Aws General
Aws General
Aws General
Reference guide
Version 1.0
AWS General Reference Reference guide
Amazon's trademarks and trade dress may not be used in connection with any product or service that is not
Amazon's, in any manner that is likely to cause confusion among customers, or in any manner that disparages or
discredits Amazon. All other trademarks not owned by Amazon are the property of their respective owners, who may
or may not be affiliated with, connected to, or sponsored by Amazon.
AWS General Reference Reference guide
Table of Contents
AWS General Reference ...................................................................................................................... 1
AWS security credentials ..................................................................................................................... 2
AWS users ................................................................................................................................. 2
Tasks that require root user credentials ................................................................................. 3
AWS credentials ......................................................................................................................... 3
Console access ................................................................................................................... 4
Programmatic access .......................................................................................................... 5
Temporary access keys ........................................................................................................ 5
AWS account identifiers .............................................................................................................. 6
Finding your AWS account ID .............................................................................................. 6
Finding the canonical user ID for your AWS account ............................................................... 7
Best practices for managing AWS access keys ................................................................................ 7
Remove (or don't generate) an account access key .................................................................. 8
Use temporary security credentials (IAM roles) instead of long-term access keys ......................... 8
Manage IAM user access keys properly .................................................................................. 9
Access the mobile app using AWS access keys ...................................................................... 10
Learn more ...................................................................................................................... 10
AWS security audit guidelines .................................................................................................... 11
When you should perform a security audit .......................................................................... 11
Guidelines for auditing ...................................................................................................... 12
Review your AWS account credentials ................................................................................. 12
Review your IAM users ...................................................................................................... 12
Review your IAM groups .................................................................................................... 12
Review your IAM roles ...................................................................................................... 13
Review your IAM providers for SAML and OpenID Connect (OIDC) ........................................... 13
Review Your mobile apps .................................................................................................. 13
Review your Amazon EC2 security configuration ................................................................... 13
Review AWS policies in other services ................................................................................. 14
Monitor activity in your AWS account ................................................................................. 14
Tips for reviewing IAM policies ........................................................................................... 14
Learn more ...................................................................................................................... 15
Service endpoints and quotas ............................................................................................................ 16
Alexa for Business .................................................................................................................... 20
Service Endpoints ............................................................................................................. 20
Service Quotas ................................................................................................................. 20
AWS Amplify ........................................................................................................................... 21
Amplify endpoints ............................................................................................................ 21
Service Quotas ................................................................................................................. 22
Amazon API Gateway ................................................................................................................ 23
Service Endpoints ............................................................................................................. 23
Service Quotas ................................................................................................................. 27
Application Auto Scaling ........................................................................................................... 27
Regions and Endpoints ..................................................................................................... 28
Service Quotas ................................................................................................................. 29
AWS Application Discovery Service ............................................................................................. 30
Service Endpoints ............................................................................................................. 30
Service Quotas ................................................................................................................. 31
Amazon AppFlow ..................................................................................................................... 31
Service Endpoints ............................................................................................................. 31
Service Quotas ................................................................................................................. 32
Amazon AppStream 2.0 ............................................................................................................ 32
Service Endpoints ............................................................................................................. 33
Service Quotas ................................................................................................................. 33
AWS App Mesh ........................................................................................................................ 34
Version 1.0
iii
AWS General Reference Reference guide
Version 1.0
iv
AWS General Reference Reference guide
Version 1.0
v
AWS General Reference Reference guide
Version 1.0
vi
AWS General Reference Reference guide
Version 1.0
vii
AWS General Reference Reference guide
Version 1.0
viii
AWS General Reference Reference guide
Version 1.0
ix
AWS General Reference Reference guide
Version 1.0
x
AWS General Reference Reference guide
Version 1.0
xi
AWS General Reference Reference guide
Version 1.0
xii
AWS General Reference Reference guide
Version 1.0
xiii
AWS General Reference Reference guide
Version 1.0
xiv
AWS General Reference Reference guide
Contents
Version 1.0
1
AWS General Reference Reference guide
AWS users
For example, if you want to download a protected file from an Amazon Simple Storage Service (Amazon
S3) bucket, your credentials must allow that access. If your credentials aren't authorized to download the
file, AWS denies your request. However, your AWS security credentials are not required to download a file
in an Amazon S3 bucket that is publicly shared.
Contents
• AWS account root user credentials and IAM user credentials (p. 2)
• Understanding and getting your AWS credentials (p. 3)
• Your AWS account identifiers (p. 6)
• Best practices for managing AWS access keys (p. 7)
• AWS security audit guidelines (p. 11)
The credentials of the account owner allow full access to all resources in the account. You cannot use
IAM policies to explicitly deny the root user access to resources. You can only use an AWS Organizations
service control policy (SCP) to limit the permissions of the root user. Because of this, we recommend that
you create an IAM user with administrator permissions to use for everyday AWS tasks and lock away the
access keys for the root user.
There are specific tasks that are restricted to the AWS account root user. For example, only the root user
can close your account. If you need to perform a task that requires the root user, sign in to the AWS
Management Console using the email address and password of the root user. For more information, see
Tasks that require root user credentials (p. 3).
IAM credentials
With IAM, you can securely control access to AWS services and resources for users in your AWS account.
For example, if you require administrator-level permissions, you can create an IAM user, grant that user
full access, and then use those credentials to interact with AWS. If you need to modify or revoke your
permissions, you can delete or modify the policies that are associated with that IAM user.
If you have multiple users that require access to your AWS account, you can create unique credentials
for each user and define who has access to which resources. You don't need to share credentials. For
example, you can create IAM users with read-only access to resources in your AWS account and distribute
those credentials to users.
Version 1.0
2
AWS General Reference Reference guide
Tasks that require root user credentials
Tasks
• Change your account settings. This includes the account name, email address, root user password,
and root user access keys. Other account settings, such as contact information, payment currency
preference, and Regions, do not require root user credentials.
• Restore IAM user permissions. If the only IAM administrator accidentally revokes their own
permissions, you can sign in as the root user to edit policies and restore those permissions.
• Activate IAM access to the Billing and Cost Management console.
• View certain tax invoices. An IAM user with the aws-portal:ViewBilling permission can view and
download VAT invoices from AWS Europe, but not AWS Inc or Amazon Internet Services Pvt. Ltd
(AISPL).
• Close your AWS account.
• Change your AWS Support plan or Cancel your AWS Support plan. For more information, see IAM for
AWS Support.
• Register as a seller in the Reserved Instance Marketplace.
• Configure an Amazon S3 bucket to enable MFA (multi-factor authentication) Delete.
• Edit or delete an Amazon S3 bucket policy that includes an invalid VPC ID or VPC endpoint ID.
• Sign up for GovCloud.
Troubleshooting
If you cannot complete any of these tasks using your root user credentials, your account might be a
member of an organization in AWS Organizations. If your organizational administrator used a service
control policy (SCP) to limit the permissions of your account, your root user permissions might be
affected. For more information, see Service control policies in the AWS Organizations User Guide.
Considerations
• Be sure to save the following in a secure location: the email address associated with your AWS account,
the AWS account ID, your password, and your secret access keys. If you forget or lose these credentials,
you can't recover them. For security reasons, AWS doesn't provide the means for you or anyone else to
retrieve your credentials.
• We strongly recommend that you create an IAM user with administrator permissions to use for
everyday AWS tasks and lock away the password and access keys for the root user. Use the root user
only for the tasks that are restricted to the root user.
• Security credentials are account-specific. If you have access to multiple AWS accounts, you have
separate credentials for each account.
• Do not provide your AWS credentials to a third party.
Version 1.0
3
AWS General Reference Reference guide
Console access
Credentials
• Console access (p. 4)
• Programmatic access (p. 5)
• Temporary access keys (p. 5)
Console access
There are two different types of users in AWS. You are either the account owner (root user) or you are
an AWS Identity and Access Management (IAM) user. How you sign in to the AWS Management Console
depends on whether you are the root user or an IAM user.
Contents
• Root user email address and password (p. 4)
• IAM user name and password (p. 4)
• Multi-factor authentication (MFA) (p. 4)
https://account_id_or_alias.signin.aws.amazon.com/console/
If you forget the password for your IAM user, contact your IAM administrator or the account owner. If
your IAM administrator gave you permissions to manage your own AWS credentials, then you can change
your password periodically, which is a security best practice, using the Security Credentials page.
With MFA enabled, when you sign in to your AWS account, you are prompted for your user name and
password, plus an authentication code from an MFA device. Adding MFA provides increased security for
your AWS account settings and resources.
By default, MFA (multi-factor authentication) is not enabled. You can enable and manage MFA devices
for the AWS account root user by going to the Security Credentials page or the IAM dashboard in the
AWS Management Console. For more information about enabling MFA for IAM users, see Enabling MFA
Devices in the IAM User Guide.
Version 1.0
4
AWS General Reference Reference guide
Programmatic access
Programmatic access
You must provide your AWS access keys to make programmatic calls to AWS or to use the AWS
Command Line Interface or AWS Tools for PowerShell.
When you create your access keys, you create the access key ID (for example, AKIAIOSFODNN7EXAMPLE)
and secret access key (for example, wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY) as a set. The
secret access key is available for download only when you create it. If you don't download your secret
access key or if you lose it, you must create a new one.
You can assign up to two access keys per user (root user or IAM user). Having two access keys is useful
when you want to rotate them. When you disable an access key, you can't use it, but it counts toward
your limit of two access keys. After you delete an access key, it's gone forever and can't be restored, but it
can be replaced with a new access key.
1. Sign in to the AWS Management Console as the root user. For more information, see Sign in as the
root user in the IAM User Guide.
2. In the navigation bar on the upper right, choose your account name or number and then choose My
Security Credentials.
3. Expand the Access keys (access key ID and secret access key) section.
4. Choose Create New Access Key. If you already have two access keys, this button is disabled.
5. When prompted, choose Show Access Key or Download Key File. This is your only opportunity to
save your secret access key.
6. After you've saved your secret access key in a secure location, chose Close.
1. Sign in to the AWS Management Console as an IAM user. For more information, see Sign in as an IAM
user in the IAM User Guide.
2. In the navigation bar on the upper right, choose your user name and then choose My Security
Credentials.
Tip
If you do not see the My Security Credentials page, you might be signed in as a federated
user, not an IAM user. You can create and use temporary access keys (p. 5) instead.
3. Choose AWS IAM credentials, Create access key. If you already have two access keys, the console
displays a "Limited exceeded" error.
4. When prompted, choose Download .csv file or Show secret access key. This is your only opportunity
to save your secret access key.
5. After you've saved your secret access key in a secure location, chose Close.
Version 1.0
5
AWS General Reference Reference guide
AWS account identifiers
security credentials access to resources in your AWS account (federation). For more information, see aws
sts assume-role.
AWS account ID
A 12-digit number, such as 123456789012, that uniquely identifies an AWS account. Many AWS
resources include the account ID in their Amazon Resource Names (ARNs). The account ID portion
distinguishes resources in one account from the resources in another account. If you are an IAM user,
you can sign in to the AWS Management Console using either the account ID or account alias.
Canonical user ID
Prerequisite
You must be signed in to the AWS Management Console. For more information, see Signing in to the
AWS Management Console in the IAM User Guide.
1. In the navigation bar on the upper right, choose your account name or number and then choose My
Security Credentials.
2. Expand the Account identifiers section. The account number appears next to the label AWS Account
ID.
1. In the navigation bar on the upper right, choose your user name and then choose My Security
Credentials.
Tip
If you do not see the My Security Credentials page, you might be signed in as a federated
user, not an IAM user.
2. At the top of the page, under Account details, the account number appears next to the label AWS
account ID.
Version 1.0
6
AWS General Reference Reference guide
Finding the canonical user ID for your AWS account
Prerequisites
You must have permission to list and view an Amazon S3 bucket if you are a federated user or are
accessing the information programmatically, such as through the AWS CLI.
To find the canonical user ID for your account when signed in to the console as the root user
or an IAM user
1. Sign in to the AWS Management Console as the root user or an IAM user.
For more information, see Signing in to the AWS Management Console in the IAM User Guide.
2. In the navigation bar on the upper right, choose your account name or number and then choose My
Security Credentials.
3. If you are the root user, expand Account identifiers and find Canonical User ID.
If you are an IAM user, under Account details, find Account canonical user ID.
To find the canonical user ID for your account when signed in to the console as a federated
user
For more information, see Signing in to the AWS Management Console in the IAM User Guide.
2. In the Amazon S3 console, to view details about a bucket, choose a bucket name.
3. Choose Permissions, and then choose Access Control List.
At the top of the page, under Access for bucket owner, the canonical user ID for the AWS account
appears.
Version 1.0
7
AWS General Reference Reference guide
Remove (or don't generate) an account access key
Anyone who has your access keys has the same level of access to your AWS resources that you do.
Consequently, AWS goes to significant lengths to protect your access keys, and, in keeping with our
shared-responsibility model, you should as well.
The steps that follow can help you protect your access keys. For background information, see AWS
security credentials (p. 2).
Note
Your organization may have different security requirements and policies than those described in
this topic. The suggestions provided here are intended as general guidelines.
One of the best ways to protect your account is to not have access keys for your AWS account root
user. Unless you must have root user access keys (which is rare), it is best not to generate them. Instead,
the recommended best practice is to create one or more AWS Identity and Access Management (IAM)
users. Grant those IAM users the necessary permissions and use them for everyday interaction with AWS.
If you already have access keys for your account, we recommend the following: Find places in your
applications where you are currently using access keys (if any), replace the root user access keys with IAM
user access keys. Then disable and remove the root user access keys. For more information about how to
substitute one access key for another, see the post How to Rotate Access Keys for IAM Users on the AWS
Security Blog.
By default, AWS does not generate access keys for new accounts.
For information about how to create an IAM user with administrative permissions, see Creating Your First
IAM Admin User and Group in the IAM User Guide.
Long-term access keys, such as those associated with IAM users and AWS account root users, remain valid
until you manually revoke them. However, temporary security credentials obtained through IAM roles
and other features of the AWS Security Token Service expire after a short period of time. Use temporary
security credentials to help reduce your risk in case credentials are accidentally exposed.
• You have an application or AWS CLI scripts running on an Amazon EC2 instance. Do not use
access keys directly in your application. Don't pass access keys to the application, embed them in the
application, or let the application read access keys from any source. Instead, define an IAM role that
has appropriate permissions for your application and launch the Amazon EC2 instance with roles for
EC2. Doing this associates an IAM role with the Amazon EC2 instance. This practice also enables the
Version 1.0
8
AWS General Reference Reference guide
Manage IAM user access keys properly
application to get temporary security credentials that it can in turn use to make programatic calls to
AWS. The AWS SDKs and the AWS CLI can get temporary credentials from the role automatically.
• You need to grant cross-account access. Use an IAM role to establish trust between accounts,
and then grant users in one account limited permissions to access the trusted account. For more
information, see Tutorial: Delegate Access Across AWS Accounts Using IAM Roles in the IAM User Guide.
• You have a mobile app. Do not embed access keys with the app, even in encrypted storage. Instead,
use Amazon Cognito to manage user identities in your app. This service lets you authenticate users
using Login with Amazon, Facebook, Google, or any OpenID Connect (OIDC)–compatible identity
provider. You can then use the Amazon Cognito credentials provider to manage credentials that your
app uses to make requests to AWS. For more information, see Using the Amazon Cognito Credentials
Provider on the AWS Mobile Blog.
• You want to federate into AWS and your organization supports SAML 2.0. If you work for an
organization that has an identity provider that supports SAML 2.0, configure the provider to use SAML.
You can use SAML to exchange authentication information with AWS and get back a set of temporary
security credentials. For more information, see About SAML 2.0-based Federation in the IAM User
Guide.
• You want to federate into AWS and your organization has an on-premises identity store. If users
can authenticate inside your organization, you can write an application that can issue them temporary
security credentials for access to AWS resources. For more information, see Creating a URL that
Enables Federated Users to Access the AWS Management Console (Custom Federation Broker) in the
IAM User Guide.
• Don't embed access keys directly into code. The AWS SDKs and the AWS Command Line Tools enable
you to put access keys in known locations so that you do not have to keep them in code.
For information about using the AWS credentials file, see the documentation for your SDK. Examples
include Set up AWS Credentials and Region for Development in the AWS SDK for Java Developer
Guide and Configuration and Credential Files in the AWS Command Line Interface User Guide.
To store credentials for the AWS SDK for .NET and the AWS Tools for Windows PowerShell, we
recommend that you use the SDK Store. For more information, see Using the SDK Store in the AWS
SDK for .NET Developer Guide.
• Environment variables. On a multitenant system, choose user environment variables, not system
environment variables.
For more information about using environment variables to store credentials, see Environment
Variables in the AWS Command Line Interface User Guide.
• Use different access keys for different applications. Do this so that you can isolate the permissions
and revoke the access keys for individual applications if they are exposed. Having separate access keys
Version 1.0
9
AWS General Reference Reference guide
Access the mobile app using AWS access keys
for different applications also generates distinct entries in AWS CloudTrail log files. This configuration
makes it easier for you to determine which application performed specific actions.
• Rotate access keys periodically. Change access keys on a regular basis. For details, see Rotating Access
Keys (AWS CLI, Tools for Windows PowerShell, and AWS API) in the IAM User Guide and How to Rotate
Access Keys for IAM Users on the AWS Security Blog.
• Remove unused access keys. If a user leaves your organization, remove the corresponding IAM user
so that the user can no longer access your resources. To find out when an access key was last used, use
the GetAccessKeyLastUsed API (AWS CLI command: aws iam get-access-key-last-used).
• Configure multi-factor authentication for your most sensitive operations. For more information, see
Using Multi-Factor Authentication (MFA) in AWS in the IAM User Guide.
You can sign in to the mobile app using your console password or your access keys. As a best practice, do
not use root user access keys. Instead, we strongly recommend that in addition to using a password or
biometric lock on your mobile device, you create an IAM user to manage AWS resources. If you lose your
mobile device, you can remove the IAM user's access. For more information about generating access keys
for an IAM user, see Managing Access Keys for IAM Users in the IAM User Guide.
If you have already signed in using another identity, choose the menu icon and choose Switch
identity. Then choose Sign in as a different identity and then Access keys.
3. On the Access keys page, enter your information:
You can now access a select set of your resources using the mobile app.
Learn more
For more information about best practices for keeping your AWS account secure, see the following
resources:
• IAM Best Practices. Contains suggestions for using the AWS Identity and Access Management (IAM)
service to help secure your AWS resources.
Version 1.0
10
AWS General Reference Reference guide
AWS security audit guidelines
• The following pages provide guidance for setting up the AWS SDKs and the AWS CLI to use access
keys.
• Set up AWS Credentials and Region for Development in the AWS SDK for Java Developer Guide.
• Using the SDK Store in the AWS SDK for .NET Developer Guide.
• Providing Credentials to the SDK in the AWS SDK for PHP Developer Guide.
• Configuration in the Boto 3 (AWS SDK for Python) documentation.
• Using AWS Credentials in the AWS Tools for Windows PowerShell guide.
• Configuration and Credential Files in the AWS Command Line Interface User Guide.
• Granting Access Using an IAM Role. Discusses how programs written using the .NET SDK can
automatically get temporary security credentials when running on an Amazon EC2 instance. Similar
information is available for the AWS SDK for Java.
Following are guidelines for systematically reviewing and monitoring your AWS resources for security
best practices.
Contents
• When you should perform a security audit (p. 11)
• Guidelines for auditing (p. 12)
• Review your AWS account credentials (p. 12)
• Review your IAM users (p. 12)
• Review your IAM groups (p. 12)
• Review your IAM roles (p. 13)
• Review your IAM providers for SAML and OpenID Connect (OIDC) (p. 13)
• Review Your mobile apps (p. 13)
• Review your Amazon EC2 security configuration (p. 13)
• Review AWS policies in other services (p. 14)
• Monitor activity in your AWS account (p. 14)
• Tips for reviewing IAM policies (p. 14)
• Learn more (p. 15)
• On a periodic basis. You should perform the steps described in this document at regular intervals as a
best practice for security.
• If there are changes in your organization, such as people leaving.
• If you have stopped using one or more individual AWS services. This is important for removing
permissions that users in your account no longer need.
• If you've added or removed software in your accounts, such as applications on Amazon EC2 instances,
AWS OpsWorks stacks, AWS CloudFormation templates, etc.
• If you ever suspect that an unauthorized person might have accessed your account.
Version 1.0
11
AWS General Reference Reference guide
Guidelines for auditing
• Be thorough. Look at all aspects of your security configuration, including those you might not use
regularly.
• Don't assume. If you are unfamiliar with some aspect of your security configuration (for example, the
reasoning behind a particular policy or the existence of a role), investigate the business need until you
are satisfied.
• Keep things simple. To make auditing (and management) easier, use IAM groups, consistent naming
schemes, and straightforward policies.
1. If you're not using the root access keys for your account, you can remove them. We strongly
recommend that you do not use root access keys for everyday work with AWS, and that instead you
create IAM users.
2. If you do need to keep the access keys for your account, rotate them regularly.
1. List your users and then delete users that are inactive.
2. Remove users from groups that they don't need to be a part of.
3. Review the policies attached to the groups the user is in. See Tips for reviewing IAM policies (p. 14).
4. Delete security credentials that the user doesn't need or that might have been exposed. For example,
an IAM user that is used for an application does not need a password (which is necessary only to sign
in to AWS websites). Similarly, if a user does not use access keys, there's no reason for the user to have
one. For more information, see Managing Passwords for IAM Users and Managing Access Keys for IAM
Users in the IAM User Guide.
You can generate and download a credential report that lists all IAM users in your account and the
status of their various credentials, including passwords, access keys, and MFA devices. For passwords
and access keys, the credential report shows how recently the password or access key has been
used. Credentials that have not been used recently might be good candidates for removal. For more
information, see Getting Credential Reports for your AWS Account in the IAM User Guide.
5. Rotate (change) user security credentials periodically, or immediately if you ever share them with an
unauthorized person. For more information, see Managing Passwords for IAM Users and Managing
Access Keys for IAM Users in the IAM User Guide.
1. List your groups and then delete groups that are unused.
2. Review users in each group and remove users that don't belong.
3. Review the policies attached to the group. See Tips for reviewing IAM policies (p. 14).
Version 1.0
12
AWS General Reference Reference guide
Review your IAM roles
1. List your roles and then delete roles that are unused.
2. Review the role's trust policy. Make sure that you know who the principal is and that you understand
why that account or user needs to be able to assume the role.
3. Review the access policy for the role to be sure that it grants suitable permissions to whoever assumes
the role—see Tips for reviewing IAM policies (p. 14).
1. Make sure that the mobile app does not contain embedded access keys, even if they are in encrypted
storage.
2. Get temporary credentials for the app by using APIs that are designed for that purpose. We
recommend that you use Amazon Cognito to manage user identity in your app. This service lets you
authenticate users using Login with Amazon, Facebook, Google, or any OpenID Connect (OIDC)–
compatible identity provider. You can then use the Amazon Cognito credentials provider to manage
credentials that your app uses to make requests to AWS.
If your mobile app doesn't support authentication using Login with Amazon, Facebook, Google, or any
other OIDC-compatible identity provider, you can create a proxy server that can dispense temporary
credentials to your app.
1. Delete Amazon EC2 key pairs that are unused or that might be known to people outside your
organization.
2. Review your Amazon EC2 security groups:
• Remove security groups that no longer meet your needs.
• Remove rules from security groups that no longer meet your needs. Make sure you know why the
ports, protocols, and IP address ranges they permit have been allowed.
3. Terminate instances that aren't serving a business need or that might have been started by someone
outside your organization for unapproved purposes. Remember that if an instance is started with a
Version 1.0
13
AWS General Reference Reference guide
Review AWS policies in other services
role, applications that run on that instance can access AWS resources using the permissions that are
granted by that role.
4. Cancel Spot Instance requests that aren't serving a business need or that might have been made by
someone outside your organization.
5. Review your Auto Scaling groups and configurations. Shut down any that no longer meet your needs
or that might have been configured by someone outside your organization.
• Turn on AWS CloudTrail in each account and use it in each supported Region.
• Periodically examine CloudTrail log files. (CloudTrail has a number of partners who provide tools for
reading and analyzing log files.)
• Enable Amazon S3 bucket logging to monitor requests made to each bucket.
• If you believe there has been unauthorized use of your account, pay particular attention to temporary
credentials that have been issued. If temporary credentials have been issued that you don't recognize,
disable their permissions.
• Enable billing alerts in each account and set a cost threshold that lets you know if your charges exceed
your normal usage.
• As a best practice, attach policies to groups instead of to individual users. If an individual user has a
policy, make sure you understand why that user needs the policy.
• Make sure that IAM users, groups, and roles have only the permissions that they need.
• Use the IAM Policy Simulator to test policies that are attached to users or groups.
• Remember that a user's permissions are the result of all applicable policies—user policies, group
policies, and resource-based policies (on Amazon S3 buckets, Amazon SQS queues, Amazon SNS
topics, and AWS KMS keys). It's important to examine all the policies that apply to a user and to
understand the complete set of permissions granted to an individual user.
• Be aware that allowing a user to create an IAM user, group, role, or policy and attach a policy to the
principal entity is effectively granting that user all permissions to all resources in your account. That is,
users who are allowed to create policies and attach them to a user, group, or role can grant themselves
Version 1.0
14
AWS General Reference Reference guide
Learn more
any permissions. In general, do not grant IAM permissions to users or roles whom you do not trust
with full access to the resources in your account. The following list contains IAM permissions that you
should review closely:
• iam:PutGroupPolicy
• iam:PutRolePolicy
• iam:PutUserPolicy
• iam:CreatePolicy
• iam:CreatePolicyVersion
• iam:AttachGroupPolicy
• iam:AttachRolePolicy
• iam:AttachUserPolicy
• Make sure policies don't grant permissions for services that you don't use. For example, if you use
AWS managed policies, make sure the AWS managed policies that are in use in your account are for
services that you actually use. To find out which AWS managed policies are in use in your account, use
the IAM GetAccountAuthorizationDetails API (AWS CLI command: aws iam get-account-
authorization-details).
• If the policy grants a user permission to launch an Amazon EC2 instance, it might also allow the
iam:PassRole action, but if so it should explicitly list the roles that the user is allowed to pass to the
Amazon EC2 instance.
• Closely examine any values for the Action or Resource element that include *. It's a best practice
to grant Allow access to only the individual actions and resources that users need. However, the
following are reasons that it might be suitable to use * in a policy:
• The policy is designed to grant administrative-level privileges.
• The wildcard character is used for a set of similar actions (for example, Describe*) as a
convenience, and you are comfortable with the complete list of actions that are referenced in this
way.
• The wildcard character is used to indicate a class of resources or a resource path (e.g.,
arn:aws:iam::account-id:users/division_abc/*), and you are comfortable granting access
to all of the resources in that class or path.
• A service action does not support resource-level permissions, and the only choice for a resource is *.
• Examine policy names to make sure they reflect the policy's function. For example, although a
policy might have a name that includes "read only," the policy might actually grant write or change
permissions.
Learn more
For information about managing IAM resources, see the following:
For more information about Amazon EC2 security, see the following:
• Network and Security in the Amazon EC2 User Guide for Linux Instances.
• Demystifying EC2 Resource-Level Permissions on the AWS Security Blog.
For more information about monitoring an AWS account, see the re:Invent 2013 video presentation
Intrusion Detection in the Cloud.
Version 1.0
15
AWS General Reference Reference guide
Click one of the following links to go to the page for that service. To view the service quotas for all AWS
services in the documentation without switching pages, view the information in the Service Endpoints
and Quotas page in the PDF instead.
Services
• Alexa for Business endpoints and quotas (p. 20)
• AWS Amplify (p. 21)
• Amazon API Gateway endpoints and quotas (p. 23)
• Application Auto Scaling endpoints and quotas (p. 27)
• AWS Application Discovery Service endpoints and quotas (p. 30)
• Amazon AppFlow (p. 31)
• Amazon AppStream 2.0 endpoints and quotas (p. 32)
• AWS App Mesh endpoints and quotas (p. 34)
• AWS AppSync endpoints and quotas (p. 38)
• Amazon Athena endpoints and quotas (p. 41)
• AWS Audit Manager (p. 44)
• Amazon Augmented AI quotas (p. 45)
• Amazon Aurora endpoints and quotas (p. 46)
• AWS Auto Scaling endpoints and quotas (p. 50)
• Amazon EC2 Auto Scaling endpoints and quotas (p. 52)
• AWS Backup endpoints and quotas (p. 55)
• AWS Batch endpoints and quotas (p. 59)
• AWS Billing and Cost Management endpoints and quotas (p. 60)
• AWS Certificate Manager endpoints and quotas (p. 64)
• AWS Certificate Manager Private Certificate Authority endpoints and quotas (p. 67)
• AWS Chatbot endpoints and quotas (p. 73)
• Amazon Chime endpoints and quotas (p. 73)
• AWS Cloud9 endpoints and quotas (p. 74)
• Amazon Cloud Directory endpoints and quotas (p. 76)
• AWS CloudFormation endpoints and quotas (p. 77)
• Amazon CloudFront endpoints and quotas (p. 81)
• AWS CloudHSM endpoints and quotas (p. 82)
• AWS Cloud Map endpoints and quotas (p. 85)
• Amazon CloudSearch endpoints and quotas (p. 88)
• AWS CloudShell endpoints and quotas (p. 89)
• AWS CloudTrail endpoints and quotas (p. 90)
• Amazon CloudWatch endpoints and quotas (p. 92)
• Amazon CloudWatch Events endpoints and quotas (p. 97)
• Amazon CloudWatch Logs endpoints and quotas (p. 100)
• Amazon CloudWatch Synthetics endpoints and quotas (p. 104)
Version 1.0
16
AWS General Reference Reference guide
Version 1.0
17
AWS General Reference Reference guide
Version 1.0
18
AWS General Reference Reference guide
Version 1.0
19
AWS General Reference Reference guide
Alexa for Business
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Resource Default
Version 1.0
20
AWS General Reference Reference guide
AWS Amplify
Resource Default
Address books 25
AWS Amplify
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Amplify endpoints
Region Region Endpoint Protocol
Name
Version 1.0
21
AWS General Reference Reference guide
Service Quotas
Service Quotas
Version 1.0
22
AWS General Reference Reference guide
Amazon API Gateway
Environment cache artifact size The maximum size (in GB) of the 5
environment cache artifact.
Manual deploy ZIP file size The maximum size (in GB) of a 5
manual deploy ZIP file.
Service Endpoints
You can use the Asia Pacific (Osaka-Local) Region only in conjunction with the Asia Pacific (Tokyo)
Region. To request access to the Asia Pacific (Osaka-Local) Region, contact your sales representative.
Version 1.0
23
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon API Gateway in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon API Gateway in the China Regions, see:
Amazon API Gateway includes the API Gateway Control Plane (for creating and managing APIs) and the
API Gateway Data Plane (for calling deployed APIs).
The Route 53 Hosted Zone ID column shows the Route 53 Hosted Zone IDs for API Gateway Regional
endpoints. Route 53 Hosted Zone IDs are for use with the execute-api (API Gateway component
service for API execution) domain. For edge-optimized endpoints, the Route 53 Hosted Zone ID is
Z2FDTNDATAQYW2 for all Regions.
Version 1.0
24
AWS General Reference Reference guide
Service Endpoints
Version 1.0
25
AWS General Reference Reference guide
Service Endpoints
Version 1.0
26
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see Quotas in Amazon API Gateway in the API Gateway Developer Guide.
Version 1.0
27
AWS General Reference Reference guide
Regions and Endpoints
Version 1.0
28
AWS General Reference Reference guide
Service Quotas
For information about using Application Auto Scaling in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Application Auto Scaling in the China Regions, see:
Service Quotas
Default Quotas Per Region Per Account
Item Default
Maximum number of scalable targets per resource type Quotas vary depending on
resource type.
Version 1.0
29
AWS General Reference Reference guide
AWS Application Discovery Service
Item Default
Amazon DynamoDB: 3000
For more information, see Application Auto Scaling Service Quotas in the Application Auto Scaling User
Guide.
