Logging AWS CodeConnections API calls with AWS CloudTrail - Developer Tools console

Logging AWS CodeConnections API calls with AWS CloudTrail

AWS CodeConnections is integrated with AWS CloudTrail, a service that provides a record of actions taken by a user, role, or an AWS service. CloudTrail captures all API calls for notifications as events. The calls captured include calls from the Developer Tools console and code calls to the AWS CodeConnections API operations.

If you create a trail, you can enable continuous delivery of CloudTrail events to an Amazon Simple Storage Service (Amazon S3) bucket, including events for notifications. If you don't configure a trail, you can still view the most recent events in the CloudTrail console in Event history. Using the information collected by CloudTrail, you can determine the request that was made to AWS CodeConnections, the IP address from which the request was made, who made the request, when it was made, and other details.

For more information, see the AWS CloudTrail User Guide.

AWS CodeConnections information in CloudTrail

CloudTrail is enabled on your AWS account when you create the account. When activity occurs in AWS CodeConnections, that activity is recorded in a CloudTrail event along with other AWS service events in Event history. You can view, search, and download recent events in your AWS account. For more information, see Viewing events with CloudTrail event history in the AWS CloudTrail User Guide.

For an ongoing record of events in your AWS account, including events for AWS CodeConnections, create a trail. A trail enables CloudTrail to deliver log files to an Amazon S3 bucket. By default, when you create a trail in the console, the trail applies to all AWS Regions. The trail logs events from all Regions in the AWS partition and delivers the log files to the Amazon S3 bucket that you specify. Additionally, you can configure other AWS services to further analyze and act upon the event data collected in CloudTrail logs.

For more information, see the following topics in the AWS CloudTrail User Guide:

All AWS CodeConnections actions are logged by CloudTrail and are documented in the AWS CodeConnections API reference. For example, calls to the CreateConnection, DeleteConnection and GetConnection actions generate entries in the CloudTrail log files.

Every event or log entry contains information about who generated the request. The identity information helps you determine the following:

  • Whether the request was made with root or other IAM credentials.

  • Whether the request was made with temporary security credentials for a role or federated user.

  • Whether the request was made by another AWS service.

For more information, see the CloudTrail userIdentity element.

Understanding log file entries

A trail is a configuration that enables delivery of events as log files to an Amazon S3 bucket that you specify. CloudTrail log files contain one or more log entries. An event represents a single request from any source and includes information about the requested action, the date and time of the action, request parameters, and so on. CloudTrail log files aren't an ordered stack trace of the public API calls, so they don't appear in any specific order.

CreateConnection example

The following example shows a CloudTrail log entry that demonstrates the CreateConnection action.

{ "EventId": "b4374fde-c544-4d43-b511-7d899568e55a", "EventName": "CreateConnection", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-09T15:13:46-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:user/Mary_Major", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-09T23:03:08Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-09T23:13:46Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "CreateConnection", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.create-connection", "requestParameters": { "providerType": "GitHub", "connectionName": "my-connection" }, "responseElements": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/df03df74-8e05-45cf-b420-b39e389dd264" }, "requestID": "57640a88-97b7-481d-9665-cfd79a681379", "eventID": "b4374fde-c544-4d43-b511-7d899568e55a", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

CreateHost example

The following example shows a CloudTrail log entry that demonstrates the CreateHost action.

{ "EventId": "af4ce349-9f21-43fb-8003-267fbf9b1a93", "EventName": "CreateHost", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:43:06-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:43:06Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "CreateHost", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.137", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.create-host", "requestParameters": { "name": "Demo1", "providerType": "GitHubEnterpriseServer", "providerEndpoint": "IP" }, "responseElements": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-EXAMPLE" }, "requestID": "974459b3-8a04-4cff-9c8f-0c88647831cc", "eventID": "af4ce349-9f21-43fb-8003-267fbf9b1a93", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

CreateSyncConfiguration example

The following example shows a CloudTrail log entry that demonstrates the CreateSyncConfiguration action.

{ "EventId": "be1397e1-eefb-49f0-b4ee-2708c45e94e7", "EventName": "CreateSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:38:30+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:38:30Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "CreateSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.create-sync-configuration", "requestParameters": { "branch": "master", "configFile": "filename", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" }, "responseElements": { "syncConfiguration": { "branch": "main", "configFile": "filename", "ownerId": "owner_ID", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } }, "requestID": "bad2f662-3f2a-42c0-b638-6115384896f6", "eventID": "be1397e1-eefb-49f0-b4ee-2708c45e94e7", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

DeleteConnection example

The following example shows a CloudTrail log entry that demonstrates the DeleteConnection action.

