Logging AWS CodeConnections API calls with AWS CloudTrail
AWS CodeConnections is integrated with AWS CloudTrail, a service that provides a record of actions taken by a user, role, or an AWS service. CloudTrail captures all API calls for notifications as events. The calls captured include calls from the Developer Tools console and code calls to the AWS CodeConnections API operations.
If you create a trail, you can enable continuous delivery of CloudTrail events to an Amazon Simple Storage Service (Amazon S3) bucket, including events for notifications. If you don't configure a trail, you can still view the most recent events in the CloudTrail console in Event history. Using the information collected by CloudTrail, you can determine the request that was made to AWS CodeConnections, the IP address from which the request was made, who made the request, when it was made, and other details.
For more information, see the AWS CloudTrail User Guide.
AWS CodeConnections information in CloudTrail
CloudTrail is enabled on your AWS account when you create the account. When activity occurs in AWS CodeConnections, that activity is recorded in a CloudTrail event along with other AWS service events in Event history. You can view, search, and download recent events in your AWS account. For more information, see Viewing events with CloudTrail event history in the AWS CloudTrail User Guide.
For an ongoing record of events in your AWS account, including events for AWS CodeConnections, create a trail. A trail enables CloudTrail to deliver log files to an Amazon S3 bucket. By default, when you create a trail in the console, the trail applies to all AWS Regions. The trail logs events from all Regions in the AWS partition and delivers the log files to the Amazon S3 bucket that you specify. Additionally, you can configure other AWS services to further analyze and act upon the event data collected in CloudTrail logs.
For more information, see the following topics in the AWS CloudTrail User Guide:
All AWS CodeConnections actions are logged by CloudTrail and are documented in the AWS CodeConnections API reference. For example, calls to the
CreateConnection
, DeleteConnection
and
GetConnection
actions generate entries in the CloudTrail log files.
Every event or log entry contains information about who generated the request. The identity information helps you determine the following:
-
Whether the request was made with root or other IAM credentials.
-
Whether the request was made with temporary security credentials for a role or federated user.
-
Whether the request was made by another AWS service.
For more information, see the CloudTrail userIdentity element.
Understanding log file entries
A trail is a configuration that enables delivery of events as log files to an Amazon S3 bucket that you specify. CloudTrail log files contain one or more log entries. An event represents a single request from any source and includes information about the requested action, the date and time of the action, request parameters, and so on. CloudTrail log files aren't an ordered stack trace of the public API calls, so they don't appear in any specific order.
CreateConnection
example
The following example shows a CloudTrail log entry that demonstrates the
CreateConnection
action.
{ "EventId": "b4374fde-c544-4d43-b511-7d899568e55a", "EventName": "CreateConnection", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-09T15:13:46-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:user/Mary_Major", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-09T23:03:08Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-09T23:13:46Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "CreateConnection", "awsRegion": "us-east-1", "sourceIPAddress": "
IP
", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.create-connection", "requestParameters": { "providerType": "GitHub", "connectionName": "my-connection" }, "responseElements": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/df03df74-8e05-45cf-b420-b39e389dd264" }, "requestID": "57640a88-97b7-481d-9665-cfd79a681379", "eventID": "b4374fde-c544-4d43-b511-7d899568e55a", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
CreateHost
example
The following example shows a CloudTrail log entry that demonstrates the
CreateHost
action.
{ "EventId": "af4ce349-9f21-43fb-8003-267fbf9b1a93", "EventName": "CreateHost", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:43:06-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:43:06Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "CreateHost", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.137", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.create-host", "requestParameters": { "name": "Demo1", "providerType": "GitHubEnterpriseServer", "providerEndpoint": "IP" }, "responseElements": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-EXAMPLE" }, "requestID": "974459b3-8a04-4cff-9c8f-0c88647831cc", "eventID": "af4ce349-9f21-43fb-8003-267fbf9b1a93", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
CreateSyncConfiguration
example
The following example shows a CloudTrail log entry that demonstrates the
CreateSyncConfiguration
action.
