bucket,S3Key=vms/my-server-vm.vmdk'}Output:
{ "Description": "My server VMDK", "ImportTaskId": "import-snap-1234567890abcdef0", "SnapshotTaskDetail": { "Description": "My server VMDK", "DiskImageSize": "0.0", "Format": "VMDK", "Progress": "3", "Status": "active", "StatusMessage": "pending" "UserBucket": { "S3Bucket": "my-import-bucket", "S3Key": "vms/my-server-vm.vmdk" } } }-
For API details, see ImportSnapshot
in AWS CLI Command Reference.
-
The following code example shows how to use list-images-in-recycle-bin.
- AWS CLI
-
To list the images in the Recycle Bin
The following
list-images-in-recycle-binexample lists all of the images that are currently retained in the Recycle Bin.aws ec2 list-images-in-recycle-binOutput:
{ "Images": [ { "RecycleBinEnterTime": "2022-03-14T15:35:08.000Z", "Description": "Monthly AMI One", "RecycleBinExitTime": "2022-03-15T15:35:08.000Z", "Name": "AMI_01", "ImageId": "ami-0111222333444abcd" } ] }For more information, see Recover deleted AMIs from the Recycle Bin in the Amazon EBS User Guide.
-
For API details, see ListImagesInRecycleBin
in AWS CLI Command Reference.
-
The following code example shows how to use list-snapshots-in-recycle-bin.
- AWS CLI
-
To view snapshots in the Recycle Bin
The following
list-snapshots-in-recycle-binexample lists information about snapshots in the Recycle Bin, including the snapshot ID, a description of the snapshot, The ID of the volume from which the snapshot was created, the date and time when the snapshot was deleted and it entered the Recycle Bin, and the date and time when the retention period expires.aws ec2 list-snapshots-in-recycle-bin \ --snapshot-idsnap-01234567890abcdefOutput:
{ "SnapshotRecycleBinInfo": [ { "Description": "Monthly data backup snapshot", "RecycleBinEnterTime": "2022-12-01T13:00:00.000Z", "RecycleBinExitTime": "2022-12-15T13:00:00.000Z", "VolumeId": "vol-abcdef09876543210", "SnapshotId": "snap-01234567890abcdef" } ] }For more information about Recycle Bin, see Recover deleted snapshots from the Recycle Bin in the Amazon EBS User Guide.
-
For API details, see ListSnapshotsInRecycleBin
in AWS CLI Command Reference.
-
The following code example shows how to use lock-snapshot.
- AWS CLI
-
Example 1: To lock a snapshot in governance mode
The following
lock-snapshotexample locks the specified snapshot in governance mode.aws ec2 lock-snapshot \ --snapshot-idsnap-0b5e733b4a8df6e0d\ --lock-modegovernance\ --lock-duration365Output:
{ "SnapshotId": "snap-0b5e733b4a8df6e0d", "LockState": "governance", "LockDuration": 365, "LockCreatedOn": "2024-05-05T00:56:06.208000+00:00", "LockExpiresOn": "2025-05-05T00:56:06.208000+00:00", "LockDurationStartTime": "2024-05-05T00:56:06.208000+00:00" }For more information, see Snapshot lock in the Amazon EBS User Guide.
Example 2: To lock a snapshot in compliance mode
The following
lock-snapshotexample lock the specified snapshot in compliance mode.aws ec2 lock-snapshot \ --snapshot-idsnap-0163a8524c5b9901f\ --lock-modecompliance\ --cool-off-period24\ --lock-duration365Output:
{ "SnapshotId": "snap-0b5e733b4a8df6e0d", "LockState": "compliance-cooloff", "LockDuration": 365, "CoolOffPeriod": 24, "CoolOffPeriodExpiresOn": "2024-05-06T01:02:20.527000+00:00", "LockCreatedOn": "2024-05-05T01:02:20.527000+00:00", "LockExpiresOn": "2025-05-05T01:02:20.527000+00:00", "LockDurationStartTime": "2024-05-05T01:02:20.527000+00:00" }For more information, see Snapshot lock in the Amazon EBS User Guide.
-
For API details, see LockSnapshot
in AWS CLI Command Reference.
-
The following code example shows how to use modify-address-attribute.
- AWS CLI
-
To modify the domain name attribute associated with an elastic IP address
The following
modify-address-attributeexamples modify the domain name attribute of an elastic IP address.Linux:
aws ec2 modify-address-attribute \ --allocation-ideipalloc-abcdef01234567890\ --domain-nameexample.comWindows:
aws ec2 modify-address-attribute^--allocation-ideipalloc-abcdef01234567890^--domain-nameexample.comOutput:
{ "Addresses": [ { "PublicIp": "192.0.2.0", "AllocationId": "eipalloc-abcdef01234567890", "PtrRecord": "example.net." "PtrRecordUpdate": { "Value": "example.com.", "Status": "PENDING" } ] }To monitor the pending change and to view the modified attributes of an elastic IP address, see describe-addresses-attribute in the AWS CLI Command Reference.
-
For API details, see ModifyAddressAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-availability-zone-group.
- AWS CLI
-
To enable a zone group
The following
modify-availability-zone-groupexample enables the specified zone group.aws ec2 modify-availability-zone-group \ --group-nameus-west-2-lax-1\ --opt-in-statusopted-inOutput:
{ "Return": true }For more information, see Regions and Zones in the Amazon EC2 User Guide.
-
For API details, see ModifyAvailabilityZoneGroup
in AWS CLI Command Reference.
-
The following code example shows how to use modify-capacity-reservation-fleet.
- AWS CLI
-
Example 1: To modify the total target capacity of a Capacity Reservation Fleet
The following
modify-capacity-reservation-fleetexample modifies the total target capacity of the specified Capacity Reservation Fleet. When you modify the total target capacity of a Capacity Reservation Fleet, the Fleet automatically creates new Capacity Reservations, or modifies or cancels existing Capacity Reservations in the Fleet to meet the new total target capacity. You can't attempt additional modifications to a Fleet while it is in themodifyingstate.aws ec2 modify-capacity-reservation-fleet \ --capacity-reservation-fleet-idcrf-01234567890abcedf\ --total-target-capacity160Output:
{ "Return": true }Example 2: To modify the end date of a Capacity Reservation Fleet
The following
modify-capacity-reservation-fleetexample modifies the end date of the specified Capacity Reservation Fleet. When you modify the end date for the Fleet, the end dates for all of the individual Capacity Reservations are updated accordingly. You can't attempt additional modifications to a Fleet while it is in themodifyingstate.aws ec2 modify-capacity-reservation-fleet \ --capacity-reservation-fleet-idcrf-01234567890abcedf\ --end-date2022-07-04T23:59:59.000ZOutput:
{ "Return": true }For more information about Capacity Reservation Fleets, see Capacity Reservation Fleets in the Amazon EC2 User Guide.
-
For API details, see ModifyCapacityReservationFleet
in AWS CLI Command Reference.
-
The following code example shows how to use modify-capacity-reservation.
- AWS CLI
-
Example 1: To change the number of instances reserved by an existing capacity reservation
The following
modify-capacity-reservationexample changes the number of instances for which the capacity reservation reserves capacity.aws ec2 modify-capacity-reservation \ --capacity-reservation-idcr-1234abcd56EXAMPLE\ --instance-count5Output:
{ "Return": true }For more information, see Modify a Capacity Reservation in the Amazon EC2 User Guide.
Example 2: To change the end date and time for an existing capacity reservation
The following
modify-capacity-reservationexample modifies an existing capacity reservation to end at the specified date and time.aws ec2 modify-capacity-reservation \ --capacity-reservation-idcr-1234abcd56EXAMPLE\ --end-date-typelimited\ --end-date2019-08-31T23:59:59ZFor more information, see Modify a Capacity Reservation in the Amazon EC2 User Guide.
-
For API details, see ModifyCapacityReservation
in AWS CLI Command Reference.
-
The following code example shows how to use modify-client-vpn-endpoint.
- AWS CLI
-
To modify a Client VPN endpoint
The following
modify-client-vpn-endpointexample enables client connection logging for the specified Client VPN endpoint.aws ec2 modify-client-vpn-endpoint \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --connection-log-optionsEnabled=true,CloudwatchLogGroup=ClientVPNLogsOutput:
{ "Return": true }For more information, see Client VPN Endpoints in the AWS Client VPN Administrator Guide.
-
For API details, see ModifyClientVpnEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use modify-default-credit-specification.
- AWS CLI
-
To modify the default credit option
The following
modify-default-credit-specificationexample modifies the default credit option for T2 instances.aws ec2 modify-default-credit-specification \ --instance-familyt2\ --cpu-creditsunlimitedOutput:
{ "InstanceFamilyCreditSpecification": { "InstanceFamily": "t2", "CpuCredits": "unlimited" } }-
For API details, see ModifyDefaultCreditSpecification
in AWS CLI Command Reference.
-
The following code example shows how to use modify-ebs-default-kms-key-id.
- AWS CLI
-
To set your default CMK for EBS encryption
The following
modify-ebs-default-kms-key-idexample sets the specified CMK as the default CMK for EBS encryption for your AWS account in the current Region.aws ec2 modify-ebs-default-kms-key-id \ --kms-key-idalias/my-cmkOutput:
{ "KmsKeyId": "arn:aws:kms:us-west-2:123456789012:key/0ea3fef3-80a7-4778-9d8c-1c0c6EXAMPLE" }-
For API details, see ModifyEbsDefaultKmsKeyId
in AWS CLI Command Reference.
-
The following code example shows how to use modify-fleet.
- AWS CLI
-
To scale an EC2 Fleet
The following
modify-fleetexample modifies the target capacity of the specified EC2 Fleet. If the specified value is greater than the current capacity, the EC2 Fleet launches additional instances. If the specified value is less than the current capacity, the EC2 Fleet cancels any open requests and if the termination policy isterminate, the EC2 fleet terminates any instances that exceed the new target capacity.aws ec2 modify-fleet \ --fleet-idsfleet-12a34b55-67cd-8ef9-ba9b-9208dEXAMPLE\ --target-capacity-specificationTotalTargetCapacity=5Output:
{ "Return": true }For more information, see Manage an EC2 Fleet in the Amazon EC2 User Guide.
-
For API details, see ModifyFleet
in AWS CLI Command Reference.
-
The following code example shows how to use modify-fpga-image-attribute.
- AWS CLI
-
To modify the attributes of an Amazon FPGA image
This example adds load permissions for account ID
123456789012for the specified AFI.Command:
aws ec2 modify-fpga-image-attribute --attributeloadPermission--fpga-image-idafi-0d123e123bfc85abc--load-permissionAdd=[{UserId=123456789012}]Output:
{ "FpgaImageAttribute": { "FpgaImageId": "afi-0d123e123bfc85abc", "LoadPermissions": [ { "UserId": "123456789012" } ] } }-
For API details, see ModifyFpgaImageAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-hosts.
- AWS CLI
-
Example 1: To enable auto-placement for a Dedicated Host
The following
modify-hostsexample enables auto-placement for a Dedicated Host so that it accepts any untargeted instance launches that match its instance type configuration.aws ec2 modify-hosts \ --host-idh-06c2f189b4EXAMPLE\ --auto-placementonOutput:
{ "Successful": [ "h-06c2f189b4EXAMPLE" ], "Unsuccessful": [] }For more information, see Modify the auto-placement setting for a Dedicated Host in the Amazon EC2 User Guide.
Example 2: To enable host recovery for a Dedicated Host
The following
modify-hostsexample enables host recovery for the specified Dedicated Host.aws ec2 modify-hosts \ --host-idh-06c2f189b4EXAMPLE\ --host-recoveryonOutput:
{ "Successful": [ "h-06c2f189b4EXAMPLE" ], "Unsuccessful": [] }For more information, see Modify the auto-placement setting for a Dedicated Host in the Amazon EC2 User Guide.
-
For API details, see ModifyHosts
in AWS CLI Command Reference.
-
The following code example shows how to use modify-id-format.
- AWS CLI
-
To enable the longer ID format for a resource
The following
modify-id-formatexample enables the longer ID format for theinstanceresource type.aws ec2 modify-id-format \ --resourceinstance\ --use-long-idsTo disable the longer ID format for a resource
The following
modify-id-formatexample disables the longer ID format for theinstanceresource type.aws ec2 modify-id-format \ --resourceinstance\ --no-use-long-idsThe following
modify-id-formatexample enables the longer ID format for all supported resource types that are within their opt-in period.aws ec2 modify-id-format \ --resourceall-current\ --use-long-ids-
For API details, see ModifyIdFormat
in AWS CLI Command Reference.
-
The following code example shows how to use modify-identity-id-format.
- AWS CLI
-
To enable an IAM role to use longer IDs for a resource
The following
modify-identity-id-formatexample enables the IAM roleEC2Rolein your AWS account to use long ID format for theinstanceresource type.aws ec2 modify-identity-id-format \ --principal-arnarn:aws:iam::123456789012:role/EC2Role\ --resourceinstance\ --use-long-idsTo enable an IAM user to use longer IDs for a resource
The following
modify-identity-id-formatexample enables the IAM userAdminUserin your AWS account to use the longer ID format for thevolumeresource type.aws ec2 modify-identity-id-format \ --principal-arnarn:aws:iam::123456789012:user/AdminUser\ --resourcevolume\ --use-long-idsThe following
modify-identity-id-formatexample enables the IAM userAdminUserin your AWS account to use the longer ID format for all supported resource types that are within their opt-in period.aws ec2 modify-identity-id-format \ --principal-arnarn:aws:iam::123456789012:user/AdminUser\ --resourceall-current\ --use-long-ids-
For API details, see ModifyIdentityIdFormat
in AWS CLI Command Reference.
-
The following code example shows how to use modify-image-attribute.
- AWS CLI
-
Example 1: To make an AMI public
The following
modify-instance-attributeexample makes the specified AMI public.aws ec2 modify-image-attribute \ --image-idami-5731123e\ --launch-permission"Add=[{Group=all}]"This command produces no output.
Example 2: To make an AMI private
The following
modify-instance-attributeexample makes the specified AMI private.aws ec2 modify-image-attribute \ --image-idami-5731123e\ --launch-permission"Remove=[{Group=all}]"This command produces no output.
Example 3: To grant launch permission to an AWS account
The following
modify-instance-attributeexample grants launch permissions to the specified AWS account.aws ec2 modify-image-attribute \ --image-idami-5731123e\ --launch-permission"Add=[{UserId=123456789012}]"This command produces no output.
Example 4: To remove launch permission from an AWS account
The following
modify-instance-attributeexample removes launch permissions from the specified AWS account.aws ec2 modify-image-attribute \ --image-idami-5731123e\ --launch-permission"Remove=[{UserId=123456789012}]"-
For API details, see ModifyImageAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-attribute.
- AWS CLI
-
Example 1: To modify the instance type
The following
modify-instance-attributeexample modifies the instance type of the specified instance. The instance must be in thestoppedstate.aws ec2 modify-instance-attribute \ --instance-idi-1234567890abcdef0\ --instance-type "{\"Value\": \"m1.small\"}"This command produces no output.
Example 2: To enable enhanced networking on an instance
The following
modify-instance-attributeexample enables enhanced networking for the specified instance. The instance must be in thestoppedstate.aws ec2 modify-instance-attribute \ --instance-idi-1234567890abcdef0\ --sriov-net-supportsimpleThis command produces no output.
Example 3: To modify the sourceDestCheck attribute
The following
modify-instance-attributeexample sets thesourceDestCheckattribute of the specified instance totrue. The instance must be in a VPC.aws ec2 modify-instance-attribute --instance-idi-1234567890abcdef0--source-dest-check "{\"Value\": true}"This command produces no output.
Example 4: To modify the deleteOnTermination attribute of the root volume
The following
modify-instance-attributeexample sets thedeleteOnTerminationattribute for the root volume of the specified Amazon EBS-backed instance tofalse. By default, this attribute istruefor the root volume.Command:
aws ec2 modify-instance-attribute \ --instance-idi-1234567890abcdef0\ --block-device-mappings "[{\"DeviceName\": \"/dev/sda1\",\"Ebs\":{\"DeleteOnTermination\":false}}]"This command produces no output.
Example 5: To modify the user data attached to an instance
The following
modify-instance-attributeexample adds the contents of the fileUserData.txtas the UserData for the specified instance.Contents of original file
UserData.txt:#!/bin/bash yum update -y service httpd start chkconfig httpd onThe contents of the file must be base64 encoded. The first command converts the text file to base64 and saves it as a new file.
Linux/macOS version of the command:
base64 UserData.txt > UserData.base64.txtThis command produces no output.
Windows version of the command:
certutil -encode UserData.txt tmp.b64 && findstr /v /c:- tmp.b64 > UserData.base64.txtOutput:
Input Length = 67 Output Length = 152 CertUtil: -encode command completed successfully.Now you can reference that file in the CLI command that follows:
aws ec2 modify-instance-attribute \ --instance-id=i-09b5a14dbca622e76 \ --attributeuserData--valuefile://UserData.base64.txtThis command produces no output.
For more information, see User Data and the AWS CLI in the EC2 User Guide.
-
For API details, see ModifyInstanceAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-capacity-reservation-attributes.