Service Endpoints
Version 1.0
30
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Amazon AppFlow
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Note
You can't use IP allow listing in your Amazon S3 bucket policy to deny access to any other IP
addresses besides Amazon AppFlow IP addresses. This is because Amazon AppFlow uses a VPC
endpoint when placing data in your Amazon S3 buckets.
For more information about the IP addresses used by Amazon AppFlow, see AWS IP address
ranges in the Amazon Web Services General Reference.
Service Endpoints
Amazon AppFlow has the following endpoints:
Version 1.0
31
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
32
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Service Quotas
Resource Default
Stacks 10
Fleets 10
Version 1.0
33
AWS General Reference Reference guide
AWS App Mesh
Resource Default
• stream.graphics-design.large:
10
• stream.graphics-design.xlarge:
10
• stream.graphics-
design.2xlarge: 10
• stream.graphics.g4dn.xlarge:
10
• stream.memory.large: 10
• stream.memory.xlarge: 10
• stream.memory.z1d.large: 10
• stream.memory.z1d.xlarge: 10
Images 10
*For fleets that have Default Internet Access enabled, the quota is 100 fleet instances. If your
deployment must support more than 100 concurrent users, use a NAT gateway configuration instead.
Version 1.0
34
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Region Region Endpoint Protocol
Name
appmesh-envoy-management.us- HTTPS
east-2.amazonaws.com
appmesh-envoy-management.us- HTTPS
east-1.amazonaws.com
appmesh-envoy-management.us- HTTPS
west-1.amazonaws.com
appmesh-envoy-management.us- HTTPS
west-2.amazonaws.com
appmesh-envoy-management.af- HTTPS
south-1.amazonaws.com
appmesh-envoy-management.ap- HTTPS
south-1.amazonaws.com
appmesh-envoy-management.ap- HTTPS
northeast-2.amazonaws.com
Version 1.0
35
AWS General Reference Reference guide
Service Endpoints
appmesh-envoy-management.ap- HTTPS
southeast-1.amazonaws.com
appmesh-envoy-management.ap- HTTPS
southeast-2.amazonaws.com
appmesh-envoy-management.ap- HTTPS
northeast-1.amazonaws.com
appmesh-envoy-management.ca- HTTPS
central-1.amazonaws.com
appmesh-envoy-management.eu- HTTPS
central-1.amazonaws.com
appmesh-envoy-management.eu- HTTPS
west-1.amazonaws.com
appmesh-envoy-management.eu- HTTPS
west-2.amazonaws.com
appmesh-envoy-management.eu- HTTPS
south-1.amazonaws.com
Version 1.0
36
AWS General Reference Reference guide
Service Quotas
appmesh-envoy-management.eu- HTTPS
west-3.amazonaws.com
appmesh-envoy-management.eu- HTTPS
north-1.amazonaws.com
appmesh-envoy-management.me- HTTPS
south-1.amazonaws.com
Service Quotas
Resource Default
Version 1.0
37
AWS General Reference Reference guide
AWS AppSync
Resource Default
Service Endpoints
AWS AppSync Control Plane
Version 1.0
38
AWS General Reference Reference guide
Service Endpoints
Version 1.0
39
AWS General Reference Reference guide
Service Quotas
Service Quotas
API keys per API The maximum number of API keys per 50
GraphQL API
Throttle rate per GraphQL API The maximum number of GraphQL 1,000
queries per API per second
You can request a
quota increase.
Version 1.0
40
AWS General Reference Reference guide
Amazon Athena
Resolvers executed in a single request The maximum number of resolvers that 10,000
can be executed in a single request
Service Endpoints
Version 1.0
41
AWS General Reference Reference guide
Service Endpoints
Version 1.0
42
AWS General Reference Reference guide
Service Quotas
To download the latest version of the JDBC driver and its documentation, see Using Athena with the
JDBC Driver.
For more information about the previous versions of the JDBC driver and their documentation, see Using
the Previous Version of the JDBC Driver.
To download the latest and previous versions of the ODBC driver and their documentation, see
Connecting to Athena with ODBC.
Service Quotas
Resource Default
Athena APIs have the following default quotas for the number of calls to the API per account (not per
query):
BatchGetNamedQuery, ListNamedQueries, 5 up to 10
ListQueryExecutions
CreateNamedQuery, DeleteNamedQuery, 5 up to 20
GetNamedQuery
Version 1.0
43
AWS General Reference Reference guide
AWS Audit Manager
BatchGetQueryExecution 20 up to 40
StartQueryExecution, StopQueryExecution 20 up to 80
For example, for StartQueryExecution, you can make up to 20 calls per second. In addition, if this API
is not called for 4 seconds, your account accumulates a burst capacity of up to 80 calls. In this case, your
application can make up to 80 calls to this API in burst mode.
If you use any of these APIs and exceed the default quota for the number of calls per second, or the
burst capacity in your account, the Athena API issues an error similar to the following: ""ClientError: An
error occurred (ThrottlingException) when calling the <API_name> operation: Rate exceeded." Reduce
the number of calls per second, or the burst capacity for the API for this account. To request a quota
increase, contact AWS Support. Open the AWS Support Center page, sign in if necessary, and choose
Create case. Choose Service limit increase. Complete and submit the form.
Note
This quota cannot be changed in the Athena Service Quotas console.
For information about quotas for databases, tables, and partitions, see Service Quotas (p. 228). If you
have not migrated to AWS Glue Data Catalog, the number of partitions per table is 20,000.
Service Endpoints
AWS Audit Manager has the following endpoints:
Version 1.0
44
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service Quotas
The following table shows the default, maximum quantity of each resource available to your AWS
account. Each quota in this table is a soft quota, which can be upgraded by submitting a service limit
increase support ticket. To learn how to submit a support ticket, see Creating a support case in the AWS
Support User Guide.
Resource Default
Version 1.0
45
AWS General Reference Reference guide
Amazon Aurora
Resource Default
Human loops are considered in-flight when their
status is InProgress or Stopping.
Service Endpoints
Amazon Aurora with MySQL compatibility
Version 1.0
46
AWS General Reference Reference guide
Service Endpoints
Version 1.0
47
AWS General Reference Reference guide
Service Endpoints
Version 1.0
48
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default Quota
DB clusters 40
DB instances 40
DB subnet groups 50
Event subscriptions 20
Version 1.0
49
AWS General Reference Reference guide
AWS Auto Scaling
Parameter groups 50
Proxies 20
Reserved DB instances 40
Version 1.0
50
AWS General Reference Reference guide
Regions and Endpoints
Version 1.0
51
AWS General Reference Reference guide
Service Quotas
For information about using in the AWS GovCloud (US-West) Region, see AWS GovCloud (US-West)
Endpoints.
Service Quotas
Default Quotas Per Region Per Account
Item Default
Maximum number of scalable resources per resource type Quotas vary depending on
resource type.
For more information, see AWS Auto Scaling Service Quotas in the AWS Auto Scaling User Guide.
Version 1.0
52
AWS General Reference Reference guide
Regions and Endpoints
Version 1.0
53
AWS General Reference Reference guide
Regions and Endpoints
If you specify the general endpoint (autoscaling.amazonaws.com), Amazon EC2 Auto Scaling directs your
request to the us-east-1 endpoint.
For information about using Amazon EC2 Auto Scaling in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon EC2 Auto Scaling in the China Regions, see:
Version 1.0
54
AWS General Reference Reference guide
Service Quotas
Service Quotas
Item Default
For more information, see Amazon EC2 Auto Scaling Service Quotas in the Amazon EC2 Auto Scaling User
Guide.
Service Endpoints
Version 1.0
55
AWS General Reference Reference guide
Service Endpoints
Version 1.0
56
AWS General Reference Reference guide
Service Quotas
Service Quotas
CreateBackupPlan 5
CreateBackupSelection
DeleteBackupPlan
DeleteBackupSelection
DeleteBackupVault
DeleteBackupVaultAccessPolicy
DeleteBackupVaultNotifications
DescribeBackupVault
ExportBackupPlanTemplate
GetBackupPlanFromJSON
GetBackupPlanFromTemplate
PutBackupVaultNotifications
StartBackupJob
StartRestoreJob
StopBackupJob
TagResource
UntagResource
Version 1.0
57
AWS General Reference Reference guide
Service Quotas
UpdateRecoveryPointLifecycle
DeleteRecoveryPoint 10
DescribeProtectedResource
DescribeBackupJob 15
DescribeRecoveryPoint
DescribeRestoreJob
GetBackupPlan
GetBackupSelection
GetBackupVaultAccessPolicy
GetBackupVaultNotifications
GetRecoveryPointRestoreMetadata
GetSupportedResourceTypes
ListBackupJobs 20
ListBackupPlans
ListBackupPlanTemplates
ListBackupPlanVersions
ListBackupSelections
ListBackupVaults
ListProtectedResources
ListRecoveryPointByResource
ListRecoveryPointsByBackupVault
ListRecoveryPointsByResource
ListRestoreJobs
ListTags
To request an increase in these quotas, create a case with the AWS Support Center.
For additional information, see Quotas in the AWS Backup Developer Guide.
Version 1.0
58
AWS General Reference Reference guide
AWS Batch
Service Endpoints
Version 1.0
59
AWS General Reference Reference guide
Service Quotas
Service Quotas
AWS Batch does not have any default service quotas that you can increase. For more information about
service quotas for AWS Batch, see Service Quotas in the AWS Batch User Guide.
Version 1.0
60
AWS General Reference Reference guide
Service Endpoints
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
AWS Billing and Cost Management includes the AWS Cost Explorer API, the AWS Cost and Usage Reports
API, the AWS Budgets API, and the AWS Price List API.
Service Endpoints
AWS Cost Explorer
AWS Budgets
Version 1.0
61
AWS General Reference Reference guide
Service Endpoints
Version 1.0
62
AWS General Reference Reference guide
Service Endpoints
Savings Plans
Version 1.0
63
AWS General Reference Reference guide
Service Quotas
Service Quotas
Billing and Cost Management has no increasable quotas. For more information, see Quotas in AWS
Billing and Cost Management.
Service Endpoints
Version 1.0
64
AWS General Reference Reference guide
Service Endpoints
Version 1.0
65
AWS General Reference Reference guide
Service Quotas
For information about using AWS Certificate Manager in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
Service Quotas
Item Default
Number of ACM certificates per year (last 365 Twice your account quota
days)
Number of imported certificates per year (last 365 Twice your account quota
days)
For more information, see Quotas in the AWS Certificate Manager User Guide.
Version 1.0
66
AWS General Reference Reference guide
AWS Certificate Manager Private Certificate Authority
Service Endpoints
Version 1.0
67
AWS General Reference Reference guide
Service Quotas
Service Quotas
ACM Private CA quotas are specific to an AWS account and Region. To request an increase on quotas that
are adjustable, visit the AWS Support Center, choose Create case, and choose Service limit increase.
Version 1.0
68
AWS General Reference Reference guide
Service Quotas
The following quotas apply to the ACM Private CA API for each Region and account. ACM Private
CA throttles API requests at different rates depending on the API operation. Throttling means that
ACM Private CA rejects an otherwise valid request because the request exceeds the operation's
quota for the number of requests per second. When a request is throttled, ACM Private CA returns a
ThrottlingException error. The following table lists each API operation and the rate at which ACM
Private CA throttles requests for that operation. ACM Private CA does not guarantee a minimum request
rate for APIs.
The maximum
CreateCertificateAuthority 1
number of
CreateCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
Version 1.0
69
AWS General Reference Reference guide
Service Quotas
The maximum
CreateCertificateAuthorityAuditReport 1
number of
CreateCertificateAuthorityAuditReport
requests that you can
perform in this account
in the current region
per second.
The maximum
DeleteCertificateAuthority 10
number of
DeleteCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
The maximum
DescribeCertificateAuthority 20
number of
DescribeCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
The maximum
DescribeCertificateAuthorityAuditReport 20
number of
DescribeCertificateAuthorityAuditReport
requests that you can
perform in this account
in the current region
per second.
Version 1.0
70
AWS General Reference Reference guide
Service Quotas
The maximum
GetCertificateAuthorityCertificate 20
number of
GetCertificateAuthorityCertificate
requests that you can
perform in this account
in the current region
per second.
The maximum
GetCertificateAuthorityCsr 10
number of
GetCertificateAuthorityCsr
requests that you can
perform in this account
in the current region
per second.
The maximum
ImportCertificateAuthorityCertificate 10
number of
ImportCertificateAuthorityCertificate
requests that you can
perform in this account
in the current region
per second.
The maximum
ListCertificateAuthorities 20
number of
ListCertificateAuthorities
requests that you can
perform in this account
in the current region
per second.
Version 1.0
71
AWS General Reference Reference guide
Service Quotas
The maximum
RestoreCertificateAuthority 20
number of
RestoreCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
The maximum
TagCertificateAuthority 10
number of
TagCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
The maximum
UntagCertificateAuthority 10
number of
UntagCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
Version 1.0
72
AWS General Reference Reference guide
AWS Chatbot
The maximum
UpdateCertificateAuthority 10
number of
UpdateCertificateAuthority
requests that you can
perform in this account
in the current region
per second.
For related information, see Quotas in the AWS Certificate Manager User Guide.
Service Quotas
Service quota Default
Service Endpoints
Amazon Chime has a single endpoint: service.chime.aws.amazon.com (HTTPS).
Service Quotas
The Service Quotas console provides information about most Amazon Chime quotas. Along with viewing
the default quotas, you can use the Service Quotas console to request quota increases for adjustable
quotas.
The following table lists additional quotas for Amazon Chime rooms and memberships.
Resource Default
Version 1.0
73
AWS General Reference Reference guide
AWS Cloud9
Resource Default
Service Endpoints
Version 1.0
74
AWS General Reference Reference guide
Service Quotas
Service Quotas
Version 1.0
75
AWS General Reference Reference guide
Amazon Cloud Directory
1
You can move an environment to attempt to increase the maximum number of members. However, the
absolute maximum number of members for an environment is still 25. For more information, see Moving
an Environment in the AWS Cloud9 User Guide.
For more information, see Quotas in the AWS Cloud9 User Guide.
Service Endpoints
Version 1.0
76
AWS General Reference Reference guide
AWS CloudFormation
Service Endpoints
Version 1.0
77
AWS General Reference Reference guide
Service Endpoints
Version 1.0
78
AWS General Reference Reference guide
StackSets regional support
For information about using AWS CloudFormation in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using AWS CloudFormation in the China Regions, see:
Version 1.0
79
AWS General Reference Reference guide
StackSets regional support
For more information, see AWS CloudFormation StackSets in the AWS CloudFormation User Guide.
Version 1.0
80
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Stacks 200
For more information, see AWS CloudFormation Quotas in the AWS CloudFormation User Guide.
Service Endpoints
Region Region Endpoint Protocol Amazon
Name Route 53
Hosted
Zone ID*
Service Quotas
General
Resource Default
Version 1.0
81
AWS General Reference Reference guide
AWS CloudHSM
Resource Default
SSL certificates per account when serving HTTPS requests using dedicated IP addresses (no quota 2
when serving HTTPS requests using SNI)
Custom headers that you can have Amazon CloudFront forward to the origin 10 name–value
Lambda@Edge
Resource Default
Distributions per AWS account that you can create triggers for 25
For more information, see Quotas in the Amazon CloudFront Developer Guide.
Service Endpoints
AWS CloudHSM
Version 1.0
82
AWS General Reference Reference guide
Service Endpoints
Version 1.0
83
AWS General Reference Reference guide
Service Endpoints
Version 1.0
84
AWS General Reference Reference guide
Service Quotas
For information about using AWS CloudHSM Classic in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
Service Quotas
AWS CloudHSM
Resource Default
Clusters 4
HSMs 6
For more information, see Quotas in the AWS CloudHSM User Guide.
Resource Default
HSM appliances 3
For more information, see Quotas in the AWS CloudHSM Classic User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
85
AWS General Reference Reference guide
Service Endpoints
Version 1.0
86
AWS General Reference Reference guide
Service Quotas
AWS Cloud Map is available in the South America (São Paulo) Region with the following limitations:
the AWS Cloud Map console isn't available, you can't create HTTP namespaces, and you can't use the
DiscoverInstances API to find resources.
Service Quotas
Resource Default
Any combination of private and public 8 per DNS name, per AWS Region
DNS namespaces
* When you create a namespace, we automatically create a Amazon Route 53 hosted zone. This hosted
zone counts against the quota on the number of hosted zones that you can create with an AWS account.
See Service Quotas (p. 418).
For more information, see AWS Cloud Map Quotas in the AWS Cloud Map Developer Guide.
Version 1.0
87
AWS General Reference Reference guide
Amazon CloudSearch
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Resource Default
Partitions 10
Version 1.0
88
AWS General Reference Reference guide
AWS CloudShell
Resource Default
Search instances 50
For more information, see Understanding Amazon CloudSearch Quotas in the Amazon CloudSearch
Developer Guide.
Service endpoints
Service endpoints are not yet published for AWS CloudShell.
You can currently work with AWS CloudShell in the following AWS Regions:
• US East (Ohio)
• US East (N. Virginia)
• US West (Oregon)
• Asia Pacific (Tokyo)
• Europe (Ireland)
Service quotas
Resource Default
Version 1.0
89
AWS General Reference Reference guide
AWS CloudTrail
Service Endpoints
Version 1.0
90
AWS General Reference Reference guide
Service Endpoints
For information about using AWS CloudTrail in the AWS GovCloud (US-West) Region, see AWS GovCloud
(US-West) Endpoints.
For information about using AWS CloudTrail in the China Regions, see:
Version 1.0
91
AWS General Reference Reference guide
Service Quotas
Service Quotas
CloudTrail has no increasable quotas. For more information, see Quotas in AWS CloudTrail.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
92
AWS General Reference Reference guide
Service Endpoints
Version 1.0
93
AWS General Reference Reference guide
Service Quotas
Service Quotas
• DeleteInsightRules
DescribeInsightRules
DisableInsightRules
EnableInsightRules
PutInsightRule
Version 1.0
94
AWS General Reference Reference guide
Service Quotas
DeleteAlarms request 3 TPS per Region for each of these operations. The
maximum number of operation requests you can make per
DescribeAlarmHistory request second without being throttled.
DescribeAlarmsForMetric request These quotas cannot be changed.
DisableAlarmActions request
EnableAlarmActions request
SetAlarmState request
DeleteDashboards request 10 TPS per Region for each of these operations. The
maximum number of operation requests you can make per
GetDashboard request second without being throttled.
ListDashboards request These quotas cannot be changed.
PutDashboard request
Version 1.0
95
AWS General Reference Reference guide
Service Quotas
Metric data values The value of a metric data point must be within the range of
-2^360 to 2^360. Special values (for example, NaN, +Infinity,
-Infinity) are not supported. This quota cannot be changed.
Version 1.0
96
AWS General Reference Reference guide
Amazon CloudWatch Events
For more information, see CloudWatch Quotas in the Amazon CloudWatch User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
97
AWS General Reference Reference guide
Service Endpoints
Version 1.0
98
AWS General Reference Reference guide
Service Quotas
For information about using Amazon CloudWatch Events in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
Service Quotas
Resource Default
Export task One active (running or pending) export task at a time, per
account. This quota cannot be changed.
GetLogEvents 10 requests per second per account per Region. This quota
cannot be changed.
Log groups 20,000 log groups per account per Region. You can request a
quota increase.
Version 1.0
99
AWS General Reference Reference guide
Amazon CloudWatch Logs
Resource Default
Metrics filters 100 per log group. This quota cannot be changed.
Query results displayed in console In CloudWatch Logs Insights query results, a maximum of
10000 log events are displayed on the console. This quota
cannot be changed.
For more information, see CloudWatch Logs Quotas in the Amazon CloudWatch Logs User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
100
AWS General Reference Reference guide
Service Endpoints
Version 1.0
101
AWS General Reference Reference guide
Service Quotas
For information about using Amazon CloudWatch Logs in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon CloudWatch Logs in the China Regions, see:
Service Quotas
CloudWatch Logs has the following quotas:
Discovered log fields CloudWatch Logs Insights can discover a maximum of 1000
log event fields in a log group. This quota can't be changed.
Version 1.0
102
AWS General Reference Reference guide
Service Quotas
Extracted log fields in JSON logs CloudWatch Logs Insights can extract a maximum of 100 log
event fields from a JSON log. This quota can't be changed.
Export task One active (running or pending) export task at a time, per
account. This quota can't be changed.
GetLogEvents 10 requests per second per account per Region. This quota
can't be changed.
Log groups 1,000,000 log groups per account per Region. You can
request a quota increase.
Metrics filters 100 per log group. This quota can't be changed.
Embedded metric format metrics 100 metrics per log event and 9 dimensions per metric.
For more information about the embedded metric format,
see Specification: Embedded Metric Format in the Amazon
CloudWatch User Guide.
Query execution timeout Queries in CloudWatch Logs Insights time out after 15
minutes. This time limit can't be changed.
Version 1.0
103
AWS General Reference Reference guide
Amazon CloudWatch Synthetics
Query results availability Results from a query are retrievable for 7 days. This
availability time can't be changed.
Query results displayed in console By default, up to 1000 rows of query results are displayed
on the console. You can use the limit command in a
query to increase this to as many as 10,000 rows. For more
information, see CloudWatch Logs Insights Query Syntax.
Saved queries You can save as many as 1000 CloudWatch Logs Insights
queries, per Region per account. This quota can't be
changed.
Service Endpoints
Version 1.0
104
AWS General Reference Reference guide
Service Endpoints
Version 1.0
105
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
For more information, see CloudWatch Quotas in the Amazon CloudWatch User Guide.
Service Endpoints
Version 1.0
106
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Quota
Version 1.0
107
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Version 1.0
108
AWS General Reference Reference guide
Service Quotas
For information about using AWS CodeBuild in the China Regions, see:
Service Quotas
Resource Default
Version 1.0
109
AWS General Reference Reference guide
AWS CodeCommit
* Quotas for the maximum number of concurrent running builds vary, depending on the compute type.
For some compute types, the default is 20. To request a higher concurrent build quota or if you get a
"Cannot have more than X active builds for the account" error, contact AWS support.
For more information, see Quotas for CodeBuild in the AWS CodeBuild User Guide.
Service Endpoints
Version 1.0
110
AWS General Reference Reference guide
Service Endpoints
For information about Git connection endpoints, including SSH and HTTPS information, see Regions and
Git Connection Endpoints for CodeCommit.
Version 1.0
111
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
For more information, see Quotas in CodeCommit in the AWS CodeCommit User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
112
AWS General Reference Reference guide
Service Endpoints
Version 1.0
113
AWS General Reference Reference guide
Service Quotas
For information about using AWS CodeDeploy in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using AWS CodeDeploy in the China Regions, see:
Service Quotas
Resource Default
For more information, see Quotas in CodeDeploy in the AWS CodeDeploy User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
114
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
115
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Resource Default
Version 1.0
116
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Version 1.0
117
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
118
AWS General Reference Reference guide
AWS CodeStar
Resource Default
AWS Step Functions invoke action: 7 days
For more information, see Quotas in CodePipeline in the AWS CodePipeline User Guide.
Version 1.0
119
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
AWS CodeStar
Version 1.0
120
AWS General Reference Reference guide
AWS CodeStar Notifications
Version 1.0
121
AWS General Reference Reference guide
Amazon Cognito Identity
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Amazon Cognito User Pools
Version 1.0
122
AWS General Reference Reference guide
Service Endpoints
Version 1.0
123
AWS General Reference Reference guide
Service Endpoints
Version 1.0
124
AWS General Reference Reference guide
Service Quotas
Service Quotas
Amazon Cognito User Pools
Resource Default
For more information, see Quotas in Amazon Cognito in the Amazon Cognito Developer Guide.
For more information, see Quotas in Amazon Cognito in the Amazon Cognito Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
125
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
For more information, see Quotas in Amazon Cognito in the Amazon Cognito Developer Guide.
Version 1.0
126
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Amazon Comprehend
Version 1.0
127
AWS General Reference Reference guide
Service Quotas
Service Quotas
Amazon Comprehend
Resource Default
You can request an increase for any of the quotas using the Amazon Comprehend service quotas increase
form.
For more information, see Guidelines and Quotas in the Amazon Comprehend Developer Guide.
Service Endpoints
Amazon Comprehend Medical
Version 1.0
128
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
129
AWS General Reference Reference guide
Compute Optimizer
You can request an increase for any of the quotas using the Amazon Comprehend Medical service quotas
increase form.
Character encoding for Amazon Comprehend Medical is in UTF-8. Amazon Comprehend Medical
operations have the following quotas:
Description Quota
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
130
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
131
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Version 1.0
132
AWS General Reference Reference guide
Service Endpoints
For information about using AWS Config in the AWS GovCloud (US-West) Region, see AWS GovCloud
(US-West) Endpoints.
For information about using AWS Config in the China Regions, see:
Version 1.0
133
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default Notes
Number of AWS Config rules per Region 250 You can request a
in your account quota increase.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
134
AWS General Reference Reference guide
Service Quotas
The Amazon Connect Contact Lens Service has a single endpoint: contact-lens.[REGION].amazonaws.com
(HTTPS).
The Amazon Connect Customer Profiles Service has a single endpoint: profile.[REGION].amazonaws.com
(HTTPS).
Service Quotas
For the list of service quotas, see Amazon Connect Service Quotas in the Amazon Connect Administrator
Guide.
Service Endpoints
Version 1.0
135
AWS General Reference Reference guide
Amazon Data Lifecycle Manager
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
136
AWS General Reference Reference guide
Service Endpoints
Version 1.0
137
AWS General Reference Reference guide
Service Quotas
Service Quotas
You can create up to 100 lifecycle policies per Region.
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Attribute Value Adjustable
Version 1.0
138
AWS General Reference Reference guide
DataSync
For more additional, see AWS Data Pipeline Quotas in the AWS Data Pipeline Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
139
AWS General Reference Reference guide
Service Endpoints
Version 1.0
140
AWS General Reference Reference guide
Service Quotas
For information about using AWS DataSync in the AWS GovCloud (US-West) Region, see AWS GovCloud
(US-West) Endpoints.
Service Quotas
Resource Value
Version 1.0
141
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Version 1.0
142
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Replication instances 60
Endpoints 1000
Tasks 600
Version 1.0
143
AWS General Reference Reference guide
AWS DeepLens
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Resource Default Adjustable
upon
Request
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
144
AWS General Reference Reference guide
Service Endpoints
Version 1.0
145
AWS General Reference Reference guide
Amazon DevOps Guru
Service Endpoints
Region Region Endpoint Protocol
Name
Service quotas
Resource Quota
For more information, see Quotas in Amazon DevOps Guru in the Amazon DevOps Guru User Guide.
Version 1.0
146
AWS General Reference Reference guide
AWS Device Farm
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Resource Default
Number of devices that AWS Device Farm can test during a run 5
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
147
AWS General Reference Reference guide
Service Endpoints
Version 1.0
148
AWS General Reference Reference guide
Service Quotas
For information about using AWS Direct Connect in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using AWS Direct Connect in the China Regions, see:
Service Quotas
For more information, see AWS Direct Connect Quotas in the AWS Direct Connect User Guide.
Version 1.0
149
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
150
AWS General Reference Reference guide
Service Quotas
For a list of supported Region endpoints by directory type, see Region Availability for AWS Directory
Service.
For information about using AWS Directory Service in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using AWS Directory Service in the China (Beijing) Region, see China (Beijing)
Region Endpoints.
Service Quotas
For a list of Simple AD service quotas, see Limits for Simple AD.
For a list of AWS Managed Microsoft AD service quotas, see Limits for AWS Managed Microsoft AD.
Version 1.0
151
AWS General Reference Reference guide
Amazon DocumentDB
Service Endpoints
Version 1.0
152
AWS General Reference Reference guide
Service Quotas
For information on finding and connecting to your cluster or instance endpoints, see Working with
Amazon DocumentDB Endpoints in the Amazon DocumentDB Developer Guide.
Service Quotas
Resource Default
Clusters 40
Event subscriptions 20
Instances 40
Subnet groups 50
For more information, see Amazon DocumentDB Service Quotas in the Amazon DocumentDB Developer
Guide.
Version 1.0
153
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
DynamoDB
Version 1.0
154
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon DynamoDB in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon DynamoDB in the China Regions, see:
Version 1.0
155
AWS General Reference Reference guide
Service Endpoints
Version 1.0
156
AWS General Reference Reference guide
Service Endpoints
Version 1.0
157
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon DynamoDB Streams in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
For information about using Amazon DynamoDB Streams in the China Regions, see:
Version 1.0
158
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
US East (N. Virginia), US East (Ohio), US West (N. California), US 40,000 read capacity units and
West (Oregon), South America (São Paulo), Europe (Frankfurt), 40,000 write capacity units
Europe (Ireland), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia
Pacific (Singapore), Asia Pacific (Sydney), China (Beijing) Regions:
US East (N. Virginia), US East (Ohio), US West (N. California), US 80,000 read capacity units and
West (Oregon), South America (São Paulo), Europe (Frankfurt), 80,000 write capacity units
Europe (Ireland), Asia Pacific (Tokyo), Asia Pacific (Seoul), Asia
Pacific (Singapore), Asia Pacific (Sydney), China (Beijing) Regions:
For more information, see Quotas in Amazon DynamoDB in the Amazon DynamoDB Developer Guide.
Service Endpoints
Elastic Beanstalk
Version 1.0
159
AWS General Reference Reference guide
Service Endpoints
Version 1.0
160
AWS General Reference Reference guide
Service Endpoints
For information about using AWS Elastic Beanstalk in the China Regions, see:
Version 1.0
161
AWS General Reference Reference guide
Service Endpoints
Version 1.0
162
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Applications 75
Environments 200
Topics
• Service Endpoints (p. 164)
• Service Quotas (p. 167)
Version 1.0
163
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Use the Amazon EBS endpoints in Amazon Elastic Compute Cloud (Amazon EC2) to manage EBS
volumes, snapshots, and encryption. For more information, see Amazon EBS Actions in the Amazon EC2
API Reference.
Use the EBS direct API endpoints to directly read the data on your EBS snapshots, and identify the
difference between two snapshots. For more information, see Accessing the Contents of an EBS
Snapshot in the Amazon Elastic Compute Cloud User Guide.
Topics
• Endpoints for Amazon EBS in Amazon EC2 (p. 164)
• Endpoints for the EBS direct APIs (p. 166)
Version 1.0
164
AWS General Reference Reference guide
Service Endpoints
Version 1.0
165
AWS General Reference Reference guide
Service Endpoints
Version 1.0
166
AWS General Reference Reference guide
Service Quotas
Service Quotas
Version 1.0
167
AWS General Reference Reference guide
Service Quotas
Version 1.0
168
AWS General Reference Reference guide
Service Quotas
Resource Default
Version 1.0
169
AWS General Reference Reference guide
Amazon EC2
Resource Default
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
170
AWS General Reference Reference guide
Service Endpoints
Version 1.0
171
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Security group rules per instance for EC2-Classic 800 (calculated as rules per security group
multiplied by security groups per instance). If you
reference other security groups in your rules, we
Version 1.0
172
AWS General Reference Reference guide
EC2 Image Builder
Resource Default
recommend using security group names of 22
characters or less.
Throttle on the emails that can be sent from your Throttle applied
Amazon EC2 account
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
173
AWS General Reference Reference guide
Service Endpoints
Version 1.0
174
AWS General Reference Reference guide
Service Quotas
Service Quotas
Unless otherwise noted, each quota is per AWS Region. Please contact AWS Support to request an
increase in your service quota.