{ "EventId": "be1397e1-eefb-49f0-b4ee-2708c45e94e7", "EventName": "CreateSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:38:30+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:38:30Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "CreateSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.create-sync-configuration", "requestParameters": { "branch": "master", "configFile": "filename", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" }, "responseElements": { "syncConfiguration": { "branch": "main", "configFile": "filename", "ownerId": "owner_ID", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } }, "requestID": "bad2f662-3f2a-42c0-b638-6115384896f6", "eventID": "be1397e1-eefb-49f0-b4ee-2708c45e94e7", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
DeleteConnection
example
The following example shows a CloudTrail log entry that demonstrates the
DeleteConnection
action.
{ "EventId": "672837cd-f977-4fe2-95c7-14280b2af76c", "EventName": "DeleteConnection", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-10T13:00:50-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::001919387613:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-10T20:41:16Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-10T21:00:50Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteConnection", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.delete-connection", "requestParameters": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/df03df74-8e05-45cf-b420-b39e389dd264" }, "responseElements": null, "requestID": "4f26ceab-d665-41df-9e15-5ed0fbb4eca6", "eventID": "672837cd-f977-4fe2-95c7-14280b2af76c", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
DeleteHost
example
The following example shows a CloudTrail log entry that demonstrates the
DeleteHost
action.
{ "EventId": "6018ba5c-6f24-4a30-b201-16ec19a1687a", "EventName": "DeleteHost", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:56:47-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:56:47Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteHost", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.delete-host", "requestParameters": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-EXAMPLE" }, "responseElements": null, "requestID": "1b244528-143a-4028-b9a4-9479e342bce5", "eventID": "6018ba5c-6f24-4a30-b201-16ec19a1687a", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
DeleteSyncConfiguration
example
The following example shows a CloudTrail log entry that demonstrates the
DeleteSyncConfiguration
action.
{ "EventId": "588660c7-3202-4998-a906-7bb72bcf4438", "EventName": "DeleteSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:41:59+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:41:59Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.142", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.delete-sync-configuration", "requestParameters": { "syncType": "CFN_STACK_SYNC", "resourceName": "mystack" }, "responseElements": null, "requestID": "221e0b1c-a50e-4cf0-ab7d-780154e29c94", "eventID": "588660c7-3202-4998-a906-7bb72bcf4438", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
GetConnection
example
The following example shows a CloudTrail log entry that demonstrates the
GetConnection
action.
{ "EventId": "672837cd-f977-4fe2-95c7-14280b2af76c", "EventName": "DeleteConnection", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-10T13:00:50-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-10T20:41:16Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-10T21:00:50Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteConnection", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.delete-connection", "requestParameters": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/df03df74-8e05-45cf-b420-b39e389dd264" }, "responseElements": null, "requestID": "4f26ceab-d665-41df-9e15-5ed0fbb4eca6", "eventID": "672837cd-f977-4fe2-95c7-14280b2af76c", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "001919387613", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
GetHost
example
The following example shows a CloudTrail log entry that demonstrates the
GetHost
action.
{ "EventId": "faa147e7-fe7c-4ab9-a11b-2568a2883c01", "EventName": "GetHost", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:44:34-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:44:34Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetHost", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.137", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.get-host", "requestParameters": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-EXAMPLE" }, "responseElements": null, "requestID": "0ad61bb6-f88f-4f96-92fe-997f017ec2bb", "eventID": "faa147e7-fe7c-4ab9-a11b-2568a2883c01", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
GetRepositoryLink
example
The following example shows a CloudTrail log entry that demonstrates the
GetRepositoryLink
action.