{ "EventId": "672837cd-f977-4fe2-95c7-14280b2af76c", "EventName": "DeleteConnection", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-10T13:00:50-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::001919387613:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-10T20:41:16Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-10T21:00:50Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteConnection", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.delete-connection", "requestParameters": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/df03df74-8e05-45cf-b420-b39e389dd264" }, "responseElements": null, "requestID": "4f26ceab-d665-41df-9e15-5ed0fbb4eca6", "eventID": "672837cd-f977-4fe2-95c7-14280b2af76c", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

DeleteHost example

The following example shows a CloudTrail log entry that demonstrates the DeleteHost action.

{ "EventId": "6018ba5c-6f24-4a30-b201-16ec19a1687a", "EventName": "DeleteHost", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:56:47-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:56:47Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteHost", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.delete-host", "requestParameters": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-EXAMPLE" }, "responseElements": null, "requestID": "1b244528-143a-4028-b9a4-9479e342bce5", "eventID": "6018ba5c-6f24-4a30-b201-16ec19a1687a", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

DeleteSyncConfiguration example

The following example shows a CloudTrail log entry that demonstrates the DeleteSyncConfiguration action.

{ "EventId": "588660c7-3202-4998-a906-7bb72bcf4438", "EventName": "DeleteSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:41:59+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:41:59Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.142", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.delete-sync-configuration", "requestParameters": { "syncType": "CFN_STACK_SYNC", "resourceName": "mystack" }, "responseElements": null, "requestID": "221e0b1c-a50e-4cf0-ab7d-780154e29c94", "eventID": "588660c7-3202-4998-a906-7bb72bcf4438", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

GetConnection example

The following example shows a CloudTrail log entry that demonstrates the GetConnection action.

{ "EventId": "672837cd-f977-4fe2-95c7-14280b2af76c", "EventName": "DeleteConnection", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-10T13:00:50-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-10T20:41:16Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-10T21:00:50Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "DeleteConnection", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.delete-connection", "requestParameters": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/df03df74-8e05-45cf-b420-b39e389dd264" }, "responseElements": null, "requestID": "4f26ceab-d665-41df-9e15-5ed0fbb4eca6", "eventID": "672837cd-f977-4fe2-95c7-14280b2af76c", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "001919387613", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

GetHost example

The following example shows a CloudTrail log entry that demonstrates the GetHost action.

{ "EventId": "faa147e7-fe7c-4ab9-a11b-2568a2883c01", "EventName": "GetHost", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:44:34-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:44:34Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetHost", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.137", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.get-host", "requestParameters": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-EXAMPLE" }, "responseElements": null, "requestID": "0ad61bb6-f88f-4f96-92fe-997f017ec2bb", "eventID": "faa147e7-fe7c-4ab9-a11b-2568a2883c01", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

GetRepositoryLink example

The following example shows a CloudTrail log entry that demonstrates the GetRepositoryLink action.

{ "EventId": "b46acb67-3612-41c7-8987-adb6c9ed4ad4", "EventName": "GetRepositoryLink", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T02:59:28+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T02:58:52Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T02:59:28Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetRepositoryLink", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-repository-link", "requestParameters": { "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173" }, "responseElements": { "repositoryLinkInfo": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "ownerId": "123456789012", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/6053346f-8a33-4edb-9397-10394b695173", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo" } }, "requestID": "d46704dd-dbe9-462f-96a6-022a8d319fd1", "eventID": "b46acb67-3612-41c7-8987-adb6c9ed4ad4", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-ea-1.codeconnections.aws.dev" } } }

GetRepositorySyncStatus example

The following example shows a CloudTrail log entry that demonstrates the GetRepositorySyncStatus action.