- AWS CLI
-
Example 1: To modify an instance's capacity reservation targeting settings
The following
modify-instance-capacity-reservation-attributesexample modifies a stopped instance to target a specific capacity reservation.aws ec2 modify-instance-capacity-reservation-attributes \ --instance-idi-EXAMPLE8765abcd4e\ --capacity-reservation-specification 'CapacityReservationTarget={CapacityReservationId= cr-1234abcd56EXAMPLE }'Output:
{ "Return": true }For more information, see Modify the Capacity Reservation settings of your instance in the Amazon EC2 User Guide.
Example 2: To modify an instance's capacity reservation targeting settings
The following
modify-instance-capacity-reservation-attributesexample modifies a stopped instance that targets the specified capacity reservation to launch in any capacity reservation that has matching attributes (instance type, platform, Availability Zone) and that has open instance matching criteria.aws ec2 modify-instance-capacity-reservation-attributes \ --instance-idi-EXAMPLE8765abcd4e\ --capacity-reservation-specification 'CapacityReservationPreference=open'Output:
{ "Return": true }For more information, see Modify the Capacity Reservation settings of your instance in the Amazon EC2 User Guide.
-
For API details, see ModifyInstanceCapacityReservationAttributes
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-credit-specification.
- AWS CLI
-
To modify the credit option for CPU usage of an instance
This example modifies the credit option for CPU usage of the specified instance in the specified region to "unlimited". Valid credit options are "standard" and "unlimited".
Command:
aws ec2 modify-instance-credit-specification --instance-credit-specification"InstanceId=i-1234567890abcdef0,CpuCredits=unlimited"Output:
{ "SuccessfulInstanceCreditSpecifications": [ { "InstanceId": "i-1234567890abcdef0" } ], "UnsuccessfulInstanceCreditSpecifications": [] }-
For API details, see ModifyInstanceCreditSpecification
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-event-start-time.
- AWS CLI
-
To modify the event start time for an instance
The following
modify-instance-event-start-timecommand shows how to modify the event start time for the specified instance. Specify the event ID by using the--instance-event-idparameter. Specify the new date and time by using the--not-beforeparameter.aws ec2 modify-instance-event-start-time --instance-idi-1234567890abcdef0--instance-event-idinstance-event-0abcdef1234567890--not-before2019-03-25T10:00:00.000Output:
"Event": { "InstanceEventId": "instance-event-0abcdef1234567890", "Code": "system-reboot", "Description": "scheduled reboot", "NotAfter": "2019-03-25T12:00:00.000Z", "NotBefore": "2019-03-25T10:00:00.000Z", "NotBeforeDeadline": "2019-04-22T21:00:00.000Z" }For more information, see Working with Instances Scheduled for Reboot in the Amazon Elastic Compute Cloud User Guide
-
For API details, see ModifyInstanceEventStartTime
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-event-window.
- AWS CLI
-
Example 1: To modify the time range of an event window
The following
modify-instance-event-windowexample modifies the time range of an event window. Specify thetime-rangeparameter to modify the time range. You can't also specify thecron-expressionparameter.aws ec2 modify-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890--time-rangeStartWeekDay=monday,StartHour=2,EndWeekDay=wednesday,EndHour=8Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "TimeRanges": [ { "StartWeekDay": "monday", "StartHour": 2, "EndWeekDay": "wednesday", "EndHour": 8 } ], "Name": "myEventWindowName", "AssociationTarget": { "InstanceIds": [ "i-0abcdef1234567890", "i-0be35f9acb8ba01f0" ], "Tags": [], "DedicatedHostIds": [] }, "State": "creating", "Tags": [ { "Key": "K1", "Value": "V1" } ] } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 2: To modify a set of time ranges for an event window
The following
modify-instance-event-windowexample modifies the time range of an event window. Specify thetime-rangeparameter to modify the time range. You can't also specify thecron-expressionparameter.aws ec2 modify-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --time-range '[{"StartWeekDay": "monday", "StartHour": 2, "EndWeekDay": "wednesday", "EndHour": 8}, {"StartWeekDay": "thursday", "StartHour": 2, "EndWeekDay": "friday", "EndHour": 8}]'Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "TimeRanges": [ { "StartWeekDay": "monday", "StartHour": 2, "EndWeekDay": "wednesday", "EndHour": 8 }, { "StartWeekDay": "thursday", "StartHour": 2, "EndWeekDay": "friday", "EndHour": 8 } ], "Name": "myEventWindowName", "AssociationTarget": { "InstanceIds": [ "i-0abcdef1234567890", "i-0be35f9acb8ba01f0" ], "Tags": [], "DedicatedHostIds": [] }, "State": "creating", "Tags": [ { "Key": "K1", "Value": "V1" } ] } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
Example 3: To modify the cron expression of an event window
The following
modify-instance-event-windowexample modifies the cron expression of an event window. Specify thecron-expressionparameter to modify the cron expression. You can't also specify thetime-rangeparameter.aws ec2 modify-instance-event-window \ --regionus-east-1\ --instance-event-window-idiew-0abcdef1234567890\ --cron-expression"* 21-23 * * 2,3"Output:
{ "InstanceEventWindow": { "InstanceEventWindowId": "iew-0abcdef1234567890", "Name": "myEventWindowName", "CronExpression": "* 21-23 * * 2,3", "AssociationTarget": { "InstanceIds": [ "i-0abcdef1234567890", "i-0be35f9acb8ba01f0" ], "Tags": [], "DedicatedHostIds": [] }, "State": "creating", "Tags": [ { "Key": "K1", "Value": "V1" } ] } }For event window constraints, see Considerations in the Scheduled Events section of the Amazon EC2 User Guide.
-
For API details, see ModifyInstanceEventWindow
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-maintenance-options.
- AWS CLI
-
Example 1: To disable the recovery behavior of an instance
The following
modify-instance-maintenance-optionsexample disables simplified automatic recovery for a running or stopped instance.aws ec2 modify-instance-maintenance-options \ --instance-idi-0abcdef1234567890\ --auto-recoverydisabledOutput:
{ "InstanceId": "i-0abcdef1234567890", "AutoRecovery": "disabled" }For more information, see Configure simplified automatic recovery in the Amazon EC2 User Guide.
Example 2: To set the recovery behavior of an instance to default
The following
modify-instance-maintenance-optionsexample sets the automatic recovery behavior to default which enables simplified automatic recovery for supported instance types.aws ec2 modify-instance-maintenance-options \ --instance-idi-0abcdef1234567890\ --auto-recoverydefaultOutput:
{ "InstanceId": "i-0abcdef1234567890", "AutoRecovery": "default" }For more information, see Configure simplified automatic recovery in the Amazon EC2 User Guide.
-
For API details, see ModifyInstanceMaintenanceOptions
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-metadata-options.
- AWS CLI
-
Example 1: To enable IMDSv2
The following
modify-instance-metadata-optionsexample configures the use of IMDSv2 on the specified instance.aws ec2 modify-instance-metadata-options \ --instance-idi-1234567898abcdef0\ --http-tokensrequired\ --http-endpointenabledOutput:
{ "InstanceId": "i-1234567898abcdef0", "InstanceMetadataOptions": { "State": "pending", "HttpTokens": "required", "HttpPutResponseHopLimit": 1, "HttpEndpoint": "enabled" } }For more information, see Instance metadata in the Amazon EC2 User Guide.
Example 2: To disable instance metadata
The following
modify-instance-metadata-optionsexample disables the use of all versions of instance metadata on the specified instance.aws ec2 modify-instance-metadata-options \ --instance-idi-1234567898abcdef0\ --http-endpointdisabledOutput:
{ "InstanceId": "i-1234567898abcdef0", "InstanceMetadataOptions": { "State": "pending", "HttpTokens": "required", "HttpPutResponseHopLimit": 1, "HttpEndpoint": "disabled" } }For more information, see Instance metadata in the Amazon EC2 User Guide.
Example 3: To enable instance metadata IPv6 endpoint for your instance
The following
modify-instance-metadata-optionsexample shows you how to turn on the IPv6 endpoint for the instance metadata service. By default, the IPv6 endpoint is disabled. This is true even if you have launched an instance into an IPv6-only subnet. The IPv6 endpoint for IMDS is only accessible on instances built on the Nitro System.aws ec2 modify-instance-metadata-options \ --instance-idi-1234567898abcdef0\ --http-protocol-ipv6enabled\ --http-endpointenabledOutput:
{ "InstanceId": "i-1234567898abcdef0", "InstanceMetadataOptions": { "State": "pending", "HttpTokens": "required", "HttpPutResponseHopLimit": 1, "HttpEndpoint": "enabled", HttpProtocolIpv6": "enabled" } }For more information, see Instance metadata in the Amazon EC2 User Guide.
-
For API details, see ModifyInstanceMetadataOptions
in AWS CLI Command Reference.
-
The following code example shows how to use modify-instance-placement.
- AWS CLI
-
Example 1: To remove an instance's affinity with a Dedicated Host
The following
modify-instance-placementexample removes an instance's affinity with a Dedicated Host and enables it to launch on any available Dedicated Host in your account that supports its instance type.aws ec2 modify-instance-placement \ --instance-idi-0e6ddf6187EXAMPLE\ --affinitydefaultOutput:
{ "Return": true }Example 2: To establish affinity between an instance and the specified Dedicated Host
The following
modify-instance-placementexample establishes a launch relationship between an instance and a Dedicated Host. The instance is only able to run on the specified Dedicated Host.aws ec2 modify-instance-placement \ --instance-idi-0e6ddf6187EXAMPLE\ --affinityhost\ --host-idi-0e6ddf6187EXAMPLEOutput:
{ "Return": true }Example 3: To move an instance to a placement group
The following
modify-instance-placementexample moves an instance to a placement group, stop the instance, modify the instance placement, and then restart the instance.aws ec2 stop-instances \ --instance-idsi-0123a456700123456awsec2modify-instance-placement\ --instance-idi-0123a456700123456\ --group-nameMySpreadGroupawsec2start-instances\ --instance-idsi-0123a456700123456Example 4: To remove an instance from a placement group
The following
modify-instance-placementexample removes an instance from a placement group by stopping the instance, modifying the instance placement, and then restarting the instance. The following example specifies an empty string ("") for the placement group name to indicate that the instance is not to be located in a placement group.Stop the instance:
aws ec2 stop-instances \ --instance-idsi-0123a456700123456Modify the placement (Windows Command Prompt):
aws ec2 modify-instance-placement \ --instance-idi-0123a456700123456\ --group-name ""Modify the placement (Windows PowerShell, Linux, and macOS):
aws ec2 modify-instance-placement`--instance-idi-0123a456700123456`--group-name ''Restart the instance:
aws ec2 start-instances \ --instance-idsi-0123a456700123456Output:
{ "Return": true }For more information, see Modify Dedicated Host tenancy and affinity in the Amazon EC2 User Guide.
-
For API details, see ModifyInstancePlacement
in AWS CLI Command Reference.
-
The following code example shows how to use modify-ipam-pool.
- AWS CLI
-
To modify an IPAM pool
The following
modify-ipam-poolexample modifies an IPAM pool.(Linux):
aws ec2 modify-ipam-pool \ --ipam-pool-idipam-pool-0533048da7d823723\ --add-allocation-resource-tags"Key=Owner,Value=Build Team"\ --clear-allocation-default-netmask-length \ --allocation-min-netmask-length14(Windows):
aws ec2 modify-ipam-pool^--ipam-pool-idipam-pool-0533048da7d823723^--add-allocation-resource-tags"Key=Owner,Value=Build Team"^--clear-allocation-default-netmask-length^--allocation-min-netmask-length14Output:
{ "IpamPool": { "OwnerId": "123456789012", "IpamPoolId": "ipam-pool-0533048da7d823723", "IpamPoolArn": "arn:aws:ec2::123456789012:ipam-pool/ipam-pool-0533048da7d823723", "IpamScopeArn": "arn:aws:ec2::123456789012:ipam-scope/ipam-scope-02fc38cd4c48e7d38", "IpamScopeType": "private", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "Locale": "None", "PoolDepth": 1, "State": "modify-complete", "AutoImport": true, "AddressFamily": "ipv4", "AllocationMinNetmaskLength": 14, "AllocationMaxNetmaskLength": 26, "AllocationResourceTags": [ { "Key": "Environment", "Value": "Preprod" }, { "Key": "Owner", "Value": "Build Team" } ] } }For more information, see Edit a pool in the Amazon VPC IPAM User Guide.
-
For API details, see ModifyIpamPool
in AWS CLI Command Reference.
-
The following code example shows how to use modify-ipam-resource-cidr.
- AWS CLI
-
To modify the CIDR allocated to a resource
The following
modify-ipam-resource-cidrexample modifies a resource CIDR.(Linux):
aws ec2 modify-ipam-resource-cidr \ --current-ipam-scope-idipam-scope-02fc38cd4c48e7d38\ --destination-ipam-scope-idipam-scope-0da34c61fd189a141\ --resource-idvpc-010e1791024eb0af9\ --resource-cidr10.0.1.0/24\ --resource-regionus-east-1\ --monitored(Windows):
aws ec2 modify-ipam-resource-cidr^--current-ipam-scope-idipam-scope-02fc38cd4c48e7d38^--destination-ipam-scope-idipam-scope-0da34c61fd189a141^--resource-idvpc-010e1791024eb0af9^--resource-cidr10.0.1.0/24^--resource-regionus-east-1^--monitoredOutput:
{ "IpamResourceCidr": { "IpamId": "ipam-08440e7a3acde3908", "IpamScopeId": "ipam-scope-0da34c61fd189a141", "IpamPoolId": "ipam-pool-0533048da7d823723", "ResourceRegion": "us-east-1", "ResourceOwnerId": "123456789012", "ResourceId": "vpc-010e1791024eb0af9", "ResourceCidr": "10.0.1.0/24", "ResourceType": "vpc", "ResourceTags": [ { "Key": "Environment", "Value": "Preprod" }, { "Key": "Owner", "Value": "Build Team" } ], "IpUsage": 0.0, "ComplianceStatus": "noncompliant", "ManagementState": "managed", "OverlapStatus": "overlapping", "VpcId": "vpc-010e1791024eb0af9" } }For more information on moving resources, see Move resource CIDRs between scopes in the Amazon VPC IPAM User Guide.
For more information on changing monitoring states, see Change the monitoring state of resource CIDRs in the Amazon VPC IPAM User Guide.
-
For API details, see ModifyIpamResourceCidr
in AWS CLI Command Reference.
-
The following code example shows how to use modify-ipam-resource-discovery.
- AWS CLI
-
To modify the operating regions of a resource discovery
In this example, you're an IPAM delegated admin who wants to modify the operating regions of a resource discovery.
To complete this request:
You cannot modify a default resource discovery and you must be the owner of the resource discovery.You need the resource discovery ID, which you can get with describe-ipam-resource-discoveries.
The following
modify-ipam-resource-discoveryexample modifies a non-default resource discovery in your AWS account.aws ec2 modify-ipam-resource-discovery \ --ipam-resource-discovery-idipam-res-disco-0f4ef577a9f37a162\ --add-operating-regions RegionName='us-west-1' \ --remove-operating-regions RegionName='us-east-2' \ --regionus-east-1Output:
{ "IpamResourceDiscovery": { "OwnerId": "149977607591", "IpamResourceDiscoveryId": "ipam-res-disco-0365d2977fc1672fe", "IpamResourceDiscoveryArn": "arn:aws:ec2::149977607591:ipam-resource-discovery/ipam-res-disco-0365d2977fc1672fe", "IpamResourceDiscoveryRegion": "us-east-1", "Description": "Example", "OperatingRegions": [ { "RegionName": "us-east-1" }, { "RegionName": "us-west-1" } ], "IsDefault": false, "State": "modify-in-progress" } }For more information, see Work with resource discoveries in the Amazon VPC IPAM User Guide.
-
For API details, see ModifyIpamResourceDiscovery
in AWS CLI Command Reference.
-
The following code example shows how to use modify-ipam-scope.
- AWS CLI
-
To modify the description of a scope
In this scenario, you're an IPAM delegated admin who wants to modify the description of an IPAM scope.
To complete this request, you'll need the scope ID, which you can get with describe-ipam-scopes.
The following
modify-ipam-scopeexample updates the description of the scope.aws ec2 modify-ipam-scope \ --ipam-scope-idipam-scope-0d3539a30b57dcdd1\ --descriptionexample\ --regionus-east-1Output:
{ "IpamScope": { "OwnerId": "320805250157", "IpamScopeId": "ipam-scope-0d3539a30b57dcdd1", "IpamScopeArn": "arn:aws:ec2::320805250157:ipam-scope/ipam-scope-0d3539a30b57dcdd1", "IpamArn": "arn:aws:ec2::320805250157:ipam/ipam-005f921c17ebd5107", "IpamRegion": "us-east-1", "IpamScopeType": "public", "IsDefault": true, "Description": "example", "PoolCount": 1, "State": "modify-in-progress" } }For more information about scopes, see How IPAM works in the Amazon VPC IPAM User Guide.
-
For API details, see ModifyIpamScope
in AWS CLI Command Reference.
-
The following code example shows how to use modify-ipam.