{ "EventId": "b46acb67-3612-41c7-8987-adb6c9ed4ad4", "EventName": "GetRepositoryLink", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T02:59:28+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T02:58:52Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T02:59:28Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetRepositoryLink", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-repository-link", "requestParameters": { "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173" }, "responseElements": { "repositoryLinkInfo": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "ownerId": "123456789012", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/6053346f-8a33-4edb-9397-10394b695173", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo" } }, "requestID": "d46704dd-dbe9-462f-96a6-022a8d319fd1", "eventID": "b46acb67-3612-41c7-8987-adb6c9ed4ad4", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-ea-1.codeconnections.aws.dev" } } }
GetRepositorySyncStatus
example
The following example shows a CloudTrail log entry that demonstrates the GetRepositorySyncStatus action.
{ "EventId": "3e183b74-d8c4-4ad3-9de3-6b5721c522e9", "EventName": "GetRepositorySyncStatus", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:41:44+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:41:44Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetRepositorySyncStatus", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.138", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-repository-sync-status", "errorCode": "ResourceNotFoundException", "errorMessage": "Could not find a sync status for repository link:6053346f-8a33-4edb-9397-10394b695173", "requestParameters": { "branch": "feature-branch", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "syncType": "CFN_STACK_SYNC" }, "responseElements": null, "requestID": "e0cee3ee-31e8-4ef5-b749-96cdcabbe36f", "eventID": "3e183b74-d8c4-4ad3-9de3-6b5721c522e9", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
GetResourceSyncStatus
example
The following example shows a CloudTrail log entry that demonstrates the GetResourceSyncStatus action.
{ "EventId": "9c47054e-f6f6-4345-96d0-9a5af3954a8d", "EventName": "GetResourceSyncStatus", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:44:11+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:44:11Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetResourceSyncStatus", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-resource-sync-status", "requestParameters": { "resourceName": "mystack", "syncType": "CFN_STACK_SYNC" }, "responseElements": null, "requestID": "e74b5503-d651-4920-9fd2-0f40fb5681e0", "eventID": "9c47054e-f6f6-4345-96d0-9a5af3954a8d", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
GetSyncBlockerSummary
example
The following example shows a CloudTrail log entry that demonstrates the GetSyncBlockerSummary action.
{ "EventId": "c16699ba-a788-476d-8c6c-47511d76309e", "EventName": "GetSyncBlockerSummary", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:03:02+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:03:02Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetSyncBlockerSummary", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-sync-blocker-summary", "requestParameters": { "syncType": "CFN_STACK_SYNC", "resourceName": "mystack" }, "responseElements": { "syncBlockerSummary": { "resourceName": "mystack", "latestBlockers": [] } }, "requestID": "04240091-eb25-4138-840d-776f8e5375b4", "eventID": "c16699ba-a788-476d-8c6c-47511d76309e", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
GetSyncConfiguration
example
The following example shows a CloudTrail log entry that demonstrates the GetSyncConfiguration action.
{ "EventId": "bab9aa16-4553-4206-a1ea-88219233dd25", "EventName": "GetSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:40:40+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:40:40Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.142", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.get-sync-configuration", "requestParameters": { "syncType": "CFN_STACK_SYNC", "resourceName": "mystack" }, "responseElements": { "syncConfiguration": { "branch": "main", "configFile": "filename", "ownerId": "123456789012", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } }, "requestID": "0aa8e43a-6e34-4d8f-89fb-5c2d01964b35", "eventID": "bab9aa16-4553-4206-a1ea-88219233dd25", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
ListConnections
example
The following example shows a CloudTrail log entry that demonstrates the ListConnections action.
{ "EventId": "3f8d80fe-fbe1-4755-903c-4f58fc8262fa", "EventName": "ListConnections", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-08T14:11:23-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-08T22:11:02Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-08T22:11:23Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListConnections", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/1.18.147 Python/2.7.18 Linux/5.10.201-168.748.amzn2int.x86_64 botocore/1.18.6", "requestParameters": { "maxResults": 50 }, "responseElements": null, "requestID": "5d456d59-3e92-44be-b941-a429df59e90b", "eventID": "3f8d80fe-fbe1-4755-903c-4f58fc8262fa", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
ListHosts
example
The following example shows a CloudTrail log entry that demonstrates the ListHosts action.