{ "EventId": "3e183b74-d8c4-4ad3-9de3-6b5721c522e9", "EventName": "GetRepositorySyncStatus", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:41:44+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:41:44Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetRepositorySyncStatus", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.138", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-repository-sync-status", "errorCode": "ResourceNotFoundException", "errorMessage": "Could not find a sync status for repository link:6053346f-8a33-4edb-9397-10394b695173", "requestParameters": { "branch": "feature-branch", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "syncType": "CFN_STACK_SYNC" }, "responseElements": null, "requestID": "e0cee3ee-31e8-4ef5-b749-96cdcabbe36f", "eventID": "3e183b74-d8c4-4ad3-9de3-6b5721c522e9", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

GetResourceSyncStatus example

The following example shows a CloudTrail log entry that demonstrates the GetResourceSyncStatus action.

{ "EventId": "9c47054e-f6f6-4345-96d0-9a5af3954a8d", "EventName": "GetResourceSyncStatus", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:44:11+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:44:11Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetResourceSyncStatus", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-resource-sync-status", "requestParameters": { "resourceName": "mystack", "syncType": "CFN_STACK_SYNC" }, "responseElements": null, "requestID": "e74b5503-d651-4920-9fd2-0f40fb5681e0", "eventID": "9c47054e-f6f6-4345-96d0-9a5af3954a8d", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

GetSyncBlockerSummary example

The following example shows a CloudTrail log entry that demonstrates the GetSyncBlockerSummary action.

{ "EventId": "c16699ba-a788-476d-8c6c-47511d76309e", "EventName": "GetSyncBlockerSummary", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:03:02+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:03:02Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetSyncBlockerSummary", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.get-sync-blocker-summary", "requestParameters": { "syncType": "CFN_STACK_SYNC", "resourceName": "mystack" }, "responseElements": { "syncBlockerSummary": { "resourceName": "mystack", "latestBlockers": [] } }, "requestID": "04240091-eb25-4138-840d-776f8e5375b4", "eventID": "c16699ba-a788-476d-8c6c-47511d76309e", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

GetSyncConfiguration example

The following example shows a CloudTrail log entry that demonstrates the GetSyncConfiguration action.

{ "EventId": "bab9aa16-4553-4206-a1ea-88219233dd25", "EventName": "GetSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:40:40+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:40:40Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "GetSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "52.94.133.142", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.get-sync-configuration", "requestParameters": { "syncType": "CFN_STACK_SYNC", "resourceName": "mystack" }, "responseElements": { "syncConfiguration": { "branch": "main", "configFile": "filename", "ownerId": "123456789012", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } }, "requestID": "0aa8e43a-6e34-4d8f-89fb-5c2d01964b35", "eventID": "bab9aa16-4553-4206-a1ea-88219233dd25", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

ListConnections example

The following example shows a CloudTrail log entry that demonstrates the ListConnections action.

{ "EventId": "3f8d80fe-fbe1-4755-903c-4f58fc8262fa", "EventName": "ListConnections", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-08T14:11:23-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-08T22:11:02Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-08T22:11:23Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListConnections", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/1.18.147 Python/2.7.18 Linux/5.10.201-168.748.amzn2int.x86_64 botocore/1.18.6", "requestParameters": { "maxResults": 50 }, "responseElements": null, "requestID": "5d456d59-3e92-44be-b941-a429df59e90b", "eventID": "3f8d80fe-fbe1-4755-903c-4f58fc8262fa", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

ListHosts example

The following example shows a CloudTrail log entry that demonstrates the ListHosts action.

{ "EventId": "f6e9e831-feaf-4ad1-ac47-51681109c401", "EventName": "ListHosts", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T13:00:55-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T21:00:55Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListHosts", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.list-hosts", "requestParameters": { "maxResults": 50 }, "responseElements": null, "requestID": "ea87e2cf-6bf1-4cc7-9666-f3fad85d6d83", "eventID": "f6e9e831-feaf-4ad1-ac47-51681109c401", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

ListRepositoryLinks example

The following example shows a CloudTrail log entry that demonstrates the ListRepositoryLinks action.

{ "EventId": "4f714bbb-0716-4f6e-9868-9b379b30757f", "EventName": "ListRepositoryLinks", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T01:57:29+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T01:43:49Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T01:57:29Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListRepositoryLinks", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.list-repository-links", "requestParameters": { "maxResults": 50 }, "responseElements": { "repositoryLinks": [ { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/001f5be2-a661-46a4-b96b-4d277cac8b6e", "ownerId": "123456789012", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/be8f2017-b016-4a77-87b4-608054f70e77", "repositoryLinkId": "be8f2017-b016-4a77-87b4-608054f70e77", "repositoryName": "MyGitHubRepo" }, { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/6053346f-8a33-4edb-9397-10394b695173", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo" } ] }, "requestID": "7c8967a9-ec15-42e9-876b-0ef58681ec55", "eventID": "4f714bbb-0716-4f6e-9868-9b379b30757f", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

ListRepositorySyncDefinitions example

The following example shows a CloudTrail log entry that demonstrates the ListRepositorySyncDefinitions action.

{ "EventId": "12e52dbb-b00d-49ad-875a-3efec36e5aa1", "EventName": "ListRepositorySyncDefinitions", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T16:56:19+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T16:43:03Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T16:56:19Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListRepositorySyncDefinitions", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.list-repository-sync-definitions", "requestParameters": { "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "syncType": "CFN_STACK_SYNC", "maxResults": 50 }, "responseElements": { "repositorySyncDefinitions": [] }, "requestID": "df31d11d-5dc7-459b-9a8f-396b4769cdd9", "eventID": "12e52dbb-b00d-49ad-875a-3efec36e5aa1", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } }

ListSyncConfigurations example

The following example shows a CloudTrail log entry that demonstrates the ListSyncConfigurations action.

{ "EventId": "aa4ae557-ec31-4151-8d21-9e74dd01344c", "EventName": "ListSyncConfigurations", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:42:06+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:42:06Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListSyncConfigurations", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.804.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/offcommand/codeconnections.list-sync-configurations", "requestParameters": { "maxResults": 50, "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "syncType": "CFN_STACK_SYNC" }, "responseElements": { "syncConfigurations": [ { "branch": "feature-branch", "configFile": "filename.yaml", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "dkstacksync", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } ] }, "requestID": "7dd220b5-fc0f-4023-aaa0-9555cfe759df", "eventID": "aa4ae557-ec31-4151-8d21-9e74dd01344c", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

ListTagsForResource example

The following example shows a CloudTrail log entry that demonstrates the ListTagsForResource action.

{ "EventId": "fc501054-d68a-4325-824c-0e34062ef040", "EventName": "ListTagsForResource", "ReadOnly": "true", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T17:16:56+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "dMary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T16:43:03Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T17:16:56Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "ListTagsForResource", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.list-tags-for-resource", "requestParameters": { "resourceArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/9703702f-bebe-41b7-8fc4-8e6d2430a330" }, "responseElements": null, "requestID": "994584a3-4807-47f2-bb1b-a64f0af6c250", "eventID": "fc501054-d68a-4325-824c-0e34062ef040", "readOnly": true, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

TagResource example

The following example shows a CloudTrail log entry that demonstrates the TagResource action.

{ "EventId": "b7fbc943-2dd1-4c5b-a5ad-fc6d60a011f1", "EventName": "TagResource", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:22:11-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:22:11Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "TagResource", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.tag-resource", "requestParameters": { "resourceArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/8dcf69d1-3316-4392-ae09-71e038adb6ed", "tags": [ { "key": "Demo1", "value": "hhvh1" } ] }, "responseElements": null, "requestID": "ba382c33-7124-48c8-a23a-25816ce27604", "eventID": "b7fbc943-2dd1-4c5b-a5ad-fc6d60a011f1", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

UnTagResource example

The following example shows a CloudTrail log entry that demonstrates the UntagResource action.

{ "EventId": "8a85cdee-2586-4679-be18-eec34204bc7e", "EventName": "UntagResource", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:31:14-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:31:14Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UntagResource", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.untag-resource", "requestParameters": { "resourceArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/8dcf69d1-3316-4392-ae09-71e038adb6ed", "tagKeys": [ "Project", "ReadOnly" ] }, "responseElements": null, "requestID": "05ef26a4-8c39-4f72-89bf-0c056c51b8d7", "eventID": "8a85cdee-2586-4679-be18-eec34204bc7e", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

UpdateHost example

The following example shows a CloudTrail log entry that demonstrates the UpdateHost action.

"Events": [{ "EventId": "4307cf7d-6d1c-40d9-a659-1bb41b31a2b6", "EventName": "UpdateHost", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-11T12:54:32-08:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-11T20:09:35Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-11T20:54:32Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateHost", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.13.30 Python/3.11.6 Darwin/23.2.0 exe/x86_64 prompt/off command/codeconnections.update-host", "requestParameters": { "hostArn": "arn:aws:codeconnections:us-east-1:123456789012:host/Demo1-34e70ecb", "providerEndpoint": "https://54.218.245.167" }, "responseElements": null, "requestID": "b17f46ac-1acb-44ab-a9f5-c35c20233441", "eventID": "4307cf7d-6d1c-40d9-a659-1bb41b31a2b6", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" }

UpdateRepositoryLink example

The following example shows a CloudTrail log entry that demonstrates the UpdateRepositoryLink action.