- AWS CLI
-
To modify an IPAM
The following
modify-ipamexample modifies an IPAM by adding an Operating Region.(Linux):
aws ec2 modify-ipam \ --ipam-idipam-08440e7a3acde3908\ --add-operating-regionsRegionName=us-west-2(Windows):
aws ec2 modify-ipam^--ipam-idipam-08440e7a3acde3908^--add-operating-regionsRegionName=us-west-2Output:
{ "Ipam": { "OwnerId": "123456789012", "IpamId": "ipam-08440e7a3acde3908", "IpamArn": "arn:aws:ec2::123456789012:ipam/ipam-08440e7a3acde3908", "IpamRegion": "us-east-1", "PublicDefaultScopeId": "ipam-scope-0b9eed026396dbc16", "PrivateDefaultScopeId": "ipam-scope-02fc38cd4c48e7d38", "ScopeCount": 3, "OperatingRegions": [ { "RegionName": "us-east-1" }, { "RegionName": "us-east-2" }, { "RegionName": "us-west-1" }, { "RegionName": "us-west-2" } ], "State": "modify-in-progress" } }-
For API details, see ModifyIpam
in AWS CLI Command Reference.
-
The following code example shows how to use modify-launch-template.
- AWS CLI
-
To change the default launch template version
This example specifies version 2 of the specified launch template as the default version.
Command:
aws ec2 modify-launch-template --launch-template-idlt-0abcd290751193123--default-version2Output:
{ "LaunchTemplate": { "LatestVersionNumber": 2, "LaunchTemplateId": "lt-0abcd290751193123", "LaunchTemplateName": "WebServers", "DefaultVersionNumber": 2, "CreatedBy": "arn:aws:iam::123456789012:root", "CreateTime": "2017-12-01T13:35:46.000Z" } }-
For API details, see ModifyLaunchTemplate
in AWS CLI Command Reference.
-
The following code example shows how to use modify-managed-prefix-list.
- AWS CLI
-
To modify a prefix list
The following
modify-managed-prefix-listexample adds an entry to the specified prefix list.aws ec2 modify-managed-prefix-list \ --prefix-list-idpl-0123456abcabcabc1\ --add-entriesCidr=10.1.0.0/16,Description=vpc-c\ --current-version1Output:
{ "PrefixList": { "PrefixListId": "pl-0123456abcabcabc1", "AddressFamily": "IPv4", "State": "modify-in-progress", "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-0123456abcabcabc1", "PrefixListName": "vpc-cidrs", "MaxEntries": 10, "Version": 1, "OwnerId": "123456789012" } }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see ModifyManagedPrefixList
in AWS CLI Command Reference.
-
The following code example shows how to use modify-network-interface-attribute.
- AWS CLI
-
To modify the attachment attribute of a network interface
This example command modifies the
attachmentattribute of the specified network interface.Command:
aws ec2 modify-network-interface-attribute --network-interface-ideni-686ea200--attachmentAttachmentId=eni-attach-43348162,DeleteOnTermination=falseTo modify the description attribute of a network interface
This example command modifies the
descriptionattribute of the specified network interface.Command:
aws ec2 modify-network-interface-attribute --network-interface-ideni-686ea200--description"My description"To modify the groupSet attribute of a network interface
This example command modifies the
groupSetattribute of the specified network interface.Command:
aws ec2 modify-network-interface-attribute --network-interface-ideni-686ea200--groupssg-903004f8sg-1a2b3c4dTo modify the sourceDestCheck attribute of a network interface
This example command modifies the
sourceDestCheckattribute of the specified network interface.Command:
aws ec2 modify-network-interface-attribute --network-interface-ideni-686ea200--no-source-dest-check-
For API details, see ModifyNetworkInterfaceAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-private-dns-name-options.
- AWS CLI
-
To modify the options for instance hostnames
The following
modify-private-dns-name-optionsexample disables the option to respond to DNS queries for instance hostnames with DNS A records.aws ec2 modify-private-dns-name-options \ --instance-idi-1234567890abcdef0\ --no-enable-resource-name-dns-a-recordOutput:
{ "Return": true }For more information, see Amazon EC2 instance hostname types in the Amazon EC2 User Guide.
-
For API details, see ModifyPrivateDnsNameOptions
in AWS CLI Command Reference.
-
The following code example shows how to use modify-reserved-instances.
- AWS CLI
-
To modify Reserved Instances
This example command moves a Reserved Instance to another Availability Zone in the same region.
Command:
aws ec2 modify-reserved-instances --reserved-instances-idsb847fa93-e282-4f55-b59a-1342f5bd7c02--target-configurationsAvailabilityZone=us-west-1c,Platform=EC2-Classic,InstanceCount=10Output:
{ "ReservedInstancesModificationId": "rimod-d3ed4335-b1d3-4de6-ab31-0f13aaf46687" }To modify the network platform of Reserved Instances
This example command converts EC2-Classic Reserved Instances to EC2-VPC.
Command:
aws ec2 modify-reserved-instances --reserved-instances-idsf127bd27-edb7-44c9-a0eb-0d7e09259af0--target-configurationsAvailabilityZone=us-west-1c,Platform=EC2-VPC,InstanceCount=5Output:
{ "ReservedInstancesModificationId": "rimod-82fa9020-668f-4fb6-945d-61537009d291" }For more information, see Modifying Your Reserved Instances in the Amazon EC2 User Guide.
To modify the instance size of Reserved Instances
This example command modifies a Reserved Instance that has 10 m1.small Linux/UNIX instances in us-west-1c so that 8 m1.small instances become 2 m1.large instances, and the remaining 2 m1.small become 1 m1.medium instance in the same Availability Zone. Command:
aws ec2 modify-reserved-instances --reserved-instances-ids1ba8e2e3-3556-4264-949e-63ee671405a9--target-configurationsAvailabilityZone=us-west-1c,Platform=EC2-Classic,InstanceCount=2,InstanceType=m1.largeAvailabilityZone=us-west-1c,Platform=EC2-Classic,InstanceCount=1,InstanceType=m1.mediumOutput:
{ "ReservedInstancesModificationId": "rimod-acc5f240-080d-4717-b3e3-1c6b11fa00b6" }For more information, see Modifying the Instance Size of Your Reservations in the Amazon EC2 User Guide.
-
For API details, see ModifyReservedInstances
in AWS CLI Command Reference.
-
The following code example shows how to use modify-security-group-rules.
- AWS CLI
-
To modify a security group rules to update the rule description, the IP protocol, and the CidrIpv4 address range
The following
modify-security-group-rulesexample updates the description, the IP protocol, and the IPV4 CIDR range of a specified security group rule. Use thesecurity-group-rulesparameter to enter the updates for the specified security group rules.-1specifies all protocols.aws ec2 modify-security-group-rules \ --group-idsg-1234567890abcdef0\ --security-group-rules SecurityGroupRuleId=sgr-abcdef01234567890,SecurityGroupRule='{Description=test,IpProtocol=-1,CidrIpv4=0.0.0.0/0}'Output:
{ "Return": true }For more information about security group rules, see Security group rules in the Amazon EC2 User Guide.
-
For API details, see ModifySecurityGroupRules
in AWS CLI Command Reference.
-
The following code example shows how to use modify-snapshot-attribute.
- AWS CLI
-
Example 1: To modify a snapshot attribute
The following
modify-snapshot-attributeexample updates thecreateVolumePermissionattribute for the specified snapshot, removing volume permissions for the specified user.aws ec2 modify-snapshot-attribute \ --snapshot-idsnap-1234567890abcdef0\ --attributecreateVolumePermission\ --operation-typeremove\ --user-ids123456789012Example 2: To make a snapshot public
The following
modify-snapshot-attributeexample makes the specified snapshot public.aws ec2 modify-snapshot-attribute \ --snapshot-idsnap-1234567890abcdef0\ --attributecreateVolumePermission\ --operation-typeadd\ --group-namesall-
For API details, see ModifySnapshotAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-snapshot-tier.
- AWS CLI
-
To archive a snapshot
The following
modify-snapshot-tierexample archives the specified snapshot. TheTieringStartTimeresponse parameter indicates the date and time at which the archive process was started, in UTC time format (YYYY-MM-DDTHH:MM:SSZ).aws ec2 modify-snapshot-tier \ --snapshot-idsnap-01234567890abcedf\ --storage-tierarchiveOutput:
{ "SnapshotId": "snap-01234567890abcedf", "TieringStartTime": "2021-09-15T16:44:37.574Z" }For more information about snapshot archiving, see Archive Amazon EBS snapshots in the Amazon EBS User Guide.
-
For API details, see ModifySnapshotTier
in AWS CLI Command Reference.
-
The following code example shows how to use modify-spot-fleet-request.
- AWS CLI
-
To modify a Spot fleet request
This example command updates the target capacity of the specified Spot fleet request.
Command:
aws ec2 modify-spot-fleet-request --target-capacity20--spot-fleet-request-idsfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLEOutput:
{ "Return": true }This example command decreases the target capacity of the specified Spot fleet request without terminating any Spot Instances as a result.
Command:
aws ec2 modify-spot-fleet-request --target-capacity10--excess-capacity-termination-policyNoTermination--spot-fleet-request-idssfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLEOutput:
{ "Return": true }-
For API details, see ModifySpotFleetRequest
in AWS CLI Command Reference.
-
The following code example shows how to use modify-subnet-attribute.
- AWS CLI
-
To change a subnet's public IPv4 addressing behavior
This example modifies subnet-1a2b3c4d to specify that all instances launched into this subnet are assigned a public IPv4 address. If the command succeeds, no output is returned.
Command:
aws ec2 modify-subnet-attribute --subnet-idsubnet-1a2b3c4d--map-public-ip-on-launchTo change a subnet's IPv6 addressing behavior
This example modifies subnet-1a2b3c4d to specify that all instances launched into this subnet are assigned an IPv6 address from the range of the subnet.
Command:
aws ec2 modify-subnet-attribute --subnet-idsubnet-1a2b3c4d--assign-ipv6-address-on-creationFor more information, see IP Addressing in Your VPC in the AWS Virtual Private Cloud User Guide.
-
For API details, see ModifySubnetAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-traffic-mirror-filter-network-services.
- AWS CLI
-
To add network services to a Traffic Mirror filter
The following
modify-traffic-mirror-filter-network-servicesexample adds the Amazon DNS network services to the specified filter.aws ec2 modify-traffic-mirror-filter-network-services \ --traffic-mirror-filter-idtmf-04812ff784EXAMPLE\ --add-network-serviceamazon-dnsOutput:
{ "TrafficMirrorFilter": { "Tags": [ { "Key": "Name", "Value": "Production" } ], "EgressFilterRules": [], "NetworkServices": [ "amazon-dns" ], "TrafficMirrorFilterId": "tmf-04812ff784EXAMPLE", "IngressFilterRules": [ { "SourceCidrBlock": "0.0.0.0/0", "RuleNumber": 1, "DestinationCidrBlock": "0.0.0.0/0", "Description": "TCP Rule", "Protocol": 6, "TrafficDirection": "ingress", "TrafficMirrorFilterId": "tmf-04812ff784EXAMPLE", "RuleAction": "accept", "TrafficMirrorFilterRuleId": "tmf-04812ff784EXAMPLE" } ] } }For more information, see Modify Traffic Mirror Filter Network Services in the AWS Traffic Mirroring Guide.
-
For API details, see ModifyTrafficMirrorFilterNetworkServices
in AWS CLI Command Reference.
-
The following code example shows how to use modify-traffic-mirror-filter-rule.
- AWS CLI
-
To modify a traffic mirror filter rule
The following
modify-traffic-mirror-filter-ruleexample modifies the description of the specified traffic mirror filter rule.aws ec2 modify-traffic-mirror-filter-rule \ --traffic-mirror-filter-rule-idtmfr-0ca76e0e08EXAMPLE\ --description"TCP Rule"Output:
{ "TrafficMirrorFilterRule": { "TrafficMirrorFilterRuleId": "tmfr-0ca76e0e08EXAMPLE", "TrafficMirrorFilterId": "tmf-0293f26e86EXAMPLE", "TrafficDirection": "ingress", "RuleNumber": 100, "RuleAction": "accept", "Protocol": 6, "DestinationCidrBlock": "10.0.0.0/24", "SourceCidrBlock": "10.0.0.0/24", "Description": "TCP Rule" } }For more information, see Modify Your Traffic Mirror Filter Rules in the AWS Traffic Mirroring Guide.
-
For API details, see ModifyTrafficMirrorFilterRule
in AWS CLI Command Reference.
-
The following code example shows how to use modify-traffic-mirror-session.
- AWS CLI
-
To modify a traffic mirror session
The following
modify-traffic-mirror-sessionexample changes the traffic mirror session description and the number of packets to mirror.aws ec2 modify-traffic-mirror-session \ --description"Change packet length"\ --traffic-mirror-session-idtms-08a33b1214EXAMPLE\ --remove-fields"packet-length"Output:
{ "TrafficMirrorSession": { "TrafficMirrorSessionId": "tms-08a33b1214EXAMPLE", "TrafficMirrorTargetId": "tmt-07f75d8feeEXAMPLE", "TrafficMirrorFilterId": "tmf-04812ff784EXAMPLE", "NetworkInterfaceId": "eni-070203f901EXAMPLE", "OwnerId": "111122223333", "SessionNumber": 1, "VirtualNetworkId": 7159709, "Description": "Change packet length", "Tags": [] } }For more information, see Modify your traffic mirror session in the Traffic Mirroring Guide.
-
For API details, see ModifyTrafficMirrorSession
in AWS CLI Command Reference.
-
The following code example shows how to use modify-transit-gateway-prefix-list-reference.
- AWS CLI
-
To modify a reference to a prefix list
The following
modify-transit-gateway-prefix-list-referenceexample modifies the prefix list reference in the specified route table by changing the attachment to which traffic is routed.aws ec2 modify-transit-gateway-prefix-list-reference \ --transit-gateway-route-table-idtgw-rtb-0123456789abcd123\ --prefix-list-idpl-11111122222222333\ --transit-gateway-attachment-idtgw-attach-aabbccddaabbccaabOutput:
{ "TransitGatewayPrefixListReference": { "TransitGatewayRouteTableId": "tgw-rtb-0123456789abcd123", "PrefixListId": "pl-11111122222222333", "PrefixListOwnerId": "123456789012", "State": "modifying", "Blackhole": false, "TransitGatewayAttachment": { "TransitGatewayAttachmentId": "tgw-attach-aabbccddaabbccaab", "ResourceType": "vpc", "ResourceId": "vpc-112233445566aabbc" } } }For more information, see Prefix list references in the Transit Gateways Guide.
-
For API details, see ModifyTransitGatewayPrefixListReference
in AWS CLI Command Reference.
-
The following code example shows how to use modify-transit-gateway-vpc-attachment.
- AWS CLI
-
To modify a transit gateway VPC attachment
The following
modify-transit-gateway-vpc-attachmentexample adds a subnet to the specified transit gateway VPC attachment.aws ec2 modify-transit-gateway-vpc-attachment \ --transit-gateway-attachment-idtgw-attach-09fbd47ddfEXAMPLE\ --add-subnet-idssubnet-0e51f45802EXAMPLEOutput:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-09fbd47ddfEXAMPLE", "TransitGatewayId": "tgw-0560315ccfEXAMPLE", "VpcId": "vpc-5eccc927", "VpcOwnerId": "111122223333", "State": "modifying", "SubnetIds": [ "subnet-0e51f45802EXAMPLE", "subnet-1EXAMPLE" ], "CreationTime": "2019-08-08T16:47:38.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" } } }For more information, see Transit gateway attachments to a VPC in the Transit Gateways Guide.
-
For API details, see ModifyTransitGatewayVpcAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use modify-transit-gateway.
- AWS CLI
-
To modify a transit gateway
The following
modify-transit-gatewayexample modifies the specified transit gateway by enabling ECMP support for VPN attachments.aws ec2 modify-transit-gateway \ --transit-gateway-idtgw-111111222222aaaaa\ --optionsVpnEcmpSupport=enableOutput:
{ "TransitGateway": { "TransitGatewayId": "tgw-111111222222aaaaa", "TransitGatewayArn": "64512", "State": "modifying", "OwnerId": "123456789012", "CreationTime": "2020-04-30T08:41:37.000Z", "Options": { "AmazonSideAsn": 64512, "AutoAcceptSharedAttachments": "disable", "DefaultRouteTableAssociation": "enable", "AssociationDefaultRouteTableId": "tgw-rtb-0123456789abcd123", "DefaultRouteTablePropagation": "enable", "PropagationDefaultRouteTableId": "tgw-rtb-0123456789abcd123", "VpnEcmpSupport": "enable", "DnsSupport": "enable" } } }For more information, see Transit gateways in the Transit Gateways Guide.
-
For API details, see ModifyTransitGateway
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-endpoint-policy.
- AWS CLI
-
To configure the Verified Access policy for an endpoint
The following
modify-verified-access-endpoint-policyexample adds the specified Verified Access policy to the specified Verified Access endpoint.aws ec2 modify-verified-access-endpoint-policy \ --verified-access-endpoint-idvae-066fac616d4d546f2\ --policy-enabled \ --policy-documentfile://policy.txtContents of
policy.txt:permit(principal,action,resource) when { context.identity.groups.contains("finance") && context.identity.email.verified == true };Output:
{ "PolicyEnabled": true, "PolicyDocument": "permit(principal,action,resource)\nwhen {\n context.identity.groups.contains(\"finance\") &&\n context.identity.email_verified == true\n};" }For more information, see Verified Access policies in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessEndpointPolicy
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-endpoint.