{ "EventId": "f6e9e831-feaf-4ad1-ac47-51681109c401", "EventName": "ListHosts", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T13:00:55-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T21:00:55Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListHosts", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.list-hosts", "requestParameters": { "maxResults": 50 }, "responseElements": null, "requestID": "ea87e2cf-6bf1-4cc7-9666-f3fad85d6d83", "eventID": "f6e9e831-feaf-4ad1-ac47-51681109c401", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
ListRepositoryLinks
example
The following example shows a CloudTrail log entry that demonstrates the ListRepositoryLinks action.
{ "EventId": "4f714bbb-0716-4f6e-9868-9b379b30757f", "EventName": "ListRepositoryLinks", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T01:57:29+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T01:43:49Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T01:57:29Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListRepositoryLinks", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.list-repository-links", "requestParameters": { "maxResults": 50 }, "responseElements": { "repositoryLinks": [ { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/001f5be2-a661-46a4-b96b-4d277cac8b6e", "ownerId": "123456789012", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/be8f2017-b016-4a77-87b4-608054f70e77", "repositoryLinkId": "be8f2017-b016-4a77-87b4-608054f70e77", "repositoryName": "MyGitHubRepo" }, { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/6053346f-8a33-4edb-9397-10394b695173", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo" } ] }, "requestID": "7c8967a9-ec15-42e9-876b-0ef58681ec55", "eventID": "4f714bbb-0716-4f6e-9868-9b379b30757f", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
ListRepositorySyncDefinitions
example
The following example shows a CloudTrail log entry that demonstrates the ListRepositorySyncDefinitions action.
{ "EventId": "12e52dbb-b00d-49ad-875a-3efec36e5aa1", "EventName": "ListRepositorySyncDefinitions", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T16:56:19+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T16:43:03Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T16:56:19Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListRepositorySyncDefinitions", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.list-repository-sync-definitions", "requestParameters": { "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "syncType": "CFN_STACK_SYNC", "maxResults": 50 }, "responseElements": { "repositorySyncDefinitions": [] }, "requestID": "df31d11d-5dc7-459b-9a8f-396b4769cdd9", "eventID": "12e52dbb-b00d-49ad-875a-3efec36e5aa1", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } }
ListSyncConfigurations
example
The following example shows a CloudTrail log entry that demonstrates the ListSyncConfigurations action.
{ "EventId": "aa4ae557-ec31-4151-8d21-9e74dd01344c", "EventName": "ListSyncConfigurations", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:42:06+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:42:06Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListSyncConfigurations", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.804.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/offcommand/codeconnections.list-sync-configurations", "requestParameters": { "maxResults": 50, "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "syncType": "CFN_STACK_SYNC" }, "responseElements": { "syncConfigurations": [ { "branch": "feature-branch", "configFile": "filename.yaml", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "dkstacksync", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } ] }, "requestID": "7dd220b5-fc0f-4023-aaa0-9555cfe759df", "eventID": "aa4ae557-ec31-4151-8d21-9e74dd01344c", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
ListTagsForResource
example
The following example shows a CloudTrail log entry that demonstrates the ListTagsForResource action.
{ "EventId": "fc501054-d68a-4325-824c-0e34062ef040", "EventName": "ListTagsForResource", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T17:16:56+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "dMary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T16:43:03Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T17:16:56Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListTagsForResource", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.list-tags-for-resource", "requestParameters": { "resourceArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/9703702f-bebe-41b7-8fc4-8e6d2430a330" }, "responseElements": null, "requestID": "994584a3-4807-47f2-bb1b-a64f0af6c250", "eventID": "fc501054-d68a-4325-824c-0e34062ef040", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
TagResource
example
The following example shows a CloudTrail log entry that demonstrates the TagResource action.
