We recommend new projects start with resources from the AWS provider.
aws-native.shield.getDrtAccess
Explore with Pulumi AI
We recommend new projects start with resources from the AWS provider.
Config the role and list of Amazon S3 log buckets used by the Shield Response Team (SRT) to access your AWS account while assisting with attack mitigation.
Using getDrtAccess
Two invocation forms are available. The direct form accepts plain arguments and either blocks until the result value is available, or returns a Promise-wrapped result. The output form accepts Input-wrapped arguments and returns an Output-wrapped result.
function getDrtAccess(args: GetDrtAccessArgs, opts?: InvokeOptions): Promise<GetDrtAccessResult>
function getDrtAccessOutput(args: GetDrtAccessOutputArgs, opts?: InvokeOptions): Output<GetDrtAccessResult>
def get_drt_access(account_id: Optional[str] = None,
opts: Optional[InvokeOptions] = None) -> GetDrtAccessResult
def get_drt_access_output(account_id: Optional[pulumi.Input[str]] = None,
opts: Optional[InvokeOptions] = None) -> Output[GetDrtAccessResult]
func LookupDrtAccess(ctx *Context, args *LookupDrtAccessArgs, opts ...InvokeOption) (*LookupDrtAccessResult, error)
func LookupDrtAccessOutput(ctx *Context, args *LookupDrtAccessOutputArgs, opts ...InvokeOption) LookupDrtAccessResultOutput
> Note: This function is named LookupDrtAccess
in the Go SDK.
public static class GetDrtAccess
{
public static Task<GetDrtAccessResult> InvokeAsync(GetDrtAccessArgs args, InvokeOptions? opts = null)
public static Output<GetDrtAccessResult> Invoke(GetDrtAccessInvokeArgs args, InvokeOptions? opts = null)
}
public static CompletableFuture<GetDrtAccessResult> getDrtAccess(GetDrtAccessArgs args, InvokeOptions options)
// Output-based functions aren't available in Java yet
fn::invoke:
function: aws-native:shield:getDrtAccess
arguments:
# arguments dictionary
The following arguments are supported:
- Account
Id string - The ID of the account that submitted the template.
- Account
Id string - The ID of the account that submitted the template.
- account
Id String - The ID of the account that submitted the template.
- account
Id string - The ID of the account that submitted the template.
- account_
id str - The ID of the account that submitted the template.
- account
Id String - The ID of the account that submitted the template.
getDrtAccess Result
The following output properties are available:
- Account
Id string - The ID of the account that submitted the template.
- Log
Bucket List<string>List - Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription.
- Role
Arn string - Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and create or update AWS WAF rules and web ACLs.
- Account
Id string - The ID of the account that submitted the template.
- Log
Bucket []stringList - Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription.
- Role
Arn string - Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and create or update AWS WAF rules and web ACLs.
- account
Id String - The ID of the account that submitted the template.
- log
Bucket List<String>List - Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription.
- role
Arn String - Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and create or update AWS WAF rules and web ACLs.
- account
Id string - The ID of the account that submitted the template.
- log
Bucket string[]List - Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription.
- role
Arn string - Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and create or update AWS WAF rules and web ACLs.
- account_
id str - The ID of the account that submitted the template.
- log_
bucket_ Sequence[str]list - Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription.
- role_
arn str - Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and create or update AWS WAF rules and web ACLs.
- account
Id String - The ID of the account that submitted the template.
- log
Bucket List<String>List - Authorizes the Shield Response Team (SRT) to access the specified Amazon S3 bucket containing log data such as Application Load Balancer access logs, CloudFront logs, or logs from third party sources. You can associate up to 10 Amazon S3 buckets with your subscription.
- role
Arn String - Authorizes the Shield Response Team (SRT) using the specified role, to access your AWS account to assist with DDoS attack mitigation during potential attacks. This enables the SRT to inspect your AWS WAF configuration and create or update AWS WAF rules and web ACLs.
Package Details
- Repository
- AWS Native pulumi/pulumi-aws-native
- License
- Apache-2.0
We recommend new projects start with resources from the AWS provider.