- AWS CLI
-
To modify the configuration of a Verified Access endpoint
The following
modify-verified-access-endpointexample adds the specified description to the specified Verified Access endpoint.aws ec2 modify-verified-access-endpoint \ --verified-access-endpoint-idvae-066fac616d4d546f2\ --description 'Testing Verified Access'Output:
{ "VerifiedAccessEndpoint": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessEndpointId": "vae-066fac616d4d546f2", "ApplicationDomain": "example.com", "EndpointType": "network-interface", "AttachmentType": "vpc", "DomainCertificateArn": "arn:aws:acm:us-east-2:123456789012:certificate/eb065ea0-26f9-4e75-a6ce-0a1a7EXAMPLE", "EndpointDomain": "my-ava-app.edge-00c3372d53b1540bb.vai-0ce000c0b7643abea.prod.verified-access.us-east-2.amazonaws.com", "SecurityGroupIds": [ "sg-004915970c4c8f13a" ], "NetworkInterfaceOptions": { "NetworkInterfaceId": "eni-0aec70418c8d87a0f", "Protocol": "https", "Port": 443 }, "Status": { "Code": "updating" }, "Description": "Testing Verified Access", "CreationTime": "2023-08-25T20:54:43", "LastUpdatedTime": "2023-08-25T22:46:32" } }For more information, see Verified Access endpoints in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-group-policy.
- AWS CLI
-
To configure a Verified Access policy for a group
The following
modify-verified-access-group-policyexample adds the specified Verified Access policy to the specified Verified Access group.aws ec2 modify-verified-access-group-policy \ --verified-access-group-idvagr-0dbe967baf14b7235\ --policy-enabled \ --policy-documentfile://policy.txtContents of
policy.txt:permit(principal,action,resource) when { context.identity.groups.contains("finance") && context.identity.email.verified == true };Output:
{ "PolicyEnabled": true, "PolicyDocument": "permit(principal,action,resource)\nwhen {\n context.identity.groups.contains(\"finance\") &&\n context.identity.email_verified == true\n};" }For more information, see Verified Access groups in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessGroupPolicy
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-group.
- AWS CLI
-
To modify the configuration of a Verified Access group
The following
modify-verified-access-groupexample adds the specified description to the specified Verified Access group.aws ec2 modify-verified-access-group \ --verified-access-group-idvagr-0dbe967baf14b7235\ --description"Testing Verified Access"Output:
{ "VerifiedAccessGroup": { "VerifiedAccessGroupId": "vagr-0dbe967baf14b7235", "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "Owner": "123456789012", "VerifiedAccessGroupArn": "arn:aws:ec2:us-east-2:123456789012:verified-access-group/vagr-0dbe967baf14b7235", "CreationTime": "2023-08-25T19:55:19", "LastUpdatedTime": "2023-08-25T22:17:25" } }For more information, see Verified Access groups in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessGroup
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-instance-logging-configuration.
- AWS CLI
-
To enable logging for a Verified Access instance
The following
modify-verified-access-instance-logging-configurationexample enables access logging for the specified Verified Access instance. The logs will be delivered to the specified CloudWatch Logs log group.aws ec2 modify-verified-access-instance-logging-configuration \ --verified-access-instance-idvai-0ce000c0b7643abea\ --access-logsCloudWatchLogs={Enabled=true,LogGroup=my-log-group}Output:
{ "LoggingConfiguration": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "AccessLogs": { "S3": { "Enabled": false }, "CloudWatchLogs": { "Enabled": true, "DeliveryStatus": { "Code": "success" }, "LogGroup": "my-log-group" }, "KinesisDataFirehose": { "Enabled": false }, "LogVersion": "ocsf-1.0.0-rc.2", "IncludeTrustContext": false } } }For more information, see Verified Access logs in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessInstanceLoggingConfiguration
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-instance.
- AWS CLI
-
To modify the configuration of a Verified Access instance
The following
modify-verified-access-instanceexample adds the specified description to the specified Verified Access instance.aws ec2 modify-verified-access-instance \ --verified-access-instance-idvai-0ce000c0b7643abea\ --description"Testing Verified Access"Output:
{ "VerifiedAccessInstance": { "VerifiedAccessInstanceId": "vai-0ce000c0b7643abea", "Description": "Testing Verified Access", "VerifiedAccessTrustProviders": [ { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center" } ], "CreationTime": "2023-08-25T18:27:56", "LastUpdatedTime": "2023-08-25T22:41:04" } }For more information, see Verified Access instances in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessInstance
in AWS CLI Command Reference.
-
The following code example shows how to use modify-verified-access-trust-provider.
- AWS CLI
-
To modify the configuration of a Verified Access trust provider
The following
modify-verified-access-trust-providerexample adds the specified description to the specified Verified Access trust provider.aws ec2 modify-verified-access-trust-provider \ --verified-access-trust-provider-idvatp-0bb32de759a3e19e7\ --description"Testing Verified Access"Output:
{ "VerifiedAccessTrustProvider": { "VerifiedAccessTrustProviderId": "vatp-0bb32de759a3e19e7", "Description": "Testing Verified Access", "TrustProviderType": "user", "UserTrustProviderType": "iam-identity-center", "PolicyReferenceName": "idc", "CreationTime": "2023-08-25T19:00:38", "LastUpdatedTime": "2023-08-25T19:18:21" } }For more information, see Trust providers for Verified Access in the AWS Verified Access User Guide.
-
For API details, see ModifyVerifiedAccessTrustProvider
in AWS CLI Command Reference.
-
The following code example shows how to use modify-volume-attribute.
- AWS CLI
-
To modify a volume attribute
This example sets the
autoEnableIoattribute of the volume with the IDvol-1234567890abcdef0totrue. If the command succeeds, no output is returned.Command:
aws ec2 modify-volume-attribute --volume-idvol-1234567890abcdef0--auto-enable-io-
For API details, see ModifyVolumeAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-volume.
- AWS CLI
-
Example 1: To modify a volume by changing its size
The following
modify-volumeexample changes the size of the specified volume to 150GB.Command:
aws ec2 modify-volume --size150--volume-idvol-1234567890abcdef0Output:
{ "VolumeModification": { "TargetSize": 150, "TargetVolumeType": "io1", "ModificationState": "modifying", "VolumeId": " vol-1234567890abcdef0", "TargetIops": 100, "StartTime": "2019-05-17T11:27:19.000Z", "Progress": 0, "OriginalVolumeType": "io1", "OriginalIops": 100, "OriginalSize": 100 } }Example 2: To modify a volume by changing its type, size, and IOPS value
The following
modify-volumeexample changes the volume type to Provisioned IOPS SSD, sets the target IOPS rate to 10000, and sets the volume size to 350GB.aws ec2 modify-volume \ --volume-typeio1\ --iops10000\ --size350\ --volume-idvol-1234567890abcdef0Output:
{ "VolumeModification": { "TargetSize": 350, "TargetVolumeType": "io1", "ModificationState": "modifying", "VolumeId": "vol-0721c1a9d08c93bf6", "TargetIops": 10000, "StartTime": "2019-05-17T11:38:57.000Z", "Progress": 0, "OriginalVolumeType": "gp2", "OriginalIops": 150, "OriginalSize": 50 } }-
For API details, see ModifyVolume
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-attribute.
- AWS CLI
-
To modify the enableDnsSupport attribute
This example modifies the
enableDnsSupportattribute. This attribute indicates whether DNS resolution is enabled for the VPC. If this attribute istrue, the Amazon DNS server resolves DNS hostnames for your instances to their corresponding IP addresses; otherwise, it does not. If the command succeeds, no output is returned.Command:
aws ec2 modify-vpc-attribute --vpc-idvpc-a01106c2--enable-dns-support "{\"Value\":false}"To modify the enableDnsHostnames attribute
This example modifies the
enableDnsHostnamesattribute. This attribute indicates whether instances launched in the VPC get DNS hostnames. If this attribute istrue, instances in the VPC get DNS hostnames; otherwise, they do not. If the command succeeds, no output is returned.Command:
aws ec2 modify-vpc-attribute --vpc-idvpc-a01106c2--enable-dns-hostnames "{\"Value\":false}"-
For API details, see ModifyVpcAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-endpoint-connection-notification.
- AWS CLI
-
To modify an endpoint connection notification
This example changes the SNS topic for the specified endpoint connection notification.
Command:
aws ec2 modify-vpc-endpoint-connection-notification --connection-notification-idvpce-nfn-008776de7e03f5abc--connection-eventsAcceptReject--connection-notification-arnarn:aws:sns:us-east-2:123456789012:mytopicOutput:
{ "ReturnValue": true }-
For API details, see ModifyVpcEndpointConnectionNotification
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-endpoint-service-configuration.
- AWS CLI
-
To modify an endpoint service configuration
This example changes the acceptance requirement for the specified endpoint service.
Command:
aws ec2 modify-vpc-endpoint-service-configuration --service-idvpce-svc-09222513e6e77dc86--no-acceptance-requiredOutput:
{ "ReturnValue": true }-
For API details, see ModifyVpcEndpointServiceConfiguration
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-endpoint-service-payer-responsibility.
- AWS CLI
-
To modify the payer responsibility
The following
modify-vpc-endpoint-service-payer-responsibilityexample modifies the payer responsibility of the specified endpoint service.aws ec2 modify-vpc-endpoint-service-payer-responsibility \ --service-idvpce-svc-071afff70666e61e0\ --payer-responsibilityServiceOwnerThis command produces no output.
-
For API details, see ModifyVpcEndpointServicePayerResponsibility
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-endpoint-service-permissions.
- AWS CLI
-
To modify endpoint service permissions
This example adds permission for an AWS account to connect to the specified endpoint service.
Command:
aws ec2 modify-vpc-endpoint-service-permissions --service-idvpce-svc-03d5ebb7d9579a2b3--add-allowed-principals '["arn:aws:iam::123456789012:root"]'Output:
{ "ReturnValue": true }This example adds permission for a specific IAM user (
admin) to connect to the specified endpoint service.Command:
aws ec2 modify-vpc-endpoint-service-permissions --service-idvpce-svc-03d5ebb7d9579a2b3--add-allowed-principals '["arn:aws:iam::123456789012:user/admin"]'-
For API details, see ModifyVpcEndpointServicePermissions
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-endpoint.
- AWS CLI
-
To modify a gateway endpoint
This example modifies gateway endpoint
vpce-1a2b3c4dby associating route tablertb-aaa222bbwith the endpoint, and resetting the policy document.Command:
aws ec2 modify-vpc-endpoint --vpc-endpoint-idvpce-1a2b3c4d--add-route-table-idsrtb-aaa222bb--reset-policyOutput:
{ "Return": true }To modify an interface endpoint
This example modifies interface endpoint
vpce-0fe5b17a0707d6fa5by adding subnetsubnet-d6fcaa8dto the endpoint.Command:
aws ec2 modify-vpc-endpoint --vpc-endpoint-idvpce-0fe5b17a0707d6fa5--add-subnet-idsubnet-d6fcaa8dOutput:
{ "Return": true }-
For API details, see ModifyVpcEndpoint
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-peering-connection-options.
- AWS CLI
-
To enable communication over a VPC peering connection from your local ClassicLink connection
In this example, for peering connection
pcx-aaaabbb, the owner of the requester VPC modifies the VPC peering connection options to enable a local ClassicLink connection to communicate with the peer VPC.Command:
aws ec2 modify-vpc-peering-connection-options --vpc-peering-connection-idpcx-aaaabbbb--requester-peering-connection-optionsAllowEgressFromLocalClassicLinkToRemoteVpc=trueOutput:
{ "RequesterPeeringConnectionOptions": { "AllowEgressFromLocalClassicLinkToRemoteVpc": true } }To enable communication over a VPC peering connection from your local VPC to a remote ClassicLink connection
In this example, the owner of the accepter VPC modifies the VPC peering connection options to enable the local VPC to communicate with the ClassicLink connection in the peer VPC.
Command:
aws ec2 modify-vpc-peering-connection-options --vpc-peering-connection-idpcx-aaaabbbb--accepter-peering-connection-optionsAllowEgressFromLocalVpcToRemoteClassicLink=trueOutput:
{ "AccepterPeeringConnectionOptions": { "AllowEgressFromLocalVpcToRemoteClassicLink": true } }To enable DNS resolution support for the VPC peering connection
In this example, the owner of the requester VPC modifies the VPC peering connection options for
pcx-aaaabbbbto enable the local VPC to resolve public DNS hostnames to private IP addresses when queried from instances in the peer VPC.Command:
aws ec2 modify-vpc-peering-connection-options --vpc-peering-connection-idpcx-aaaabbbb--requester-peering-connection-optionsAllowDnsResolutionFromRemoteVpc=trueOutput:
{ "RequesterPeeringConnectionOptions": { "AllowDnsResolutionFromRemoteVpc": true } }-
For API details, see ModifyVpcPeeringConnectionOptions
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpc-tenancy.
- AWS CLI
-
To modify the tenancy of a VPC
This example modifies the tenancy of VPC
vpc-1a2b3c4dtodefault.Command:
aws ec2 modify-vpc-tenancy --vpc-idvpc-1a2b3c4d--instance-tenancydefaultOutput:
{ "Return": true }-
For API details, see ModifyVpcTenancy
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpn-connection-options.
- AWS CLI
-
To modify your VPN connection options
The following
modify-vpn-connection-optionsexample modifies the local IPv4 CIDR on the customer gateway side of the specified VPN connection.aws ec2 modify-vpn-connection-options \ --vpn-connection-idvpn-1122334455aabbccd\ --local-ipv4-network-cidr10.0.0.0/16Output:
{ "VpnConnections": [ { "CustomerGatewayConfiguration": "...configuration information...", "CustomerGatewayId": "cgw-01234567abcde1234", "Category": "VPN", "State": "modifying", "Type": "ipsec.1", "VpnConnectionId": "vpn-1122334455aabbccd", "TransitGatewayId": "tgw-00112233445566aab", "Options": { "EnableAcceleration": false, "StaticRoutesOnly": true, "LocalIpv4NetworkCidr": "10.0.0.0/16", "RemoteIpv4NetworkCidr": "0.0.0.0/0", "TunnelInsideIpVersion": "ipv4" }, "Routes": [], "Tags": [ { "Key": "Name", "Value": "CanadaVPN" } ], "VgwTelemetry": [ { "AcceptedRouteCount": 0, "LastStatusChange": "2020-07-29T10:35:11.000Z", "OutsideIpAddress": "203.0.113.3", "Status": "DOWN", "StatusMessage": "" }, { "AcceptedRouteCount": 0, "LastStatusChange": "2020-09-02T09:09:33.000Z", "OutsideIpAddress": "203.0.113.5", "Status": "UP", "StatusMessage": "" } ] } ] }For more information, see Modifying Site-to-Site VPN connection options in the AWS Site-to-Site VPN User Guide.
-
For API details, see ModifyVpnConnectionOptions
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpn-connection.
- AWS CLI
-
To modify a VPN connection
The following
modify-vpn-connectionexample changes the target gateway for VPN connectionvpn-12345678901234567to virtual private gatewayvgw-11223344556677889:aws ec2 modify-vpn-connection \ --vpn-connection-idvpn-12345678901234567\ --vpn-gateway-idvgw-11223344556677889Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": "...configuration information...", "CustomerGatewayId": "cgw-aabbccddee1122334", "Category": "VPN", "State": "modifying", "Type": "ipsec.1", "VpnConnectionId": "vpn-12345678901234567", "VpnGatewayId": "vgw-11223344556677889", "Options": { "StaticRoutesOnly": false }, "VgwTelemetry": [ { "AcceptedRouteCount": 0, "LastStatusChange": "2019-07-17T07:34:00.000Z", "OutsideIpAddress": "18.210.3.222", "Status": "DOWN", "StatusMessage": "IPSEC IS DOWN" }, { "AcceptedRouteCount": 0, "LastStatusChange": "2019-07-20T21:20:16.000Z", "OutsideIpAddress": "34.193.129.33", "Status": "DOWN", "StatusMessage": "IPSEC IS DOWN" } ] } }-
For API details, see ModifyVpnConnection
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpn-tunnel-certificate.
- AWS CLI
-
To rotate a VPN tunnel certificate
The following
modify-vpn-tunnel-certificateexample rotates the certificate for the specified tunnel for a VPN connectionaws ec2 modify-vpn-tunnel-certificate \ --vpn-tunnel-outside-ip-address203.0.113.17\ --vpn-connection-idvpn-12345678901234567Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": ...configuration information..., "CustomerGatewayId": "cgw-aabbccddee1122334", "Category": "VPN", "State": "modifying", "Type": "ipsec.1", "VpnConnectionId": "vpn-12345678901234567", "VpnGatewayId": "vgw-11223344556677889", "Options": { "StaticRoutesOnly": false }, "VgwTelemetry": [ { "AcceptedRouteCount": 0, "LastStatusChange": "2019-09-11T17:27:14.000Z", "OutsideIpAddress": "203.0.113.17", "Status": "DOWN", "StatusMessage": "IPSEC IS DOWN", "CertificateArn": "arn:aws:acm:us-east-1:123456789101:certificate/c544d8ce-20b8-4fff-98b0-example" }, { "AcceptedRouteCount": 0, "LastStatusChange": "2019-09-11T17:26:47.000Z", "OutsideIpAddress": "203.0.114.18", "Status": "DOWN", "StatusMessage": "IPSEC IS DOWN", "CertificateArn": "arn:aws:acm:us-east-1:123456789101:certificate/5ab64566-761b-4ad3-b259-example" } ] } }-
For API details, see ModifyVpnTunnelCertificate
in AWS CLI Command Reference.
-
The following code example shows how to use modify-vpn-tunnel-options.
- AWS CLI
-
To modify the tunnel options for a VPN connection
The following
modify-vpn-tunnel-optionsexample updates the Diffie-Hellman groups that are permitted for the specified tunnel and VPN connection.aws ec2 modify-vpn-tunnel-options \ --vpn-connection-idvpn-12345678901234567\ --vpn-tunnel-outside-ip-address203.0.113.17\ --tunnel-optionsPhase1DHGroupNumbers=[{Value=14},{Value=15},{Value=16},{Value=17},{Value=18}],Phase2DHGroupNumbers=[{Value=14},{Value=15},{Value=16},{Value=17},{Value=18}]Output:
{ "VpnConnection": { "CustomerGatewayConfiguration": "...configuration information...", "CustomerGatewayId": "cgw-aabbccddee1122334", "Category": "VPN", "State": "available", "Type": "ipsec.1", "VpnConnectionId": "vpn-12345678901234567", "VpnGatewayId": "vgw-11223344556677889", "Options": { "StaticRoutesOnly": false, "TunnelOptions": [ { "OutsideIpAddress": "203.0.113.17", "Phase1DHGroupNumbers": [ { "Value": 14 }, { "Value": 15 }, { "Value": 16 }, { "Value": 17 }, { "Value": 18 } ], "Phase2DHGroupNumbers": [ { "Value": 14 }, { "Value": 15 }, { "Value": 16 }, { "Value": 17 }, { "Value": 18 } ] }, { "OutsideIpAddress": "203.0.114.19" } ] }, "VgwTelemetry": [ { "AcceptedRouteCount": 0, "LastStatusChange": "2019-09-10T21:56:54.000Z", "OutsideIpAddress": "203.0.113.17", "Status": "DOWN", "StatusMessage": "IPSEC IS DOWN" }, { "AcceptedRouteCount": 0, "LastStatusChange": "2019-09-10T21:56:43.000Z", "OutsideIpAddress": "203.0.114.19", "Status": "DOWN", "StatusMessage": "IPSEC IS DOWN" } ] } }-
For API details, see ModifyVpnTunnelOptions
in AWS CLI Command Reference.
-
The following code example shows how to use monitor-instances.
- AWS CLI
-
To enable detailed monitoring for an instance
This example command enables detailed monitoring for the specified instance.
Command:
aws ec2 monitor-instances --instance-idsi-1234567890abcdef0Output:
{ "InstanceMonitorings": [ { "InstanceId": "i-1234567890abcdef0", "Monitoring": { "State": "pending" } } ] }-
For API details, see MonitorInstances
in AWS CLI Command Reference.
-
The following code example shows how to use move-address-to-vpc.
- AWS CLI
-
To move an address to EC2-VPC
This example moves Elastic IP address 54.123.4.56 to the EC2-VPC platform.
Command:
aws ec2 move-address-to-vpc --public-ip54.123.4.56Output:
{ "Status": "MoveInProgress" }-
For API details, see MoveAddressToVpc
in AWS CLI Command Reference.
-
The following code example shows how to use move-byoip-cidr-to-ipam.
- AWS CLI
-
To transfer a BYOIP CIDR to IPAM
The following
move-byoip-cidr-to-ipamexample transfers a BYOIP CIDR to IPAM.(Linux):
aws ec2 move-byoip-cidr-to-ipam \ --regionus-west-2\ --ipam-pool-idipam-pool-0a03d430ca3f5c035\ --ipam-pool-owner111111111111\ --cidr130.137.249.0/24(Windows):
aws ec2 move-byoip-cidr-to-ipam^--regionus-west-2^--ipam-pool-idipam-pool-0a03d430ca3f5c035^--ipam-pool-owner111111111111^--cidr130.137.249.0/24Output:
{ "ByoipCidr": { "Cidr": "130.137.249.0/24", "State": "pending-transfer" } }For more information, see Tutorial: Transfer an existing BYOIP IPv4 CIDR to IPAM in the Amazon VPC IPAM User Guide.
-
For API details, see MoveByoipCidrToIpam
in AWS CLI Command Reference.
-
The following code example shows how to use network-insights-access-scope.
- AWS CLI
-
To create Network Insights access scopes
The following
create-network-insights-access-scopeexample creates a network insights access scope in your AWS account.aws ec2 create-network-insights-access-scope \ --cli-input-jsonfile://access-scope-file.jsonContents of
access-scope-file.json:{ { "MatchPaths": [ { "Source": { "ResourceStatement": { "Resources": [ "vpc-abcd12e3" ] } } } ], "ExcludePaths": [ { "Source": { "ResourceStatement": { "ResourceTypes": [ "AWS::EC2::InternetGateway" ] } } } ] } }Output:
{ "NetworkInsightsAccessScopeAnalysisId": "nisa-123456789111" }{ "NetworkInsightsAccessScope": { "NetworkInsightsAccessScopeId": "nis-123456789222", "NetworkInsightsAccessScopeArn": "arn:aws:ec2:us-east-1:123456789222:network-insights-access-scope/nis-123456789222", "CreatedDate": "2022-01-25T19:20:28.796000+00:00", "UpdatedDate": "2022-01-25T19:20:28.797000+00:00" }, "NetworkInsightsAccessScopeContent": { "NetworkInsightsAccessScopeId": "nis-04c0c0fbca737c404", "MatchPaths": [ { "Source": { "ResourceStatement": { "Resources": [ "vpc-abcd12e3" ] } } } ], "ExcludePaths": [ { "Source": { "ResourceStatement": { "ResourceTypes": [ "AWS::EC2::InternetGateway" ] } } } ] } }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see NetworkInsightsAccessScope
in AWS CLI Command Reference.
-
The following code example shows how to use provision-byoip-cidr.
- AWS CLI
-
To provision an address range
The following
provision-byoip-cidrexample provisions a public IP address range for use with AWS.aws ec2 provision-byoip-cidr \ --cidr203.0.113.25/24\ --cidr-authorization-context Message="$text_message",Signature="$signed_message"Output:
{ "ByoipCidr": { "Cidr": "203.0.113.25/24", "State": "pending-provision" } }For more information about creating the messages strings for the authorization context, see Bring Your Own IP Addresses in the Amazon EC2 User Guide.
-
For API details, see ProvisionByoipCidr
in AWS CLI Command Reference.
-
The following code example shows how to use provision-ipam-pool-cidr.
- AWS CLI
-
To provision a CIDR to an IPAM pool
The following
provision-ipam-pool-cidrexample provisions a CIDR to an IPAM pool.(Linux):
aws ec2 provision-ipam-pool-cidr \ --ipam-pool-idipam-pool-0533048da7d823723\ --cidr10.0.0.0/24(Windows):
aws ec2 provision-ipam-pool-cidr^--ipam-pool-idipam-pool-0533048da7d823723^--cidr10.0.0.0/24Output:
{ "IpamPoolCidr": { "Cidr": "10.0.0.0/24", "State": "pending-provision" } }For more information, see Provision CIDRs to a pool in the Amazon VPC IPAM User Guide.
-
For API details, see ProvisionIpamPoolCidr
in AWS CLI Command Reference.
-
The following code example shows how to use purchase-host-reservation.
- AWS CLI
-
To purchase a Dedicated Host Reservation
This example purchases the specified Dedicated Host Reservation offering for the specified Dedicated Host in your account.
Command:
aws ec2 purchase-host-reservation --offering-idhro-03f707bf363b6b324--host-id-seth-013abcd2a00cbd123Output:
{ "TotalHourlyPrice": "1.499", "Purchase": [ { "HourlyPrice": "1.499", "InstanceFamily": "m4", "PaymentOption": "NoUpfront", "HostIdSet": [ "h-013abcd2a00cbd123" ], "HostReservationId": "hr-0d418a3a4ffc669ae", "UpfrontPrice": "0.000", "Duration": 31536000 } ], "TotalUpfrontPrice": "0.000" }-
For API details, see PurchaseHostReservation
in AWS CLI Command Reference.
-
The following code example shows how to use purchase-reserved-instances-offering.
- AWS CLI
-
To purchase a Reserved Instance offering
This example command illustrates a purchase of a Reserved Instances offering, specifying an offering ID and instance count.
Command:
aws ec2 purchase-reserved-instances-offering --reserved-instances-offering-idec06327e-dd07-46ee-9398-75b5fexample--instance-count3Output:
{ "ReservedInstancesId": "af9f760e-6f91-4559-85f7-4980eexample" }-
For API details, see PurchaseReservedInstancesOffering
in AWS CLI Command Reference.
-
The following code example shows how to use purchase-scheduled-instances.
- AWS CLI
-
To purchase a Scheduled Instance
This example purchases a Scheduled Instance.
Command:
aws ec2 purchase-scheduled-instances --purchase-requestsfile://purchase-request.jsonPurchase-request.json:
[ { "PurchaseToken": "eyJ2IjoiMSIsInMiOjEsImMiOi...", "InstanceCount": 1 } ]Output:
{ "ScheduledInstanceSet": [ { "AvailabilityZone": "us-west-2b", "ScheduledInstanceId": "sci-1234-1234-1234-1234-123456789012", "HourlyPrice": "0.095", "CreateDate": "2016-01-25T21:43:38.612Z", "Recurrence": { "OccurrenceDaySet": [ 1 ], "Interval": 1, "Frequency": "Weekly", "OccurrenceRelativeToEnd": false, "OccurrenceUnit": "" }, "Platform": "Linux/UNIX", "TermEndDate": "2017-01-31T09:00:00Z", "InstanceCount": 1, "SlotDurationInHours": 32, "TermStartDate": "2016-01-31T09:00:00Z", "NetworkPlatform": "EC2-VPC", "TotalScheduledInstanceHours": 1696, "NextSlotStartTime": "2016-01-31T09:00:00Z", "InstanceType": "c4.large" } ] }-
For API details, see PurchaseScheduledInstances
in AWS CLI Command Reference.
-
The following code example shows how to use reboot-instances.
- AWS CLI
-
To reboot an Amazon EC2 instance
This example reboots the specified instance. If the command succeeds, no output is returned.
Command:
aws ec2 reboot-instances --instance-idsi-1234567890abcdef5For more information, see Reboot Your Instance in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see RebootInstances
in AWS CLI Command Reference.
-
The following code example shows how to use register-image.
- AWS CLI
-
Example 1: To register an AMI using a manifest file
The following
register-imageexample registers an AMI using the specified manifest file in Amazon S3.aws ec2 register-image \ --namemy-image\ --image-locationamzn-s3-demo-bucket/myimage/image.manifest.xmlOutput:
{ "ImageId": "ami-1234567890EXAMPLE" }For more information, see Amazon Machine Images (AMI) in the Amazon EC2 User Guide.
Example 2: To register an AMI using a snapshot of a root device
The following
register-imageexample registers an AMI using the specified snapshot of an EBS root volume as device/dev/xvda. The block device mapping also includes an empty 100 GiB EBS volume as device/dev/xvdf.aws ec2 register-image \ --namemy-image\ --root-device-name/dev/xvda\ --block-device-mappingsDeviceName=/dev/xvda,Ebs={SnapshotId=snap-0db2cf683925d191f}DeviceName=/dev/xvdf,Ebs={VolumeSize=100}Output:
{ "ImageId": "ami-1a2b3c4d5eEXAMPLE" }For more information, see Amazon Machine Images (AMI) in the Amazon EC2 User Guide.
-
For API details, see RegisterImage
in AWS CLI Command Reference.
-
The following code example shows how to use register-instance-event-notification-attributes.
- AWS CLI
-
Example 1: To include all tags in event notifications
The following
register-instance-event-notification-attributesexample includes all tags in event notifications.aws ec2 register-instance-event-notification-attributes \ --instance-tag-attributeIncludeAllTagsOfInstance=trueOutput:
{ "InstanceTagAttribute": { "InstanceTagKeys": [], "IncludeAllTagsOfInstance": true } }For more information, see Scheduled events for your instances in the Amazon EC2 User Guide.
Example 2: To include specific tags in event notifications
The following
register-instance-event-notification-attributesexample includes the specified tags in event notifications. You cannot specify tags ifIncludeAllTagsOfInstanceistrue.aws ec2 register-instance-event-notification-attributes \ --instance-tag-attribute InstanceTagKeys="tag-key1","tag-key2"Output:
{ "InstanceTagAttribute": { "InstanceTagKeys": [ "tag-key1", "tag-key2" ], "IncludeAllTagsOfInstance": false } }For more information, see Scheduled events for your instances in the Amazon EC2 User Guide.
-
For API details, see RegisterInstanceEventNotificationAttributes
in AWS CLI Command Reference.
-
The following code example shows how to use register-transit-gateway-multicase-group-sources.
- AWS CLI
-
To register a source with a transit gateway multicast group.
The following
register-transit-gateway-multicast-group-sourcesexample registers the specified network interface group source with a multicast group.aws ec2 register-transit-gateway-multicast-group-sources \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef79d6e597\ --group-ip-address224.0.1.0\ --network-interface-idseni-07f290fc3c090cbaeOutput:
{ "RegisteredMulticastGroupSources": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef79d6e597", "RegisteredNetworkInterfaceIds": [ "eni-07f290fc3c090cbae" ], "GroupIpAddress": "224.0.1.0" } }For more information, see Register Sources with a Multicast Group in the AWS Transit Gateways User Guide.
-
For API details, see RegisterTransitGatewayMulticaseGroupSources
in AWS CLI Command Reference.
-
The following code example shows how to use register-transit-gateway-multicast-group-members.
- AWS CLI
-
To view the information about the transit gateway multicast domain associations
The following
register-transit-gateway-multicast-group-membersexample returns the associations for the specified multicast domain.aws ec2 register-transit-gateway-multicast-group-members \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef79d6e597\ --group-ip-address224.0.1.0\ --network-interface-idseni-0e246d32695012e81Output:
{ "RegisteredMulticastGroupMembers": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef79d6e597", "RegisteredNetworkInterfaceIds": [ "eni-0e246d32695012e81" ], "GroupIpAddress": "224.0.1.0" } }For more information, see Multicast domains in the Transit Gateways User Guide.
-
For API details, see RegisterTransitGatewayMulticastGroupMembers
in AWS CLI Command Reference.
-
The following code example shows how to use register-transit-gateway-multicast-group-sources.
- AWS CLI
-
To register a source with a transit gateway multicast group.
The following
register-transit-gateway-multicast-group-sourcesexample registers the specified network interface group source with a multicast group.aws ec2 register-transit-gateway-multicast-group-sources \ --transit-gateway-multicast-domain-idtgw-mcast-domain-0c4905cef79d6e597\ --group-ip-address224.0.1.0\ --network-interface-idseni-07f290fc3c090cbaeOutput:
{ "RegisteredMulticastGroupSources": { "TransitGatewayMulticastDomainId": "tgw-mcast-domain-0c4905cef79d6e597", "RegisteredNetworkInterfaceIds": [ "eni-07f290fc3c090cbae" ], "GroupIpAddress": "224.0.1.0" } }For more information, see Multicast domains in the Transit Gateways Guide.
-
For API details, see RegisterTransitGatewayMulticastGroupSources
in AWS CLI Command Reference.
-
The following code example shows how to use reject-transit-gateway-peering-attachment.
- AWS CLI
-
To reject a transit gateway peering attachment
The following
reject-transit-gateway-peering-attachmentexample rejects the specified transit gateway peering attachment request. The--regionparameter specifies the Region that the accepter transit gateway is located in.aws ec2 reject-transit-gateway-peering-attachment \ --transit-gateway-attachment-idtgw-attach-4455667788aabbccd\ --regionus-east-2Output:
{ "TransitGatewayPeeringAttachment": { "TransitGatewayAttachmentId": "tgw-attach-4455667788aabbccd", "RequesterTgwInfo": { "TransitGatewayId": "tgw-123abc05e04123abc", "OwnerId": "123456789012", "Region": "us-west-2" }, "AccepterTgwInfo": { "TransitGatewayId": "tgw-11223344aabbcc112", "OwnerId": "123456789012", "Region": "us-east-2" }, "State": "rejecting", "CreationTime": "2019-12-09T11:50:31.000Z" } }For more information, see Transit Gateway Peering Attachments in the Transit Gateways Guide.
-
For API details, see RejectTransitGatewayPeeringAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use reject-transit-gateway-vpc-attachment.
- AWS CLI
-
To reject a transit gateway VPC attachment
The following
reject-transit-gateway-vpc-attachmentexample rejects the specified transit gateway VPC attachment.aws ec2 reject-transit-gateway-vpc-attachment \ --transit-gateway-attachment-idtgw-attach-0a34fe6b4fEXAMPLEOutput:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-0a34fe6b4fEXAMPLE", "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "VpcId": "vpc-07e8ffd50fEXAMPLE", "VpcOwnerId": "111122223333", "State": "pending", "SubnetIds": [ "subnet-0752213d59EXAMPLE" ], "CreationTime": "2019-07-10T17:33:46.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" } } }For more information, see Transit gateway attachments to a VPC in the Transit Gateways Guide.
-
For API details, see RejectTransitGatewayVpcAttachment
in AWS CLI Command Reference.
-
The following code example shows how to use reject-transit-gateway-vpc-attachments.
- AWS CLI
-
To reject a transit gateway VPC attachment
The following
reject-transit-gateway-vpc-attachmentexample rejects the specified transit gateway VPC attachment.aws ec2 reject-transit-gateway-vpc-attachment \ --transit-gateway-attachment-idtgw-attach-0a34fe6b4fEXAMPLEOutput:
{ "TransitGatewayVpcAttachment": { "TransitGatewayAttachmentId": "tgw-attach-0a34fe6b4fEXAMPLE", "TransitGatewayId": "tgw-0262a0e521EXAMPLE", "VpcId": "vpc-07e8ffd50fEXAMPLE", "VpcOwnerId": "111122223333", "State": "pending", "SubnetIds": [ "subnet-0752213d59EXAMPLE" ], "CreationTime": "2019-07-10T17:33:46.000Z", "Options": { "DnsSupport": "enable", "Ipv6Support": "disable" } } }For more information, see Transit gateway attachments to a VPC in the Transit Gateways Guide.
-
For API details, see RejectTransitGatewayVpcAttachments
in AWS CLI Command Reference.
-
The following code example shows how to use reject-vpc-endpoint-connections.
- AWS CLI
-
To reject an interface endpoint connection request
This example rejects the specified endpoint connection request for the specified endpoint service.
Command:
aws ec2 reject-vpc-endpoint-connections --service-idvpce-svc-03d5ebb7d9579a2b3--vpc-endpoint-idsvpce-0c1308d7312217abcOutput:
{ "Unsuccessful": [] }-
For API details, see RejectVpcEndpointConnections
in AWS CLI Command Reference.
-
The following code example shows how to use reject-vpc-peering-connection.
- AWS CLI
-
To reject a VPC peering connection
This example rejects the specified VPC peering connection request.
Command:
aws ec2 reject-vpc-peering-connection --vpc-peering-connection-idpcx-1a2b3c4dOutput:
{ "Return": true }-
For API details, see RejectVpcPeeringConnection
in AWS CLI Command Reference.
-
The following code example shows how to use release-address.
- AWS CLI
-
To release an Elastic IP addresses for EC2-Classic
This example releases an Elastic IP address for use with instances in EC2-Classic. If the command succeeds, no output is returned.
Command:
aws ec2 release-address --public-ip198.51.100.0To release an Elastic IP address for EC2-VPC
This example releases an Elastic IP address for use with instances in a VPC. If the command succeeds, no output is returned.
Command:
aws ec2 release-address --allocation-ideipalloc-64d5890a-
For API details, see ReleaseAddress
in AWS CLI Command Reference.
-
The following code example shows how to use release-hosts.
- AWS CLI
-
To release a Dedicated host from your account
To release a Dedicated host from your account. Instances that are on the host must be stopped or terminated before the host can be released.
Command:
aws ec2 release-hosts --host-id=h-0029d6e3cacf1b3daOutput:
{ "Successful": [ "h-0029d6e3cacf1b3da" ], "Unsuccessful": [] }-
For API details, see ReleaseHosts
in AWS CLI Command Reference.
-
The following code example shows how to use release-ipam-pool-allocation.
- AWS CLI
-
To release an IPAM pool allocation
In this example, you're an IPAM delegated admin who tried to delete an IPAM pool but received an error that you cannot delete the pool while the pool has allocations. You are using this command to release a pool allocation.
Note the following:
You can only use this command for custom allocations. To remove an allocation for a resource without deleting the resource, set its monitored state to false using modify-ipam-resource-cidr.To complete this request, you'll need the IPAM pool ID, which you can get with describe-ipam-pools. You'll also need the allocation ID, which you can get with get-ipam-pool-allocations.If you do not want to remove allocations one by one, you can use the
--cascade optionwhen you delete an IPAM pool to automatically release any allocations in the pool before deleting it.There are a number of prerequisites before running this command. For more information, see Release an allocation in the Amazon VPC IPAM User Guide.The--regionin which you run this command must be the locale of the IPAM pool where the allocation is.The following
release-ipam-pool-allocationexample releases an IPAM pool allocation.aws ec2 release-ipam-pool-allocation \ --ipam-pool-idipam-pool-07bdd12d7c94e4693\ --cidr10.0.0.0/23\ --ipam-pool-allocation-idipam-pool-alloc-0e66a1f730da54791b99465b79e7d1e89\ --regionus-west-1Output:
{ "Success": true }Once you release an allocation, you may want to run delete-ipam-pool.
-
For API details, see ReleaseIpamPoolAllocation
in AWS CLI Command Reference.
-
The following code example shows how to use replace-iam-instance-profile-association.
- AWS CLI
-
To replace an IAM instance profile for an instance
This example replaces the IAM instance profile represented by the association
iip-assoc-060bae234aac2e7fawith the IAM instance profile namedAdminRole.aws ec2 replace-iam-instance-profile-association \ --iam-instance-profileName=AdminRole\ --association-idiip-assoc-060bae234aac2e7faOutput:
{ "IamInstanceProfileAssociation": { "InstanceId": "i-087711ddaf98f9489", "State": "associating", "AssociationId": "iip-assoc-0b215292fab192820", "IamInstanceProfile": { "Id": "AIPAJLNLDX3AMYZNWYYAY", "Arn": "arn:aws:iam::123456789012:instance-profile/AdminRole" } } }-
For API details, see ReplaceIamInstanceProfileAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use replace-network-acl-association.
- AWS CLI
-
To replace the network ACL associated with a subnet
This example associates the specified network ACL with the subnet for the specified network ACL association.
Command:
aws ec2 replace-network-acl-association --association-idaclassoc-e5b95c8c--network-acl-idacl-5fb85d36Output:
{ "NewAssociationId": "aclassoc-3999875b" }-
For API details, see ReplaceNetworkAclAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use replace-network-acl-entry.
- AWS CLI
-
To replace a network ACL entry
This example replaces an entry for the specified network ACL. The new rule 100 allows ingress traffic from 203.0.113.12/24 on UDP port 53 (DNS) into any associated subnet.
Command:
aws ec2 replace-network-acl-entry --network-acl-idacl-5fb85d36--ingress --rule-number100--protocoludp--port-rangeFrom=53,To=53--cidr-block203.0.113.12/24--rule-actionallow-
For API details, see ReplaceNetworkAclEntry
in AWS CLI Command Reference.
-
The following code example shows how to use replace-route-table-association.
- AWS CLI
-
To replace the route table associated with a subnet
This example associates the specified route table with the subnet for the specified route table association.
Command:
aws ec2 replace-route-table-association --association-idrtbassoc-781d0d1a--route-table-idrtb-22574640Output:
{ "NewAssociationId": "rtbassoc-3a1f0f58" }-
For API details, see ReplaceRouteTableAssociation
in AWS CLI Command Reference.
-
The following code example shows how to use replace-route.
- AWS CLI
-
To replace a route
This example replaces the specified route in the specified route table. The new route matches the specified CIDR and sends the traffic to the specified virtual private gateway. If the command succeeds, no output is returned.
Command:
aws ec2 replace-route --route-table-idrtb-22574640--destination-cidr-block10.0.0.0/16--gateway-idvgw-9a4cacf3-
For API details, see ReplaceRoute
in AWS CLI Command Reference.
-
The following code example shows how to use replace-transit-gateway-route.
- AWS CLI
-
To replace the specified route in the specified transit gateway route table
The following
replace-transit-gateway-routeexample replaces the route in the specified transit gateway route table.aws ec2 replace-transit-gateway-route \ --destination-cidr-block10.0.2.0/24\ --transit-gateway-attachment-idtgw-attach-09b52ccdb5EXAMPLE\ --transit-gateway-route-table-idtgw-rtb-0a823edbdeEXAMPLEOutput:
{ "Route": { "DestinationCidrBlock": "10.0.2.0/24", "TransitGatewayAttachments": [ { "ResourceId": "vpc-4EXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-09b52ccdb5EXAMPLE", "ResourceType": "vpc" } ], "Type": "static", "State": "active" } }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see ReplaceTransitGatewayRoute
in AWS CLI Command Reference.
-
The following code example shows how to use report-instance-status.
- AWS CLI
-
To report status feedback for an instance
This example command reports status feedback for the specified instance.
Command:
aws ec2 report-instance-status --instancesi-1234567890abcdef0--statusimpaired--reason-codesunresponsive-
For API details, see ReportInstanceStatus
in AWS CLI Command Reference.
-
The following code example shows how to use request-spot-fleet.
- AWS CLI
-
To request a Spot fleet in the subnet with the lowest price
This example command creates a Spot fleet request with two launch specifications that differ only by subnet. The Spot fleet launches the instances in the specified subnet with the lowest price. If the instances are launched in a default VPC, they receive a public IP address by default. If the instances are launched in a nondefault VPC, they do not receive a public IP address by default.
Note that you can't specify different subnets from the same Availability Zone in a Spot fleet request.
Command:
aws ec2 request-spot-fleet --spot-fleet-request-configfile://config.jsonConfig.json:
{ "SpotPrice": "0.04", "TargetCapacity": 2, "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role", "LaunchSpecifications": [ { "ImageId": "ami-1a2b3c4d", "KeyName": "my-key-pair", "SecurityGroups": [ { "GroupId": "sg-1a2b3c4d" } ], "InstanceType": "m3.medium", "SubnetId": "subnet-1a2b3c4d, subnet-3c4d5e6f", "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" } } ] }Output:
{ "SpotFleetRequestId": "sfr-73fbd2ce-aa30-494c-8788-1cee4EXAMPLE" }To request a Spot fleet in the Availability Zone with the lowest price
This example command creates a Spot fleet request with two launch specifications that differ only by Availability Zone. The Spot fleet launches the instances in the specified Availability Zone with the lowest price. If your account supports EC2-VPC only, Amazon EC2 launches the Spot instances in the default subnet of the Availability Zone. If your account supports EC2-Classic, Amazon EC2 launches the instances in EC2-Classic in the Availability Zone.
Command:
aws ec2 request-spot-fleet --spot-fleet-request-configfile://config.jsonConfig.json:
{ "SpotPrice": "0.04", "TargetCapacity": 2, "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role", "LaunchSpecifications": [ { "ImageId": "ami-1a2b3c4d", "KeyName": "my-key-pair", "SecurityGroups": [ { "GroupId": "sg-1a2b3c4d" } ], "InstanceType": "m3.medium", "Placement": { "AvailabilityZone": "us-west-2a, us-west-2b" }, "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" } } ] }To launch Spot instances in a subnet and assign them public IP addresses
This example command assigns public addresses to instances launched in a nondefault VPC. Note that when you specify a network interface, you must include the subnet ID and security group ID using the network interface.
Command:
aws ec2 request-spot-fleet --spot-fleet-request-configfile://config.jsonConfig.json:
{ "SpotPrice": "0.04", "TargetCapacity": 2, "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role", "LaunchSpecifications": [ { "ImageId": "ami-1a2b3c4d", "KeyName": "my-key-pair", "InstanceType": "m3.medium", "NetworkInterfaces": [ { "DeviceIndex": 0, "SubnetId": "subnet-1a2b3c4d", "Groups": [ "sg-1a2b3c4d" ], "AssociatePublicIpAddress": true } ], "IamInstanceProfile": { "Arn": "arn:aws:iam::880185128111:instance-profile/my-iam-role" } } ] }To request a Spot fleet using the diversified allocation strategy
This example command creates a Spot fleet request that launches 30 instances using the diversified allocation strategy. The launch specifications differ by instance type. The Spot fleet distributes the instances across the launch specifications such that there are 10 instances of each type.
Command:
aws ec2 request-spot-fleet --spot-fleet-request-configfile://config.jsonConfig.json:
{ "SpotPrice": "0.70", "TargetCapacity": 30, "AllocationStrategy": "diversified", "IamFleetRole": "arn:aws:iam::123456789012:role/my-spot-fleet-role", "LaunchSpecifications": [ { "ImageId": "ami-1a2b3c4d", "InstanceType": "c4.2xlarge", "SubnetId": "subnet-1a2b3c4d" }, { "ImageId": "ami-1a2b3c4d", "InstanceType": "m3.2xlarge", "SubnetId": "subnet-1a2b3c4d" }, { "ImageId": "ami-1a2b3c4d", "InstanceType": "r3.2xlarge", "SubnetId": "subnet-1a2b3c4d" } ] }For more information, see Spot Fleet Requests in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see RequestSpotFleet
in AWS CLI Command Reference.
-
The following code example shows how to use request-spot-instances.
- AWS CLI
-
To request Spot Instances
This example command creates a one-time Spot Instance request for five instances in the specified Availability Zone. If your account supports EC2-VPC only, Amazon EC2 launches the instances in the default subnet of the specified Availability Zone. If your account supports EC2-Classic, Amazon EC2 launches the instances in EC2-Classic in the specified Availability Zone.
Command:
aws ec2 request-spot-instances --spot-price"0.03"--instance-count5--type"one-time"--launch-specificationfile://specification.jsonSpecification.json:
{ "ImageId": "ami-1a2b3c4d", "KeyName": "my-key-pair", "SecurityGroupIds": [ "sg-1a2b3c4d" ], "InstanceType": "m3.medium", "Placement": { "AvailabilityZone": "us-west-2a" }, "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" } }Output:
{ "SpotInstanceRequests": [ { "Status": { "UpdateTime": "2014-03-25T20:54:21.000Z", "Code": "pending-evaluation", "Message": "Your Spot request has been submitted for review, and is pending evaluation." }, "ProductDescription": "Linux/UNIX", "SpotInstanceRequestId": "sir-df6f405d", "State": "open", "LaunchSpecification": { "Placement": { "AvailabilityZone": "us-west-2a" }, "ImageId": "ami-1a2b3c4d", "KeyName": "my-key-pair", "SecurityGroups": [ { "GroupName": "my-security-group", "GroupId": "sg-1a2b3c4d" } ], "Monitoring": { "Enabled": false }, "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" }, "InstanceType": "m3.medium" }, "Type": "one-time", "CreateTime": "2014-03-25T20:54:20.000Z", "SpotPrice": "0.050000" }, ... ] }This example command creates a one-time Spot Instance request for five instances in the specified subnet. Amazon EC2 launches the instances in the specified subnet. If the VPC is a nondefault VPC, the instances do not receive a public IP address by default.
Command:
aws ec2 request-spot-instances --spot-price"0.050"--instance-count5--type"one-time"--launch-specificationfile://specification.jsonSpecification.json:
{ "ImageId": "ami-1a2b3c4d", "SecurityGroupIds": [ "sg-1a2b3c4d" ], "InstanceType": "m3.medium", "SubnetId": "subnet-1a2b3c4d", "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" } }Output:
{ "SpotInstanceRequests": [ { "Status": { "UpdateTime": "2014-03-25T22:21:58.000Z", "Code": "pending-evaluation", "Message": "Your Spot request has been submitted for review, and is pending evaluation." }, "ProductDescription": "Linux/UNIX", "SpotInstanceRequestId": "sir-df6f405d", "State": "open", "LaunchSpecification": { "Placement": { "AvailabilityZone": "us-west-2a" } "ImageId": "ami-1a2b3c4d" "SecurityGroups": [ { "GroupName": "my-security-group", "GroupID": "sg-1a2b3c4d" } ] "SubnetId": "subnet-1a2b3c4d", "Monitoring": { "Enabled": false }, "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" }, "InstanceType": "m3.medium", }, "Type": "one-time", "CreateTime": "2014-03-25T22:21:58.000Z", "SpotPrice": "0.050000" }, ... ] }This example assigns a public IP address to the Spot Instances that you launch in a nondefault VPC. Note that when you specify a network interface, you must include the subnet ID and security group ID using the network interface.
Command:
aws ec2 request-spot-instances --spot-price"0.050"--instance-count1--type"one-time"--launch-specificationfile://specification.jsonSpecification.json:
{ "ImageId": "ami-1a2b3c4d", "KeyName": "my-key-pair", "InstanceType": "m3.medium", "NetworkInterfaces": [ { "DeviceIndex": 0, "SubnetId": "subnet-1a2b3c4d", "Groups": [ "sg-1a2b3c4d" ], "AssociatePublicIpAddress": true } ], "IamInstanceProfile": { "Arn": "arn:aws:iam::123456789012:instance-profile/my-iam-role" } }-
For API details, see RequestSpotInstances
in AWS CLI Command Reference.
-
The following code example shows how to use reset-address-attribute.
- AWS CLI
-
To reset the domain name attribute associated with an elastic IP address
The following
reset-address-attributeexamples reset the domain name attribute of an elastic IP address.Linux:
aws ec2 reset-address-attribute \ --allocation-ideipalloc-abcdef01234567890\ --attributedomain-nameWindows:
aws ec2 reset-address-attribute^--allocation-ideipalloc-abcdef01234567890^--attributedomain-nameOutput:
{ "Addresses": [ { "PublicIp": "192.0.2.0", "AllocationId": "eipalloc-abcdef01234567890", "PtrRecord": "example.com." "PtrRecordUpdate": { "Value": "example.net.", "Status": "PENDING" } ] }To monitor the pending change, see describe-addresses-attribute in the AWS CLI Command Reference.
-
For API details, see ResetAddressAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use reset-ebs-default-kms-key-id.
- AWS CLI
-
To reset your default CMK for EBS encryption
The following
reset-ebs-default-kms-key-idexample resets the default CMK for EBS encryption for your AWS account in the current Region.aws ec2 reset-ebs-default-kms-key-idOutput:
{ "KmsKeyId": "arn:aws:kms:us-west-2:123456789012:key/8c5b2c63-b9bc-45a3-a87a-5513eEXAMPLE" }-
For API details, see ResetEbsDefaultKmsKeyId
in AWS CLI Command Reference.
-
The following code example shows how to use reset-fpga-image-attribute.
- AWS CLI
-
To reset the attributes of an Amazon FPGA image
This example resets the load permissions for the specified AFI.
Command:
aws ec2 reset-fpga-image-attribute --fpga-image-idafi-0d123e123bfc85abc--attributeloadPermissionOutput:
{ "Return": true }-
For API details, see ResetFpgaImageAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use reset-image-attribute.
- AWS CLI
-
To reset the launchPermission attribute
This example resets the
launchPermissionattribute for the specified AMI to its default value. By default, AMIs are private. If the command succeeds, no output is returned.Command:
aws ec2 reset-image-attribute --image-idami-5731123e--attributelaunchPermission-
For API details, see ResetImageAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use reset-instance-attribute.
- AWS CLI
-
To reset the sourceDestCheck attribute
This example resets the
sourceDestCheckattribute of the specified instance. The instance must be in a VPC. If the command succeeds, no output is returned.Command:
aws ec2 reset-instance-attribute --instance-idi-1234567890abcdef0--attributesourceDestCheckTo reset the kernel attribute
This example resets the
kernelattribute of the specified instance. The instance must be in thestoppedstate. If the command succeeds, no output is returned.Command:
aws ec2 reset-instance-attribute --instance-idi-1234567890abcdef0--attributekernelTo reset the ramdisk attribute
This example resets the
ramdiskattribute of the specified instance. The instance must be in thestoppedstate. If the command succeeds, no output is returned.Command:
aws ec2 reset-instance-attribute --instance-idi-1234567890abcdef0--attributeramdisk-
For API details, see ResetInstanceAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use reset-network-interface-attribute.
- AWS CLI
-
To reset a network interface attribute
The following
reset-network-interface-attributeexample resets the value of the source/destination checking attribute totrue.aws ec2 reset-network-interface-attribute \ --network-interface-ideni-686ea200\ --source-dest-checkThis command produces no output.
-
For API details, see ResetNetworkInterfaceAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use reset-snapshot-attribute.
- AWS CLI
-
To reset a snapshot attribute
This example resets the create volume permissions for snapshot
snap-1234567890abcdef0. If the command succeeds, no output is returned.Command:
aws ec2 reset-snapshot-attribute --snapshot-idsnap-1234567890abcdef0--attributecreateVolumePermission-
For API details, see ResetSnapshotAttribute
in AWS CLI Command Reference.
-
The following code example shows how to use restore-address-to-classic.
- AWS CLI
-
To restore an address to EC2-Classic
This example restores Elastic IP address 198.51.100.0 to the EC2-Classic platform.
Command:
aws ec2 restore-address-to-classic --public-ip198.51.100.0Output:
{ "Status": "MoveInProgress", "PublicIp": "198.51.100.0" }-
For API details, see RestoreAddressToClassic
in AWS CLI Command Reference.
-
The following code example shows how to use restore-image-from-recycle-bin.
- AWS CLI
-
To restore an image from the Recycle Bin
The following
restore-image-from-recycle-binexample restores AMI ami-0111222333444abcd from the Recycle Bin.aws ec2 restore-image-from-recycle-bin \ --image-idami-0111222333444abcdOutput:
{ "Return": true }For more information, see Recover deleted AMIs from the Recycle Bin in the Amazon EBS User Guide.
-
For API details, see RestoreImageFromRecycleBin
in AWS CLI Command Reference.
-
The following code example shows how to use restore-managed-prefix-list-version.
- AWS CLI
-
us-west-2**To restore a prefix list version**
The following
restore-managed-prefix-list-versionrestores the entries from version 1 of the specified prefix list.aws ec2 restore-managed-prefix-list-version \ --prefix-list-idpl-0123456abcabcabc1\ --current-version2\ --previous-version1Output:
{ "PrefixList": { "PrefixListId": "pl-0123456abcabcabc1", "AddressFamily": "IPv4", "State": "restore-in-progress", "PrefixListArn": "arn:aws:ec2:us-west-2:123456789012:prefix-list/pl-0123456abcabcabc1", "PrefixListName": "vpc-cidrs", "MaxEntries": 10, "Version": 2, "OwnerId": "123456789012" } }For more information, see Managed prefix lists in the Amazon VPC User Guide.
-
For API details, see RestoreManagedPrefixListVersion
in AWS CLI Command Reference.
-
The following code example shows how to use restore-snapshot-from-recycle-bin.
- AWS CLI
-
To restore snapshots from the Recycle Bin
The following
restore-snapshot-from-recycle-binexample restores a snapshot from the Recycle Bin. When you restore a snapshot from the Recycle Bin, the snapshot is immediately available for use, and it is removed from the Recycle Bin. You can use a restored snapshot in the same way that you use any other snapshot in your account.aws ec2 restore-snapshot-from-recycle-bin \ --snapshot-idsnap-01234567890abcdefThis command produces no output.
For more information about Recycle Bin, see Recover deleted snapshots from the Recycle Bin in the Amazon EBS User Guide.
-
For API details, see RestoreSnapshotFromRecycleBin
in AWS CLI Command Reference.
-
The following code example shows how to use restore-snapshot-tier.
- AWS CLI
-
Example 1: To permanently restore an archived snapshot
The following
restore-snapshot-tierexample permanently restores the specified snapshot. Specify the--snapshot-idand include thepermanent-restoreoption.aws ec2 restore-snapshot-tier \ --snapshot-idsnap-01234567890abcedf\ --permanent-restoreOutput:
{ "SnapshotId": "snap-01234567890abcedf", "IsPermanentRestore": true }For more information about snapshot archiving, see Archive Amazon EBS snapshots in the Amazon EBS User Guide.
Example 2: To temporarily restore an archived snapshot
The following
restore-snapshot-tierexample temporarily restores the specified snapshot. Omit the--permanent-restoreoption. Specify the--snapshot-idand, fortemporary-restore-days, specify the number of days for which to restore the snapshot.temporary-restore-daysmust be specified in days. The allowed range is1to180. If you do not specify a value, it defaults to1day.aws ec2 restore-snapshot-tier \ --snapshot-idsnap-01234567890abcedf\ --temporary-restore-days5Output:
{ "SnapshotId": "snap-01234567890abcedf", "RestoreDuration": 5, "IsPermanentRestore": false }For more information about snapshot archiving, see Archive Amazon EBS snapshots in the Amazon EBS User Guide.
Example 3: To modify the restore period
The following
restore-snapshot-tierexample changes the restore period for the specified snapshot to10days.aws ec2 restore-snapshot-tier \ --snapshot-idsnap-01234567890abcedf--temporary-restore-days10Output:
{ "SnapshotId": "snap-01234567890abcedf", "RestoreDuration": 10, "IsPermanentRestore": false }For more information about snapshot archiving, see Archive Amazon EBS snapshots in the Amazon EBS User Guide.
Example 4: To modify the restore type
The following
restore-snapshot-tierexample changes the restore type for the specified snapshot from temporary to permanent.aws ec2 restore-snapshot-tier \ --snapshot-idsnap-01234567890abcedf--permanent-restoreOutput:
{ "SnapshotId": "snap-01234567890abcedf", "IsPermanentRestore": true }For more information about snapshot archiving, see Archive Amazon EBS snapshots in the Amazon EBS User Guide.
-
For API details, see RestoreSnapshotTier
in AWS CLI Command Reference.
-
The following code example shows how to use revoke-client-vpn-ingress.
- AWS CLI
-
To revoke an authorization rule for a Client VPN endpoint
The following
revoke-client-vpn-ingressexample revokes a rule for internet access (0.0.0.0/0) for all groups.aws ec2 revoke-client-vpn-ingress \ --client-vpn-endpoint-idcvpn-endpoint-123456789123abcde\ --target-network-cidr0.0.0.0/0--revoke-all-groupsOutput:
{ "Status": { "Code": "revoking" } }For more information, see Authorization Rules in the AWS Client VPN Administrator Guide.
-
For API details, see RevokeClientVpnIngress
in AWS CLI Command Reference.
-
The following code example shows how to use revoke-security-group-egress.
- AWS CLI
-
Example 1: To remove the rule that allows outbound traffic to a specific address range
The following
revoke-security-group-egressexample command removes the rule that grants access to the specified address ranges on TCP port 80.aws ec2 revoke-security-group-egress \ --group-idsg-026c12253ce15eff7\ --ip-permissions[{IpProtocol=tcp,FromPort=80,ToPort=80,IpRanges=[{CidrIp=10.0.0.0/16}]This command produces no output.
For more information, see Security groups in the Amazon EC2 User Guide.
Example 2: To remove the rule that allows outbound traffic to a specific security group
The following
revoke-security-group-egressexample command removes the rule that grants access to the specified security group on TCP port 80.aws ec2 revoke-security-group-egress \ --group-idsg-026c12253ce15eff7\ --ip-permissions '[{"IpProtocol": "tcp", "FromPort": 443, "ToPort": 443,"UserIdGroupPairs": [{"GroupId": "sg-06df23a01ff2df86d"}]}]'This command produces no output.
For more information, see Security groups in the Amazon EC2 User Guide.
-
For API details, see RevokeSecurityGroupEgress
in AWS CLI Command Reference.
-
The following code example shows how to use revoke-security-group-ingress.
- AWS CLI
-
Example 1: To remove a rule from a security group
The following
revoke-security-group-ingressexample removes TCP port 22 access for the203.0.113.0/24address range from the specified security group for a default VPC.aws ec2 revoke-security-group-ingress \ --group-namemySecurityGroup--protocoltcp\ --port22\ --cidr203.0.113.0/24This command produces no output if it succeeds.
For more information, see Security groups in the Amazon EC2 User Guide.
Example 2: To remove a rule using the IP permissions set
The following
revoke-security-group-ingressexample uses theip-permissionsparameter to remove an inbound rule that allows the ICMP messageDestination Unreachable: Fragmentation Needed and Don't Fragment was Set(Type 3, Code 4).aws ec2 revoke-security-group-ingress \ --group-idsg-026c12253ce15eff7\ --ip-permissionsIpProtocol=icmp,FromPort=3,ToPort=4,IpRanges=[{CidrIp=0.0.0.0/0}]This command produces no output if it succeeds.
For more information, see Security groups in the Amazon EC2 User Guide.
-
For API details, see RevokeSecurityGroupIngress
in AWS CLI Command Reference.
-
The following code example shows how to use run-instances.
- AWS CLI
-
Example 1: To launch an instance into a default subnet
The following
run-instancesexample launches a single instance of typet2.microinto the default subnet for the current Region and associates it with the default subnet for the default VPC for the Region. The key pair is optional if you do not plan to connect to your instance using SSH (Linux) or RDP (Windows).aws ec2 run-instances \ --image-idami-0abcdef1234567890\ --instance-typet2.micro\ --key-nameMyKeyPairOutput:
{ "Instances": [ { "AmiLaunchIndex": 0, "ImageId": "ami-0abcdef1234567890", "InstanceId": "i-1231231230abcdef0", "InstanceType": "t2.micro", "KeyName": "MyKeyPair", "LaunchTime": "2018-05-10T08:05:20.000Z", "Monitoring": { "State": "disabled" }, "Placement": { "AvailabilityZone": "us-east-2a", "GroupName": "", "Tenancy": "default" }, "PrivateDnsName": "ip-10-0-0-157.us-east-2.compute.internal", "PrivateIpAddress": "10.0.0.157", "ProductCodes": [], "PublicDnsName": "", "State": { "Code": 0, "Name": "pending" }, "StateTransitionReason": "", "SubnetId": "subnet-04a636d18e83cfacb", "VpcId": "vpc-1234567890abcdef0", "Architecture": "x86_64", "BlockDeviceMappings": [], "ClientToken": "", "EbsOptimized": false, "Hypervisor": "xen", "NetworkInterfaces": [ { "Attachment": { "AttachTime": "2018-05-10T08:05:20.000Z", "AttachmentId": "eni-attach-0e325c07e928a0405", "DeleteOnTermination": true, "DeviceIndex": 0, "Status": "attaching" }, "Description": "", "Groups": [ { "GroupName": "MySecurityGroup", "GroupId": "sg-0598c7d356eba48d7" } ], "Ipv6Addresses": [], "MacAddress": "0a:ab:58:e0:67:e2", "NetworkInterfaceId": "eni-0c0a29997760baee7", "OwnerId": "123456789012", "PrivateDnsName": "ip-10-0-0-157.us-east-2.compute.internal", "PrivateIpAddress": "10.0.0.157", "PrivateIpAddresses": [ { "Primary": true, "PrivateDnsName": "ip-10-0-0-157.us-east-2.compute.internal", "PrivateIpAddress": "10.0.0.157" } ], "SourceDestCheck": true, "Status": "in-use", "SubnetId": "subnet-04a636d18e83cfacb", "VpcId": "vpc-1234567890abcdef0", "InterfaceType": "interface" } ], "RootDeviceName": "/dev/xvda", "RootDeviceType": "ebs", "SecurityGroups": [ { "GroupName": "MySecurityGroup", "GroupId": "sg-0598c7d356eba48d7" } ], "SourceDestCheck": true, "StateReason": { "Code": "pending", "Message": "pending" }, "Tags": [], "VirtualizationType": "hvm", "CpuOptions": { "CoreCount": 1, "ThreadsPerCore": 1 }, "CapacityReservationSpecification": { "CapacityReservationPreference": "open" }, "MetadataOptions": { "State": "pending", "HttpTokens": "optional", "HttpPutResponseHopLimit": 1, "HttpEndpoint": "enabled" } } ], "OwnerId": "123456789012", "ReservationId": "r-02a3f596d91211712" }Example 2: To launch an instance into a non-default subnet and add a public IP address
The following
run-instancesexample requests a public IP address for an instance that you're launching into a nondefault subnet. The instance is associated with the specified security group.aws ec2 run-instances \ --image-idami-0abcdef1234567890\ --instance-typet2.micro\ --subnet-idsubnet-08fc749671b2d077c\ --security-group-idssg-0b0384b66d7d692f9\ --associate-public-ip-address \ --key-nameMyKeyPairFor an example of the output for
run-instances, see Example 1.Example 3: To launch an instance with additional volumes
The following
run-instancesexample uses a block device mapping, specified in mapping.json, to attach additional volumes at launch. A block device mapping can specify EBS volumes, instance store volumes, or both EBS volumes and instance store volumes.aws ec2 run-instances \ --image-idami-0abcdef1234567890\ --instance-typet2.micro\ --subnet-idsubnet-08fc749671b2d077c\ --security-group-idssg-0b0384b66d7d692f9\ --key-nameMyKeyPair\ --block-device-mappingsfile://mapping.jsonContents of
mapping.json. This example adds/dev/sdhan empty EBS volume with a size of 100 GiB.[ { "DeviceName": "/dev/sdh", "Ebs": { "VolumeSize": 100 } } ]Contents of
mapping.json. This example addsephemeral1as an instance store volume.[ { "DeviceName": "/dev/sdc", "VirtualName": "ephemeral1" } ]For an example of the output for
run-instances, see Example 1.For more information about block device mappings, see Block device mapping in the Amazon EC2 User Guide.
Example 4: To launch an instance and add tags on creation
The following
run-instancesexample adds a tag with a key ofwebserverand value ofproductionto the instance. The command also applies a tag with a key ofcost-centerand a value ofcc123to any EBS volume that's created (in this case, the root volume).aws ec2 run-instances \ --image-idami-0abcdef1234567890\ --instance-typet2.micro\ --count1\ --subnet-idsubnet-08fc749671b2d077c\ --key-nameMyKeyPair\ --security-group-idssg-0b0384b66d7d692f9\ --tag-specifications 'ResourceType=instance,Tags=[{Key=webserver,Value=production}]' 'ResourceType=volume,Tags=[{Key=cost-center,Value=cc123}]'For an example of the output for
run-instances, see Example 1.Example 5: To launch an instance with user data
The following
run-instancesexample passes user data in a file calledmy_script.txtthat contains a configuration script for your instance. The script runs at launch.aws ec2 run-instances \ --image-idami-0abcdef1234567890\ --instance-typet2.micro\ --count1\ --subnet-idsubnet-08fc749671b2d077c\ --key-nameMyKeyPair\ --security-group-idssg-0b0384b66d7d692f9\ --user-datafile://my_script.txtFor an example of the output for
run-instances, see Example 1.For more information about instance user data, see Working with instance user data in the Amazon EC2 User Guide.