{ "EventId": "b7fbc943-2dd1-4c5b-a5ad-fc6d60a011f1", "EventName": "TagResource", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:22:11-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:22:11Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "TagResource", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.tag-resource", "requestParameters": { "resourceArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/8dcf69d1-3316-4392-ae09-71e038adb6ed", "tags": [ { "key": "Demo1", "value": "hhvh1" } ] }, "responseElements": null, "requestID": "ba382c33-7124-48c8-a23a-25816ce27604", "eventID": "b7fbc943-2dd1-4c5b-a5ad-fc6d60a011f1", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
UnTagResource
example
The following example shows a CloudTrail log entry that demonstrates the UntagResource action.
{ "EventId": "8a85cdee-2586-4679-be18-eec34204bc7e", "EventName": "UntagResource", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:31:14-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:31:14Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UntagResource", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.untag-resource", "requestParameters": { "resourceArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/8dcf69d1-3316-4392-ae09-71e038adb6ed", "tagKeys": [ "Project", "ReadOnly" ] }, "responseElements": null, "requestID": "05ef26a4-8c39-4f72-89bf-0c056c51b8d7", "eventID": "8a85cdee-2586-4679-be18-eec34204bc7e", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
UpdateHost
example
The following example shows a CloudTrail log entry that demonstrates the UpdateHost action.
"Events": [{ "EventId": "4307cf7d-6d1c-40d9-a659-1bb41b31a2b6", "EventName": "UpdateHost", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:54:32-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:54:32Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateHost", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.update-host", "requestParameters": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-34e70ecb", "providerEndpoint": "https://54.218.245.167" }, "responseElements": null, "requestID": "b17f46ac-1acb-44ab-a9f5-c35c20233441", "eventID": "4307cf7d-6d1c-40d9-a659-1bb41b31a2b6", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" }
UpdateRepositoryLink
example
The following example shows a CloudTrail log entry that demonstrates the UpdateRepositoryLink action.
{ "EventId": "be358c9a-5a8f-467e-8585-2860070be4fe", "EventName": "UpdateRepositoryLink", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T02:03:24+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T01:43:49Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T02:03:24Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateRepositoryLink", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.update-repository-link", "requestParameters": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173" }, "responseElements": { "repositoryLinkInfo": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/6053346f-8a33-4edb-9397-10394b695173", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo" } }, "additionalEventData": { "providerAction": "UpdateRepositoryLink" }, "requestID": "e01eee49-9393-4983-89e4-d1b3353a70d9", "eventID": "be358c9a-5a8f-467e-8585-2860070be4fe", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
UpdateSyncBlocker
example
The following example shows a CloudTrail log entry that demonstrates the UpdateSyncBlocker action.
{ "EventId": "211d19db-9f71-4d93-bf90-10f9ddefed88", "EventName": "UpdateSyncBlocker", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:01:05+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:01:05Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateSyncBlocker", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.update-sync-blocker", "requestParameters": { "id": "ID", "syncType": "CFN_STACK_SYNC", "resourceName": "mystack", "resolvedReason": "Reason" }, "responseElements": null, "requestID": "eea03b39-b299-4099-ba55-608480f8d96d", "eventID": "211d19db-9f71-4d93-bf90-10f9ddefed88", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }
UpdateSyncConfiguration
example
The following example shows a CloudTrail log entry that demonstrates the UpdateSyncConfiguration action.
{ "EventId": "d961c94f-1881-4fe8-83bf-d04cb9f22577", "EventName": "UpdateSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:40:55+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:40:55Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.update-sync-configuration", "requestParameters": { "branch": "feature-branch", "resourceName": "mystack", "syncType": "CFN_STACK_SYNC" }, "responseElements": { "syncConfiguration": { "branch": "feature-branch", "configFile": "filename", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } }, "requestID": "2ca545ef-4395-4e1f-b14a-2750481161d6", "eventID": "d961c94f-1881-4fe8-83bf-d04cb9f22577", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }