Skip to main content

network_insights_access_scopes

Creates, updates, deletes or gets a network_insights_access_scope resource or lists network_insights_access_scopes in a region

Overview

Namenetwork_insights_access_scopes
TypeResource
DescriptionResource schema for AWS::EC2::NetworkInsightsAccessScope
Idaws.ec2.network_insights_access_scopes

Fields

NameDatatypeDescription
network_insights_access_scope_idstring
network_insights_access_scope_arnstring
created_datestring
updated_datestring
tagsarray
match_pathsarray
exclude_pathsarray
regionstringAWS region.

Methods

NameAccessible byRequired Params
create_resourceINSERTregion
delete_resourceDELETEdata__Identifier, region
update_resourceUPDATEdata__Identifier, data__PatchDocument, region
list_resourcesSELECTregion
get_resourceSELECTdata__Identifier, region

SELECT examples

Gets all network_insights_access_scopes in a region.

SELECT
region,
network_insights_access_scope_id,
network_insights_access_scope_arn,
created_date,
updated_date,
tags,
match_paths,
exclude_paths
FROM aws.ec2.network_insights_access_scopes
WHERE region = 'us-east-1';

Gets all properties from an individual network_insights_access_scope.

SELECT
region,
network_insights_access_scope_id,
network_insights_access_scope_arn,
created_date,
updated_date,
tags,
match_paths,
exclude_paths
FROM aws.ec2.network_insights_access_scopes
WHERE region = 'us-east-1' AND data__Identifier = '<NetworkInsightsAccessScopeId>';

INSERT example

Use the following StackQL query and manifest file to create a new network_insights_access_scope resource, using stack-deploy.

/*+ create */
INSERT INTO aws.ec2.network_insights_access_scopes (
Tags,
MatchPaths,
ExcludePaths,
region
)
SELECT
'{{ Tags }}',
'{{ MatchPaths }}',
'{{ ExcludePaths }}',
'{{ region }}';

DELETE example

/*+ delete */
DELETE FROM aws.ec2.network_insights_access_scopes
WHERE data__Identifier = '<NetworkInsightsAccessScopeId>'
AND region = 'us-east-1';

Permissions

To operate on the network_insights_access_scopes resource, the following permissions are required:

Create

ec2:CreateNetworkInsightsAccessScope,
ec2:CreateTags,
tiros:CreateQuery

Read

ec2:DescribeNetworkInsightsAccessScopes,
ec2:GetNetworkInsightsAccessScopeContent

Update

ec2:DescribeNetworkInsightsAccessScopes,
ec2:GetNetworkInsightsAccessScopeContent,
ec2:CreateTags,
ec2:DeleteTags

Delete

ec2:DeleteNetworkInsightsAccessScope,
ec2:DeleteTags

List

ec2:DescribeNetworkInsightsAccessScopes