Example 6: To launch a burstable performance instance
The following
run-instancesexample launches a t2.micro instance with theunlimitedcredit option. When you launch a T2 instance, if you do not specify--credit-specification, the default is thestandardcredit option. When you launch a T3 instance, the default is theunlimitedcredit option.aws ec2 run-instances \ --image-idami-0abcdef1234567890\ --instance-typet2.micro\ --count1\ --subnet-idsubnet-08fc749671b2d077c\ --key-nameMyKeyPair\ --security-group-idssg-0b0384b66d7d692f9\ --credit-specificationCpuCredits=unlimitedFor an example of the output for
run-instances, see Example 1.For more information about burstable performance instances, see Burstable performance instances in the Amazon EC2 User Guide.
-
For API details, see RunInstances
in AWS CLI Command Reference.
-
The following code example shows how to use run-scheduled-instances.
- AWS CLI
-
To launch a Scheduled Instance
This example launches the specified Scheduled Instance in a VPC.
Command:
aws ec2 run-scheduled-instances --scheduled-instance-idsci-1234-1234-1234-1234-123456789012--instance-count1--launch-specificationfile://launch-specification.jsonLaunch-specification.json:
{ "ImageId": "ami-12345678", "KeyName": "my-key-pair", "InstanceType": "c4.large", "NetworkInterfaces": [ { "DeviceIndex": 0, "SubnetId": "subnet-12345678", "AssociatePublicIpAddress": true, "Groups": ["sg-12345678"] } ], "IamInstanceProfile": { "Name": "my-iam-role" } }Output:
{ "InstanceIdSet": [ "i-1234567890abcdef0" ] }This example launches the specified Scheduled Instance in EC2-Classic.
Command:
aws ec2 run-scheduled-instances --scheduled-instance-idsci-1234-1234-1234-1234-123456789012--instance-count1--launch-specificationfile://launch-specification.jsonLaunch-specification.json:
{ "ImageId": "ami-12345678", "KeyName": "my-key-pair", "SecurityGroupIds": ["sg-12345678"], "InstanceType": "c4.large", "Placement": { "AvailabilityZone": "us-west-2b" } "IamInstanceProfile": { "Name": "my-iam-role" } }Output:
{ "InstanceIdSet": [ "i-1234567890abcdef0" ] }-
For API details, see RunScheduledInstances
in AWS CLI Command Reference.
-
The following code example shows how to use search-local-gateway-routes.
- AWS CLI
-
To search for routes in a local gateway route table
The following
search-local-gateway-routesexample searches for static routes in the specified local gateway route table.aws ec2 search-local-gateway-routes \ --local-gateway-route-table-idlgw-rtb-059615ef7dEXAMPLE\ --filters"Name=type,Values=static"Output:
{ "Route": { "DestinationCidrBlock": "0.0.0.0/0", "LocalGatewayVirtualInterfaceGroupId": "lgw-vif-grp-07145b276bEXAMPLE", "Type": "static", "State": "deleted", "LocalGatewayRouteTableId": "lgw-rtb-059615ef7EXAMPLE" } }-
For API details, see SearchLocalGatewayRoutes
in AWS CLI Command Reference.
-
The following code example shows how to use search-transit-gateway-multicast-groups.
- AWS CLI
-
To search one or more transit gateway multicast groups and return the group membership information
The following
search-transit-gateway-multicast-groupsexample returns the group membership of the specified multicast group.aws ec2 search-transit-gateway-multicast-groups \ --transit-gateway-multicast-domain-idtgw-mcast-domain-000fb24d04EXAMPLEOutput:
{ "MulticastGroups": [ { "GroupIpAddress": "224.0.1.0", "TransitGatewayAttachmentId": "tgw-attach-0372e72386EXAMPLE", "SubnetId": "subnet-0187aff814EXAMPLE", "ResourceId": "vpc-0065acced4EXAMPLE", "ResourceType": "vpc", "NetworkInterfaceId": "eni-03847706f6EXAMPLE", "GroupMember": false, "GroupSource": true, "SourceType": "static" } ] }For more information, see Multicast on transit gateways in the Transit Gateways Guide.
-
For API details, see SearchTransitGatewayMulticastGroups
in AWS CLI Command Reference.
-
The following code example shows how to use search-transit-gateway-routes.
- AWS CLI
-
To search for routes in the specified transit gateway route table
The following
search-transit-gateway-routesexample returns all the routes that are of typestaticin the specified route table.aws ec2 search-transit-gateway-routes \ --transit-gateway-route-table-idtgw-rtb-0a823edbdeEXAMPLE\ --filters"Name=type,Values=static"Output:
{ "Routes": [ { "DestinationCidrBlock": "10.0.2.0/24", "TransitGatewayAttachments": [ { "ResourceId": "vpc-4EXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-09b52ccdb5EXAMPLE", "ResourceType": "vpc" } ], "Type": "static", "State": "active" }, { "DestinationCidrBlock": "10.1.0.0/24", "TransitGatewayAttachments": [ { "ResourceId": "vpc-4EXAMPLE", "TransitGatewayAttachmentId": "tgw-attach-09b52ccdb5EXAMPLE", "ResourceType": "vpc" } ], "Type": "static", "State": "active" } ], "AdditionalRoutesAvailable": false }For more information, see Transit gateway route tables in the Transit Gateways Guide.
-
For API details, see SearchTransitGatewayRoutes
in AWS CLI Command Reference.
-
The following code example shows how to use send-diagnostic-interrupt.
- AWS CLI
-
To send a diagnostic interrupt
The following
send-diagnostic-interruptexample sends a diagnostic interrupt to the specified instance.aws ec2 send-diagnostic-interrupt \ --instance-idi-1234567890abcdef0This command produces no output.
-
For API details, see SendDiagnosticInterrupt
in AWS CLI Command Reference.
-
The following code example shows how to use start-instances.
- AWS CLI
-
To start an Amazon EC2 instance
This example starts the specified Amazon EBS-backed instance.
Command:
aws ec2 start-instances --instance-idsi-1234567890abcdef0Output:
{ "StartingInstances": [ { "InstanceId": "i-1234567890abcdef0", "CurrentState": { "Code": 0, "Name": "pending" }, "PreviousState": { "Code": 80, "Name": "stopped" } } ] }For more information, see Stop and Start Your Instance in the Amazon Elastic Compute Cloud User Guide.
-
For API details, see StartInstances
in AWS CLI Command Reference.
-
The following code example shows how to use start-network-insights-access-scope-analysis.
- AWS CLI
-
To start a Network Insights access scope analysis
The following
start-network-insights-access-scope-analysisexample starts the scope analysis in your AWS account.aws ec2 start-network-insights-access-scope-analysis \ --regionus-east-1\ --network-insights-access-scope-idnis-123456789111Output:
{ "NetworkInsightsAccessScopeAnalysis": { "NetworkInsightsAccessScopeAnalysisId": "nisa-123456789222", "NetworkInsightsAccessScopeAnalysisArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-access-scope-analysis/nisa-123456789222", "NetworkInsightsAccessScopeId": "nis-123456789111", "Status": "running", "StartDate": "2022-01-26T00:47:06.814000+00:00" } }For more information, see Getting started with Network Access Analyzer using the AWS CLI in the Network Access Analyzer Guide.
-
For API details, see StartNetworkInsightsAccessScopeAnalysis
in AWS CLI Command Reference.
-
The following code example shows how to use start-network-insights-analysis.
- AWS CLI
-
To analyze a path
The following
start-network-insights-analysisexample analyzes the path between the source and destination. To view the results of the path analysis, use thedescribe-network-insights-analysescommand.aws ec2 start-network-insights-analysis \ --network-insights-path-idnip-0b26f224f1d131fa8Output:
{ "NetworkInsightsAnalysis": { "NetworkInsightsAnalysisId": "nia-02207aa13eb480c7a", "NetworkInsightsAnalysisArn": "arn:aws:ec2:us-east-1:123456789012:network-insights-analysis/nia-02207aa13eb480c7a", "NetworkInsightsPathId": "nip-0b26f224f1d131fa8", "StartDate": "2021-01-20T22:58:37.495Z", "Status": "running" } }For more information, see Getting started using the AWS CLI in the Reachability Analyzer Guide.
-
For API details, see StartNetworkInsightsAnalysis
in AWS CLI Command Reference.
-
The following code example shows how to use start-vpc-endpoint-service-private-dns-verification.
- AWS CLI
-
To initiate the DNS verification process
The following
start-vpc-endpoint-service-private-dns-verificationexample initiates the DNS verification process for the specified endpoint service.aws ec2 start-vpc-endpoint-service-private-dns-verification \ --service-idvpce-svc-071afff70666e61e0This command produces no output.
For more information, see Manage DNS names in the AWS PrivateLink User Guide.
-
For API details, see StartVpcEndpointServicePrivateDnsVerification
in AWS CLI Command Reference.
-
The following code example shows how to use stop-instances.
- AWS CLI
-
Example 1: To stop an Amazon EC2 instance
The following
stop-instancesexample stops the specified Amazon EBS-backed instance.aws ec2 stop-instances \ --instance-idsi-1234567890abcdef0Output:
{ "StoppingInstances": [ { "InstanceId": "i-1234567890abcdef0", "CurrentState": { "Code": 64, "Name": "stopping" }, "PreviousState": { "Code": 16, "Name": "running" } } ] }For more information, see Stop and Start Your Instance in the Amazon Elastic Compute Cloud User Guide.
Example 2: To hibernate an Amazon EC2 instance
The following
stop-instancesexample hibernates Amazon EBS-backed instance if the instance is enabled for hibernation and meets the hibernation prerequisites. After the instance is put into hibernation the instance is stopped.aws ec2 stop-instances \ --instance-idsi-1234567890abcdef0\ --hibernateOutput:
{ "StoppingInstances": [ { "CurrentState": { "Code": 64, "Name": "stopping" }, "InstanceId": "i-1234567890abcdef0", "PreviousState": { "Code": 16, "Name": "running" } } ] }For more information, see Hibernate your On-Demand Linux instance in the Amazon Elastic Cloud Compute User Guide.
-
For API details, see StopInstances
in AWS CLI Command Reference.
-
The following code example shows how to use terminate-client-vpn-connections.
- AWS CLI
-
To terminate a connection to a Client VPN endpoint
The following
terminate-client-vpn-connectionsexample terminates the specified connection to the Client VPN endpoint.aws ec2 terminate-client-vpn-connections \ --client-vpn-endpoint-idvpn-endpoint-123456789123abcde\ --connection-idcvpn-connection-04edd76f5201e0cb8Output:
{ "ClientVpnEndpointId": "vpn-endpoint-123456789123abcde", "ConnectionStatuses": [ { "ConnectionId": "cvpn-connection-04edd76f5201e0cb8", "PreviousStatus": { "Code": "active" }, "CurrentStatus": { "Code": "terminating" } } ] }For more information, see Client Connections in the AWS Client VPN Administrator Guide.
-
For API details, see TerminateClientVpnConnections
in AWS CLI Command Reference.
-
The following code example shows how to use terminate-instances.
- AWS CLI
-
To terminate an Amazon EC2 instance
This example terminates the specified instance.
Command:
aws ec2 terminate-instances --instance-idsi-1234567890abcdef0Output:
{ "TerminatingInstances": [ { "InstanceId": "i-1234567890abcdef0", "CurrentState": { "Code": 32, "Name": "shutting-down" }, "PreviousState": { "Code": 16, "Name": "running" } } ] }For more information, see Using Amazon EC2 Instances in the AWS Command Line Interface User Guide.
-
For API details, see TerminateInstances
in AWS CLI Command Reference.
-
The following code example shows how to use unassign-ipv6-addresses.
- AWS CLI
-
To unassign an IPv6 address from a network interface
This example unassigns the specified IPv6 address from the specified network interface.
Command:
aws ec2 unassign-ipv6-addresses --ipv6-addresses2001:db8:1234:1a00:3304:8879:34cf:4071--network-interface-ideni-23c49b68Output:
{ "NetworkInterfaceId": "eni-23c49b68", "UnassignedIpv6Addresses": [ "2001:db8:1234:1a00:3304:8879:34cf:4071" ] }-
For API details, see UnassignIpv6Addresses
in AWS CLI Command Reference.
-
The following code example shows how to use unassign-private-ip-addresses.
- AWS CLI
-
To unassign a secondary private IP address from a network interface
This example unassigns the specified private IP address from the specified network interface. If the command succeeds, no output is returned.
Command:
aws ec2 unassign-private-ip-addresses --network-interface-ideni-e5aa89a3--private-ip-addresses10.0.0.82-
For API details, see UnassignPrivateIpAddresses
in AWS CLI Command Reference.
-
The following code example shows how to use unassign-private-nat-gateway-address.
- AWS CLI
-
To unassign a private IP address from your private NAT gateway
The following
unassign-private-nat-gateway-addressexample unassigns the specifed IP address from the specified private NAT gateway.aws ec2 unassign-private-nat-gateway-address \ --nat-gateway-idnat-1234567890abcdef0\ --private-ip-addresses10.0.20.197Output:
{ "NatGatewayId": "nat-0ee3edd182361f662", "NatGatewayAddresses": [ { "NetworkInterfaceId": "eni-0065a61b324d1897a", "PrivateIp": "10.0.20.197", "IsPrimary": false, "Status": "unassigning" } ] }For more information, see NAT gateways in the Amazon VPC User Guide.
-
For API details, see UnassignPrivateNatGatewayAddress
in AWS CLI Command Reference.
-
The following code example shows how to use unlock-snapshot.
- AWS CLI
-
To unlock a snapshot
The following
unlock-snapshotexample unlocks the specified snapshot.aws ec2 unlock-snapshot \ --snapshot-idsnap-0b5e733b4a8df6e0dOutput:
{ "SnapshotId": "snap-0b5e733b4a8df6e0d" }For more information, see Snapshot lock in the Amazon EBS User Guide.
-
For API details, see UnlockSnapshot
in AWS CLI Command Reference.
-
The following code example shows how to use unmonitor-instances.
- AWS CLI
-
To disable detailed monitoring for an instance
This example command disables detailed monitoring for the specified instance.
Command:
aws ec2 unmonitor-instances --instance-idsi-1234567890abcdef0Output:
{ "InstanceMonitorings": [ { "InstanceId": "i-1234567890abcdef0", "Monitoring": { "State": "disabling" } } ] }-
For API details, see UnmonitorInstances
in AWS CLI Command Reference.
-
The following code example shows how to use update-security-group-rule-descriptions-egress.
- AWS CLI
-
To update the description of an outbound security group rule
The following
update-security-group-rule-descriptions-egressexample updates the description for the security group rule for the specified port and IPv4 address range. The description 'Outbound HTTP access to server 2' replaces any existing description for the rule.aws ec2 update-security-group-rule-descriptions-egress \ --group-idsg-02f0d35a850ba727f\ --ip-permissions IpProtocol=tcp,FromPort=80,ToPort=80,IpRanges=[{CidrIp=203.0.113.0/24,Description="Outbound HTTP access to server 2"}]Output:
{ "Return": true }For more information, see Security group rules in the Amazon EC2 User Guide.
-
For API details, see UpdateSecurityGroupRuleDescriptionsEgress
in AWS CLI Command Reference.
-
The following code example shows how to use update-security-group-rule-descriptions-ingress.
- AWS CLI
-
Example 1: To update the description of an inbound security group rule with a CIDR source
The following
update-security-group-rule-descriptions-ingressexample updates the description for the security group rule for the specified port and IPv4 address range. The description 'SSH access from ABC office' replaces any existing description for the rule.aws ec2 update-security-group-rule-descriptions-ingress \ --group-idsg-02f0d35a850ba727f\ --ip-permissions IpProtocol=tcp,FromPort=22,ToPort=22,IpRanges='[{CidrIp=203.0.113.0/16,Description="SSH access from corpnet"}]'Output:
{ "Return": true }For more information, see Security group rules in the Amazon EC2 User Guide.
Example 2: To update the description of an inbound security group rule with a prefix list source
The following
update-security-group-rule-descriptions-ingressexample updates the description for the security group rule for the specified port and prefix list. The description 'SSH access from ABC office' replaces any existing description for the rule.aws ec2 update-security-group-rule-descriptions-ingress \ --group-idsg-02f0d35a850ba727f\ --ip-permissions IpProtocol=tcp,FromPort=22,ToPort=22,PrefixListIds='[{PrefixListId=pl-12345678,Description="SSH access from corpnet"}]'Output:
{ "Return": true }For more information, see Security group rules in the Amazon EC2 User Guide.
-
For API details, see UpdateSecurityGroupRuleDescriptionsIngress
in AWS CLI Command Reference.
-
The following code example shows how to use withdraw-byoip-cidr.
- AWS CLI
-
To stop advertising an address range
The following
withdraw-byoip-cidrexample stops advertising the specified address range.aws ec2 withdraw-byoip-cidr --cidr203.0.113.25/24Output:
{ "ByoipCidr": { "Cidr": "203.0.113.25/24", "StatusMessage": "ipv4pool-ec2-1234567890abcdef0", "State": "advertised" } }-
For API details, see WithdrawByoipCidr
in AWS CLI Command Reference.
-