{ "EventId": "be358c9a-5a8f-467e-8585-2860070be4fe", "EventName": "UpdateRepositoryLink", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T02:03:24+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T01:43:49Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T02:03:24Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateRepositoryLink", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.update-repository-link", "requestParameters": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173" }, "responseElements": { "repositoryLinkInfo": { "connectionArn": "arn:aws:codeconnections:us-east-1:123456789012:connection/7df263cc-f055-4843-adef-4ceaefcb2167", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkArn": "arn:aws:codeconnections:us-east-1:123456789012:repository-link/6053346f-8a33-4edb-9397-10394b695173", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo" } }, "additionalEventData": { "providerAction": "UpdateRepositoryLink" }, "requestID": "e01eee49-9393-4983-89e4-d1b3353a70d9", "eventID": "be358c9a-5a8f-467e-8585-2860070be4fe", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

UpdateSyncBlocker example

The following example shows a CloudTrail log entry that demonstrates the UpdateSyncBlocker action.

{ "EventId": "211d19db-9f71-4d93-bf90-10f9ddefed88", "EventName": "UpdateSyncBlocker", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-25T03:01:05+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-25T02:56:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-25T03:01:05Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateSyncBlocker", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6 Linux/5.10.205-172.807.amzn2int.x86_64 exe/x86_64.amzn.2 prompt/off command/codeconnections.update-sync-blocker", "requestParameters": { "id": "ID", "syncType": "CFN_STACK_SYNC", "resourceName": "mystack", "resolvedReason": "Reason" }, "responseElements": null, "requestID": "eea03b39-b299-4099-ba55-608480f8d96d", "eventID": "211d19db-9f71-4d93-bf90-10f9ddefed88", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }

UpdateSyncConfiguration example

The following example shows a CloudTrail log entry that demonstrates the UpdateSyncConfiguration action.

{ "EventId": "d961c94f-1881-4fe8-83bf-d04cb9f22577", "EventName": "UpdateSyncConfiguration", "ReadOnly": "false", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE", "EventTime": "2024-01-24T17:40:55+00:00", "EventSource": "codeconnections.amazonaws.com", "Username": "Mary_Major", "Resources": [], "CloudTrailEvent": { "eventVersion": "1.08", "userIdentity": { "type": "AssumedRole", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/Mary_Major", "accountId": "123456789012", "accessKeyId": "AKIAIOSFODNN7EXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AIDACKCEVSQ6C2EXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" }, "webIdFederationData": {}, "attributes": { "creationDate": "2024-01-24T17:34:55Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-01-24T17:40:55Z", "eventSource": "codeconnections.amazonaws.com", "eventName": "UpdateSyncConfiguration", "awsRegion": "us-east-1", "sourceIPAddress": "IP", "userAgent": "aws-cli/2.15.11 Python/3.11.6Linux/5.10.205-172.804.amzn2int.x86_64exe/x86_64.amzn.2prompt/offcommand/codeconnections.update-sync-configuration", "requestParameters": { "branch": "feature-branch", "resourceName": "mystack", "syncType": "CFN_STACK_SYNC" }, "responseElements": { "syncConfiguration": { "branch": "feature-branch", "configFile": "filename", "ownerId": "owner", "providerType": "GitHub", "repositoryLinkId": "6053346f-8a33-4edb-9397-10394b695173", "repositoryName": "MyGitHubRepo", "resourceName": "mystack", "roleArn": "arn:aws:iam::123456789012:role/my-role", "syncType": "CFN_STACK_SYNC" } }, "requestID": "2ca545ef-4395-4e1f-b14a-2750481161d6", "eventID": "d961c94f-1881-4fe8-83bf-d04cb9f22577", "readOnly": false, "eventType": "AwsApiCall", "managementEvent": true, "recipientAccountId": "123456789012", "eventCategory": "Management", "tlsDetails": { "clientProvidedHostHeader": "api.us-east-1.codeconnections.aws.dev" } } }