Resource Default
The maximum number of concurrent builds that can be in progress in this account 100 builds per
in the current Region. account per
Region
The maximum number of EC2 Image Builder components that you can create in 1,000 components
an account in the current Region. per account per
Region
The maximum size of the data field of an EC2 Image Builder component. 16 KB
The maximum number of EC2 Image Builder image pipelines that you can create 75 image pipelines
in an account in the current Region. per account per
Region
The maximum number of EC2 Image Builder image recipes that you can create in 1,000 image
an account in the current Region. recipes per
account per
Region
The maximum number of EC2 Image Builder components that can be associated 20 components
with a single EC2 Image Builder image recipe. per image per
Region
The maximum number of EC2 Image Builder infrastructure configurations that 1,000
you can create in an account in the current Region. configurations
per account per
Region
The maximum number of EC2 Image Builder distribution configurations that you 1,000
can create in an account in the current Region. configurations
per account per
Region
Version 1.0
175
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
The ecr and api.ecr endpoints are used for calls to the Amazon ECR API. API actions such as
DescribeImages and CreateRepository go to this endpoint. While the two endpoints function
the same, the api.ecr endpoint is recommended and the default when using the AWS CLI or AWS
SDKs. When connecting to Amazon ECR through an AWS PrivateLink VPC endpoint, you must use the
api.ecr endpoint to make API calls. For more information, see Amazon ECR Interface VPC Endpoints
(AWS PrivateLink) in the Amazon Elastic Container Registry User Guide.
For more information about FIPS endpoints, see FIPS endpoints (p. 538).
ecr-fips.us-east-2.amazonaws.com HTTPS
dkr.ecr-fips.us-east-2.amazonaws.com HTTPS
ecr-fips.us-east-1.amazonaws.com HTTPS
dkr.ecr-fips.us-east-1.amazonaws.com HTTPS
ecr-fips.us-west-1.amazonaws.com HTTPS
dkr.ecr-fips.us-west-1.amazonaws.com HTTPS
ecr-fips.us-west-2.amazonaws.com HTTPS
dkr.ecr-fips.us-west-2.amazonaws.com HTTPS
Version 1.0
176
AWS General Reference Reference guide
Service Endpoints
Version 1.0
177
AWS General Reference Reference guide
Service Endpoints
ecr-fips.us-gov-east-1.amazonaws.com HTTPS
dkr.ecr-fips.us-gov-east-1.amazonaws.com HTTPS
ecr-fips.us-gov-west-1.amazonaws.com HTTPS
dkr.ecr-fips.us-gov-west-1.amazonaws.com HTTPS
For more information about FIPS endpoints, see FIPS endpoints (p. 538).
Version 1.0
178
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon ECR in the China Regions, see:
Version 1.0
179
AWS General Reference Reference guide
Service Quotas
Service Quotas
The following table provides the default limits for Amazon Elastic Container Registry (Amazon ECR).
The following table provides the default rate quotas for each of the Amazon ECR API actions involved
with the image push and image pull actions.
When an image is
pushed to a repository,
each image layer is
checked to verify if
it has been uploaded
before. If it has been
uploaded, then the
image layer is skipped.
When an image
is pushed, the
InitiateLayerUpload
API is called once
per image layer that
has not already been
uploaded. Whether
or not an image layer
Version 1.0
180
AWS General Reference Reference guide
Service Quotas
When an image
is pushed, the
CompleteLayerUpload
API is called once
per each new image
layer to verify that the
upload has completed.
When an image is
pushed, each new
image layer is uploaded
in parts. The maximum
size of each image layer
part can be 20,971,520
bytes (or about 20MB).
The UploadLayerPart
API is called once per
each new image layer
part.
When an image is
pushed and all new
image layers have been
uploaded, the PutImage
API is called once to
create or update the
image manifest and the
tags associated with the
image.
Version 1.0
181
AWS General Reference Reference guide
Service Quotas
When an image
is pulled, the
BatchGetImage API is
called once to retrieve
the image manifest.
When an image
is pulled, the
GetDownloadUrlForLayer
API is called once per
image layer that is not
already cached.
The following table provides other quotas for Amazon ECR and Docker images that cannot be changed.
Note
The layer part information mentioned in the following table is only applicable if you are calling
the Amazon ECR API actions directly to initiate multipart uploads for image push operations.
This is a rare action. We recommend that you use the Docker CLI to pull, tag, and push images.
Version 1.0
182
AWS General Reference Reference guide
Amazon ECR Public
** The maximum layer size listed here is calculated by multiplying the maximum layer part size (10 MiB)
by the maximum number of layer parts (1,000).
For more information, see Amazon ECR Service Quotas in the Amazon Elastic Container Registry User
Guide.
Service endpoints
The ecr-public and api.ecr-public endpoints are used for calls to the Amazon ECR Public API.
API actions such as DescribeImages and CreateRepository go to this endpoint. While the two
endpoints function the same, the api.ecr-public endpoint is recommended and the default when
using the AWS CLI or AWS SDKs.
Service quotas
For more information, see Amazon ECR Public service quotas in the Amazon ECR Public user guide.
Version 1.0
183
AWS General Reference Reference guide
Amazon ECS
Service endpoints
Version 1.0
184
AWS General Reference Reference guide
Amazon ECS service quotas
For information about using Amazon ECS in the China Regions, see:
Version 1.0
185
AWS General Reference Reference guide
Amazon ECS service quotas
Most of these service quotas, but not all, are listed under the Amazon Elastic Container Service (Amazon
ECS) namespace in the Service Quotas console. To request a quota increase, see Requesting a quota
increase in the Service Quotas User Guide.
Version 1.0
186
AWS General Reference Reference guide
AWS Fargate service quotas
For more information, see Amazon ECS service quotas in the Amazon Elastic Container Service Developer
Guide.
These service quotas are listed under the AWS Fargate namespace in the Service Quotas console. To
request a quota increase, see Requesting a quota increase in the Service Quotas User Guide.
Version 1.0
187
AWS General Reference Reference guide
Amazon EKS
Service Endpoints
Version 1.0
188
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
189
AWS General Reference Reference guide
AWS Fargate service quotas
Resource Default
These service quotas are listed under the AWS Fargate namespace in the Service Quotas console. To
request a quota increase, see Requesting a quota increase in the Service Quotas User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
190
AWS General Reference Reference guide
Service Endpoints
Version 1.0
191
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Elastic File System in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
For information about using Amazon Elastic File System in the China Regions, see:
Version 1.0
192
AWS General Reference Reference guide
Service Quotas
Service Quotas
Total bursting throughput for all US East (Ohio) Region 3 GiB/s 5 GiB/s
connected clients
US East (N. Virginia) Region 3 GiB/s 5 GiB/s
For more information, see Amazon EFS Quotas in the Amazon Elastic File System User Guide.
Version 1.0
193
AWS General Reference Reference guide
Amazon Elastic Inference
Service Endpoints
Service Quotas
Version 1.0
194
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
elasticloadbalancing-
fips.us-
east-2.amazonaws.com
elasticloadbalancing-
fips.us-
east-1.amazonaws.com
elasticloadbalancing-
fips.us-
west-1.amazonaws.com
elasticloadbalancing-
fips.us-
west-2.amazonaws.com
Version 1.0
195
AWS General Reference Reference guide
Service Quotas
Service Quotas
Elastic Load Balancing supports multiple types of load balancers.
Version 1.0
196
AWS General Reference Reference guide
Service Quotas
Resource Default
Resource Default
* This quota is shared by target groups for your Application Load Balancers and Network Load Balancers.
Resource Default
Version 1.0
197
AWS General Reference Reference guide
Elastic Transcoder
Resource Default
Targets per Availability Zone per target group with GENEVE 300
protocol
Resource Default
Service Endpoints
Version 1.0
198
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
User-defined presets 50
Maximum rate at which you can submit requests You can submit two requests per second per AWS
to create a job account at a sustained rate; brief bursts of 100
requests per second are allowed.
Maximum rate at which you can submit requests You can submit four requests per second per AWS
to read a job account at a sustained rate; brief bursts of 50
requests per second are allowed.
For more information, see Amazon Elastic Transcoder quotas in the Amazon Elastic Transcoder Developer
Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
199
AWS General Reference Reference guide
Service Endpoints
Version 1.0
200
AWS General Reference Reference guide
Service Quotas
The Asia Pacific (Osaka-Local) Region is a local Region that is available to select AWS customers who
request access. Customers wishing to use the Asia Pacific (Osaka-Local) Region should speak with their
sales representative. The Asia Pacific (Osaka-Local) Region supports a single Availability Zone.
For information about using Amazon ElastiCache in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
Service Quotas
For information on ElastiCache terminology, see ElastiCache Components and Features.
Version 1.0
201
AWS General Reference Reference guide
Amazon ES
These quotas are global quotas per customer account. To exceed these quotas, make your request using
the ElastiCache Node request form.
Version 1.0
202
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Version 1.0
203
AWS General Reference Reference guide
Amazon EMR
Service Endpoints
Version 1.0
204
AWS General Reference Reference guide
Service Endpoints
Version 1.0
205
AWS General Reference Reference guide
Service Quotas
If you specify the general endpoint (elasticmapreduce.amazonaws.com), Amazon EMR directs your
request to an endpoint in the default Region. For accounts created on or after March 8, 2013, the default
Region is us-west-2; for older accounts, the default Region is us-east-1.
For information about using Amazon EMR in the AWS GovCloud (US-West) Region, see AWS GovCloud
(US-West) Endpoints.
For information about using Amazon EMR in the China Regions, see:
Service Quotas
Resource Default
Version 1.0
206
AWS General Reference Reference guide
Service Quotas
Resource Default
Instances per cluster Amazon EC2 quotas for On-Demand, Spot, and
Reserved Instances apply. For more information,
see Service Quotas for Amazon EC2 (p. 170).
Amazon EMR notebooks per cluster Dependent on master node instance type. For
more information, see Notebook Limits Per
Cluster in the Amazon EMR Management Guide.
Amazon EMR throttles the following API requests for each AWS account on a per-Region basis. For
more information about how throttling is applied, see API Request Throttling in the Amazon EC2 API
Reference. You can request an increase to API throttling quotas for your AWS account. To request a quota
adjustment, create a case using the AWS Support Center.
API Action Bucket Maximum Capacity Bucket Refill Rate (per second)
DescribeJobFlows 20 0.2
RunJobFlow 10 0.5
TerminateJobFlows 10 0.5
AddJobFlowSteps 10 0.5
AddInstanceGroups 5 0.2
ModifyInstanceGroups 5 0.2
SetTerminationProtection 5 0.2
SetVisibleToAllUsers 5 0.2
ListClusters 20 0.5
DescribeCluster 10 1.0
ListSteps 10 0.5
DescribeStep 10 0.5
ListInstanceGroups 5 0.5
ListBootstrapActions 5 0.5
ListInstances 10 0.5
AddTags 5 0.5
RemoveTags 5 0.5
Version 1.0
207
AWS General Reference Reference guide
EventBridge
Service Endpoints
Version 1.0
208
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon EventBridge in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
Version 1.0
209
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see EventBridge Quotas in the Amazon EventBridge User Guide.
Service Endpoints
Version 1.0
210
AWS General Reference Reference guide
Service Quotas
Service Quotas
AWS Firewall Manager has default quotas on the number of entities per account. You can request an
increase in these quotas.
Resource Default
Version 1.0
211
AWS General Reference Reference guide
Forecast
Resource Default
quota. The count
is returned if the
invited account
declines, the
master account
cancels the
invitation, or the
invitation expires.
Resource Value
Service Endpoints
Amazon Forecast
Version 1.0
212
AWS General Reference Reference guide
Service Endpoints
Version 1.0
213
AWS General Reference Reference guide
Amazon Fraud Detector
Service Endpoints
Version 1.0
214
AWS General Reference Reference guide
Service Quotas
Service Quotas
Machine learning model
getEventEvaluation
Service Endpoints
The following tables provide a list of Region-specific endpoints that FreeRTOS supports for Over-the-Air
functionality. The FreeRTOS console is also supported in these Regions.
Version 1.0
215
AWS General Reference Reference guide
Service Endpoints
Version 1.0
216
AWS General Reference Reference guide
Service Endpoints
Version 1.0
217
AWS General Reference Reference guide
Service Quotas
Service Quotas
FreeRTOS OTA Resource Quotas
Resource Default
CreateOTAUpdate 10 TPS
DeleteOTAUpdate 5 TPS
GetOTAUpdate 15 TPS
ListOTAUpdates 15 TPS
Version 1.0
218
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
219
AWS General Reference Reference guide
Service Quotas
Service Quotas
Amazon FSx for Lustre
Total storage for all file systems 100,800 GiB. This is the default Petabytes
value.
For more information, see FSx Lustre Quotas in the Amazon FSx for Lustre User Guide.
Version 1.0
220
AWS General Reference Reference guide
GameLift
Total storage for all file systems 512 TiB Multiple PiBs
For more information, see FSx for Windows Quotas in the Amazon FSx for Windows File Server User Guide.
Service Endpoints
Version 1.0
221
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Aliases 20
Fleets 20
Builds 1000
Scripts 1000
Version 1.0
222
AWS General Reference Reference guide
S3 Glacier
Resource Default
GameLift SDK v3.x and up: 50
VPC peering connections For quotas on active and pending VPC peering
connections, see Amazon VPC (p. 519).
Service Endpoints
Version 1.0
223
AWS General Reference Reference guide
Service Endpoints
Version 1.0
224
AWS General Reference Reference guide
Service Quotas
For information about using Amazon S3 Glacier in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon S3 Glacier in the China Regions, see:
Service Quotas
Resource Default
Service Endpoints
Region Region Endpoint Protocol Amazon
Name Route 53
Hosted
Zone ID*
Version 1.0
225
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
In addition, there are quotas for Elastic IP addresses, Network Load Balancers, and Application Load
Balancers that are used as endpoints for an accelerator. For more information, see the following:
• Elastic IP Address Quota in the Amazon EC2 User Guide for Linux Instances.
• Quotas for Your Network Load Balancers in the User Guide for Network Load Balancers.
• Quotas for Your Application Load Balancers in the User Guide for Application Load Balancers.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
226
AWS General Reference Reference guide
Service Endpoints
Version 1.0
227
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
228
AWS General Reference Reference guide
AWS Glue DataBrew
Resource Default
Some of the quotas for AWS Glue vary for the AWS GovCloud (US-West) Region. For more information,
see AWS Glue in the AWS GovCloud (US) User Guide.
Service Endpoints
Version 1.0
229
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
230
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Service Quotas
Resource Default
For more information, see the AWS Ground Station User Guide.
Version 1.0
231
AWS General Reference Reference guide
GuardDuty
Service Endpoints
Version 1.0
232
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Detectors 1
Filters 100
Trusted IP sets 1
Version 1.0
233
AWS General Reference Reference guide
AWS Health
Resource Default
Service Endpoints
AWS Health has a single endpoint: health.us-east-1.amazonaws.com (HTTPS).
Description Limit
The following table describes the Data Store service quotas for HealthLake for the preview period.
Description Limit
Version 1.0
234
AWS General Reference Reference guide
Amazon Honeycode
Description Limit
The following table lists the quotas for Import jobs for the preview period.
Description Limit
Amazon Honeycode
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Amazon Honeycode has a single endpoint: honeycode.us-west-2.amazonaws.com (HTTPS).
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
235
AWS General Reference Reference guide
Service Endpoints
Version 1.0
236
AWS General Reference Reference guide
Service Quotas
Service Quotas
AWS allows you to request an increase to default quotas for IAM entities. You can use Service Quotas to
manage your IAM quotas. For adjustable IAM quotas, you can request a quota increase. Smaller increases
are automatically approved in Service Quotas and are completed within a few minutes. Larger requests
above the maximum autoapproved increase are submitted to AWS Support. Some adjustable quotas
can't be increased above the maximum autoapproved increase amount. You can track your request case
in the AWS Support console.
To request a quota increase, sign in to the AWS Management Console and open the Service Quotas
console at https://console.aws.amazon.com/servicequotas/. In the navigation pane, choose AWS
services. On the navigation bar, choose the US East (N. Virginia) Region. Then search for IAM. Choose
AWS Identity and Access Management (IAM), choose a quota, and follow the directions to request a
quota increase. For more information, see Requesting a Quota Increase in the Service Quotas User Guide.
ACL (Assume role policy) size per 2048 characters 4096 characters
role
Version 1.0
237
AWS General Reference Reference guide
IAM Access Analyzer
Virtual MFA devices (assigned or Equal to the user quota for the Not applicable
unassigned) in an AWS account account
These quotas can be changed. For information about other quotas that cannot be changed, see IAM and
STS Quotas in the IAM User Guide.
Service endpoints
Region Region Endpoint Protocol
Name
Version 1.0
238
AWS General Reference Reference guide
Service endpoints
Version 1.0
239
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service Endpoints
Endpoint Protocol
importexport.amazonaws.com HTTPS
Version 1.0
240
AWS General Reference Reference guide
Amazon Inspector
Amazon Inspector
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Version 1.0
241
AWS General Reference Reference guide
Service Quotas
For information about using Amazon Inspector in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
Service Quotas
Resource Default
Assessment targets 50
Service Endpoints
AWS IoT 1-Click Projects API
The following table lists the service endpoints for AWS IoT 1-Click Projects. For more information, see
the AWS IoT 1-Click Projects API Reference.
Version 1.0
242
AWS General Reference Reference guide
Service Quotas
Service Quotas
API Transactions per Second Adjustable
10
AssociateDeviceWithPlacement No
ClaimDevicesByClaimCode 10 No
CreatePlacement 10 No
CreateProject 10 No
DeletePlacement 10 No
DeleteProject 10 No
DescribeDevice 10 No
DescribePlacement 10 No
DescribeProject 10 No
10
DisassociateDeviceFromPlacement No
FinalizeDeviceClaim 10 No
Version 1.0
243
AWS General Reference Reference guide
AWS IoT Analytics
GetDeviceMethods 10 No
GetDevicesInPlacement 10 No
InitiateDeviceClaim 10 No
InvokeDeviceMethod 10 No
ListDeviceEvents 10 No
ListDevices 10 No
ListPlacements 10 No
ListProjects 10 No
ListTagsForResource 10 No
TagResource 10 No
UnclaimDevice 10 No
UntagResource 10 No
UpdateDeviceState 10 No
UpdatePlacement 10 No
UpdateProject 10 No
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
244
AWS General Reference Reference guide
Service Quotas
Service Quotas
API Default Description Adjustable
Version 1.0
245
AWS General Reference Reference guide
AWS IoT Core
Service Endpoints
The following sections describe the service endpoints for AWS IoT Core.
Note
You can use these endpoints to perform the operations in the AWS IoT API Reference. The
endpoints in the following sections are different from the device endpoints, which provide
devices an MQTT publish/subscribe interface and a subset of the API operations. For more
information about the data, credential access, and job management endpoints used by devices,
see AWS IoT device endpoints.
For information about connecting to and using the AWS IoT endpoints, see Connecting devices
to AWS IoT in the AWS IoT Developer Guide.
For information about using AWS IoT in the AWS GovCloud (US-West) Region, see AWS GovCloud (US-
West) Endpoints.
For information about using AWS IoT in the China Regions, see:
Topics
• Control Plane API Endpoints (p. 247)
• Data Plane API Endpoints (p. 248)
• Jobs Data Plane API Endpoints (p. 250)
• Secure Tunneling API Endpoints (p. 251)
Version 1.0
246
AWS General Reference Reference guide
Service Endpoints
Version 1.0
247
AWS General Reference Reference guide
Service Endpoints
For information about using AWS IoT in the AWS GovCloud (US) Regions, see AWS GovCloud (US)
Endpoints.
For information about using AWS IoT in the China Regions, see:
Version 1.0
248
AWS General Reference Reference guide
Service Endpoints
Version 1.0
249
AWS General Reference Reference guide
Service Endpoints
Version 1.0
250
AWS General Reference Reference guide
Service Endpoints
Version 1.0
251
AWS General Reference Reference guide
Service Endpoints
Version 1.0
252
AWS General Reference Reference guide
Service Quotas
Service Quotas
Contents
Version 1.0
253
AWS General Reference Reference guide
Service Quotas
Version 1.0
254
AWS General Reference Reference guide
Service Quotas
Resource Limits
Resource Quota
AcceptCertificateTransfer 10 Yes
AddThingToBillingGroup 60 Yes
AddThingToThingGroup 60 Yes
AssociateTargetsWithJob 10
AttachPolicy 15 Yes
AttachPrincipalPolicy 15 Yes
AttachThingPrincipal 15
Version 1.0
255
AWS General Reference Reference guide
Service Quotas
CancelCertificateTransfer 10 Yes
CancelJob 10
CancelJobExecution 10
ClearDefaultAuthorizer 10 Yes
CreateAuthorizer 10 Yes
CreateBillingGroup 25 Yes
CreateCertificateFromCsr 15 Yes
CreateDomainConfiguration 10 Yes
CreateDynamicThingGroup 5 Yes
CreateJob 10
CreateKeysAndCertificate 10 Yes
CreatePolicy 10 Yes
CreatePolicyVersion 10 Yes
CreateProvisioningClaim 10 Yes
CreateProvisioningTemplate 10 Yes
10
CreateProvisioningTemplateVersion Yes
CreateRoleAlias 10 Yes
CreateThing 15 Yes
CreateThingGroup 25 Yes
CreateThingType 15 Yes
CreateTopicRule 5 No
CreateTopicRuleDestination 5 No
DeleteAuthorizer 10 Yes
DeleteBillingGroup 15 Yes
DeleteCertificate 10 Yes
DeleteDomainConfiguration 10 Yes
DeleteCACertificate 10 Yes
DeleteDynamicThingGroup 5 Yes
DeleteJob 10
DeleteJobExecution 10
DeletePolicy 10 Yes
Version 1.0
256
AWS General Reference Reference guide
Service Quotas
DeletePolicyVersion 10 Yes
DeleteProvisioningTemplate 10 Yes
10
DeleteProvisioningTemplateVersion Yes
DeleteRegistrationCode 10 Yes
DeleteRoleAlias 10 Yes
DeleteThing 15 Yes
DeleteThingGroup 15 Yes
DeleteThingType 15 Yes
DeprecateThingType 15 Yes
DeleteTopicRule 20 No
DeleteTopicRuleDestination 5 No
DeleteV2LoggingLevel 2 No
DescribeAuthorizer 10 Yes
DescribeCertificate 10 Yes
DescribeCertificateTag 10 Yes
DescribeCACertificate 10 Yes
DescribeDomainConfiguration10 Yes
DescribeEndpoint 10 Yes
DescribeDefaultAuthorizer 10 Yes
DescribeJob 10
DescribeJobExecution 10
10
DescribeProvisioningTemplate Yes
10
DescribeProvisioningTemplateVersion Yes
DescribeRoleAlias 10 Yes
DescribeThingType 10 Yes
DetachThingPrincipal 15 Yes
DisableTopicRule 5 No
EnableTopicRule 5 No
Version 1.0
257
AWS General Reference Reference guide
Service Quotas
DetachPrincipalPolicy 15 Yes
DetachPolicy 15 Yes
GetEffectivePolicies 50 Yes
GetJobDocument 10
GetLoggingOptions 2 No
GetPolicy 10 Yes
GetPolicyVersion 15 Yes
GetRegistrationCode 10 Yes
GetTopicRule 200 No
GetTopicRuleDestination 50 No
GetV2LoggingOptions 2 No
ListAttachedPolicies 15 Yes
ListAuthorizers 10 Yes
ListBillingGroups 10 Yes
ListCACertificates 10 Yes
ListCertificates 10 Yes
ListDomainConfigurations 10 Yes
ListCertificatesByCA 10 Yes
ListJobExecutionsForJob 10
ListJobExecutionsForThing 10
ListJobs 10
ListOutgoingCertificates 10 Yes
ListPolicies 10 Yes
ListPolicyPrincipals 10 Yes
ListPolicyVersions 10 Yes
ListPrincipalPolicies 15 Yes
ListPrincipalThings 10 Yes
ListProvisioningTemplates 10 Yes
10
ListProvisioningTemplateVersions Yes
ListRoleAliases 10 Yes
ListTagsForResource 10 Yes
Version 1.0
258
AWS General Reference Reference guide
Service Quotas
ListTargetsForPolicy 10 Yes
ListThingGroups 10 Yes
ListThingGroupsForThing 10 Yes
ListThingPrincipals 10 Yes
ListThings 10 Yes
ListThingsInBillingGroup 25 Yes
ListThingsInThingGroup 25 Yes
ListThingTypes 10 Yes
ListTopicRuleDestinations 1 No
ListTopicRules 1 No
ListV2LoggingLevels 2 No
RegisterCertificate 10 Yes
10
RegisterCertificateWithoutCA Yes
RegisterCACertificate 10 Yes
RegisterThing 10 Yes
RejectCertificateTransfer 10 Yes
RemoveThingFromBillingGroup15 Yes
RemoveThingFromThingGroup 15 Yes
ReplaceTopicRule 5 No
SetDefaultAuthorizer 10 Yes
SetDefaultPolicyVersion 10 Yes
SetLoggingOptions 2 No
SetV2LoggingLevel 2 No
SetV2LoggingOptions 2 No
TagResource 10 Yes
TestAuthorization 10 Yes
TestInvokeAuthorizer 10 Yes
TransferCertificate 10 Yes
UntagResource 10 Yes
UpdateAuthorizer 10 Yes
UpdateBillingGroup 15 Yes
Version 1.0
259
AWS General Reference Reference guide
Service Quotas
UpdateCertificate 10 Yes
UpdateCertificateMode 10 Yes
UpdateCertificateTag 10 Yes
UpdateDomainConfiguration 10 Yes
UpdateCACertificate 10 Yes
UpdateDynamicThingGroup 5 Yes
UpdateJob 10
UpdateProvisioningTemplate 10 Yes
UpdateRoleAlias 10 Yes
UpdateThing 10 Yes
UpdateThingGroup 15 Yes
UpdateTopicRuleDestination 5 No
This table describes the maximum number of transactions per second (TPS) that can be made to each
acton in the AWS IoT Wireless API.
AWS IoT Core for LoRaWAN and Amazon Sidewalk Integration API throttling
10
AssociateAwsAccountWithPartnerAccount Yes
10
AssociateWirelessDeviceWithThing Yes
10
AssociateWirelessGatewayWithCertificate No
10
AssociateWirelessGatewayWithThing Yes
CreateDestination 10 Yes
CreateDeviceProfile 10 Yes
Version 1.0
260
AWS General Reference Reference guide
Service Quotas
CreateServiceProfile 10 Yes
CreateWirelessDevice 10 Yes
CreateWirelessGateway 10 Yes
CreateWirelessGatewayTask 10 No
10
CreateWirelessGatewayTaskDefinition No
DeleteDestination 10 Yes
DeleteDeviceProfile 10 Yes
DeleteServiceProfile 10 Yes
DeleteWirelessDevice 10 Yes
DeleteWirelessGateway 10 Yes
DeleteWirelessGatewayTask 10 No
10
DeleteWirelessGatewayTaskDefinition No
10
DisassociateAwsAccountFromPartnerAccountt Yes
10
DisassociateWirelessDeviceFromThing Yes
10
DisassociateWirelessGatewayFromCertificate No
10
DisassociateWirelessGatewayFromThing Yes
GetDestination 10 Yes
GetDeviceProfile 10 Yes
GetPartnerAccount 10 Yes
GetServiceEndpoint 10 No
GetServiceProfile 10 Yes
GetWirelessDevice 10 Yes
GetWirelessDeviceStatistics10 No
GetWirelessGateway 10 Yes
10
GetWirelessGatewayCertificate No
10
GetWirelessGatewayFirmwareInformation No
10
GetWirelessGatewayStatistics No
GetWirelessGatewayTask 10 No
10
GetWirelessGatewayTaskDefinition No
ListDestinations 10 Yes
ListDeviceProfiles 10 Yes
Version 1.0
261
AWS General Reference Reference guide
Service Quotas
ListPartnerAccounts 10 Yes
ListServiceProfiles 10 Yes
ListTagsForResource 10 Yes
ListWirelessDevices 10 Yes
10
ListWirelessGatewayTaskDefinitions No
ListWirelessGateways 10 Yes
SendDataToWirelessDevice 10 Yes
TagResource 10 Yes
TestWirelessDevice 10 Yes
UntagResource 10 Yes
UpdateDestination 10 Yes
UpdatePartnerAccount 10 Yes
UpdateWirelessDevice 10 Yes
UpdateWirelessGateway 10 Yes
For more information, see Managing Devices with AWS IoT, Authentication, and Device Provisioning.
You can use the AttachThingPrincipal API operation to attach a certificate or other credential to a
thing.
• The maximum number of billing groups per AWS account is 20,000.
Device Shadows
The Device Shadow Service API is subject to these per-account limits, depending on the region.
Version 1.0
262
AWS General Reference Reference guide
Service Quotas
"desired": {
"one": {
"two": {
"three": {
"four": {
"five":{
}
}
}
}
}
}
Version 1.0
263
AWS General Reference Reference guide
Service Quotas
Note
AWS IoT Core deletes a device shadow after the creating account is deleted or upon customer
request. For operational purposes, AWS IoT service backups are retained for 6 months.
Resource Quota
Version 1.0
264
AWS General Reference Reference guide
Service Quotas
Version 1.0
265
AWS General Reference Reference guide
Service Quotas
Version 1.0
266
AWS General Reference Reference guide
Service Quotas
Version 1.0
267
AWS General Reference Reference guide
Service Quotas
Protocols
Resource Description
Connection inactivity (keep-alive interval) For MQTT (or MQTT over WebSocket) connections,
a client can request a keep-alive interval between
30—1200 seconds as part of the MQTT CONNECT
message. AWS IoT Core starts the keep-alive
timer for a client when sending CONNACK in
response to the CONNECT message. This timer
is reset whenever AWS IoT receives a PUBLISH,
SUBSCRIBE, PING, or PUBACK message from the
client. AWS IoT Core disconnects a client whose
Version 1.0
268
AWS General Reference Reference guide
Service Quotas
Resource Description
keep-alive timer has reached 1.5x the specified
keep-alive interval (i.e., by a factor of 1.5).
Maximum number of slashes in topic and topic A topic in a publish or subscribe request can have
filter no more than 7 forward slashes (/). This excludes
the first 3 slashes in the mandatory segments for
Basic Ingest topics ($AWS/rules/rule-name/).
Maximum subscriptions per subscribe request A single SUBSCRIBE request has a quota of 8
subscriptions.
Restricted topic prefix Topics that start with $ are reserved by AWS IoT
Core. They are not supported for publishing and
subscribing except for using the specific topic
names defined by AWS IoT Core services (for
example, the Device Shadow service).
Topic size The topic passed to AWS IoT Core when sending
a publish request can be no larger than 256 bytes
of UTF-8 encoded characters. This excludes the
first 3 mandatory segments for Basic Ingest topics
($AWS/rules/rule-name/).
Maximum number of CA 10
certificates with the same
Version 1.0
269
AWS General Reference Reference guide
Service Quotas
Custom authentication: 10 No
maximum number of authorizers
per account
Streaming service
Streaming Service Resource Quotas
File size 24 MB No
Version 1.0
270
AWS General Reference Reference guide
Service Quotas
* For additional information, see Using the AWS IoT Streaming service in devices in the AWS IoT
Developer Guide.
CreateStream 15 TPS
DeleteStream 15 TPS
DescribeStream 15 TPS
ListStreams 15 TPS
UpdateStream 15 TPS
Things
Version 1.0
271
AWS General Reference Reference guide
AWS IoT Device Defender
Thing Groups
Service endpoints
Version 1.0
272
AWS General Reference Reference guide
Service endpoints
Version 1.0
273
AWS General Reference Reference guide
Service quotas
Service quotas
Audits
The following service quotas apply to mitigation actions and audit mitigation action tasks:
Resource Quota
Detect
Version 1.0
274
AWS General Reference Reference guide
AWS IoT Device Management
Device metric reporting Throttled to 1 value per A device can report a Yes
metric per device per 5 value for every metric
minutes for every device at most
once every 5 minutes.
ML Detect
Service Endpoints
Region Name Region Endpoint Protocol
Version 1.0
275
AWS General Reference Reference guide
Service Endpoints
Version 1.0
276
AWS General Reference Reference guide
Service Endpoints
For information about using AWS IoT in the AWS GovCloud (US) Regions, see AWS GovCloud (US)
Endpoints.
For information about using AWS IoT in the China Regions, see:
AWS IoT Device Management supports additional endpoints for working with jobs. These endpoints
add an account specific prefix to the endpoints already listed and can be used with both the MQTT and
HTTPS protocols. To look up your account-specific prefix, use the describe-endpoint command:
Version 1.0
277
AWS General Reference Reference guide
Service Endpoints
Version 1.0
278
AWS General Reference Reference guide
Service Endpoints
Version 1.0
279
AWS General Reference Reference guide
Service Endpoints
Version 1.0
280
AWS General Reference Reference guide
Service Endpoints
Version 1.0
281
AWS General Reference Reference guide
Service Quotas
Service Quotas
Contents
Version 1.0
282
AWS General Reference Reference guide
Service Quotas
DescribeIndex 10
GetCardinality 15
GetIndexingConfiguration 20
GetPercentiles 15
GetStatistics 15
ListIndices 5
SearchIndex 15
UpdateIndexingConfiguration 1
Version 1.0
283
AWS General Reference Reference guide
Service Quotas
1
MaximumJobExecutionsPerMinute 1000 Configures the roll out
speed for a job.
MaxResults 1 250
Targets 1 100
1
inProgressTimeoutInMinutes 10080 Values are in minutes (1
property of minute to 7 days).
TimeoutConfig
N/A
StartNextPendingJobExecution 200 TPS per account If invoking one or more
and of these write APIs in
†
UpdateJobExecution the data plane causes
the associated AWS
account to exceed 200
write transactions per
second (TPS) in total,
then the offending
API invocation is
throttled to maintain
the maximum allowed
200 write TPS per AWS
account.
Version 1.0
284
AWS General Reference Reference guide
Service Quotas
†
For definitions of data plane and control plane, see What are the ways for accessing AWS IoT Core?
Resource Quota
CloseTunnel 1
DescribeTunnel 10
ListTagsForResource 10
ListTunnels 10
OpenTunnel 1
TagResource 10
UntagResource 10
Resource Quota
Version 1.0
285
AWS General Reference Reference guide
AWS IoT Events
Service Endpoints
Control Plane Endpoints
The following table contains AWS Region-specific endpoints that AWS IoT Events supports for control
plane operations. For more information, see AWS IoT Events operations in the AWS IoT Events API
Reference.
Version 1.0
286
AWS General Reference Reference guide
Service Quotas
Service Quotas
Version 1.0
287
AWS General Reference Reference guide
Service Quotas
Version 1.0
288
AWS General Reference Reference guide
AWS IoT Greengrass V1
Service Endpoints
Control Plane Operations
The following table contains AWS Region-specific endpoints that AWS IoT Greengrass supports for group
management operations.
Version 1.0
289
AWS General Reference Reference guide
Service Endpoints
greengrass.us-gov-east-1.amazonaws.com HTTPS
For information about using AWS IoT Greengrass V1 in the AWS GovCloud Region, see AWS GovCloud
Endpoints.
For information about using AWS IoT Greengrass V1 in the China Regions, see:
To look up your account-specific endpoint, use the aws iot describe-endpoint --endpoint-type iot:Data-
ATS command.
Version 1.0
290
AWS General Reference Reference guide
Service Endpoints
Note
Legacy Verisign endpoints are currently supported for some Regions (p. 292), but we
recommend that you use ATS endpoints with ATS root certificate authority (CA) certificates. For
more information, see Server Authentication in the AWS IoT Developer Guide.
Discovery Operations
The following table contains AWS Region-specific ATS endpoints for device discovery operations using
the AWS IoT Greengrass Discovery API. This is a data plane API.
Version 1.0
291
AWS General Reference Reference guide
Service Endpoints
Note
Legacy Verisign endpoints are currently supported for some Regions (p. 292), but we
recommend that you use ATS endpoints with ATS root CA certificates. For more information, see
Server authentication in the AWS IoT Developer Guide.
When using legacy Verisign endpoints, you must use Verisign root CA certificates.
Version 1.0
292
AWS General Reference Reference guide
Service Quotas
To look up your account-specific legacy endpoint, use the aws iot describe-endpoint --endpoint-type
iot:Data command.
Discovery Operations (Legacy Endpoints)
Service Quotas
AWS IoT Greengrass Cloud API
Description Default
Maximum number of transactions per second See the section called “TPS” (p. 293).
(TPS) on the AWS IoT Greengrass APIs.
Maximum length of a core thing name. 124 bytes of UTF-8 encoded characters.
TPS
The default quota for the maximum number of transactions per second on the AWS IoT Greengrass APIs
depends on the API and the AWS Region where AWS IoT Greengrass is used.
Version 1.0
293
AWS General Reference Reference guide
Service Quotas
For most APIs and supported AWS Regions (p. 289), the default quota is 30. Exceptions are noted in the
following tables.
API exceptions
API Default
CreateDeployment 20
China (Beijing) 10
This quota applies per account and per API. For example, in the US East (N. Virginia) Region, each account
has a default quota of 30 TPS, which is the aggregate of all API operation requests. Each API (such as
CreateGroupVersion or ListFunctionDefinitions) has a quota of 30 TPS. This includes control
plane and data plane operations. Requests that exceed the account or API quotas are throttled. To
request account and API quota increases, including quotas for specific APIs, contact your AWS Enterprise
Support representative.
Description Default
Maximum number of routing table entries that 50 (matches AWS IoT subscription quota)
specify Cloud as the source.
Maximum size of messages sent by an AWS IoT 128 KB (matches AWS IoT message size quota)
device.
The Greengrass Core software provides a service to detect the IP addresses of your Greengrass core
devices. It sends this information to the AWS IoT Greengrass cloud service and allows AWS IoT devices to
download the IP address of the Greengrass core they need to connect to.
Version 1.0
294
AWS General Reference Reference guide
AWS IoT Greengrass V2
Service Endpoints
Control Plane Operations
The following table contains AWS Region-specific endpoints that AWS IoT Greengrass supports for
operations to manage components, devices, and deployments.
Version 1.0
295
AWS General Reference Reference guide
Service Endpoints
For information about using AWS IoT Greengrass V2 in the AWS GovCloud Region, see AWS GovCloud
Endpoints.
To look up your account-specific endpoint, use the aws iot describe-endpoint --endpoint-type iot:Data-
ATS command.
Version 1.0
296
AWS General Reference Reference guide
Service Endpoints
Note
Legacy Verisign endpoints are currently supported for some Regions (p. 298), but we
recommend that you use ATS endpoints with ATS root certificate authority (CA) certificates. For
more information, see Server Authentication in the AWS IoT Developer Guide.
Version 1.0
297
AWS General Reference Reference guide
Service Quotas
Note
Legacy Verisign endpoints are currently supported for some Regions (p. 298), but we
recommend that you use ATS endpoints with ATS root CA certificates. For more information, see
Server authentication in the AWS IoT Developer Guide.
When using legacy Verisign endpoints, you must use Verisign root CA certificates.
To look up your account-specific legacy endpoint, use the aws iot describe-endpoint --endpoint-type
iot:Data command.
Service Quotas
The following tables describe quotas in AWS IoT Greengrass V2. For more information about quotas and
how to request quota increases, see AWS service quotas (p. 540).
Version 1.0
298
AWS General Reference Reference guide
AWS IoT SiteWise
Maximum size of 8 KB No
component recipe
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
299
AWS General Reference Reference guide
Service Quotas
Service Quotas
Quotas for Assets and Asset Models
Number of asset 10 No
hierarchy definitions
per asset model
Version 1.0
300
AWS General Reference Reference guide
Service Quotas
Request rate for model 10 requests per second Yes This quota applies to
API actions and logging per Region per AWS API operations such as
options account CreateAssetModel
and logging options.
Request rate for asset 30 requests per second Yes This quota applies to
API actions per Region per AWS API operations such
account as CreateAsset and
AssociateAssets.
Request rate for asset 1,000 requests per Yes This quota applies to
property data API second per Region per API operations such as
actions AWS account GetAssetPropertyValue
and
BatchPutAssetPropertyValue.
Version 1.0
301
AWS General Reference Reference guide
Service Quotas
Rate of data entries 10 entries per asset Yes This quota applies to
ingested per asset property BatchPutAssetPropertyValue
property entries from all sources,
including gateways,
AWS IoT Core rules, and
API calls.
Rate of data points 10,000 data points per Yes This quota applies
computed second per Region per to the number of
AWS account timestamp-quality-
value (TQV) data
points output by
transform and metric
computations.
Version 1.0
302
AWS General Reference Reference guide
AWS IoT Things Graph
Service Endpoints
Service Quotas
Version 1.0
303
AWS General Reference Reference guide
Service Quotas
AssociateEntityToThing 10 yes
10
CreateDeploymentConfiguration yes
CreateFlowTemplate 10 yes
CreateSystemInstance 20 yes
CreateSystemTemplate 10 yes
10
DeleteDeploymentConfiguration yes
DeleteFlowTemplate 10 yes
DeleteNamespace 10 yes
DeleteSystemInstance 10 yes
DeleteSystemTemplate 10 yes
DeployConfigurationToTarget10 yes
DeploySystemInstance 10 yes
10
DeprecateDeploymentConfiguration yes
DeprecateFlowTemplate 10 yes
DeprecateSystemTemplate 10 yes
DescribeNamespace 10 yes
Version 1.0
304
AWS General Reference Reference guide
Amazon IVS
DissociateEntityFromThing 10 yes
GetDeploymentConfiguration 10 yes
GetEntities 10 yes
GetFlowTemplate 10 yes
GetFlowTemplateRevisions 10 yes
GetNamespaceDeletionStatus 10 yes
GetRecentUploads 10 yes
GetSystemInstance 10 yes
GetSystemTemplate 10 yes
GetSystemTemplateRevisions 10 yes
GetUploadStatus 10 yes
ListFlowExecutionMessages 10 yes
ListMappingPaths 10 yes
10
SearchDeploymentConfigurations yes
SearchEntities 10 yes
SearchFlowExecutions 10 yes
SearchFlowTemplates 10 yes
SearchSystemInstances 10 yes
SearchSystemTemplates 10 yes
SearchThings 10 yes
UndeploySystemInstance 10 yes
UpdateFlowTemplate 10 yes
UpdateSystemTemplate 10 yes
UploadEntityDefinitions 10 yes
ValidateEntityDefinitions 10 yes
Version 1.0
305
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Region Name Region Endpoint Protocol
Service Quotas
For more information, see Service Quotas in the Amazon IVS User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
306
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Version 1.0
307
AWS General Reference Reference guide
Service Quotas
For information about using Amazon Keyspaces (for Apache Cassandra) in the China Regions, see:
Service Quotas
For information about Amazon Keyspaces service quotas, see Quotas for Amazon Keyspaces (for Apache
Cassandra) in the Amazon Keyspaces (for Apache Cassandra) Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
308
AWS General Reference Reference guide
Service Endpoints
Version 1.0
309
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
310
AWS General Reference Reference guide
Kinesis Data Analytics
Resource Default
Requests per second Varies by API operation; see Request quotas in the
AWS Key Management Service Developer Guide.
All quotas in the preceding table are calculated separately for each AWS Region in each AWS account.
For more information about these quotas, see Quotas in the AWS Key Management Service Developer
Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
311
AWS General Reference Reference guide
Service Endpoints
Version 1.0
312
AWS General Reference Reference guide
Service Quotas
Service Quotas
Kinesis Data Analytics for SQL Applications
Resource Default
Applications 50
For more information, see Quotas in the Amazon Kinesis Data Analytics for SQL Applications Developer
Guide.
Resource Default
Snapshots 1000
Applications 50
For more information, see Quotas in the Amazon Kinesis Data Analytics for Apache Flink Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
313
AWS General Reference Reference guide
Service Endpoints
Version 1.0
314
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Delivery stream capacity for US East (N. Virginia), US West (Oregon), 2,000 transactions/second
and Europe (Ireland) †
5,000 records/second
5 MB/second
Delivery stream capacity for other Regions where Kinesis Data 1,000 transactions/second
Firehose is available †
1,000 records/second
1 MB/second
† The three capacity quotas scale proportionally. For example, if you increase the throughput quota to 2
MB/second in Asia Pacific (Singapore), the other quotas increase to 2,000 transactions/second and 2,000
records/second.
For more information, see Amazon Kinesis Data Firehose Quotas in the Amazon Kinesis Data Firehose
Developer Guide.
Version 1.0
315
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Version 1.0
316
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Kinesis Data Streams in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
For information about using Amazon Kinesis Data Streams in the China Regions, see:
Version 1.0
317
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
For more information, see Amazon Kinesis Data Streams Quotas in the Amazon Kinesis Data Streams
Developer Guide.
Service Endpoints
Version 1.0
318
AWS General Reference Reference guide
Service Quotas
Service Quotas
The quotas below are either soft [s], which can be upgraded by submitting a support ticket, or hard [h],
which cannot be increased.
Version 1.0
319
AWS General Reference Reference guide
Service Quotas
Version 1.0
320
AWS General Reference Reference guide
Service Quotas
UpdateDataRetention
50 TPS [h] N/A 5 TPS [h]
ListTagsForStream
50 TPS [h] N/A 5 TPS [h]
The following errors or acks are thrown when a fragment-level quota is reached:
PutMedia 5 TPS [h] 1 [s] 12.5 MB/ • Minimum A typical PutMedia request
second, or fragment contains data for several
100 Mbps [s] duration: seconds, resulting in a
1 second lower TPS per stream.
[h] In the case of multiple
• Maximum concurrent connections
fragment that exceed quotas, the last
duration: connection is accepted.
10
seconds
[h]
• Maximum
fragment
Version 1.0
321
AWS General Reference Reference guide
Service Quotas
GetHLSStreamingSessionURL
5 TPS Burst, N/A N/A N/A Only 10 sessions per
1 TPS stream can be active at a
Sustained time [s]. After the quota
[h] has been reached, the
oldest session is revoked
when a new session is
created.
GetDASHStreamingSessionURL
5 TPS Burst, N/A N/A N/A Only 10 sessions per
1 TPS stream can be active at a
Sustained time [s]. After the quota
[h] has been reached, the
oldest session is revoked
when a new session is
created.
GetMedia 5 TPS [h] 3 [s] 25 MB/s or N/A Only three clients can
200 Mbps [s] concurrently receive
content from the media
stream at any moment
of time. Further client
connections are rejected.
A unique consuming client
shouldn’t need more
than 2 or 3 TPS because
after the connection is
established, we anticipate
that the application will
read continuously.
If a typical fragment is
approximately 5 MB, this
quota means ~75 MB/ sec
per Kinesis video stream.
Such a stream would have
an outgoing bitrate of 2x
the streams' maximum
incoming bitrate.
GetMediaForFragmentList
5 TPS [h] 5 [s] 25 MB/s or Maximum Five fragment-based
200 MbpsA number of consuming applications can
[s] fragments: concurrently get media.
1000 [h] Further connections are
rejected.
Version 1.0
322
AWS General Reference Reference guide
Service Quotas
CreateSignalingChannel
50 TPS [s] 10000
signaling
channels per
account [s]
per region,
in all other
supported
regions.
DescribeSignalingChannel
300 TPS [h] N/A 5 TPS [h]
UpdateSignalingChannel
50 TPS [h] N/A 5 TPS [h]
ListSignalingChannels
50 TPS [h] N/A
GetSignalingChannelEndpoint
300 TPS [h] N/A
ListTagsForResource
50 TPS [h] N/A 5 TPS [h]
Version 1.0
323
AWS General Reference Reference guide
Lake Formation
• ConnectAsMaster
• API - 3 TPS per channel (hard)
• Maximum number of master connections per signaling channel - 1 (hard)
• Connection duration limit - 1 hour (hard)
• Idle connection timeout - 10 minutes (hard)
• When a client receives the GO_AWAY message from the server, connection is terminated after a grace
period of 1 minute (hard)
• ConnectAsViewer
• API - 3 TPS per channel (hard)
• Maximum number of viewer connections per channel - 10 (soft)
• Connection duration limit - 1 hour (hard)
• Idle connection timeout - 10 minutes (hard)
• Once a client receives the GO_AWAY message from the server, connection is terminated after a grace
period of 1 minute (hard)
• SendSDPOffer
• API: 5 TPS per WebSocket connection (hard)
• Message payload size limit - 10k (hard)
• SendSDPAnswer
• API: 5 TPS per WebSocket connection (hard)
• Message payload size limit - 10k (hard)
• SendICECandidate
• API: 20 TPS per WebSocket connection (hard)
• Message payload size limit - 10k (hard)
• SendAlexaOffertoMaster
• API: 5 TPS per signaling channel (hard)
• GetIceServerConfig
• API: 5 TPS per signaling channel (hard)
• Disconnect
• N/A
Service Endpoints
Version 1.0
325
AWS General Reference Reference guide
Service Quotas
Service Quotas
The following quotas apply per catalog.
Resource Default
Number of admins 10
Version 1.0
326
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Version 1.0
327
AWS General Reference Reference guide
Service Quotas
For information about using AWS Lambda in the AWS GovCloud (US-West) Region, see AWS GovCloud
(US-West) Endpoints.
Service Quotas
AWS Lambda quotas the amount of compute and storage resources that you can use to run and store
functions. The following quotas apply per Region and can be increased. To request an increase, use the
Support Center console.
Resource Default
Version 1.0
328
AWS General Reference Reference guide
AWS Launch Wizard
For more information, see AWS Lambda Quotas in the AWS Lambda Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
329
AWS General Reference Reference guide
Service Quotas
Service Quotas
Launch Wizard allows for a maximum of 50 active applications (with status in progress or
completed) for any given application type. If you want to increase this limit, contact AWS Support.
Version 1.0
330
AWS General Reference Reference guide
V2 service endpoints
V2 service endpoints
Model building endpoints
Runtime endpoints
Version 1.0
331
AWS General Reference Reference guide
V1 service endpoints
V1 service endpoints
Model building endpoints
Runtime endpoints
Version 1.0
332
AWS General Reference Reference guide
License Manager
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
333
AWS General Reference Reference guide
Service Endpoints
Version 1.0
334
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service Endpoints
Version 1.0
335
AWS General Reference Reference guide
Service Quotas
Service Quotas
New AWS accounts may start with quotas that are lower than those described here.
Number of parallel SSH connections 5 per Region, per This quota cannot be increased.
using the browser-based SSH client account
Version 1.0
336
AWS General Reference Reference guide
Service Quotas
Number of parallel RDP connections 1 per Region, per This quota cannot be increased.
using the browser-based RDP client account
Number of DNS zones (or domains) 3 per account This quota cannot be increased.
Amount of attached block storage disk 20,000 GB per These quotas cannot be increased.
space Region
16 TB per disk
maximum, or 8 GB
per disk minimum
20 total per
Region, per
account in the last
365 days
Number of container services 100 per Region This quota cannot be increased.
Number of stored container images per 150 stored This quota cannot be increased.
container service container images
Number of custom domains per 4 custom domains This quota cannot be increased.
container service
Number of days container logs are 4 days This quota cannot be increased.
stored
Version 1.0
337
AWS General Reference Reference guide
Amazon Location Service
The following table provides the quotas for Lightsail content delivery network distributions.
Resource Default
Service Endpoints
Amazon Location is available in the following AWS Regions:
Version 1.0
338
AWS General Reference Reference guide
Service Quotas
protocol://service-code.geo.region-code.amazonaws.com
Within this syntax, Amazon Location uses the following service codes:
For example, the regional endpoint for Amazon Location Maps for US East (N. Virginia) would be:
https://maps.geo.us-east-1.amazonaws.com.
Service Quotas
The following table lists the service quotas for Amazon Location, also referred to as limits, or the
maximum number of service resources or operations for your AWS account.
Note
Some quotas can be increased. For more information, see the AWS Support Center.
Version 1.0
339
AWS General Reference Reference guide
Service Quotas
Version 1.0
340
AWS General Reference Reference guide
Service Quotas
Version 1.0
341
AWS General Reference Reference guide
Service Quotas
Version 1.0
342
AWS General Reference Reference guide
Service Quotas
Version 1.0
343
AWS General Reference Reference guide
Service Quotas
Version 1.0
344
AWS General Reference Reference guide
Amazon Lookout for Equipment
Service Endpoints
Region name Region Endpoint Protocol
Service Quotas
Data Ingestion
Resource Default
Version 1.0
345
AWS General Reference Reference guide
Service Quotas
Training
Resource Default
Inference
Resource Default
Version 1.0
346
AWS General Reference Reference guide
Amazon Lookout for Vision
Resource Default
Service Endpoints
Region Name Region Endpoint Protocol
Service Quotas
Resource Default
Transactions per second per account for individual Amazon Lookout • In all regions that Amazon
for Vision data plane operations: Lookout for Vision supports –
10
• DetectAnomalies
Transactions per second per account for individual Amazon Lookout In each Region that Amazon
for Vision control plane operations: Lookout for Vision supports – 5
• CreateDataset
• CreateModel
• CreateProject
Version 1.0
347
AWS General Reference Reference guide
Macie
Resource Default
• DeleteDataset
• DeleteModel
• DeleteProject
• DescribeDataset
• DescribeModel
• DescribeProject
• ListDatasetEntries
• ListModels
• ListProjects
• StartModel
• StopModel
• UpdateDatasetEntries
Service Endpoints
Amazon Macie
Version 1.0
348
AWS General Reference Reference guide
Service Endpoints
Version 1.0
349
AWS General Reference Reference guide
Service Quotas
Service Quotas
Amazon Macie
For information about Amazon Macie quotas, see Amazon Macie Quotas in the Amazon Macie User Guide.
Resource Default
Version 1.0
350
AWS General Reference Reference guide
Amazon ML
Service Endpoints
Service Quotas
Resource Default
Total Transactions Per Second for all real-time prediction endpoints 10,000
ML model size 2 GB
The size of your data files is restricted to ensure that jobs finish in a timely manner. Jobs that have been
running for more than seven days are automatically terminated, resulting in a FAILED status.
For more information, see Amazon ML Quotas in the Amazon Machine Learning Developer Guide.
Version 1.0
351
AWS General Reference Reference guide
Managed Blockchain
Service Endpoints
Service Quotas
For information about attributes of Starter Edition and Standard Edition networks, such as the number
of members per network, peer nodes per member, available instance types, and more, see Amazon
Managed Blockchain Pricing.
Resource Default
Version 1.0
352
AWS General Reference Reference guide
AWS Marketplace
Resource Default
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
The AWS Marketplace website is available globally. The AWS Marketplace console is available in the
US East (N. Virginia) Region. The product vendor determines the Regions in which their products are
available.
Version 1.0
353
AWS General Reference Reference guide
Service Endpoints
Version 1.0
354
AWS General Reference Reference guide
Amazon Mechanical Turk
Service Endpoints
Version 1.0
355
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Version 1.0
356
AWS General Reference Reference guide
MediaConnect
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
357
AWS General Reference Reference guide
Service Endpoints
Version 1.0
358
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default Comments
Service Endpoints
Use these endpoints only to request an account-specific endpoint, using the DescribeEndpoints
operation. Send all your transcoding requests to the account-specific endpoint that the service returns.
For more information, see Getting Started with the API in the MediaConvert API Reference.
Version 1.0
359
AWS General Reference Reference guide
Service Endpoints
Version 1.0
360
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
20 in all other
Regions
Version 1.0
361
AWS General Reference Reference guide
MediaLive
Resource Default
This endpoint is
specific to your
AWS account and
won't change.
Request this
endpoint once,
and then hardcode
or cache it.
Service Endpoints
When you submit requests using the AWS CLI or SDKs, either leave the Region and endpoint unspecified,
or specify us-east-1 as the Region. When you submit requests using the MediaLive API, use the us-east-1
Region to sign requests. For more information about signing MediaLive API requests, see Signature
Version 4 signing process (p. 560).
Version 1.0
362
AWS General Reference Reference guide
Service Quotas
Service Quotas
Version 1.0
363
AWS General Reference Reference guide
MediaPackage
Inputs of type push (not 5 The maximum number of push inputs (not inclu
including VPC push inputs) inputs) that you can create in this account in th
Inputs of type pull 100 The maximum number of pull inputs that you c
account in the current Region.
Inputs of type VPC push 50 The maximum number of VPC push inputs that
this account in the current Region.
Service Endpoints
These are the endpoints for live content workflows.
Version 1.0
364
AWS General Reference Reference guide
Service Endpoints
These are the endpoints for video on demand (VOD) content workflows.
Version 1.0
365
AWS General Reference Reference guide
Service Quotas
Service Quotas
You can request increases on the following quotas. For more information about AWS Elemental
MediaPackage quotas, including quotas that can't be increased, see Quotas in the AWS Elemental
MediaPackage User Guide.
Live Content
Resource Default
Version 1.0
366
AWS General Reference Reference guide
MediaStore
VOD Content
Resource Default
Service Endpoints
Version 1.0
367
AWS General Reference Reference guide
Service Quotas
Service Quotas
DeleteObject 100 transactions per The maximum number of operation requests that
second (TPS) you can make per second. Additional requests are
throttled.
Version 1.0
368
AWS General Reference Reference guide
MediaTailor
For more information, see Quotas in the AWS Elemental MediaStore User Guide.
Service Endpoints
Version 1.0
369
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default Comment
For more information about AWS Elemental MediaTailor quotas, including quotas that can't be increased,
see Quotas in the AWS Elemental MediaTailor User Guide.
Service Endpoints
The migration tools that integrate with AWS Migration Hub send migration status to the Migration Hub
in the home region you choose. For information about choosing a home region, see The AWS Migration
Hub Home Region in the AWS Migration Hub User Guide.
Version 1.0
370
AWS General Reference Reference guide
Amazon MQ
Service Endpoints
Version 1.0
371
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see Amazon MQ Quotas in the Amazon MQ Developer Guide.
Version 1.0
372
AWS General Reference Reference guide
Neptune
Service Endpoints
Version 1.0
373
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Maximum instances
Version 1.0
374
AWS General Reference Reference guide
Service endpoints
Service endpoints
AWS Network Firewall has a single endpoint: network-firewall.amazonaws.com. It supports HTTPS
requests only.
Service quotas
For a listing of Network Firewall quotas, see AWS Network Firewall quotas in the Network Firewall
developer guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
For more information, see Network Manager Quotas.
Version 1.0
375
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
AWS OpsWorks CM
You can create and manage AWS OpsWorks for Chef Automate and AWS OpsWorks for Puppet
Enterprise servers in the following Regions. Resources can be managed only in the Region in which
they are created. Resources that are created in one Regional endpoint are not available, nor can they be
cloned to, another Regional endpoint.
Version 1.0
376
AWS General Reference Reference guide
Service Endpoints
Version 1.0
377
AWS General Reference Reference guide
Service Quotas
Service Quotas
AWS OpsWorks CM
Resource Default
Resource Default
Stacks 40
Service Endpoints
Note
Because AWS Organizations is a global service, there is a single global endpoint for all of the
AWS Regions in each partition.
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
Version 1.0
378
AWS General Reference Reference guide
Service Endpoints
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
Version 1.0
379
AWS General Reference Reference guide
Service Endpoints
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
organizations-fips.us-east-1.amazonaws.com HTTPS
Version 1.0
380
AWS General Reference Reference guide
Service Quotas
organizations.us-gov-west-1.amazonaws.com HTTPS
organizations.us-gov-west-1.amazonaws.com HTTPS
Service Quotas
Resource Default
For more information, see Quotas of AWS Organizations in the AWS Organizations User Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
381
AWS General Reference Reference guide
Service Endpoints
Version 1.0
382
AWS General Reference Reference guide
Amazon Personalize
Service Endpoints
Amazon Personalize
Version 1.0
383
AWS General Reference Reference guide
Service Endpoints
Version 1.0
384
AWS General Reference Reference guide
Amazon Pinpoint
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Version 1.0
385
AWS General Reference Reference guide
Service endpoints
Service endpoints
Amazon Pinpoint API
Note
You can't use the Amazon Pinpoint API to send SMS messages in the Asia Pacific (Seoul) Region.
Version 1.0
386
AWS General Reference Reference guide
Service quotas
Note
The Amazon Pinpoint SMS and Voice API is not available in the following Regions:
Service quotas
Resource Default
Total file size per endpoint import job 1 GB per import job.
Version 1.0
387
AWS General Reference Reference guide
Service quotas
Resource Default
Maximum number of Amazon SNS topics for two-way SMS 100,000 per account.
Number of emails that you can send in a 24-hour period (sending 200 emails per 24-hour period
quota) for accounts in the sandbox.
Number of emails that you can send each second (sending rate) 1 email per second for accounts
in the sandbox.
Number of voice messages that you can send in a 24-hour period. 20 messages per 24-hour period
for accounts in the sandbox.
Number of voice messages that you can send per minute. 5 messages per minute for
accounts in the sandbox.
Ability to send voice messages to international phone numbers. Accounts in the sandbox can
only send messages to recipients
in the following countries and
Regions:
• Australia
• Canada
• China
• Germany
• Hong Kong
• Israel
• Japan
• Mexico
• Singapore
• Sweden
• The United States
• The United Kingdom
The sandbox for the email channel is separate from the sandbox for the voice channel. To gain
production access for both channels, you have to complete the request form for both channels.
To learn more about requesting production access for the email channel, see Requesting production
access for email. To learn more about requesting production access for the voice channel, see Requesting
production access (Voice).
For more information, see Amazon Pinpoint quotas in the Amazon Pinpoint Developer Guide.
Version 1.0
388
AWS General Reference Reference guide
Amazon Polly
Service Endpoints
Version 1.0
389
AWS General Reference Reference guide
Service Quotas
Service Quotas
Throttle rate per IP address
100 transactions (requests) per second (tps) with a burst quota of 120 tps
Operation Default
Lexicon
ListLexicons
Speech
Version 1.0
390
AWS General Reference Reference guide
QLDB
Service Endpoints
Amazon QLDB Control Plane
Version 1.0
391
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
The maximum number of active ledgers that you can create in this 5
account in the current Region
For more information, see Quotas in Amazon QLDB in the Amazon QLDB Developer Guide.
Version 1.0
392
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
QuickSight
Version 1.0
393
AWS General Reference Reference guide
AWS RAM
For information about using Amazon QuickSight in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon QuickSight in the China Regions, see:
QuickSight Websites
Region Name Region Endpoint
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
394
AWS General Reference Reference guide
Service Endpoints
Version 1.0
395
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service endpoints
Version 1.0
396
AWS General Reference Reference guide
Service endpoints
Version 1.0
397
AWS General Reference Reference guide
Service quotas
For information about using Amazon Redshift in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using Amazon Redshift in the China Regions, see:
Service quotas
For information about Amazon Redshift quotas and limits, see Quotas and limits in Amazon Redshift in
the Amazon Redshift Cluster Management Guide.
Version 1.0
398
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Version 1.0
399
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Rekognition in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
The following are differences for certain Amazon Rekognition features and AWS Regions.
• CompareFaces
• CreateCollection
• DeleteCollection
• DeleteFaces
• DescribeCollection
• DetectFaces
• IndexFaces
• ListCollections
• ListFaces
• SearchFaces
Version 1.0
400
AWS General Reference Reference guide
Service Quotas
• SearchFacesByImage
Service Quotas
The quotas listed on this page are defaults. You can request a quota increase for Amazon Rekognition
using the AWS Support Center. To request a quota increase for a Amazon Rekognition Transactions Per
Second (TPS) limit, follow the instructions at Default Quotas in Amazon Rekognition.
Note
These limits may be different in different regions. Making a case to change a limit affects the
API operation you request, in the region you request it. Other API operations and regions are not
affected.
Resource Default
Transactions per second per account for individual Amazon • US East (Ohio) Region – 5
Rekognition Image data plane operations: • US East (N. Virginia) Region –
50
• CompareFaces
• US West (N. California) Region
• DetectFaces –5
• DetectLabels
• US West (Oregon) Region – 50
• DetectModerationLabels • Asia Pacific (Mumbai) Region –
• DetectText 5
• GetCelebrityInfo • Asia Pacific (Seoul) Region – 5
• IndexFaces • Asia Pacific (Singapore) Region
• ListFaces –5
• RecognizeCelebrities • Asia Pacific (Sydney) Region –
• SearchFaces 5
• SearchFacesByImage • Asia Pacific (Tokyo) Region – 5
• Canada (Central) – 5 (For
supported operations, see
Service Endpoints (p. 399)).
• Europe (Frankfurt) Region – 5
• Europe (Ireland) Region – 50
• Europe (London) Region – 5
• AWS GovCloud (US-West) – 5
Transactions per second per account for the personal protective In each Region that Amazon
equipment data plane operation: Rekognition Image supports – 5
• DetectProtectiveEquipment
Transactions per second per account for individual Amazon In each Region that Amazon
Rekognition Image control plane operations: Rekognition Image supports – 5
• CreateCollection
• DeleteCollection
• DeleteFaces
• DescribeCollection
• ListCollections
Transactions per second per account for individual stored video In each Region that Amazon
start operations: Rekognition Video supports – 5
Version 1.0
401
AWS General Reference Reference guide
Service Quotas
Resource Default
• StartCelebrityRecognition Note that
• StartContentModeration StartCelebrityRecognition is not
available in the AWS GovCloud
• StartFaceDetection
region.
• StartFaceSearch
• StartLabelDetection
• StartPersonTracking
• StartTextDetection
• StartSegmentDetection
Transactions per second per account for individual Amazon • US East (Ohio) Region – 5
Rekognition Video stored video get operations: • US East (N. Virginia) Region –
20
• GetCelebrityRecognition
• US West (N. California) Region
• GetContentModeration –5
• GetFaceDetection
• US West (Oregon) Region – 20
• GetFaceSearch • Asia Pacific (Mumbai) Region –
• GetLabelDetection 5
• GetPersonTracking • Asia Pacific (Seoul) Region – 5
• GetTextDetection • Asia Pacific (Singapore) Region
• GetSegmentDetection –5
• Asia Pacific (Sydney) Region –
5
• Asia Pacific (Tokyo) Region – 5
• Europe (Frankfurt) Region – 5
• Europe (Ireland) Region – 20
• Europe (London) Region – 5
• AWS GovCloud (US-
West) –20 (Note that
GetCelebrityRecognition is not
available in this region.)
Maximum number of streaming video stream processors per In each Region that Amazon
account that can simultaneously exist Rekognition Video supports – 10
Transactions per second per account for individual streaming video In each Region that Amazon
operations: Rekognition Video supports – 1
• CreateStreamProcessor
• DeleteStreamProcessor
• DescribeStreamProcessor
• ListStreamProcessors
• StartStreamProcessor
• StopStreamProcessor
Version 1.0
402
AWS General Reference Reference guide
Amazon RDS
Resource Default
Transactions per second per account for individual Amazon In each Region that Amazon
Rekognition Custom Labels control plane operations: Rekognition Custom Labels
supports – 5
• CreateProject
• CreateProjectVersion
• DeleteProject
• DeleteProjectVersion
• DescribeProjects
• DescribeProjectVersions
• StartProjectVersion
• StopProjectVersion
Maximum number of concurrent Amazon Rekognition Custom • All regions except Asia Pacific
Labels training jobs per account. (Sydney) – 2
• Asia Pacific (Sydney) – 1
Service Endpoints
Amazon RDS
Version 1.0
403
AWS General Reference Reference guide
Service Endpoints
Version 1.0
404
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Relational Database Service in the AWS GovCloud (US-West)
Region, see AWS GovCloud (US-West) Endpoints.
For information about using Amazon Relational Database Service in the China Regions, see:
Version 1.0
405
AWS General Reference Reference guide
Service Endpoints
Version 1.0
406
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default Quota
DB instances 40
DB security groups 25
DB subnet groups 50
Event subscriptions 20
Option groups 20
Parameter groups 50
Proxies 20
Reserved DB instances 40
Version 1.0
407
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Resource Groups
Version 1.0
408
AWS General Reference Reference guide
Service Endpoints
Version 1.0
409
AWS General Reference Reference guide
Service Endpoints
Version 1.0
410
AWS General Reference Reference guide
Service Quotas
Service Quotas
Service Quotas for AWS Resource Groups are set on a per Region basis. When you request a service quota
increase, you must specify the AWS Region in which you want the increased quota.
Resource Default
Version 1.0
411
AWS General Reference Reference guide
Service Endpoints
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Region Region Endpoint Protocol
Name
Service Quotas
Resource Default Adjustable Comments
Version 1.0
412
AWS General Reference Reference guide
Service Quotas
Version 1.0
413
AWS General Reference Reference guide
Service Quotas
Version 1.0
414
AWS General Reference Reference guide
Route 53
Service Endpoints
Hosted zones, records, health checks, DNS query logs, reusable
delegation sets, traffic policies, and cost allocation tags
When you use the AWS CLI or SDKs to submit requests, you can either leave the Region and endpoint
unspecified, or specify the applicable Region:
• Route 53 in AWS Regions other than the AWS Beijing and Ningxia (China) Regions: specify us-east-1 as
the Region.
• Route 53 in China regions: specify cn-northwest-1.
When you use the Route 53 API to submit requests, use the same Regions as above to sign requests.
For more information about signing Route 53 API requests, see Signature Version 4 signing
process (p. 560).
Version 1.0
415
AWS General Reference Reference guide
Service Endpoints
Version 1.0
416
AWS General Reference Reference guide
Service Endpoints
Version 1.0
417
AWS General Reference Reference guide
Service Quotas
Service Quotas
DNS and Domain Registration
Resource Default
Domains 50
Version 1.0
418
AWS General Reference Reference guide
SageMaker
Resource Default
Hosted zones that can use the same reusable delegation set 100
Amazon VPCs that you can associate with a private hosted zone 100
Traffic policies 50
Route 53 Resolver
Resource Default
Associations between rules and VPCs per AWS Region 2,000 per AWS account
For more information, see Route 53 Quotas in the Amazon Route 53 Developer Guide.
Service Endpoints
The following table provides a list of Region-specific endpoints that SageMaker supports for training
and deploying models. This include creating and managing notebook instances, training jobs, model,
endpoint configurations, and endpoints.
Version 1.0
419
AWS General Reference Reference guide
Service Endpoints
Version 1.0
420
AWS General Reference Reference guide
Service Endpoints
The following table provides a list of Region-specific endpoints that Amazon SageMaker supports for
making inference requests against models hosted in SageMaker.
Version 1.0
421
AWS General Reference Reference guide
Service Endpoints
Version 1.0
422
AWS General Reference Reference guide
Service Quotas
Service Quotas
SageMaker quotas for new accounts might be different from the default quotas listed here. If you receive
an error that you've exceeded your quota, contact customer service to request a quota increase for the
resources you want to use.
On-demand and Spot instance quotas are tracked and modified separately. For example, with the default
quotas, you could run up to 20 training jobs with on-demand ml.m4.xlarge instances and up to 20
training jobs with Managed Spot ml.m4.xlarge instances simultaneously. Request quota increases for on-
demand and spot instances separately.
Resource Default
ml.t2.medium instances 30
ml.t2.large instances 30
ml.t2.xlarge instances 30
ml.t2.2xlarge instances 30
ml.t3.medium instances 30
ml.t3.large instances 30
ml.t3.xlarge instances 30
ml.t3.2xlarge instances 30
ml.m4.xlarge instances 30
ml.m4.2xlarge instances 30
ml.m4.4xlarge instances 15
ml.m4.10xlarge instances 8
ml.m4.16xlarge instances 8
ml.m5.xlarge instances 30
ml.m5.2xlarge instances 30
ml.m5.4xlarge instances 15
ml.m5.12xlarge instances 5
ml.m5.24xlarge instances 3
Version 1.0
423
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.c4.xlarge instances 30
ml.c4.2xlarge instances 30
ml.c4.4xlarge instances 30
ml.c4.8xlarge instances 30
ml.c5.xlarge instances 30
ml.c5.2xlarge instances 30
ml.c5.4xlarge instances 8
ml.c5.9xlarge instances 8
ml.c5.18xlarge instances 8
ml.c5d.xlarge instances 30
ml.c5d.2xlarge instances 30
ml.c5d.4xlarge instances 8
ml.c5d.9xlarge instances 8
ml.c5d.18xlarge instances 8
ml.p2.xlarge instances 1
ml.p2.8xlarge instances 1
ml.p2.16xlarge instances 1
ml.p3.2xlarge instances 3
ml.p3.8xlarge instances 3
ml.p3.16xlarge instances 3
Resource Default
Version 1.0
424
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.c4.2xlarge 20
ml.c4.4xlarge 20
ml.c4.8xlarge 20
ml.c4.xlarge 20
ml.c5.18xlarge 5
ml.c5.2xlarge 20
ml.c5.4xlarge 5
ml.c5.9xlarge 5
ml.c5.xlarge 20
ml.m4.10xlarge 5
ml.m4.16xlarge 5
ml.m4.2xlarge 20
ml.m4.4xlarge 10
ml.m4.xlarge 20
ml.m5.12xlarge 4
ml.m5.24xlarge 4
ml.m5.2xlarge 20
ml.m5.4xlarge 10
ml.m5.large 20
ml.m5.xlarge 65
ml.p2.16xlarge 4
ml.p2.8xlarge 4
ml.p2.xlarge 4
ml.p3.16xlarge 4
ml.p3.2xlarge 4
ml.p3.8xlarge 4
ml.r5.12xlarge 20
ml.r5.16xlarge 20
ml.r5.24xlarge 20
ml.r5.2xlarge 20
Version 1.0
425
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.r5.4xlarge 20
ml.r5.8xlarge 20
ml.r5.large 20
ml.r5.xlarge 20
ml.t3.2xlarge 5
ml.t3.large 20
ml.t3.medium 50
ml.t3.xlarge 10
Resource Default
ml.m4.xlarge instances 20
ml.m4.2xlarge instances 20
ml.m4.4xlarge instances 10
ml.m4.10xlarge instances 5
ml.m4.16xlarge instances 5
ml.m5.large instances 20
ml.m5.xlarge instances 20
ml.m5.2xlarge instances 20
ml.m5.4xlarge instances 10
ml.m5.12xlarge instances 3
ml.m5.24xlarge instances 2
ml.c4.xlarge instances 20
ml.c4.2xlarge instances 20
ml.c4.4xlarge instances 20
ml.c4.8xlarge instances 20
ml.c5.xlarge instances 20
Version 1.0
426
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.c5.2xlarge instances 20
ml.c5.4xlarge instances 5
ml.c5.9xlarge instances 5
ml.c5.18xlarge instances 5
ml.p2.xlarge instances 1
ml.p2.8xlarge instances 1
ml.p2.16xlarge instances 1
ml.p3.2xlarge instances 2
ml.p3.8xlarge instances 2
ml.p3.16xlarge instances 2
Resource Default
ml.t2.medium instances 30
ml.t2.large instances 30
ml.t2.xlarge instances 30
ml.t2.2xlarge instances 30
ml.m4.xlarge instances 30
ml.m4.2xlarge instances 30
ml.m4.4xlarge instances 15
ml.m4.10xlarge instances 8
ml.m4.16xlarge instances 8
ml.m5.large instances 30
ml.m5.xlarge instances 30
ml.m5.2xlarge instances 30
ml.m5.4xlarge instances 15
ml.m5.12xlarge instances 5
Version 1.0
427
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.m5.24xlarge instances 3
ml.m5d.large instances 30
ml.m5d.xlarge instances 30
ml.m5d.2xlarge instances 30
ml.m5d.4xlarge instances 15
ml.m5d.12xlarge instances 5
ml.m5d.24xlarge instances 3
ml.c4.large instances 30
ml.c4.xlarge instances 30
ml.c4.2xlarge instances 30
ml.c4.4xlarge instances 30
ml.c4.8xlarge instances 30
ml.c5.large instances 30
ml.c5.xlarge instances 30
ml.c5.2xlarge instances 30
ml.c5.4xlarge instances 8
ml.c5.9xlarge instances 8
ml.c5.18xlarge instances 8
ml.c5d.large instances 30
ml.c5d.xlarge instances 30
ml.c5d.2xlarge instances 30
ml.c5d.4xlarge instances 8
ml.c5d.9xlarge instances 8
ml.c5d.18xlarge instances 8
ml.p2.xlarge instances 3
ml.p2.8xlarge instances 3
ml.p2.16xlarge instances 3
ml.p3.2xlarge instances 3
ml.p3.8xlarge instances 3
ml.p3.16xlarge instances 3
ml.g4dn.xlarge instances 3
Version 1.0
428
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.g4dn.2xlarge instances 3
ml.g4dn.4xlarge instances 3
ml.g4dn.8xlarge instances 3
ml.g4dn.12xlarge instances 3
ml.g4dn.16xlarge instances 3
ml.r5.large instances 8
ml.r5.xlarge instances 8
ml.r5.2xlarge instances 4
ml.r5.4xlarge instances 4
ml.r5.12xlarge instances 5
ml.r5.24xlarge instances 5
ml.r5d.large instances 8
ml.r5d.xlarge instances 8
ml.r5d.2xlarge instances 4
ml.r5d.4xlarge instances 4
ml.r5d.12xlarge instances 5
ml.r5d.24xlarge instances 5
Resource Default
ml.m4.xlarge instances 20
ml.m4.2xlarge instances 20
ml.m4.4xlarge instances 10
ml.m4.10xlarge instances 5
ml.m4.16xlarge instances 5
ml.m5.large instances 20
Version 1.0
429
AWS General Reference Reference guide
Service Quotas
Resource Default
ml.m5.xlarge instances 20
ml.m5.2xlarge instances 20
ml.m5.4xlarge instances 10
ml.m5.12xlarge instances 3
ml.m5.24xlarge instances 2
ml.c4.xlarge instances 20
ml.c4.2xlarge instances 20
ml.c4.4xlarge instances 20
ml.c4.8xlarge instances 20
ml.c5.xlarge instances 20
ml.c5.2xlarge instances 20
ml.c5.4xlarge instances 5
ml.c5.9xlarge instances 5
ml.c5.18xlarge instances 5
ml.p2.xlarge instances 2
ml.p2.8xlarge instances 2
ml.p2.16xlarge instances 2
ml.p3.2xlarge instances 2
ml.p3.8xlarge instances 2
ml.p3.16xlarge instances 2
Resource Default
Version 1.0
430
AWS General Reference Reference guide
Secrets Manager
Service Endpoints
Version 1.0
431
AWS General Reference Reference guide
Service Endpoints
Version 1.0
432
AWS General Reference Reference guide
Service Quotas
Service Quotas
The listed Service Quotas are available on a per region basis. For instance, Secrets Manager allows an
endpoint in us-east-2 a maximum number of 40,000 secrets and allows an endpoint in us-east-1 a
maximum of 40,000 secrets.
Resource Default
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
433
AWS General Reference Reference guide
Service Endpoints
Version 1.0
434
AWS General Reference Reference guide
AWS STS
Service Endpoints
By default, the AWS Security Token Service (AWS STS) is available as a global service, and all STS
requests go to a single endpoint at https://sts.amazonaws.com. AWS recommends using Regional
STS endpoints to reduce latency, build in redundancy, and increase session token validity. Most Regional
endpoints are active by default, but you must manually enable endpoints for some Regions, such as Asia
Pacific (Hong Kong). You can deactivate STS endpoints for any Regions that are enabled by default if you
do not intend to use those Regions.
For more information, see Activating and Deactivating AWS STS in an AWS Region in the IAM User Guide.
Version 1.0
435
AWS General Reference Reference guide
Service Endpoints
Version 1.0
436
AWS General Reference Reference guide
AWS SMS
For information about using AWS Security Token Service in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
For information about using AWS Security Token Service in the China Regions, see:
Service Endpoints
Version 1.0
437
AWS General Reference Reference guide
Service Endpoints
Version 1.0
438
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
439
AWS General Reference Reference guide
Service Endpoints
Version 1.0
440
AWS General Reference Reference guide
Service Quotas
Service Quotas
None of the quotas for this service can be increased. The Service Quotas console provides information
about the quotas for the service. Along with viewing the default quotas, you can use the Service Quotas
console to request quota increases for adjustable quotas.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
441
AWS General Reference Reference guide
Service Endpoints
Version 1.0
442
AWS General Reference Reference guide
Service Quotas
For information about using AWS Serverless Application Repository in the AWS GovCloud (US-West)
Region, see AWS GovCloud (US-West) Endpoints.
Service Quotas
Resource Default
Free Amazon S3 storage for code packages (per AWS account per 5 GB
AWS Region)
For more information, see AWS Serverless Application Repository Quotas in the AWS Serverless
Application Repository Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
443
AWS General Reference Reference guide
Service Endpoints
Version 1.0
444
AWS General Reference Reference guide
Service Quotas
Service Quotas
Portfolios 100
Products 350
Version 1.0
445
AWS General Reference Reference guide
Shield Advanced
Service Endpoints
Region Region Endpoint Protocol
Name
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
Version 1.0
446
AWS General Reference Reference guide
Service Endpoints
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
Version 1.0
447
AWS General Reference Reference guide
Service Quotas
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
shield-fips.us-east-1.amazonaws.com HTTPS
Service Quotas
AWS Shield Advanced offers advanced monitoring and protection for Elastic IP addresses, CloudFront
distributions, Route 53 hosted zones, or Elastic Load Balancing load balancers. You can monitor and
protect up to 1000 of each of these resource types per account. If you want to increase these quotas,
contact the AWS Support Center.
Service Endpoints
API Endpoints
Version 1.0
448
AWS General Reference Reference guide
Service Endpoints
email-fips.us-
east-1.amazonaws.com
email-fips.us-
west-2.amazonaws.com
Version 1.0
449
AWS General Reference Reference guide
Service Endpoints
SMTP Endpoints
Note
SMTP endpoints are not currently available in Middle East (Bahrain).
email-smtp-
fips.us-
east-1.amazonaws.com
email-smtp-
fips.us-
west-2.amazonaws.com
Version 1.0
450
AWS General Reference Reference guide
Service Quotas
email-smtp-
fips.us-gov-
west-1.amazonaws.com
Amazon SES doesn't support email receiving in the following Regions: US East (Ohio), US West (N.
California) Asia Pacific (Mumbai), Asia Pacific (Seoul), Asia Pacific (Singapore), Asia Pacific (Sydney),
Asia Pacific (Tokyo), Canada (Central), Europe (Frankfurt), Europe (London), Europe (Paris), Europe
(Stockholm), Middle East (Bahrain), South America (São Paulo), and AWS GovCloud (US).
Service Quotas
The following are the default quotas for Amazon SES in the sandbox environment.
Resource Default
Version 1.0
451
AWS General Reference Reference guide
AWS Signer
Resource Default
For more information, see Quotas in Amazon SES in the Amazon Simple Email Service Developer Guide.
Version 1.0
452
AWS General Reference Reference guide
Service Endpoints for AWS Signer with Lambda
Version 1.0
453
AWS General Reference Reference guide
Service Endpoints for AWS Signer with IoT
Version 1.0
454
AWS General Reference Reference guide
Service Quotas
For information about using AWS Signer in the AWS GovCloud (US-West) Region, see AWS GovCloud (US-
West) Endpoints.
Service Quotas
You can make 5 calls per second to the StartSigningJob API operation. You can make 25 calls per
second to all other AWS Signer API operations. These quotas apply to each AWS region and each AWS
account.
Service endpoints
Region Region Endpoint Protocol
Name
Version 1.0
455
AWS General Reference Reference guide
Service endpoints
Version 1.0
456
AWS General Reference Reference guide
Service quotas
Notes
Service quotas
The following quotas determine how many Amazon SNS resources you can create in your AWS account,
and they determine the rate at which you can issue Amazon SNS API requests.
Resource Default
Version 1.0
457
AWS General Reference Reference guide
Service quotas
Resource Default
Hard
The following quotas cannot be increased.
ListEndpointsByPlatformApplication 30
ListTopics 30
ListPlatformApplications 15
ListSubscriptions 30
ListSubscriptionsByTopic 30
Subscribe 100
Unsubscribe 100
Soft
The following quotas vary by AWS Region.
Publish US East (N. Virginia) 30,000 transactions per 300 transactions per
Region second second or 10 MB per
second, per topic,
whichever comes first
Version 1.0
458
AWS General Reference Reference guide
Service quotas
Europe (Frankfurt)
Region
Europe (Stockholm)
Region
Version 1.0
459
AWS General Reference Reference guide
Amazon SQS
Version 1.0
460
AWS General Reference Reference guide
Service Endpoints
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
Amazon SQS
Version 1.0
461
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Simple Queue Service in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
Version 1.0
462
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Simple Queue Service in the China Regions, see:
Version 1.0
463
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see Amazon SQS Quotas in the Amazon Simple Queue Service Developer Guide and
the "Quotas and Restrictions" section of the Amazon SQS FAQs.
Service Endpoints
Amazon S3 Endpoints
When you use the REST API to send requests to the endpoints shown in the table below, you can use the
virtual-hosted style and path-style methods. For more information, see Virtual Hosting of Buckets.
Version 1.0
464
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.us-
east-2.amazonaws.com
• s3-accesspoint-fips.us-
east-2.amazonaws.com
• s3-accesspoint.dualstack.us-
east-2.amazonaws.com**
• s3-accesspoint-
fips.dualstack.us-
east-2.amazonaws.com**
Version 1.0
465
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.us-
east-1.amazonaws.com
• s3-accesspoint-fips.us-
east-1.amazonaws.com
• s3-accesspoint.dualstack.us-
east-1.amazonaws.com**
• s3-accesspoint-
fips.dualstack.us-
east-1.amazonaws.com**
Version 1.0
466
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.us-
west-1.amazonaws.com
• s3-accesspoint-fips.us-
west-1.amazonaws.com
• s3-accesspoint.dualstack.us-
west-1.amazonaws.com**
• s3-accesspoint-
fips.dualstack.us-
west-1.amazonaws.com**
Version 1.0
467
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.us-
west-2.amazonaws.com
• s3-accesspoint-fips.us-
west-2.amazonaws.com
• s3-accesspoint.dualstack.us-
west-2.amazonaws.com**
• s3-accesspoint-
fips.dualstack.us-
west-2.amazonaws.com**
Version 1.0
468
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.af-
south-1.amazonaws.com
• s3-accesspoint.dualstack.af-
south-1.amazonaws.com**
• s3-accesspoint.ap-
east-1.amazonaws.com
• s3-accesspoint.dualstack.ap-
east-1.amazonaws.com**
Version 1.0
469
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.ap-
south-1.amazonaws.com
• s3-accesspoint.dualstack.ap-
south-1.amazonaws.com**
• s3-accesspoint.ap-
northeast-3.amazonaws.com
• s3-accesspoint.dualstack.ap-
northeast-3.amazonaws.com**
Version 1.0
470
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.ap-
northeast-2.amazonaws.com
• s3-accesspoint.dualstack.ap-
northeast-2.amazonaws.com**
• s3-accesspoint.ap-
southeast-1.amazonaws.com
• s3-accesspoint.ap-
southeast-1.amazonaws.com**
Version 1.0
471
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.ap-
southeast-2.amazonaws.com
• s3-accesspoint.dualstack.ap-
southeast-2.amazonaws.com**
• s3-accesspoint.ap-
northeast-1.amazonaws.com
• s3-accesspoint.dualstack.ap-
northeast-1.amazonaws.com**
Version 1.0
472
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.ca-
central-1.amazonaws.com
• s3-accesspoint-fips.ca-
central-1.amazonaws.com
• s3-accesspoint.dualstack.ca-
central-1.amazonaws.com**
• s3-accesspoint-
fips.dualstack.ca-
central-1.amazonaws.com**
Version 1.0
473
AWS General Reference Reference guide
Service Endpoints
China cn-north-1 Valid endpoint name for this cn-north-1 HTTP and Version 4
(Beijing) Region: HTTPS only
• s3.cn-
north-1.amazonaws.com.cn
• s3.dualstack.cn-
north-1.amazonaws.com.cn
• account-id.s3-control.cn-
north-1.amazonaws.com.cn
• account-id.s3-
control.dualstack.cn-
north-1.amazonaws.com.cn
• s3-accesspoint.cn-
north-1.amazonaws.com
• s3-accesspoint.dualstack.cn-
north-1.amazonaws.com
China cn- Valid endpoint name for this cn- HTTP and Version 4
(Ningxia) northwest-1 Region: northwest-1 HTTPS only
• s3.cn-
northwest-1.amazonaws.com.cn
• s3.dualstack.cn-
northwest-1.amazonaws.com.cn
• account-id.s3-control.cn-
northwest-1.amazonaws.com.cn
• account-id.s3-
control.dualstack.cn-
northwest-1.amazonaws.com.cn
• s3-accesspoint.cn-
northwest-1.amazonaws.com
• s3-accesspoint.dualstack.cn-
northwest-1.amazonaws.com
Version 1.0
474
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.eu-
central-1.amazonaws.com
• s3-accesspoint.dualstack.eu-
central-1.amazonaws.com**
• s3-accesspoint.eu-
west-1.amazonaws.com
• s3-accesspoint.dualstack.eu-
west-1.amazonaws.com**
Version 1.0
475
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.eu-
west-2.amazonaws.com
• s3-accesspoint.dualstack.eu-
west-2.amazonaws.com**
• s3-accesspoint.eu-
south-1.amazonaws.com
• s3-accesspoint.dualstack.eu-
south-1.amazonaws.com**
Version 1.0
476
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.eu-
west-3.amazonaws.com
• s3-accesspoint.dualstack.eu-
west-3.amazonaws.com**
• s3-accesspoint.eu-
north-1.amazonaws.com
• s3-accesspoint.dualstack.eu-
north-1.amazonaws.com**
Version 1.0
477
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.sa-
east-1.amazonaws.com
• s3-accesspoint.dualstack.sa-
east-1.amazonaws.com**
• s3-accesspoint.me-
south-1.amazonaws.com
• s3-accesspoint.dualstack.me-
south-1.amazonaws.com**
Version 1.0
478
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.us-gov-
east-1.amazonaws.com
• s3-accesspoint-fips.us-gov-
east-1.amazonaws.com
• s3-accesspoint.dualstack.us-
gov-east-1.amazonaws.com**
• s3-accesspoint-
fips.dualstack.us-gov-
east-1.amazonaws.com**
Version 1.0
479
AWS General Reference Reference guide
Service Endpoints
• s3-accesspoint.us-gov-
west-1.amazonaws.com
• s3-accesspoint-fips.us-gov-
west-1.amazonaws.com
• s3-accesspoint.dualstack.us-
gov-west-1.amazonaws.com**
• s3-accesspoint-
fips.dualstack.us-gov-
west-1.amazonaws.com**
**Amazon S3 dual-stack endpoints support requests to S3 buckets over IPv6 and IPv4. For more
information, see Using Dual-Stack Endpoints.
***You must enable this Region before you can use it.
****You can use the Asia Pacific (Osaka-Local) Region only in conjunction with the Asia Pacific (Tokyo)
Region. To request access to the Asia Pacific (Osaka-Local) Region, contact your sales representative.
When using the preceding endpoints the following additional considerations apply:
Version 1.0
480
AWS General Reference Reference guide
Service Endpoints
• Amazon S3 renamed the US Standard Region to the US East (N. Virginia) Region to be consistent with
AWS Regional naming conventions. There is no change to the endpoint, and you do not need to make
any changes to your application.
• If you use a Region other than the US East (N. Virginia) endpoint to create a bucket, you must set the
LocationConstraint bucket parameter to the same Region. Both the AWS SDK for Java and AWS SDK
for .NET use an enumeration for setting location constraints (Region for Java, S3Region for .NET). For
more information, see PUT Bucket in the Amazon Simple Storage Service API Reference.
Version 1.0
481
AWS General Reference Reference guide
Service Quotas
For information about using Amazon Simple Storage Service in the AWS GovCloud (US-West) Region, see
AWS GovCloud (US-West) Endpoints.
For information about using Amazon Simple Storage Service in the China Regions, see:
Service Quotas
Version 1.0
482
AWS General Reference Reference guide
Amazon SWF
Service Endpoints
Version 1.0
483
AWS General Reference Reference guide
Service Endpoints
For information about using Amazon Simple Workflow Service in the AWS GovCloud (US-West) Region,
see AWS GovCloud (US-West) Endpoints.
For information about using Amazon Simple Workflow Service in the China Regions, see:
Version 1.0
484
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see Amazon SWF Quotas in the Amazon Simple Workflow Service Developer Guide.
Service Endpoints
Version 1.0
485
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Domains 250
For more information, see Amazon SimpleDB Quotas in the Amazon SimpleDB Developer Guide.
Service Endpoints
AWS SSO
Version 1.0
486
AWS General Reference Reference guide
Service Quotas
Identity Store
Service Quotas
For a list of AWS SSO service quotas, see AWS Single Sign-On Quotas.
Version 1.0
487
AWS General Reference Reference guide
Snow Family
Service Endpoints
AWS Snow Family devices are available in the following AWS Regions.
AWS Snowcone is only available in the following AWS Regions:
US us-west-1 snowball.us-west-1.amazonaws.com
West (N. HTTPS
California) snowball-fips.us-west-1.amazonaws.com
Version 1.0
488
AWS General Reference Reference guide
Service Endpoints
Version 1.0
489
AWS General Reference Reference guide
Service Quotas
For information about using AWS Snow Family in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
Service Quotas
Resource Default Comments
Snowball Edge and AWS Snowcone devices 1 To increase this quota, contact AWS
Support.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
490
AWS General Reference Reference guide
Service Endpoints
Version 1.0
491
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see AWS Step Functions Quotas in the AWS Step Functions Developer Guide.
Service endpoints
AWS Storage Gateway
For AWS Regions that the hardware appliance is supported in, see Storage Gateway hardware appliance
regions (p. 494).
Version 1.0
492
AWS General Reference Reference guide
Service endpoints
Version 1.0
493
AWS General Reference Reference guide
Service endpoints
For information about using Storage Gateway in the AWS GovCloud (US) Regions, see AWS GovCloud
(US) endpoints in the AWS GovCloud (US) User Guide.
For information about using Storage Gateway in the China Regions, see:
• US East (Ohio)
• US East (N. Virginia)
• US West (N. California)
• US West (Oregon)
• Asia Pacific (Mumbai)
• Asia Pacific (Seoul)
• Asia Pacific (Singapore)
• Asia Pacific (Sydney)
• Asia Pacific (Tokyo)
• Canada (Central)
• Europe (Frankfurt)
• Europe (Ireland)
• Europe (London)
Version 1.0
494
AWS General Reference Reference guide
Service quotas
• Europe (Paris)
• Europe (Stockholm)
• South America (São Paulo)
Service quotas
For more information, see AWS Storage Gateway quotas in the AWS Storage Gateway User Guide.
Service Endpoints
AWS Support has a single endpoint: support.us-east-1.amazonaws.com (HTTPS).
Service Quotas
The following table describes the current quotas and restrictions for AWS Support.
Resource Default
Service Endpoints
Note
In addition to the ssm.* endpoints listed below, your managed instances must also allow
HTTPS (port 443) outbound traffic to the following endpoints:
• ec2messages.*
• ssmmessages.*
Version 1.0
495
AWS General Reference Reference guide
Service Endpoints
For more information about these endpoints, see Reference: ec2messages, ssmmessages, and
Other API Calls in the AWS Systems Manager User Guide.
Version 1.0
496
AWS General Reference Reference guide
Service Quotas
For information about using AWS Systems Manager in the AWS GovCloud (US-West) Region, see AWS
GovCloud (US-West) Endpoints.
For information about using AWS Systems Manager in the China Regions, see:
AWS Systems Manager Distributor is available in all commercial Regions except the China (Beijing)
Region and the China (Ningxia) Region. Distributor is not available in the AWS GovCloud (US-West)
Endpoints.
Service Quotas
Version 1.0
497
AWS General Reference Reference guide
Service Quotas
Amazon S3: 1 MB
Version 1.0
498
AWS General Reference Reference guide
Service Quotas
A parent-level Automation
document can start a child-
level Automation document.
This represents one level
of nested automation. The
child-level Automation
document can start another
Automation document,
resulting in two levels of
nested automation. This can
continue up to a maximum
of five (5) levels below the
top-level parent Automation
document.
Version 1.0
499
AWS General Reference Reference guide
Service Quotas
Each executeScript
action can run up to a
maximum duration of 10
minutes.
Version 1.0
500
AWS General Reference Reference guide
Service Quotas
Version 1.0
501
AWS General Reference Reference guide
Service Quotas
If you terminate an
instance, inventory data
for that instance is deleted
immediately. For running
instances, inventory data
older than 30 days is
deleted. If you need to store
inventory data longer than
30 days, you can use AWS
Config to record history
or periodically query and
upload the data to an
Amazon S3 bucket. For more
information, see, Recording
Amazon EC2 managed
instance inventory in the
AWS Config Developer Guide.
Version 1.0
502
AWS General Reference Reference guide
Service Quotas
Managed Instances - Hybrid Total number of registered on-premises Standard instances: 1,000
Environment servers and virtual machines (VMs) in a (per account per Region)
hybrid environment
Advanced instances:
Advanced instances are
available on a pay-per-use
basis. Advanced instances
also enable you to connect
to your hybrid machines
by using AWS Systems
Manager Session Manager.
For more information about
activating on-premises
instances for use in your
hybrid environment, see
Create a Managed-Instance
Activation in the AWS
Systems Manager User
Guide. For more information
about enabling advanced
instances, see Using the
Advanced-Instances Tier.
Version 1.0
503
AWS General Reference Reference guide
Service Quotas
Advanced parameter: 8 KB
Version 1.0
504
AWS General Reference Reference guide
Amazon Textract
Version 1.0
505
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Version 1.0
506
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Transactions per second per account for synchronous operations: For AnalyzeDocument:
For DetectDocumentText:
Transactions per second per account for all start (asynchronous) For StartDocumentAnalysis Text:
operations:
All Regions Amazon Textract
• StartDocumentAnalysis supports – 2
• StartDocumentTextDetection
For
StartDocumentTextDetection:
Transactions per second per account for all get (asynchronous) For GetDocumentAnalysis:
operations:
US East (N. Virginia) Region – 10
• GetDocumentAnalysis
US West (Oregon) Region - 10
• GetDocumentTextDetection
All other Regions that Amazon
Textract supports – 1
For GetDocumentTextDetection:
Version 1.0
507
AWS General Reference Reference guide
Amazon Transcribe
Resource Default
All other Regions that Amazon
Textract supports – 1
Maximum number of asynchronous jobs per account that can US East (N. Virginia) Region –
simultaneously exist 600
Service Endpoints
Amazon Transcribe
Version 1.0
508
AWS General Reference Reference guide
Service Endpoints
Version 1.0
509
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Version 1.0
510
AWS General Reference Reference guide
Service Quotas
Resource Default
Number of concurrent 5
HTTP/2 streams for
streaming transcription
Number of 5
StartStreamTranscription
Websocket requests
Number of concurrently 3
training custom language
models
Number of pending 10
vocabularies
Version 1.0
511
AWS General Reference Reference guide
Amazon Transcribe Medical
For more information, see Guidelines and Quotas in the Amazon Transcribe Developer Guide.
Service Endpoints
Amazon Transcribe Medical
Service Quotas
Resource Default
Number of 5
StartMedicalStreamTranscription
Websocket requests
Version 1.0
512
AWS General Reference Reference guide
AWS Transfer Family
Resource Default
Service endpoints
Version 1.0
513
AWS General Reference Reference guide
Service endpoints
Version 1.0
514
AWS General Reference Reference guide
Service quotas
For information about using AWS Transfer Family in the AWS GovCloud (US) Regions, see AWS GovCloud
(US) endpoints in the AWS GovCloud (US) User Guide.
Service quotas
Resource Default Comments
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
515
AWS General Reference Reference guide
Service Endpoints
Version 1.0
516
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
For more information, see Guidelines and Quotas in the Amazon Translate Developer Guide.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
517
AWS General Reference Reference guide
Service Endpoints
Version 1.0
518
AWS General Reference Reference guide
Service Quotas
If you specify the general endpoint (ec2.amazonaws.com), Amazon VPC directs your request to the us-
east-1 endpoint.
For information about using Amazon VPC in the AWS GovCloud (US-West) Region, see AWS GovCloud
(US-West) Endpoints.
For information about using Amazon VPC in the China Regions, see:
Service Quotas
Unless otherwise noted, you can submit a request to increase these quotas.
Amazon VPC
For more information, see Amazon VPC quotas in the Amazon VPC User Guide:
Traffic Mirroring
For more information, see Traffic Mirroring quotas and considerations in Amazon VPC Traffic Mirroring.
Transit Gateways
For more information, see Quotas for your transit gateways in Amazon VPC Transit Gateways.
Version 1.0
519
AWS General Reference Reference guide
AWS WAF
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
AWS WAF has a single endpoint: wafv2.amazonaws.com. It supports HTTPS requests only.
Version 1.0
520
AWS General Reference Reference guide
Service Endpoints
Version 1.0
521
AWS General Reference Reference guide
Service Quotas
Service Quotas
AWS WAF has default quotas on the number of entities per account. You can request an increase in these
quotas.
Resource Default
Requests per second per web ACL (applies only to Application Load Balancers) 10,000
*This quota applies only to AWS WAF on an Application Load Balancer and Amazon API Gateway API.
Requests per Second (RPS) quotas for AWS WAF on CloudFront are the same as the RPS quotas support
by CloudFront described in the Amazon CloudFront Developer Guide.
Resource Default
Maximum number of references (to IP sets and regex pattern sets) per rule group 50
Maximum number of references (to IP sets, regex pattern sets, and rule groups) 50
per web ACL
Minimum request rate that can be defined for a rate-based rule 100
These quotas are the same for all Regions in which AWS WAF is available. Each Region is subject to these
quotas individually. That is, the quotas are not cumulative across regions.
Version 1.0
522
AWS General Reference Reference guide
AWS WAF Classic
The following are the service endpoints and service quotas for this service. To connect programmatically
to an AWS service, you use an endpoint. In addition to the standard AWS endpoints, some AWS services
offer FIPS endpoints in selected Regions. For more information, see AWS service endpoints (p. 536).
Service quotas, also referred to as limits, are the maximum number of service resources or operations for
your AWS account. For more information, see AWS service quotas (p. 540).
Service Endpoints
AWS WAF Classic for CloudFront distributions has a single endpoint: waf.amazonaws.com. It supports
HTTPS requests only.
Version 1.0
523
AWS General Reference Reference guide
Service Endpoints
Version 1.0
524
AWS General Reference Reference guide
Service Endpoints
AWS WAF Classic for Application Load Balancers and API Gateway APIs has the following endpoints:
Version 1.0
525
AWS General Reference Reference guide
Service Quotas
Service Quotas
AWS WAF Classic has default quotas on the number of entities per account. You can request an increase
in these quotas.
Resource Default
Version 1.0
526
AWS General Reference Reference guide
Service Quotas
Resource Default
exception is regex
match conditions.
You can have
a maximum of
10 regex match
conditions per
account per
Region. This
quota cannot be
increased.)
*This quota applies only to AWS WAF Classic on an Application Load Balancer and API Gateway. Requests
per Second (RPS) quotas for AWS WAF Classic on CloudFront are the same as the RPS quotas support by
CloudFront described in the Amazon CloudFront Developer Guide.
Resource Default
In string match conditions, the number of characters in the value that you want 50
AWS WAF to search for
In regex match conditions, the number of characters in the pattern that you want 70
AWS WAF to search for
Version 1.0
527
AWS General Reference Reference guide
AWS Well-Architected Tool
Resource Default
In regex match conditions, the number of pattern sets per regex condition 1
These quotas are the same for all Regions in which AWS WAF Classic is available. Each Region is subject
to these quotas individually. That is, the quotas are not cumulative across regions.
Service Endpoints
Version 1.0
528
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
529
AWS General Reference Reference guide
Amazon WorkLink
Service Endpoints
Version 1.0
530
AWS General Reference Reference guide
Service Endpoints
Service Endpoints
Region Name Region Service Endpoint
Version 1.0
531
AWS General Reference Reference guide
Service Quotas
Service Quotas
For more information, see Amazon WorkMail Quotas.
Service Endpoints
Region Region Endpoint Protocol
Name
Version 1.0
532
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default
Service Endpoints
Version 1.0
533
AWS General Reference Reference guide
Service Endpoints
Version 1.0
534
AWS General Reference Reference guide
Service Quotas
Service Quotas
Resource Default Can be increased
Version 1.0
535
AWS General Reference Reference guide
AWS service endpoints
AWS resources
The following pages provide information that helps you work with AWS resources.
Contents
• AWS service endpoints (p. 536)
• Managing AWS Regions (p. 538)
• AWS service quotas (p. 540)
• Tagging AWS resources (p. 541)
• Amazon Resource Names (ARNs) (p. 544)
If a service supports Regions, the resources in each Region are independent of similar resources in other
Regions. For example, you can create an Amazon EC2 instance or an Amazon SQS queue in one Region.
When you do, the instance or queue is independent of instances or queues in all other Regions.
Contents
• Regional endpoints (p. 536)
• View the service endpoints (p. 537)
• FIPS endpoints (p. 538)
• Learn more (p. 538)
Regional endpoints
Most Amazon Web Services offer a Regional endpoint that you can use to make your requests. The
general syntax of a Regional endpoint is as follows.
protocol://service-code.region-code.amazonaws.com
The following table lists the name and code of each Region.
Version 1.0
536
AWS General Reference Reference guide
View the service endpoints
Some services, such as IAM, do not support Regions. The endpoints for these services do not include
a Region. Other services, such as Amazon EC2, support Regions but let you specify an endpoint that
does not include a Region, such as https://ec2.amazonaws.com. When you use an endpoint with
no Region, AWS routes the Amazon EC2 request to US East (N. Virginia) (us-east-1), which is the default
Region for API calls.
• Open Service endpoints and quotas (p. 16), search for the service name, and click the link to open
the page for that service. To view the supported endpoints for all AWS services in the documentation
without switching pages, view the information in the Service Endpoints and Quotas page in the PDF
instead.
• To programmatically check for service availability using the SDK for Java, see Checking for Service
Availability in an AWS Region in the AWS SDK for Java Developer Guide.
Version 1.0
537
AWS General Reference Reference guide
FIPS endpoints
• To programmatically view Region and service information using Systems Manager, see Calling AWS
Service, Region, and Endpoint Public Parameters in the AWS Systems Manager User Guide. For
information about how to use public parameters, see Query for AWS Regions, Endpoints, and More
Using AWS Systems Manager Parameter Store.
• To see the supported AWS services in each Region (without endpoints), see the Region Table.
FIPS endpoints
Some AWS services offer FIPS endpoints in selected Regions. Unlike standard AWS endpoints, FIPS
endpoints use a TLS software library that complies with Federal Information Processing Standard
(FIPS) 140-2. These endpoints might be required by enterprises that interact with the United States
government. For more information, see Federal Information Processing Standard (FIPS) 140-2 on the
AWS Compliance site.
To use a FIPS endpoint with an AWS operation, use the mechanism provided by the AWS SDK or tool to
specify a custom endpoint. For example, the AWS Command Line Interface provides the --endpoint-
url option. The following example uses the FIPS endpoint for the US West (Oregon) Region with an
operation for AWS Key Management Service (AWS KMS).
AWS encourages you to be proactive in maintaining security standards to avoid impacting availability
and to protect the integrity of data in transit. We recommend that you review your client applications to
confirm that they support TLS 1.2. We recommend that you test TLS 1.2 in a staging environment before
you introduce configuration changes to your applications in production.
Learn more
You can find endpoint information from the following sources:
• To learn about enabling Regions that are disabled by default, see Managing AWS Regions (p. 538).
• For information about the AWS services and endpoints available in the China Regions, see China
(Beijing) Region Endpoints and China (Ningxia) Region Endpoints.
• For information about the AWS services and endpoints available in AWS GovCloud (US), see Service
Endpoints in the AWS GovCloud (US) User Guide.
The resources that you create in one Region do not exist in any other Region unless you explicitly use a
replication feature offered by an AWS service. For example, Amazon S3 and Amazon EC2 support cross-
Version 1.0
538
AWS General Reference Reference guide
Enabling a Region
Region replication. Some services, such as AWS Identity and Access Management (IAM), do not have
Regional resources.
You can use policy conditions to control access to AWS services in an AWS Region. For a table of AWS
services supported in each Region (without endpoints), see the Region Table.
Regions introduced before March 20, 2019 are enabled by default. You can begin creating and managing
resources in these Regions immediately. You cannot enable or disable a Region that is enabled by
default.
Enabling a Region
If a Region is disabled by default, you must enable it before you can create and manage resources. The
following Regions are disabled by default:
When you enable a Region, AWS performs actions to prepare your account in that Region, such as
distributing your IAM resources to the Region. This process takes a few minutes for most accounts, but
this can take several hours. You cannot use the Region until this process is complete.
Requirements
To enable a Region that is disabled by default, you must have permission to enable Regions. To view an
example IAM policy, see Allow enabling and disabling AWS Regions in the IAM User Guide.
To enable a Region
Disabling a Region
After you disable a Region, the resources in this Region are immediately unavailable. However, they are
not deleted. You cannot disable a Region that is enabled by default.
Requirements
• To disable a Region, you must have permission to disable Regions. To view an example IAM policy, see
Allow enabling and disabling AWS Regions in the IAM User Guide.
• Before you disable a Region, we recommend that you remove all resources from that Region. After you
disable a Region, you can no longer view or manage resources in that Region. However, resources in
that Region can continue to incur charges. For more information, see Enabling and disabling Regions in
the AWS Billing and Cost Management User Guide.
Version 1.0
539
AWS General Reference Reference guide
Describing your Regions using the AWS CLI
To disable a Region
"OptInStatus": "opt-in-not-required"
"OptInStatus": "not-opted-in"
"OptInStatus": "opted-in"
Service Quotas is an AWS service that helps you manage your quotas for over 100 AWS services, from
one location. Along with looking up the quota values, you can also request a quota increase from the
Service Quotas console.
• Open the Service endpoints and quotas (p. 16) page in the documentation, search for the service
name, and click the link to go to the page for that service. To view the service quotas for all AWS
services in the documentation without switching pages, view the information in the Service Endpoints
and Quotas page in the PDF instead.
• Open the Service Quotas console. In the navigation pane, choose AWS services and select a service.
• Use the list-service-quotas and list-aws-default-service-quotas AWS CLI commands.
Version 1.0
540
AWS General Reference Reference guide
Tagging AWS resources
You can request a quota increase using Service Quotas and AWS Support Center. If a service is not yet
available in Service Quotas, use AWS Support Center instead. Increases are not granted immediately. It
might take a couple of days for your increase to become effective.
• (Recommended) Open the Service Quotas console. In the navigation pane, choose AWS services.
Select a service, select a quota, and follow the directions to request a quota increase. For more
information, see Requesting a Quota Increase in the Service Quotas User Guide.
• Use the request-service-quota-increase AWS CLI command.
• Open the AWS Support Center page, sign in if necessary, and choose Create case. Choose Service limit
increase. Complete and submit the form.
This topic describes commonly used tagging categories and strategies to help you implement a
consistent and effective tagging strategy. The following sections assume basic knowledge of AWS
resources, tagging, detailed billing, and AWS Identity and Access Management (IAM).
• A tag key (for example, CostCenter, Environment, or Project). Tag keys are case sensitive.
• A tag value (for example, 111122223333 or Production). Like tag keys, tag values are case sensitive.
You can use tags to categorize resources by purpose, owner, environment, or other criteria. For more
information, see AWS Tagging Strategies.
You can add, change, or remove tags one resource at a time from each resource’s service console, service
API, or the AWS CLI.
Best practices
As you create a tagging strategy for AWS resources, follow best practices:
• Do not store personally identifiable information (PII) or other confidential or sensitive information in
tags.
• Use a standardized, case-sensitive format for tags, and apply it consistently across all resource types.
• Consider tag guidelines that support multiple purposes, like managing resource access control, cost
tracking, automation, and organization.
• Use automated tools to help manage resource tags. AWS Resource Groups and the Resource Groups
Tagging API enable programmatic control of tags, making it easier to automatically manage, search,
and filter tags and resources.
• Use too many tags rather than too few tags.
Version 1.0
541
AWS General Reference Reference guide
Tagging categories
• Remember that it is easy to change tags to accommodate changing business requirements, but
consider the consequences of future changes. For example, changing access control tags means you
must also update the policies that reference those tags and control access to your resources.
Tagging categories
Companies that are most effective in their use of tags typically create business-relevant tag groupings
to organize their resources along technical, business, and security dimensions. Companies that use
automated processes to manage their infrastructure also include additional, automation-specific tags.
Version 1.0
542
AWS General Reference Reference guide
Common tagging strategies
• The tag value must be a minimum of 0 and a maximum of 256 Unicode characters in UTF-8.
Note
Some services don't permit tags with an empty value (length of 0).
• Allowed characters can vary by AWS service. For information about what characters you can use to tag
resources in a particular AWS service, see its documentation. In general, allowed characters in tags are
letters, numbers, spaces representable in UTF-8, and the following characters: _ . : / = + - @ .
• Tag keys and values are case sensitive. As a best practice, decide on a strategy for capitalizing tags,
and consistently implement that strategy across all resource types. For example, decide whether to use
Costcenter, costcenter, or CostCenter, and use the same convention for all tags. Avoid using
similar tags with inconsistent case treatment.
For some services, you can use an AWS-generated createdBy tag for cost allocation purposes, to help
account for resources that might otherwise go uncategorized. The createdBy tag is available only for
supported AWS services and resources. Its value contains data associated with specific API or console
events. For more information, see AWS-Generated Cost Allocation Tags in the AWS Billing and Cost
Management User Guide.
Version 1.0
543
AWS General Reference Reference guide
Tagging governance
resources to archive, update, or delete. For example, you can run automated start or stop scripts that
turn off development environments during nonbusiness hours to reduce costs. In this scenario, Amazon
Elastic Compute Cloud (Amazon EC2) instance tags are a simple way to identify instances to opt out of
this action. For scripts that find and delete stale, out-of-date, or rolling Amazon EBS snapshots, snapshot
tags can add an extra dimension of search criteria.
Tagging governance
An effective tagging strategy uses standardized tags and applies them consistently and
programmatically across AWS resources. You can use both reactive and proactive approaches for
governing tags in your AWS environment.
• Reactive governance is for finding resources that are not properly tagged using tools such as the
Resource Groups Tagging API, AWS Config Rules, and custom scripts. To find resources manually, you
can use Tag Editor and detailed billing reports.
• Proactive governance uses tools such as AWS CloudFormation, AWS Service Catalog, tag policies in
AWS Organizations, or IAM resource-level permissions to ensure standardized tags are consistently
applied at resource creation.
For example, you can use the AWS CloudFormation Resource Tags property to apply tags to
resource types. In AWS Service Catalog, you can add portfolio and product tags that are combined and
applied to a product automatically when it is launched. More rigorous forms of proactive governance
include automated tasks. For example, you can use the Resource Groups Tagging API to search an AWS
environment’s tags, or run scripts to quarantine or delete improperly tagged resources.
Learn more
This page provides general information on tagging AWS resources. For more information about tagging
resources in a particular AWS service, see its documentation. The following are also good sources of
information about tagging:
• For a list of services that support tagging, see the Resource Groups Tagging API Reference.
• For information about Tag Editor, see Working with Tag Editor in the AWS Resource Groups User Guide.
• For information about using tags to control access to AWS resources, see Control Access Using IAM
Tags in the IAM User Guide.
Contents
Version 1.0
544
AWS General Reference Reference guide
Format
Format
The following are the general formats for ARNs. The specific formats depend on the resource. To use an
ARN, replace the italicized text with the resource-specific information. Be aware that the ARNs for
some resources omit the Region, the account ID, or both the Region and the account ID.
arn:partition:service:region:account-id:resource-id
arn:partition:service:region:account-id:resource-type/resource-id
arn:partition:service:region:account-id:resource-type:resource-id
partition
The partition in which the resource is located. A partition is a group of AWS Regions. Each AWS
account is scoped to one partition.
The service namespace that identifies the AWS product. For example, s3 for Amazon S3 resources.
region
The ID of the AWS account that owns the resource, without the hyphens. For example,
123456789012.
resource-id
The resource identifier. This part of the ARN can be the name or ID of the resource or a resource
path (p. 545). For example, user/Bob for an IAM user or instance/i-1234567890abcdef0 for
an EC2 instance. Some resource identifiers include a parent resource (sub-resource-type/parent-
resource/sub-resource) or a qualifier such as a version (resource-type:resource-name:qualifier).
Paths in ARNs
Resource ARNs can include a path. For example, in Amazon S3, the resource identifier is an object name
that can include slashes (/) to form a path. Similarly, IAM user names and group names can include
paths.
Paths can include a wildcard character, namely an asterisk (*). For example, if you are writing an IAM
policy, you can specify all IAM users that have the path product_1234 using a wildcard as follows:
arn:aws:iam::123456789012:user/Development/product_1234/*
Similarly, you can specify user/* to mean all users or group/* to mean all groups, as in the following
examples:
Version 1.0
545
AWS General Reference Reference guide
Resource ARNs
"Resource":"arn:aws:iam::123456789012:user/*"
"Resource":"arn:aws:iam::123456789012:group/*"
You cannot use a wildcard to specify all users in the Principal element in a resource-based policy or a
role trust policy. Groups are not supported as principals in any policy.
The following example shows ARNs for an Amazon S3 bucket in which the resource name includes a
path:
arn:aws:s3:::my_corporate_bucket/*
arn:aws:s3:::my_corporate_bucket/Development/*
You cannot use a wildcard in the portion of the ARN that specifies the resource type, such as the term
user in an IAM ARN.
arn:aws:iam::123456789012:u*
Resource ARNs
The documentation for AWS Identity and Access Management (IAM) lists the ARNs supported by each
service for use in resource-level permissions. For more information, see Actions, Resources, and Condition
Keys for AWS Services in the IAM User Guide.
Version 1.0
546
AWS General Reference Reference guide
Download
Contents
• Download (p. 547)
• Syntax (p. 547)
• Filtering the JSON file (p. 549)
• Implementing egress control (p. 551)
• AWS IP address ranges notifications (p. 553)
• Release notes (p. 554)
Download
Download ip-ranges.json.
If you access this file programmatically, it is your responsibility to ensure that the application downloads
the file only after successfully verifying the TLS certificate presented by the server.
Syntax
The syntax of ip-ranges.json is as follows.
{
"syncToken": "0123456789",
"createDate": "yyyy-mm-dd-hh-mm-ss",
"prefixes": [
{
"ip_prefix": "cidr",
"region": "region",
"network_border_group": "network_border_group",
"service": "subset"
}
],
"ipv6_prefixes": [
{
"ipv6_prefix": "cidr",
"region": "region",
"network_border_group": "network_border_group",
"service": "subset"
}
]
}
syncToken
Version 1.0
547
AWS General Reference Reference guide
Syntax
Type: String
Type: String
Type: Array
ipv6_prefixes
Type: Array
ip_prefix
The public IPv4 address range, in CIDR notation. Note that AWS may advertise a prefix in more
specific ranges. For example, prefix 96.127.0.0/17 in the file may be advertised as 96.127.0.0/21,
96.127.8.0/21, 96.127.32.0/19, and 96.127.64.0/18.
Type: String
The public IPv6 address range, in CIDR notation. Note that AWS may advertise a prefix in more
specific ranges.
Type: String
The name of the network border group, which is a unique set of Availability Zones or Local Zones
from where AWS advertises IP addresses.
Type: String
The AWS Region or GLOBAL for edge locations. The CLOUDFRONT and ROUTE53 ranges are GLOBAL.
Type: String
Version 1.0
548
AWS General Reference Reference guide
Filtering the JSON file
service
The subset of IP address ranges. The addresses listed for API_GATEWAY are egress only. Specify
AMAZON to get all IP address ranges (meaning that every subset is also in the AMAZON subset).
However, some IP address ranges are only in the AMAZON subset (meaning that they are not also
available in another subset).
Type: String
Windows
The AWS Tools for Windows PowerShell includes a cmdlet, Get-AWSPublicIpAddressRange, to parse
this JSON file. The following examples demonstrate its use. For more information, see Querying the
Public IP Address Ranges for AWS and Get-AWSPublicIpAddressRange.
PS C:\> (Get-AWSPublicIpAddressRange).IpPrefix
23.20.0.0/14
27.0.0.0/22
43.250.192.0/24
...
2406:da00:ff00::/64
2600:1fff:6000::/40
2a01:578:3::/64
2600:9000::/28
Version 1.0
549
AWS General Reference Reference guide
Linux
IpPrefix
--------
23.20.0.0/14
27.0.0.0/22
43.250.192.0/24
...
IpPrefix
--------
2a05:d07c:2000::/40
2a05:d000:8000::/40
2406:dafe:2000::/40
...
IpPrefix
--------
52.47.73.72/29
13.55.255.216/29
52.15.247.208/29
...
Linux
The following example commands use the jq tool to parse a local copy of the JSON file.
"2016-02-18-17-22-15"
{
"ip_prefix": "23.20.0.0/14",
"region": "us-east-1",
"network_border_group": "us-east-1",
"service": "AMAZON"
},
{
"ip_prefix": "50.16.0.0/15",
"region": "us-east-1",
"network_border_group": "us-east-1",
Version 1.0
550
AWS General Reference Reference guide
Implementing egress control
"service": "AMAZON"
},
{
"ip_prefix": "50.19.0.0/16",
"region": "us-east-1",
"network_border_group": "us-east-1",
"service": "AMAZON"
},
...
23.20.0.0/14
27.0.0.0/22
43.250.192.0/24
...
2a05:d07c:2000::/40
2a05:d000:8000::/40
2406:dafe:2000::/40
...
52.47.73.72/29
13.55.255.216/29
52.15.247.208/29
...
Example 6. Get all IPv4 addresses for a specific service in a specific Region
34.228.4.208/28
us-west-2-lax-1
Version 1.0
551
AWS General Reference Reference guide
Windows PowerShell
Windows PowerShell
The following PowerShell example shows you how to get the IP addresses that are in the AMAZON list but
not the EC2 list. Copy the script and save it in a file named Select_address.ps1.
PS C:\> .\Select_address.ps1
13.32.0.0/15
13.35.0.0/16
13.248.0.0/20
13.248.16.0/21
13.248.24.0/22
13.248.28.0/22
27.0.0.0/22
43.250.192.0/24
43.250.193.0/24
...
jq
The following example shows you how to get the IP addresses that are in the AMAZON list but not the
EC2 list, for all Regions:
52.94.22.0/24
52.94.17.0/24
52.95.154.0/23
52.95.212.0/22
54.239.0.240/28
54.239.54.0/23
52.119.224.0/21
...
The following example shows you how to filter the results to one Region:
Python
The following python script shows you how to get the IP addresses that are in the AMAZON list but not
the EC2 list. Copy the script and save it in a file named get_ips.py.
Version 1.0
552
AWS General Reference Reference guide
AWS IP address ranges notifications
#!/usr/bin/env python
import requests
ip_ranges = requests.get('https://ip-ranges.amazonaws.com/ip-ranges.json').json()
['prefixes']
amazon_ips = [item['ip_prefix'] for item in ip_ranges if item["service"] == "AMAZON"]
ec2_ips = [item['ip_prefix'] for item in ip_ranges if item["service"] == "EC2"]
amazon_ips_less_ec2=[]
for ip in amazon_ips:
if ip not in ec2_ips:
amazon_ips_less_ec2.append(ip)
$ python ./get_ips.py
13.32.0.0/15
13.35.0.0/16
13.248.0.0/20
13.248.16.0/21
13.248.24.0/22
13.248.28.0/22
27.0.0.0/22
43.250.192.0/24
43.250.193.0/24
...
{
"create-time":"yyyy-mm-ddThh:mm:ss+00:00",
"synctoken":"0123456789",
"md5":"6a45316e8bc9463c9e926d5d37836d33",
"url":"https://ip-ranges.amazonaws.com/ip-ranges.json"
}
create-time
Notifications could be delivered out of order. Therefore, we recommend that you check the
timestamps to ensure the correct order.
synctoken
The cryptographic hash value of the ip-ranges.json file. You can use this value to check whether
the downloaded file is corrupted.
url
Version 1.0
553
AWS General Reference Reference guide
Release notes
If you want to be notified whenever there is a change to the AWS IP address ranges, you can subscribe as
follows to receive notifications using Amazon SNS.
a. For Topic ARN, copy the following Amazon Resource Name (ARN):
arn:aws:sns:us-east-1:806199016981:AmazonIpSpaceChanged
Notifications are subject to the availability of the endpoint. Therefore, you might want to check the
JSON file periodically to ensure that you've got the latest ranges. For more information about Amazon
SNS reliability, see https://aws.amazon.com/sns/faqs/#Reliability.
If you no longer want to receive these notifications, use the following procedure to unsubscribe.
For more information about Amazon SNS, see the Amazon Simple Notification Service Developer Guide.
Release notes
The following table describes updates to the AWS IP address ranges. We also add new Region codes with
each Region launch.
Version 1.0
554
AWS General Reference Reference guide
Release notes
Version 1.0
555
AWS General Reference Reference guide
API retries
AWS APIs
The following pages provide information that is useful when using an AWS API.
Contents
• Error retries and exponential backoff in AWS (p. 556)
• Signing AWS API requests (p. 558)
• AWS SDK support for Amazon S3 client-side encryption (p. 599)
Each AWS SDK implements automatic retry logic. The AWS SDK for Java automatically retries requests,
and you can configure the retry settings using the ClientConfiguration class. For example, you
might want to turn off the retry logic for a web page that makes a request with minimal latency and no
retries. Use the ClientConfiguration class and provide a maxErrorRetry value of 0 to turn off the
retries.
If you're not using an AWS SDK, you should retry original requests that receive server (5xx) or throttling
errors. However, client errors (4xx) indicate that you need to revise the request to correct the problem
before trying again.
In addition to simple retries, each AWS SDK implements exponential backoff algorithm for better flow
control. The idea behind exponential backoff is to use progressively longer waits between retries for
consecutive error responses. You should implement a maximum delay interval, as well as a maximum
number of retries. The maximum delay interval and maximum number of retries are not necessarily fixed
values, and should be set based on the operation being performed, as well as other local factors, such as
network latency.
Most exponential backoff algorithms use jitter (randomized delay) to prevent successive collisions.
Because you aren't trying to avoid such collisions in these cases, you don't need to use this random
number. However, if you use concurrent clients, jitter can help your requests succeed faster. For more
information, see the blog post for Exponential Backoff and Jitter.
The following pseudo code shows one way to poll for a status using an incremental delay.
retries = 0
DO
wait for (2^retries * 100) milliseconds
IF status = SUCCESS
retry = false
ELSE IF status = NOT_READY
retry = true
ELSE IF status = THROTTLED
Version 1.0
556
AWS General Reference Reference guide
API retries
retry = true
ELSE
Some other error occurred, so stop calling the API.
retry = false
END IF
retries = retries + 1
The following code demonstrates how to implement this incremental delay in Java.
/*
* Performs an asynchronous operation, then polls for the result of the
* operation using an incremental delay.
*/
public static void doOperationAndWaitForResult() {
// Do some asynchronous operation.
long token = asyncOperation();
int retries = 0;
boolean retry = false;
do {
long waitTime = Math.min(getWaitTimeExp(retries), MAX_WAIT_INTERVAL);
System.out.print(waitTime + "\n");
try {
// Wait for the result.
Thread.sleep(waitTime);
if (Results.SUCCESS == result) {
retry = false;
} else if (Results.NOT_READY == result) {
retry = true;
} else if (Results.THROTTLED == result) {
retry = true;
} else if (Results.SERVER_ERROR == result) {
retry = true;
} else {
// Some other error occurred, so stop calling the API.
retry = false;
}
/*
Version 1.0
557
AWS General Reference Reference guide
Signing AWS API requests
return waitTime;
}
• You are working with a programming language for which there is no AWS SDK.
• You want complete control over how a request is sent to AWS.
You don't need to sign a request when you use the AWS Command Line Interface (AWS CLI) or one of the
AWS SDKs. These tools manage the connection details, such as calculating signatures, handling request
retries, and error handling. In most cases, they also contain sample code, tutorials, and other resources to
help you get started writing applications that interact with AWS.
Signing makes sure that the request has been sent by someone with a valid access key. For more
information, see Understanding and getting your AWS credentials (p. 3).
• Protect data in transit
To prevent tampering with a request while it's in transit, some of the request elements are used to
calculate a hash (digest) of the request, and the resulting hash value is included as part of the request.
Version 1.0
558
AWS General Reference Reference guide
Signing requests
When an AWS service receives the request, it uses the same information to calculate a hash and
matches it against the hash value in your request. If the values don't match, AWS denies the request.
• Protect against potential replay attacks
In most cases, a request must reach AWS within five minutes of the time stamp in the request.
Otherwise, AWS denies the request.
Signing requests
To sign a request, you first calculate a hash (digest) of the request. Then you use the hash value, some
other information from the request, and your secret access key to calculate another hash known as the
signature. Then you add the signature to the request in one of the following ways:
Signature versions
AWS supports two signature versions: Signature Version 4 and Signature Version 2. You should use
Signature Version 4. All AWS services support Signature Version 4, except Amazon SimpleDB which
requires Signature Version 2. For AWS services that support both versions, we recommend that you use
Signature Version 4.
Version 1.0
559
AWS General Reference Reference guide
Signature Version 4 signing process
When an AWS service receives the request, it performs the same steps that you did to calculate the
signature you sent in your request. AWS then compares its calculated signature to the one you sent with
the request. If the signatures match, the request is processed. If the signatures don't match, the request
is denied.
• To get started with the signing process, see Signing AWS requests with Signature Version 4 (p. 563).
• For sample signed requests, see Examples of the complete Signature Version 4 signing process
(Python) (p. 582).
• If you have questions about Signature Version 4, post your question in the AWS Identity and Access
Management forum.
Version 1.0
560
AWS General Reference Reference guide
Signature Version 4 signing process
• To sign your message, you use a signing key that is derived from your secret access key rather than
using the secret access key itself. For more information about deriving keys, see Task 3: Calculate the
signature for AWS Signature Version 4 (p. 574).
• You derive your signing key from the credential scope, which means that you don't need to include the
key itself in the request. Credential scope is represented by a slash-separated string of dimensions in
the following order:
1. Date information as an eight-digit string representing the year (YYYY), month (MM), and day (DD)
of the request (for example, 20150830). For more information about handling dates, see Handling
dates in Signature Version 4 (p. 578).
2. Region information as a lowercase alphanumeric string. Use the Region name that is part of the
service's endpoint. For services with a globally unique endpoint such as IAM, use us-east-1.
3. Service name information as a lowercase alphanumeric string (for example, iam). Use the
service name that is part of the service's endpoint. For example, the IAM endpoint is https://
iam.amazonaws.com, so you use the string iam as part of the Credential parameter.
4. A special termination string: aws4_request.
• You use the credential scope in each signing task:
• If you add signing information to the query string, include the credential scope as part of the X-
Amz-Credential parameter when you create the canonical request in Task 1: Create a canonical
request for Signature Version 4 (p. 566).
• You must include the credential scope as part of your string to sign in Task 2: Create a string to sign
for Signature Version 4 (p. 572).
• Finally, you use the date, Region, and service name components of the credential scope to derive
your signing key in Task 3: Calculate the signature for AWS Signature Version 4 (p. 574).
Version 1.0
561
AWS General Reference Reference guide
Signature Version 4 signing process
• Endpoint Specification
• Action
• Required and Optional Parameters
• Date
• Authentication Parameters
Endpoint specification
This is specified as the Host header in HTTP/1.1 requests. This header specifies the DNS name of the
computer to which you send the request, like dynamodb.us-east-1.amazonaws.com.
You must include the Host header with HTTP/1.1 requests. For HTTP/2 requests, you can use the
:authority header or the Host header. Use only the :authority header for compliance with the
HTTP/2 specification. Not all services support HTTP/2 requests, so check the service documentation for
details.
The endpoint usually contains the service name and Region, both of which you must use as part of the
Credential authentication parameter. For example, the Amazon DynamoDB endpoint for the eu-
west-1 Region is dynamodb.eu-west-1.amazonaws.com. If you don't specify a Region, a web service
uses the default Region, us-east-1. If you use a service like IAM that uses a globally unique endpoint,
use the default Region (us-east-1), as part of the Credential authentication parameter (described
later in this topic).
For a complete list of endpoints supported by AWS, see Regions and Endpoints.
Action
This element specifies the action that you want a web service to perform, such as the DynamoDB
CreateTable action or the Amazon EC2 DescribeInstances action. The specified action determines
the parameters used in the request. For query APIs, the action is an API name. For non-query APIs (such
as RESTful APIs), see the service documentation for the appropriate actions.
Date
This is the date and time at which you make the request. Including the date in the request helps prevent
third parties from intercepting your request and resubmitting it later. The date is specified using the
ISO8601 Basic format via the x-amz-date header in the YYYYMMDD'T'HHMMSS'Z' format.
Authentication parameters
Each request that you send must include the following set of parameters that AWS uses to ensure the
validity and authenticity of the request.
• Algorithm. The hash algorithm that you're using as part of the signing process. For example, if you use
SHA-256 to create hashes, use the value AWS4-HMAC-SHA256.
Version 1.0
562
AWS General Reference Reference guide
Signature Version 4 signing process
• Credential scope. A string separated by slashes ("/") that is formed by concatenating your access key
ID and your credential scope components. Credential scope includes the date in YYYYMMDD format,
the AWS Region, the service name, and a special termination string (aws4_request). For example, the
following string represents the Credential parameter for an IAM request in the us-east-1 Region.
AKIAIOSFODNN7EXAMPLE/20111015/us-east-1/iam/aws4_request
Important
You must use lowercase characters for the Region, service name, and special termination
string.
• SignedHeaders A list delimited by semicolons (";") of HTTP/HTTPS headers to include in the signature.
• Signature A hexadecimal-encoded string that represents the output of the signature operation
described in Task 3: Calculate the signature for AWS Signature Version 4 (p. 574). You must calculate
the signature using the algorithm that you specified in the Algorithm parameter.
To view sample signed requests, see Examples of the complete Signature Version 4 signing process
(Python) (p. 582).
Arrange the contents of your request (host, action, headers, etc.) into a standard (canonical) format.
The canonical request is one of the inputs used to create a string to sign.
• Task 2: Create a string to sign for Signature Version 4 (p. 572)
Create a string to sign with the canonical request and extra information such as the algorithm, request
date, credential scope, and the digest (hash) of the canonical request.
• Task 3: Calculate the signature for AWS Signature Version 4 (p. 574)
Derive a signing key by performing a succession of keyed hash operations (HMAC operations) on the
request date, Region, and service, with your AWS secret access key as the key for the initial hashing
operation. After you derive the signing key, you then calculate the signature by performing a keyed
hash operation on the string to sign. Use the derived signing key as the hash key for this operation.
• Task 4: Add the signature to the HTTP request (p. 576)
After you calculate the signature, add it to an HTTP header or to the query string of the request.
Important
The AWS SDKs handle the signature calculation process for you, so you do not have to manually
complete the signing process. For more information, see Tools for Amazon Web Services.
Version 1.0
563
AWS General Reference Reference guide
Signature Version 4 signing process
Additional resources
• Examples of how to derive a signing key for Signature Version 4 (p. 579). This page shows how to
derive a signing key using Java, C#, Python, Ruby, and JavaScript.
• Examples of the complete Signature Version 4 signing process (Python) (p. 582). This set of programs
in Python provide complete examples of the signing process. The examples show signing with a POST
request, with a GET request that has signing information in a request header, and with a GET request
that has signing information in the query string.
After you complete the signing tasks, you add the authentication information to the request. You can
add the authentication information in two ways:
Authorization header
You can add the authentication information to the request with an Authorization header. Although
the HTTP header is named Authorization, the signing information is actually used for authentication
to establish who the request came from.
The following example shows what the preceding request might look like after you've created the
signing information and added it to the request in the Authorization header.
Note that in the actual request, the Authorization header would appear as a continuous line of text.
The version below has been formatted for readability.
Query string
Version 1.0
564
AWS General Reference Reference guide
Signature Version 4 signing process
As an alternative to adding authentication information with an HTTP request header, you can include it
in the query string. The query string contains everything that is part of the request, including the name
and parameters for the action, the date, and the authentication information.
The following example shows how you might construct a GET request with the action and authentication
information in the query string.
(In the actual request, the query string would appear as a continuous line of text. The version below has
been formatted with line breaks for readability.)
GET https://iam.amazonaws.com?Action=ListUsers&Version=2010-05-08
&X-Amz-Algorithm=AWS4-HMAC-SHA256
&X-Amz-Credential=AKIDEXAMPLE%2F20150830%2Fus-east-1%2Fiam%2Faws4_request
&X-Amz-Date=20150830T123600Z
&X-Amz-Expires=60
&X-Amz-SignedHeaders=content-type%3Bhost
&X-Amz-Signature=37ac2f4fde00b0ac9bd9eadeb459b1bbee224158d66e7ae5fcadb70b2d181d02 HTTP/1.1
content-type: application/x-www-form-urlencoded; charset=utf-8
host: iam.amazonaws.com
Version 1.0
565
AWS General Reference Reference guide
Signature Version 4 signing process
Follow the steps here to create a canonical version of the request. Otherwise, your version and the
version calculated by AWS won't match, and the request will be denied.
CanonicalRequest =
HTTPRequestMethod + '\n' +
CanonicalURI + '\n' +
CanonicalQueryString + '\n' +
CanonicalHeaders + '\n' +
SignedHeaders + '\n' +
HexEncode(Hash(RequestPayload))
In this pseudocode, Hash represents a function that produces a message digest, typically SHA-256. (Later
in the process, you specify which hashing algorithm you're using.) HexEncode represents a function
that returns the base-16 encoding of the digest in lowercase characters. For example, HexEncode("m")
returns the value 6d rather than 6D. Each input byte must be represented as exactly two hexadecimal
characters.
Signature Version 4 does not require that you use a particular character encoding to encode the
canonical request. However, some AWS services might require a specific encoding. For more information,
consult the documentation for that service.
The following examples show how to construct the canonical form of a request to IAM. The original
request might look like this as it is sent from the client to AWS, except that this example does not include
the signing information yet.
Example Request
The preceding example request is a GET request (method) that makes a ListUsers API (action) call to
AWS Identity and Access Management (host). This action takes the Version parameter.
To create a canonical request, concatenate the following components from each step into a
single string:
1. Start with the HTTP request method (GET, PUT, POST, etc.), followed by a newline character.
GET
2. Add the canonical URI parameter, followed by a newline character. The canonical URI is the URI-
encoded version of the absolute path component of the URI, which is everything in the URI from the
HTTP host to the question mark character ("?") that begins the query string parameters (if any).
Version 1.0
566
AWS General Reference Reference guide
Signature Version 4 signing process
Normalize URI paths according to RFC 3986. Remove redundant and relative path components. Each
path segment must be URI-encoded twice (except for Amazon S3 which only gets URI-encoded
once).
/documents%2520and%2520settings/
Note
In exception to this, you do not normalize URI paths for requests to Amazon S3.
For example, if you have a bucket with an object named my-object//example//
photo.user, use that path. Normalizing the path to my-object/example/photo.user
will cause the request to fail. For more information, see Task 1: Create a Canonical Request
in the Amazon Simple Storage Service API Reference.
If the absolute path is empty, use a forward slash (/). In the example IAM request, nothing follows
the host in the URI, so the absolute path is empty.
3. Add the canonical query string, followed by a newline character. If the request does not include a
query string, use an empty string (essentially, a blank line). The example request has the following
query string.
Action=ListUsers&Version=2010-05-08
a. Sort the parameter names by character code point in ascending order. Parameters with
duplicate names should be sorted by value. For example, a parameter name that begins with
the uppercase letter F precedes a parameter name that begins with a lowercase letter b.
b. URI-encode each parameter name and value according to the following rules:
• Do not URI-encode any of the unreserved characters that RFC 3986 defines: A-Z, a-z, 0-9,
hyphen ( - ), underscore ( _ ), period ( . ), and tilde ( ~ ).
• Percent-encode all other characters with %XY, where X and Y are hexadecimal characters (0-9
and uppercase A-F). For example, the space character must be encoded as %20 (not using '+',
as some encoding schemes do) and extended UTF-8 characters must be in the form %XY%ZA
%BC.
• Double-encode any equals ( = ) characters in parameter values.
c. Build the canonical query string by starting with the first parameter name in the sorted list.
d. For each parameter, append the URI-encoded parameter name, followed by the equals
sign character (=), followed by the URI-encoded parameter value. Use an empty string for
parameters that have no value.
e. Append the ampersand character (&) after each parameter value, except for the last value in the
list.
One option for the query API is to put all request parameters in the query string. For example, you
can do this for Amazon S3 to create aVersion
presigned
1.0 URL. In that case, the canonical query string must
567
AWS General Reference Reference guide
Signature Version 4 signing process
include not only parameters for the request, but also the parameters used as part of the signing
process—the hashing algorithm, credential scope, date, and signed headers parameters.
The following example shows a query string that includes authentication information. The example
is formatted with line breaks for readability, but the canonical query string must be one continuous
line of text in your code.
Action=ListUsers&
Version=2010-05-08&
X-Amz-Algorithm=AWS4-HMAC-SHA256&
X-Amz-Credential=AKIDEXAMPLE%2F20150830%2Fus-east-1%2Fiam%2Faws4_request&
X-Amz-Date=20150830T123600Z&
X-Amz-SignedHeaders=content-type%3Bhost%3Bx-amz-date
For more information about authentication parameters, see Task 2: Create a string to sign for
Signature Version 4 (p. 572).
Note
You can use temporary security credentials provided by the AWS Security Token Service
(AWS STS) to sign a request. The process is the same as using long-term credentials, but
when you add signing information to the query string you must add an additional query
parameter for the security token. The parameter name is X-Amz-Security-Token, and
the parameter's value is the URI-encoded session token (the string you received from AWS
STS when you obtained temporary security credentials).
For some services, you must include the X-Amz-Security-Token query parameter in the
canonical (signed) query string. For other services, you add the X-Amz-Security-Token
parameter at the end, after you calculate the signature. For details, see the API reference
documentation for that service.
4. Add the canonical headers, followed by a newline character. The canonical headers consist of a list of
all the HTTP headers that you are including with the signed request.
For HTTP/1.1 requests, you must include the host header at a minimum. Standard headers like
content-type are optional. For HTTP/2 requests, you must include the :authority header
instead of the host header. Different services might require other headers.
content-type:application/x-www-form-urlencoded; charset=utf-8\n
host:iam.amazonaws.com\n
x-amz-date:20150830T123600Z\n
To create the canonical headers list, convert all header names to lowercase and remove leading
spaces and trailing spaces. Convert sequential spaces in the header value to a single space.
The following pseudocode describes how to construct the canonical list of headers:
CanonicalHeaders =
CanonicalHeadersEntry0 + CanonicalHeadersEntry1 + ... + CanonicalHeadersEntryN
CanonicalHeadersEntry =
Lowercase(HeaderName) + ':' + Trimall(HeaderValue) + '\n'
Lowercase represents a function that converts all characters to lowercase. The Trimall function
removes excess white space before and after values, and converts sequential spaces to a single
space.
Version 1.0
568
AWS General Reference Reference guide
Signature Version 4 signing process
Build the canonical headers list by sorting the (lowercase) headers by character code and then
iterating through the header names. Construct each header according to the following rules:
The following examples compare a more complex set of headers with their canonical form:
Host:iam.amazonaws.com\n
Content-Type:application/x-www-form-urlencoded; charset=utf-8\n
My-header1: a b c \n
X-Amz-Date:20150830T123600Z\n
My-Header2: "a b c" \n
content-type:application/x-www-form-urlencoded; charset=utf-8\n
host:iam.amazonaws.com\n
my-header1:a b c\n
my-header2:"a b c"\n
x-amz-date:20150830T123600Z\n
Note
Each header is followed by a newline character, meaning the complete list ends with a
newline character.
Note
You can use temporary security credentials provided by the AWS Security Token Service
(AWS STS) to sign a request. The process is the same as using long-term credentials, but
when you include signing information in the Authorization header you must add an
additional HTTP header for the security token. The header name is X-Amz-Security-
Token, and the header's value is the session token (the string you received from AWS STS
when you obtained temporary security credentials).
5. Add the signed headers, followed by a newline character. This value is the list of headers that you
included in the canonical headers. By adding this list of headers, you tell AWS which headers in the
request are part of the signing process and which ones AWS can ignore (for example, any additional
headers added by a proxy) for purposes of validating the request.
For HTTP/1.1 requests, the host header must be included as a signed header. For HTTP/2
requests that include the :authority header instead of the host header, you must include the
Version 1.0
569
AWS General Reference Reference guide
Signature Version 4 signing process
:authority header as a signed header. If you include a date or x-amz-date header, you must also
include that header in the list of signed headers.
To create the signed headers list, convert all header names to lowercase, sort them by character
code, and use a semicolon to separate the header names. The following pseudocode describes how
to construct a list of signed headers. Lowercase represents a function that converts all characters
to lowercase.
SignedHeaders =
Lowercase(HeaderName0) + ';' + Lowercase(HeaderName1) + ";" + ... +
Lowercase(HeaderNameN)
Build the signed headers list by iterating through the collection of header names, sorted by
lowercase character code. For each header name except the last, append a semicolon (';') to the
header name to separate it from the following header name.
content-type;host;x-amz-date\n
6. Use a hash (digest) function like SHA256 to create a hashed value from the payload in the body of
the HTTP or HTTPS request. Signature Version 4 does not require that you use a particular character
encoding to encode text in the payload. However, some AWS services might require a specific
encoding. For more information, consult the documentation for that service.
HashedPayload = Lowercase(HexEncode(Hash(requestPayload)))
When you create the string to sign, you specify the signing algorithm that you used to hash the
payload. For example, if you used SHA256, you will specify AWS4-HMAC-SHA256 as the signing
algorithm. The hashed payload must be represented as a lowercase hexadecimal string.
If the payload is empty, use an empty string as the input to the hash function. In the IAM example,
the payload is empty.
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
7. To construct the finished canonical request, combine all the components from each step as a single
string. As noted, each component ends with a newline character. If you follow the canonical request
pseudocode explained earlier, the resulting canonical request is shown in the following example.
GET
/
Action=ListUsers&Version=2010-05-08
content-type:application/x-www-form-urlencoded; charset=utf-8
host:iam.amazonaws.com
x-amz-date:20150830T123600Z
content-type;host;x-amz-date
e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
Version 1.0
570
AWS General Reference Reference guide
Signature Version 4 signing process
8. Create a digest (hash) of the canonical request with the same algorithm that you used to hash the
payload.
Note
Signature Version 4 does not require that you use a particular character encoding to encode
the canonical request before calculating the digest. However, some AWS services might
require a specific encoding. For more information, consult the documentation for that
service.
The hashed canonical request must be represented as a string of lowercase hexadecimal characters.
The following example shows the result of using SHA-256 to hash the example canonical request.
f536975d06c0309214f805bb90ccff089219ecd68b2577efef23edd43b7e1a59
You include the hashed canonical request as part of the string to sign in Task 2: Create a string to
sign for Signature Version 4 (p. 572).
Version 1.0
571
AWS General Reference Reference guide
Signature Version 4 signing process
To create the string to sign, concatenate the algorithm, date and time, credential scope, and digest of the
canonical request, as shown in the following pseudocode:
StringToSign =
Algorithm + \n +
RequestDateTime + \n +
CredentialScope + \n +
HashedCanonicalRequest
The following example shows how to construct the string to sign with the same request from Task 1:
Create A Canonical Request (p. 566).
1. Start with the algorithm designation, followed by a newline character. This value is the hashing
algorithm that you use to calculate the digests in the canonical request. For SHA256, AWS4-HMAC-
SHA256 is the algorithm.
AWS4-HMAC-SHA256\n
2. Append the request date value, followed by a newline character. The date is specified with ISO8601
basic format in the x-amz-date header in the format YYYYMMDD'T'HHMMSS'Z'. This value must
match the value you used in any previous steps.
20150830T123600Z\n
3. Append the credential scope value, followed by a newline character. This value is a string that
includes the date, the Region you are targeting, the service you are requesting, and a termination
string ("aws4_request") in lowercase characters. The Region and service name strings must be
UTF-8 encoded.
20150830/us-east-1/iam/aws4_request\n
• The date must be in the YYYYMMDD format. Note that the date does not include a time value.
• Verify that the Region you specify is the Region that you are sending the request to. See AWS
service endpoints (p. 536).
4. Append the hash of the canonical request that you created in Task 1: Create a canonical request for
Signature Version 4 (p. 566). This value is not followed by a newline character. The hashed canonical
request must be lowercase base-16 encoded, as defined by Section 8 of RFC 4648.
Version 1.0
572
AWS General Reference Reference guide
Signature Version 4 signing process
f536975d06c0309214f805bb90ccff089219ecd68b2577efef23edd43b7e1a59
AWS4-HMAC-SHA256
20150830T123600Z
20150830/us-east-1/iam/aws4_request
f536975d06c0309214f805bb90ccff089219ecd68b2577efef23edd43b7e1a59
Version 1.0
573
AWS General Reference Reference guide
Signature Version 4 signing process
Signature Version 4 does not require that you use a particular character encoding to encode the string to
sign. However, some AWS services might require a specific encoding. For more information, consult the
documentation for that service.
To calculate a signature
1. Derive your signing key. To do this, use your secret access key to create a series of hash-based
message authentication codes (HMACs). This is shown in the following pseudocode, where
HMAC(key, data) represents an HMAC-SHA256 function that returns output in binary format. The
result of each hash function becomes input for the next one.
Note that the date used in the hashing process is in the format YYYYMMDD (for example, 20150830),
and does not include the time.
Make sure you specify the HMAC parameters in the correct order for the programming language you
are using. This example shows the key as the first parameter and the data (message) as the second
parameter, but the function that you use might specify the key and data in a different order.
Use the digest (binary format) for the key derivation. Most languages have functions to compute
either a binary format hash, commonly called a digest, or a hex-encoded hash, called a hexdigest.
The key derivation requires that you use a binary-formatted digest.
The following example show the inputs to derive a signing key and the resulting output, where
kSecret = wJalrXUtnFEMI/K7MDENG+bPxRfiCYEXAMPLEKEY.
The example uses the same parameters from the request in Task 1 and Task 2 (a request to IAM in
the us-east-1 Region on August 30, 2015).
Example inputs
HMAC(HMAC(HMAC(HMAC("AWS4" + kSecret,"20150830"),"us-east-1"),"iam"),"aws4_request")
The following example shows the derived signing key that results from this sequence of HMAC hash
operations. This shows the hexadecimal representation of each byte in the binary signing key.
c4afb1cc5771d871763a393e44b703571b55cc28424d1a5e86da6ed3c154a4b9
For more information about how to derive a signing key in different programming languages, see
Examples of how to derive a signing key for Signature
Version 1.0 Version 4 (p. 579).
574
AWS General Reference Reference guide
Signature Version 4 signing process
2. Calculate the signature. To do this, use the signing key that you derived and the string to sign as
inputs to the keyed hash function. After you calculate the signature, convert the binary value to a
hexadecimal representation.
Note
Make sure you specify the HMAC parameters in the correct order for the programming
language you are using. This example shows the key as the first parameter and the data
(message) as the second parameter, but the function that you use might specify the key and
data in a different order.
The following example shows the resulting signature if you use the same signing key and the string
to sign from Task 2:
Example signature
5d672d79c15b13162d9279b0855cfba6789a8edb4c82c400e06b5924a6f2b5d7
Version 1.0
575
AWS General Reference Reference guide
Signature Version 4 signing process
You cannot pass signing information in both the Authorization header and the query string.
Note
You can use temporary security credentials provided by the AWS Security Token Service (AWS
STS) to sign a request. The process is the same as using long-term credentials, but requires
an additional HTTP header or query string parameter for the security token. The name of
the header or query string parameter is X-Amz-Security-Token, and the value is the
session token (the string you received from AWS STS when you obtained temporary security
credentials).
When you add the X-Amz-Security-Token parameter to the query string, some services
require that you include this parameter in the canonical (signed) request. For other services,
you add this parameter at the end, after you calculate the signature. For details, see the API
reference documentation for that service.
Note that in the actual request, the authorization header would appear as a continuous line of text. The
version below has been formatted for readability.
Authorization: AWS4-HMAC-SHA256
Credential=AKIDEXAMPLE/20150830/us-east-1/iam/aws4_request,
SignedHeaders=content-type;host;x-amz-date,
Signature=5d672d79c15b13162d9279b0855cfba6789a8edb4c82c400e06b5924a6f2b5d7
• There is no comma between the algorithm and Credential. However, the SignedHeaders and
Signature are separated from the preceding values with a comma.
• The Credential value starts with the access key ID, which is followed by a forward slash (/), which
is followed by the credential scope that you calculated in Task 2: Create a string to sign for Signature
Version 4 (p. 572). The secret access key is used to derive the signing key for the signature, but is not
included in the signing information sent in the request.
Version 1.0
576
AWS General Reference Reference guide
Signature Version 4 signing process
in order to make a successful call to AWS. It's commonly used in Amazon S3. For more information, see
Authenticating Requests by Using Query Parameters (AWS Signature Version 4) in the Amazon Simple
Storage Service API Reference.
Important
If you make a request in which all parameters are included in the query string, the resulting URL
represents an AWS action that is already authenticated. Therefore, treat the resulting URL with
as much caution as you would treat your actual credentials. We recommend you specify a short
expiration time for the request with the X-Amz-Expires parameter.
When you use this approach, all the query string values (except the signature) are included in the
canonical query string that is part of the canonical query that you construct in the first part of the
signing process (p. 566).
The following pseudocode shows the construction of a query string that contains all request parameters.
querystring = Action=action
querystring += &X-Amz-Algorithm=algorithm
querystring += &X-Amz-Credential= urlencode(access_key_ID + '/' + credential_scope)
querystring += &X-Amz-Date=date
querystring += &X-Amz-Expires=timeout interval
querystring += &X-Amz-SignedHeaders=signed_headers
After the signature is calculated (which uses the other query string values as part of the calculation), you
add the signature to the query string as the X-Amz-Signature parameter:
querystring += &X-Amz-Signature=signature
The following example shows what a request might look like when all the request parameters and the
signing information are included in query string parameters.
Note that in the actual request, the authorization header would appear as a continuous line of text. The
version below has been formatted for readability.
https://iam.amazonaws.com?Action=ListUsers&Version=2010-05-08
&X-Amz-Algorithm=AWS4-HMAC-SHA256
&X-Amz-Credential=AKIDEXAMPLE%2F20150830%2Fus-east-1%2Fiam%2Faws4_request
&X-Amz-Date=20150830T123600Z
&X-Amz-Expires=60
&X-Amz-SignedHeaders=content-type%3Bhost
&X-Amz-Signature=37ac2f4fde00b0ac9bd9eadeb459b1bbee224158d66e7ae5fcadb70b2d181d02
• For the signature calculation, query string parameters must be sorted in code point order from low to
high, and their values must be URI-encoded. See the step about creating a canonical query string in
Task 1: Create a canonical request for Signature Version 4 (p. 566).
• Set the timeout interval (X-Amz-Expires) to the minimal viable time for the operation you're
requesting.
Version 1.0
577
AWS General Reference Reference guide
Signature Version 4 signing process
The time stamp must be in UTC and in the following ISO 8601 format: YYYYMMDD'T'HHMMSS'Z'. For
example, 20150830T123600Z is a valid time stamp. Do not include milliseconds in the time stamp.
AWS first checks the x-amz-date header or parameter for a time stamp. If AWS can't find a value for x-
amz-date, it looks for the date header. AWS then checks the credential scope for an eight-digit string
representing the year (YYYY), month (MM), and day (DD) of the request. For example, if the x-amz-date
header value is 20111015T080000Z and the date component of the credential scope is 20111015, AWS
allows the authentication process to proceed.
If the dates don't match, AWS rejects the request, even if the time stamp is only seconds away from the
date in the credential scope. For example, AWS will reject a request that has an x-amz-date header
value of 20151014T235959Z and a credential scope that has the date 20151015.
Version 1.0
578
AWS General Reference Reference guide
Signature Version 4 signing process
Examples
• Deriving a signing key using Java (p. 579)
• Deriving a signing key using .NET (C#) (p. 579)
• Deriving a signing key using Python (p. 580)
• Deriving a signing key using Ruby (p. 580)
• Deriving a signing key using JavaScript (Node.js) (p. 580)
• Deriving a signing key using other languages (p. 580)
• Common coding errors (p. 581)
return kha.ComputeHash(Encoding.UTF8.GetBytes(data));
}
Version 1.0
579
AWS General Reference Reference guide
Signature Version 4 signing process
return kSigning;
}
kSigning
end
Version 1.0
580
AWS General Reference Reference guide
Signature Version 4 signing process
key = 'wJalrXUtnFEMI/K7MDENG+bPxRfiCYEXAMPLEKEY'
dateStamp = '20120215'
regionName = 'us-east-1'
serviceName = 'iam'
Your program should generate the following values for the values in getSignatureKey. Note that
these are hex-encoded representations of the binary data; the key itself and the intermediate values
should be in binary format.
kSecret =
'41575334774a616c725855746e46454d492f4b374d44454e472b62507852666943594558414d504c454b4559'
kDate = '969fbb94feb542b71ede6f87fe4d5fa29c789342b0f407474670f0c2489e0a0d'
kRegion = '69daa0209cd9c5ff5c8ced464a696fd4252e981430b10e3d3fd8e2f197d7a70c'
kService = 'f72cfd46f26bc4643f06a11eabb6c0ba18780c19a8da0c31ace671265e3c87fa'
kSigning = 'f4780e2d9f65fa895f9c67b32ce1baf0b0d8a43505a000a1a9e090d414db404d'
• Don't include an extra newline character, or forget one where it's required.
• Don't format the date incorrectly in the credential scope, such as using a time stamp instead of
YYYYMMDD format.
• Make sure the headers in the canonical headers and the signed headers are the same.
• Don't inadvertently swap the key and the data (message) when calculating intermediary keys. The
result of the previous step's computation is the key, not the data. Check the documentation for your
cryptographic primitives carefully to ensure that you place the parameters in the proper order.
• Don't forget to add the string "AWS4" in front of the key for the first step. If you implement the key
derivation using a for loop or iterator, don't forget to special-case the first iteration so that it includes
the "AWS4" string.
For more information about possible errors, see Troubleshooting AWS Signature Version 4
errors (p. 590).
Version 1.0
581
AWS General Reference Reference guide
Signature Version 4 signing process
In order to work with these example programs, you need the following:
• Python 2.x installed on your computer, which you can get from the Python site. These programs were
tested using Python 2.7 and 3.6.
• The Python requests library, which is used in the example script to make web requests. A convenient
way to install Python packages is to use pip, which gets packages from the Python package index site.
You can then install requests by running pip install requests at the command line.
• An access key (access key ID and secret access key) in environment variables named
AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY. Alternatively, you can keep these values in a
credentials file and read them from that file. As a best practice, we recommend that you do not embed
credentials in code. For more information, see Best Practices for Managing AWS Access Keys in the
Amazon Web Services General Reference.
The following examples use UTF-8 to encode the canonical request and string to sign, but Signature
Version 4 does not require that you use a particular character encoding. However, some AWS services
might require a specific encoding. For more information, consult the documentation for that service.
Examples
• Using GET with an authorization header (Python) (p. 582)
• Using POST (Python) (p. 585)
• Using GET with authentication information in the Query string (Python) (p. 587)
Version 1.0
582
AWS General Reference Reference guide
Signature Version 4 signing process
# See: http://docs.aws.amazon.com/general/latest/gr/sigv4_signing.html
# This version makes a GET request and passes the signature
# in the Authorization header.
import sys, os, base64, datetime, hashlib, hmac
import requests # pip install requests
# Read AWS access key from env. variables or configuration file. Best practice is NOT
# to embed credentials in code.
access_key = os.environ.get('AWS_ACCESS_KEY_ID')
secret_key = os.environ.get('AWS_SECRET_ACCESS_KEY')
if access_key is None or secret_key is None:
print('No access key is available.')
sys.exit()
# Step 2: Create canonical URI--the part of the URI from domain to query
# string (use '/' if no path)
canonical_uri = '/'
# Step 3: Create the canonical query string. In this example (a GET request),
# request parameters are in the query string. Query string values must
# be URL-encoded (space=%20). The parameters must be sorted by name.
# For this example, the query string is pre-formatted in the request_parameters variable.
canonical_querystring = request_parameters
# Step 4: Create the canonical headers and signed headers. Header names
# must be trimmed and lowercase, and sorted in code point order from
# low to high. Note that there is a trailing \n.
canonical_headers = 'host:' + host + '\n' + 'x-amz-date:' + amzdate + '\n'
Version 1.0
583
AWS General Reference Reference guide
Signature Version 4 signing process
# Step 5: Create the list of signed headers. This lists the headers
# in the canonical_headers list, delimited with ";" and in alpha order.
# Note: The request can include any headers; canonical_headers and
# signed_headers lists those that you want to be included in the
# hash of the request. "Host" and "x-amz-date" are always required.
signed_headers = 'host;x-amz-date'
# Step 6: Create payload hash (hash of the request body content). For GET
# requests, the payload is an empty string ("").
payload_hash = hashlib.sha256(('').encode('utf-8')).hexdigest()
# The request can include any headers, but MUST include "host", "x-amz-date",
# and (for this scenario) "Authorization". "host" and "x-amz-date" must
# be included in the canonical_headers and signed_headers, as noted
# earlier. Order here is not significant.
# Python note: The 'host' header is added automatically by the Python 'requests' library.
headers = {'x-amz-date':amzdate, 'Authorization':authorization_header}
print('\nBEGIN REQUEST++++++++++++++++++++++++++++++++++++')
print('Request URL = ' + request_url)
r = requests.get(request_url, headers=headers)
print('\nRESPONSE++++++++++++++++++++++++++++++++++++')
print('Response code: %d\n' % r.status_code)
print(r.text)
Version 1.0
584
AWS General Reference Reference guide
Signature Version 4 signing process
# See: http://docs.aws.amazon.com/general/latest/gr/sigv4_signing.html
# This version makes a POST request and passes request parameters
# in the body (payload) of the request. Auth information is passed in
# an Authorization header.
import sys, os, base64, datetime, hashlib, hmac
import requests # pip install requests
Version 1.0
585
AWS General Reference Reference guide
Signature Version 4 signing process
# Read AWS access key from env. variables or configuration file. Best practice is NOT
# to embed credentials in code.
access_key = os.environ.get('AWS_ACCESS_KEY_ID')
secret_key = os.environ.get('AWS_SECRET_ACCESS_KEY')
if access_key is None or secret_key is None:
print('No access key is available.')
sys.exit()
# Step 2: Create canonical URI--the part of the URI from domain to query
# string (use '/' if no path)
canonical_uri = '/'
# Step 5: Create the list of signed headers. This lists the headers
# in the canonical_headers list, delimited with ";" and in alpha order.
# Note: The request can include any headers; canonical_headers and
# signed_headers include those that you want to be included in the
# hash of the request. "Host" and "x-amz-date" are always required.
# For DynamoDB, content-type and x-amz-target are also required.
signed_headers = 'content-type;host;x-amz-date;x-amz-target'
Version 1.0
586
AWS General Reference Reference guide
Signature Version 4 signing process
# For DynamoDB, the request can include any headers, but MUST include "host", "x-amz-date",
# "x-amz-target", "content-type", and "Authorization". Except for the authorization
# header, the headers must be included in the canonical_headers and signed_headers values,
as
# noted earlier. Order here is not significant.
# # Python note: The 'host' header is added automatically by the Python 'requests' library.
headers = {'Content-Type':content_type,
'X-Amz-Date':amz_date,
'X-Amz-Target':amz_target,
'Authorization':authorization_header}
print('\nRESPONSE++++++++++++++++++++++++++++++++++++')
print('Response code: %d\n' % r.status_code)
print(r.text)
# See: http://docs.aws.amazon.com/general/latest/gr/sigv4_signing.html
# This version makes a GET request and passes request parameters
# and authorization information in the query string
import sys, os, base64, datetime, hashlib, hmac, urllib
Version 1.0
587
AWS General Reference Reference guide
Signature Version 4 signing process
# Read AWS access key from env. variables or configuration file. Best practice is NOT
# to embed credentials in code.
access_key = os.environ.get('AWS_ACCESS_KEY_ID')
secret_key = os.environ.get('AWS_SECRET_ACCESS_KEY')
if access_key is None or secret_key is None:
print('No access key is available.')
sys.exit()
# Step 2: Create canonical URI--the part of the URI from domain to query
# string (use '/' if no path)
canonical_uri = '/'
# Step 3: Create the canonical headers and signed headers. Header names
# must be trimmed and lowercase, and sorted in code point order from
# low to high. Note trailing \n in canonical_headers.
# signed_headers is the list of headers that are being included
# as part of the signing process. For requests that use query strings,
# only "host" is included in the signed headers.
canonical_headers = 'host:' + host + '\n'
signed_headers = 'host'
# Match the algorithm to the hashing algorithm you use, either SHA-1 or
# SHA-256 (recommended)
algorithm = 'AWS4-HMAC-SHA256'
credential_scope = datestamp + '/' + region + '/' + service + '/' + 'aws4_request'
Version 1.0
588
AWS General Reference Reference guide
Signature Version 4 signing process
print('\nBEGIN REQUEST++++++++++++++++++++++++++++++++++++')
print('Request URL = ' + request_url)
r = requests.get(request_url)
print('\nRESPONSE++++++++++++++++++++++++++++++++++++')
print('Response code: %d\n' % r.status_code)
print(r.text)
Version 1.0
589
AWS General Reference Reference guide
Signature Version 4 signing process
Errors
• Troubleshooting canonicalization errors (p. 590)
• Troubleshooting credential scope errors (p. 591)
• Troubleshooting key signing errors (p. 592)
https://iam.amazonaws.com/?MaxItems=100
&Action=ListGroupsForUser
&UserName=Test
&Version=2010-05-08
&X-Amz-Date=20120223T063000Z
&X-Amz-Algorithm=AWS4-HMAC-SHA256
&X-Amz-Credential=AKIAIOSFODNN7EXAMPLE/20120223/us-east-1/iam/aws4_request
&X-Amz-SignedHeaders=host
&X-Amz-Signature=<calculated value>
If you incorrectly calculate the canonical request or the string to sign, the signature verification step
performed by the service fails. The following example is a typical error response, which includes the
canonical string and the string to sign as computed by the service. You can troubleshoot your calculation
error by comparing the returned strings with the canonical string and your calculated string to sign.
<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<Error>
<Type>Sender</Type>
<Code>SignatureDoesNotMatch</Code>
<Message>The request signature we calculated does not match the signature you provided.
Check your AWS Secret Access Key and signing method. Consult the service documentation for
details.
The canonical string for this request should have been 'GET /
Action=ListGroupsForUser&MaxItems=100&UserName=Test&Version=2010-05-08&X-Amz-
Algorithm=AWS4-HMAC-SHA256&X-Amz-Credential
=AKIAIOSFODNN7EXAMPLE%2F20120223%2Fus-east-1%2Fiam%2Faws4_request&X-Amz-
Date=20120223T063000Z&X-Amz-SignedHeaders=host
host:iam.amazonaws.com
host
<hashed-value>'
Version 1.0
590
AWS General Reference Reference guide
Signature Version 4 signing process
Credential=AKIAIOSFODNN7EXAMPLE/20120224/us-east-1/rds/aws4_request
If you use the same credentials to submit a request to IAM, you'll receive the following error response:
<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<Error>
<Type>Sender</Type>
<Code>SignatureDoesNotMatch</Code>
<Message>Credential should be scoped to correct service: 'iam'. </Message>
</Error>
<RequestId>aa0da9de-5f2b-11e1-a2c0-c1dc98b6c575</RequestId>
The credential must also specify the correct Region. For example, the following credential for an IAM
request incorrectly specifies the US West (N. California) Region.
Credential=AKIAIOSFODNN7EXAMPLE/20120224/us-west-1/iam/aws4_request
If you use the credential to submit a request to IAM, which accepts only the us-east-1 Region
specification, you'll receive the following response:
comma-separated<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<Error>
<Type>Sender</Type>
<Code>SignatureDoesNotMatch</Code>
<Message>Credential should be scoped to a valid Region, not 'us-west-1'. </Message>
</Error>
<RequestId>8e229682-5f27-11e1-88f2-4b1b00f424ae</RequestId>
</ErrorResponse>
You'll receive the same type of invalid Region response from AWS products that are available in multiple
Regions if you submit requests to a Region that differs from the Region specified in your credential
scope.
The credential must also specify the correct Region for the service and action in your request.
The date that you use as part of the credential must match the date value in the x-amz-date header.
For example, the following x-amz-date header value does not match the date value used in the
Credential parameter that follows it.
x-amz-date:"20120224T213559Z"
Credential=AKIAIOSFODNN7EXAMPLE/20120225/us-east-1/iam/aws4_request
If you use this pairing of x-amz-date header and credential, you'll receive the following error response:
<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<Error>
<Type>Sender</Type>
<Code>SignatureDoesNotMatch</Code>
<Message>Date in Credential scope does not match YYYYMMDD from ISO-8601 version of date
from HTTP: '20120225' != '20120224', from '20120 224T213559Z'.</Message>
</Error>
<RequestId>9d6ddd2b-5f2f-11e1-b901-a702cd369eb8</RequestId>
Version 1.0
591
AWS General Reference Reference guide
Signature Version 4 signing process
</ErrorResponse>
An expired signature can also generate an error response. For example, the following error response was
generated due to an expired signature.
<ErrorResponse xmlns="https://iam.amazonaws.com/doc/2010-05-08/">
<Error>
<Type>Sender</Type>
<Code>SignatureDoesNotMatch</Code>
<Message>Signature expired: 20120306T074514Z is now earlier than 20120306T074556Z
(20120306T080056Z - 15 min.)</Message>
</Error>
<RequestId>fcc88440-5dec-11e1-b901-a702cd369eb8</RequestId>
</ErrorResponse>
• The secret access key does not match the access key ID that you specified in the Credential
parameter.
• There is a problem with your key derivation code.
To check whether the secret key matches the access key ID, you can use your secret key and access key ID
with a known working implementation. One way is to use one of the AWS SDKs to write a program that
makes a simple request to AWS using the access key ID and secret access key that you want to use.
To check whether your key derivation code is correct, you can compare it to our example derivation code.
For more information, see Examples of how to derive a signing key for Signature Version 4 (p. 579).
Version 1.0
592
AWS General Reference Reference guide
Signature Version 2 signing process
• Amazon Simple Storage Service (Amazon S3) - Amazon S3 Update - SigV2 Deprecation
• Amazon Simple Email Service (Amazon SES)
Version 1.0
593
AWS General Reference Reference guide
Signature Version 2 signing process
Endpoint
Also known as the host part of an HTTP request. This is the DNS name of the computer where you
send the Query request. This is different for each AWS Region. For the list of endpoints for each
service, see AWS service endpoints (p. 536).
Action
The action you want a web service to perform. This value determines the parameters used in the
request.
AWSAccessKeyId
The hash-based protocol used to calculate the signature. This can be either HMAC-SHA1 or HMAC-
SHA256 for Signature Version 2.
SignatureVersion
The time at which you make the request. Include this in the Query request to help prevent third
parties from intercepting your request.
Required and optional parameters
Each action has a set of required and optional parameters that define the API call.
Signature
The calculated value that ensures the signature is valid and has not been tampered.
The following is an example Amazon EMR Query request formatted as an HTTPS GET request.
• The endpoint, elasticmapreduce.amazonaws.com, is the default endpoint and maps to the Region
us-east-1.
• The action is DescribeJobFlows, which requests information about one or more job flows.
Note
In the actual Query request, there are no spaces or newline characters. The request is a
continuous line of text. The version below is formatted for human readability.
https://elasticmapreduce.amazonaws.com?
&AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE
&Action=DescribeJobFlows
&SignatureMethod=HmacSHA256
&SignatureVersion=2
&Timestamp=2011-10-03T15%3A19%3A30
&Version=2009-03-31
&Signature=calculated value
Version 1.0
594
AWS General Reference Reference guide
Signature Version 2 signing process
Be sure to URI encode the request. For example, blank spaces in your request should be encoded as
%20. Although an unencoded space is normally allowed by the HTTP protocol specification, unencoded
characters create an invalid signature in your Query request. Do not encode spaces as a plus sign (+) as
this will cause errors.
The following topics describe the steps needed to calculate a signature using AWS Signature Version 2.
To create the string to sign, you concatenate the Query request components. The following example
generates the string to sign for the following call to the Amazon EMR API.
https://elasticmapreduce.amazonaws.com?
Action=DescribeJobFlows
&Version=2009-03-31
&AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE
&SignatureVersion=2
&SignatureMethod=HmacSHA256
&Timestamp=2011-10-03T15:19:30
Note
In the preceding request, the last four parameters (AWSAccessKeyID through Timestamp) are
called authentication parameters. They're required in every Signature Version 2 request. AWS
uses them to identify who is sending the request and whether to grant the requested access.
1. Start with the request method (either GET or POST), followed by a newline character. For human
readability, the newline character is represented as \n.
GET\n
2. Add the HTTP host header (endpoint) in lowercase, followed by a newline character. The port
information is omitted if it is the standard port for the protocol (port 80 for HTTP and port 443 for
HTTPS), but included if it is a nonstandard port.
elasticmapreduce.amazonaws.com\n
3. Add the URL-encoded version of each path segment of the URI, which is everything between the
HTTP host header to the question mark character (?) that begins the query string parameters,
followed by a newline character. Don't encode the forward slash (/) that delimits each path
segment.
In this example, if the absolute path is empty, use a forward slash (/).
/\n
4. a. Add the query string components, as UTF-8 characters which are URL encoded (hexadecimal
characters must be uppercase). You do not encode the initial question mark character (?) in the
request. For more information, see RFC 3986.
b. Sort the query string components by byte order. Byte ordering is case sensitive. AWS sorts these
components based on the raw bytes.
Version 1.0
595
AWS General Reference Reference guide
Signature Version 2 signing process
For example, this is the original order for the query string components.
Action=DescribeJobFlows
Version=2009-03-31
AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE
SignatureVersion=2
SignatureMethod=HmacSHA256
Timestamp=2011-10-03T15%3A19%3A30
AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE
Action=DescribeJobFlows
SignatureMethod=HmacSHA256
SignatureVersion=2
Timestamp=2011-10-03T15%3A19%3A30
Version=2009-03-31
c. Separate parameter names from their values with the equal sign character (=), even if the value
is empty. Separate parameter and value pairs with the ampersand character (&). Concatenate
the parameters and their values to make one long string with no spaces. Spaces within a
parameter value are allowed, but must be URL encoded as %20. In the concatenated string,
period characters (.) are not escaped. RFC 3986 considers the period character an unreserved
character, so it is not URL encoded.
Note
RFC 3986 does not specify what happens with ASCII control characters, extended
UTF-8 characters, and other characters reserved by RFC 1738. Since any values may be
passed into a string value, these other characters should be percent encoded as %XY
where X and Y are uppercase hex characters. Extended UTF-8 characters take the form
%XY%ZA... (this handles multibytes).
The following example shows the query string components, with the parameters concatenated with
the ampersand character (&), and sorted by byte order.
AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE&Action=DescribeJobFlows&SignatureMethod=HmacSHA256&SignatureVer
5. To construct the finished canonical request, combine all the components from each step. As shown,
each component ends with a newline character.
GET\n
elasticmapreduce.amazonaws.com\n
/\n
AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE&Action=DescribeJobFlows&SignatureMethod=HmacSHA256&SignatureVer
In this example, the signature is calculated with the following canonical string and secret key as inputs to
a keyed hash function:
Version 1.0
596
AWS General Reference Reference guide
Signature Version 2 signing process
GET\n
elasticmapreduce.amazonaws.com\n
/\n
AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE&Action=DescribeJobFlows&SignatureMethod=HmacSHA256&SignatureVersi
wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
i91nKc4PWAt0JJIdXwz9HxZCJDdiy6cf%2FMj6vPxyYIs%3D
Add the resulting value to the query request as a Signature parameter. When you add this parameter
to the request, you must URI encode it just like any other parameter. You can use the signed request in
an HTTP or HTTPS call.
https://elasticmapreduce.amazonaws.com?
AWSAccessKeyId=AKIAIOSFODNN7EXAMPLE&Action=DescribeJobFlows&SignatureMethod=HmacSHA256&SignatureVersion
%2FMj6vPxyYIs%3D
Note
You can use temporary security credentials provided by AWS Security Token Service (AWS STS)
to sign a request. The process is the same as using long-term credentials, but requests require
an additional parameter for the security token.
The following request uses a temporary access key ID and the SecurityToken parameter.
https://sdb.amazonaws.com/
?Action=GetAttributes
&AWSAccessKeyId=access-key-from-AWS Security Token Service
&DomainName=MyDomain
&ItemName=MyItem
&SignatureVersion=2
&SignatureMethod=HmacSHA256
&Timestamp=2010-01-25T15%3A03%3A07-07%3A00
&Version=2009-04-15
&Signature=signature-calculated-using-the-temporary-access-key
&SecurityToken=session-token
• The Amazon EMR Developer Guide has information about Amazon EMR API calls.
• The API documentation for each service has information about requirements and specific parameters
for an action.
• The AWS SDKs offer functions to generate Query request signatures. To see an example using the AWS
SDK for Java, see Using the Java SDK to sign a Query request (p. 598).
Version 1.0
597
AWS General Reference Reference guide
Signature Version 2 signing process
The following error response is returned when a web service attempts to validate the request signature
by recalculating the signature value and generates a value that does not match the signature you
appended to the request. This can occur because the request was altered between the time you sent it
and the time it reached a web service endpoint (which is what the signature is designed to detect) or
because the signature was calculated improperly. A common cause of the following error message is not
properly creating the string to sign, such as forgetting to URL-encode characters such as the colon (:) and
the forward slash (/) in Amazon S3 bucket names.
<ErrorResponse xmlns="http://elasticmapreduce.amazonaws.com/doc/2009-03-31">
<Error>
<Type>Sender</Type>
<Code>SignatureDoesNotMatch</Code>
<Message>The request signature we calculated does not match the signature you
provided.
Check your AWS Secret Access Key and signing method.
Consult the service documentation for details.</Message>
</Error>
<RequestId>7589637b-e4b0-11e0-95d9-639f87241c66</RequestId>
</ErrorResponse>
The following error indicates that signature is missing information or has been improperly formed.
<ErrorResponse xmlns="http://elasticmapreduce.amazonaws.com/doc/2009-03-31">
<Error>
<Type>Sender</Type>
<Code>IncompleteSignature</Code>
<Message>Request must contain a signature that conforms to AWS standards</Message>
</Error>
<RequestId>7146d0dd-e48e-11e0-a276-bd10ea0cbb74</RequestId>
</ErrorResponse>
import java.security.SignatureException;
import javax.crypto.Mac;
import javax.crypto.spec.SecretKeySpec;
import com.amazonaws.util.*;
Version 1.0
598
AWS General Reference Reference guide
AWS SDK support for Amazon S3 client-side encryption
/**
* This class defines common routines for generating
* authentication signatures for AWS Platform requests.
*/
public class Signature {
private static final String HMAC_SHA256_ALGORITHM = "HmacSHA256";
/**
* Computes RFC 2104-compliant HMAC signature.
* * @param data
* The signed data.
* @param key
* The signing key.
* @return
* The Base64-encoded RFC 2104-compliant HMAC signature.
* @throws
* java.security.SignatureException when signature generation fails
*/
public static String calculateRFC2104HMAC(String data, String key)
throws java.security.SignatureException
{
String result;
try {
// Get an hmac_sha256 Mac instance and initialize with the signing key.
Mac mac = Mac.getInstance(HMAC_SHA256_ALGORITHM);
mac.init(signingKey);
} catch (Exception e) {
throw new SignatureException("Failed to generate HMAC : " + e.getMessage());
}
return result;
}
}
If you are new to cryptography, see Cryptography Basics in the AWS Key Management Service Developer
Guide to get familiar with terms and concepts.
Note
The AWS Encryption SDK is an encryption library that is separate from the language–specific
SDKs. You can use this encryption library to more easily implement encryption best practices in
Amazon S3. Unlike the Amazon S3 encryption clients in the language–specific AWS SDKs, the
Version 1.0
599
AWS General Reference Reference guide
AWS SDK features for Amazon S3 client-side encryption
AWS Encryption SDK is not tied to Amazon S3 and can be used to encrypt or decrypt data to be
stored anywhere.
The AWS Encryption SDK and the Amazon S3 encryption clients are not compatible because
they produce ciphertexts with different data formats. For more information about the AWS
Encryption SDK, see the AWS Encryption SDK Developer Guide.
For details about how to use the features for a particular SDK, see the SDK's developer guide.
In the following table, each column indicates whether the AWS Command Line Interface or SDK for a
specific language supports the features used in client-side encryption.
For information about the v2 Amazon S3 encryption clients that support client-side encryption, see our
blog post about Updates to the Amazon S3 Encryption Client.
For more details about the legacy v1 Amazon S3 encryption client, see the following blog posts.
• Client-Side Data Encryption for Amazon S3 Using the AWS SDK for Java
• Client Side Data Encryption with AWS SDK for .NET and Amazon S3
• Using Client-Side Encryption for Amazon S3 in the AWS SDK for Ruby
• Using the AWS SDK for Go Encryption Client
• Amazon S3 Encryption Client Now Available for C++ Developers
Version 1.0
600
AWS General Reference Reference guide
Amazon S3 encryption client cryptographic algorithms
Key DeprecatedDeprecatedDeprecatedNo No No No No No
Wrap:
AES/
ECB
For more information about authenticated and encryption-only modes, see the Amazon S3 Client-Side
Authenticated Encryption blog post.
Version 1.0
601
AWS General Reference Reference guide
Document conventions
The following are the common typographical conventions for AWS technical publications.
Inline code (for example, commands, operations, parameters, constants, XML elements, and regular
expressions)
Example:
# ls -l /var/www/html/index.html
-rw-rw-r-- 1 root root 1872 Jun 21 09:33 /var/www/html/index.html
# date
Wed Jun 21 09:33:42 EDT 2006
Version 1.0
602
AWS General Reference Reference guide
Example:
Version 1.0
603
AWS General Reference Reference guide
AWS glossary
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
A
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
Access Analyzer A feature of AWS Identity and Access Management (IAM) (p. 616) that helps
you identify the resources in your organization and accounts, such as Amazon S3
buckets or IAM roles, that are shared with an external entity.
See Also https://aws.amazon.com/about-aws/whats-new/2019/12/introducing-
aws-identity-and-access-management-access-analyzer/.
access control list (ACL) A document that defines who can access a particular bucket (p. 621) or
object. Each bucket (p. 621) and object in Amazon S3 (p. 611) has an ACL.
The document defines what each type of user can do, such as write and read
permissions.
access key The combination of an access key ID (p. 604) (like AKIAIOSFODNN7EXAMPLE)
and a secret access key (p. 652) (like wJalrXUtnFEMI/K7MDENG/
bPxRfiCYEXAMPLEKEY). You use access keys to sign API requests that you make
to AWS.
access key ID A unique identifier that's associated with a secret access key (p. 652); the
access key ID and secret access key are used together to sign programmatic AWS
requests cryptographically.
Version 1.0
604
AWS General Reference Reference guide
access key rotation A method to increase security by changing the AWS access key ID. This method
enables you to retire an old key at your discretion.
access policy language A language for writing documents (that is, policies (p. 645)) that specify who can
access a particular AWS resource (p. 650) and under what conditions.
account A formal relationship with AWS that is associated with all of the following:
The AWS account has permission to do anything and everything with all the
AWS account resources. This is in contrast to a user (p. 659), which is an entity
contained within the account.
account activity A webpage showing your month-to-date AWS usage and costs. The account
activity page is located at https://aws.amazon.com/account-activity/.
ACM PCA See the section called “AWS Certificate Manager Private Certificate Authority”.
ACM Private CA See the section called “AWS Certificate Manager Private Certificate Authority”.
action An API function. Also called operation or call. The activity the principal (p. 646)
has permission to perform. The action is B in the statement "A has permission
to do B to C where D applies." For example, Jane sends a request to Amazon
SQS (p. 611) with Action=ReceiveMessage.
Amazon CloudWatch (p. 606): The response initiated by the change in an alarm's
state: for example, from OK to ALARM. The state change may be triggered by a
metric reaching the alarm threshold, or by a SetAlarmState request. Each alarm
can have one or more actions assigned to each state. Actions are performed
once each time the alarm changes to a state that has an action assigned, such as
an Amazon Simple Notification Service (p. 611) notification, an Amazon EC2
Auto Scaling (p. 607) policy (p. 645) execution or an Amazon EC2 (p. 607)
instance (p. 636) stop/terminate action.
active trusted key groups A list showing each of the trusted key groups (p. 659), and the IDs of the public
keys in each key group, that are active for a distribution in Amazon CloudFront.
CloudFront can use the public keys in these key groups to verify the signatures of
CloudFront signed URLs and signed cookies.
active trusted signers See active trusted key groups (p. 605).
additional authenticated data Information that is checked for integrity but not encrypted, such as headers or
other contextual metadata.
administrative suspension Amazon EC2 Auto Scaling (p. 607) might suspend processes for Auto Scaling
group (p. 613) that repeatedly fail to launch instances. Auto Scaling groups
that most commonly experience administrative suspension have zero running
instances, have been trying to launch instances for more than 24 hours, and have
not succeeded in that time.
alarm An item that watches a single metric over a specified time period and triggers an
Amazon SNS (p. 611) topic (p. 658) or an Amazon EC2 Auto Scaling (p. 607)
Version 1.0
605
AWS General Reference Reference guide
policy (p. 645) if the value of the metric crosses a threshold value over a
predetermined number of time periods.
allow One of two possible outcomes (the other is deny (p. 628)) when an
IAM (p. 616) access policy (p. 645) is evaluated. When a user makes a request
to AWS, AWS evaluates the request based on all permissions that apply to the
user and then returns either allow or deny.
Amazon API Gateway A fully managed service that makes it easy for developers to create, publish,
maintain, monitor, and secure APIs at any scale.
See Also https://aws.amazon.com/api-gateway.
Amazon AppStream 2.0 A fully managed, secure service for streaming desktop applications to users
without rewriting those applications.
See Also https://aws.amazon.com/appstream/.
Amazon Athena An interactive query service that makes it easy to analyze data in Amazon S3
using ANSI SQL. Athena is serverless, so there is no infrastructure to manage.
Athena scales automatically and is simple to use, so you can start analyzing your
datasets within seconds.
See Also https://aws.amazon.com/athena/.
Amazon Aurora A fully managed MySQL-compatible relational database engine that combines
the speed and availability of commercial databases with the simplicity and cost-
effectiveness of open-source databases.
See Also https://aws.amazon.com/rds/aurora/.
Amazon Chime A secure, real-time, unified communications service that transforms meetings by
making them more efficient and easier to conduct.
See Also https://aws.amazon.com/chime/.
Amazon Cloud Directory A service that provides a highly scalable directory store for your application’s
(Cloud Directory) multihierarchical data.
See Also https://aws.amazon.com/cloud-directory/.
Amazon CloudFront An AWS content delivery service that helps you improve the performance,
reliability, and availability of your websites and applications.
See Also https://aws.amazon.com/cloudfront.
Amazon CloudSearch A fully managed service in the AWS Cloud that makes it easy to set up, manage,
and scale a search solution for your website or application.
Amazon CloudWatch A web service that enables you to monitor and manage various metrics, and
configure alarm actions based on data from those metrics.
See Also https://aws.amazon.com/cloudwatch.
Amazon CloudWatch Events A web service that enables you to deliver a timely stream of system events that
describe changes in AWS resource (p. 650)s to AWS Lambda (p. 617) functions,
streams in Amazon Kinesis Data Streams (p. 609), Amazon Simple Notification
Service (p. 611) topics, or built-in targets.
See Also https://aws.amazon.com/cloudwatch.
Amazon CloudWatch Logs A web service for monitoring and troubleshooting your systems and applications
from your existing system, application, and custom log files. You can send your
existing log files to CloudWatch Logs and monitor these logs in near-real time.
See Also https://aws.amazon.com/cloudwatch.
Amazon Cognito A web service that makes it easy to save mobile user data, such as app
preferences or game state, in the AWS Cloud without writing any backend
Version 1.0
606
AWS General Reference Reference guide
Amazon Connect A service solution that offers easy, self-service configuration and enables
dynamic, personal, and natural customer engagement at any scale.
See Also https://aws.amazon.com/connect/.
Amazon Detective A service that collects log data from your AWS resources to analyze and identify
the root cause of security findings or suspicious activities. The Detective behavior
graph provides visualizations to help you to determine the nature and extent of
possible security issues and conduct an efficient investigation.
See Also https://aws.amazon.com/detective/.
Amazon DocumentDB (with A managed database service that you can use to set up, operate, and scale
MongoDB compatibility) MongoDB-compatible databases in the cloud.
See Also https://aws.amazon.com/documentdb/.
Amazon DynamoDB A fully managed NoSQL database service that provides fast and predictable
performance with seamless scalability.
See Also https://aws.amazon.com/dynamodb/.
Amazon DynamoDB A software library that helps you protect your table data before you send it to
Encryption Client Amazon DynamoDB (p. 607).
Amazon DynamoDB Storage A storage backend for the Titan graph database implemented on top of Amazon
Backend for Titan DynamoDB. Titan is a scalable graph database optimized for storing and querying
graphs.
See Also https://aws.amazon.com/dynamodb/.
Amazon DynamoDB Streams An AWS service that captures a time-ordered sequence of item-level
modifications in any Amazon DynamoDB table, and stores this information in a
log for up to 24 hours. Applications can access this log and view the data items as
they appeared before and after they were modified, in near real time.
See Also https://aws.amazon.com/dynamodb/.
Amazon EBS-backed AMI A type of Amazon Machine Image (AMI) (p. 609) whose instance (p. 636)s use
an Amazon EBS (p. 607) volume (p. 661) as their root device. Compare this
with instances launched from instance store-backed AMI (p. 636)s, which use the
instance store (p. 636) as the root device.
Amazon EC2 A web service for launching and managing Linux/UNIX and Windows Server
instance (p. 636)s in Amazon's data centers.
See Also Amazon Elastic Compute Cloud (Amazon EC2), https://aws.amazon.com/
ec2.
Amazon EC2 Auto Scaling A web service designed to launch or terminate instance (p. 636)s automatically
based on user-defined policies (p. 645), schedules, and health check (p. 634)s.
See Also https://aws.amazon.com/ec2/autoscaling.
Amazon Elastic Block Store A service that provides block level storage volume (p. 661)s for use with EC2
(Amazon EBS) instance (p. 629)s.
See Also https://aws.amazon.com/ebs.
Amazon Elastic Compute A web service for launching and managing Linux/UNIX and Windows Server
Cloud (Amazon EC2) instance (p. 636)s in Amazon's data centers.
Version 1.0
607
AWS General Reference Reference guide
Amazon Elastic Container A fully managed Docker container registry that makes it easy for developers to
Registry (Amazon ECR) store, manage, and deploy Docker container images. Amazon ECR is integrated
with Amazon Elastic Container Service (Amazon ECS) (p. 608) and AWS Identity
and Access Management (IAM) (p. 616).
See Also https://aws.amazon.com/ecr.
Amazon Elastic Container A highly scalable, fast, container (p. 624) management service that makes it
Service (Amazon ECS) easy to run, stop, and manage Docker containers on a cluster (p. 623) of EC2
instance (p. 629)s.
See Also https://aws.amazon.com/ecs.
Amazon Elastic File System A file storage service for EC2 (p. 607) instance (p. 636)s. Amazon EFS is easy
(Amazon EFS) to use and provides a simple interface with which you can create and configure
file systems. Amazon EFS storage capacity grows and shrinks automatically as you
add and remove files.
See Also https://aws.amazon.com/efs/.
Amazon Elastic Kubernetes A managed service that simplifies running Kubernetes on AWS without your
Service (Amazon EKS) needing to stand up or maintain your own Kubernetes control plane.
See Also https://aws.amazon.com/eks/.
Amazon Elastic Transcoder A cloud-based media transcoding service. Elastic Transcoder is a highly scalable
tool for converting (or transcoding) media files from their source format into
versions that play on devices like smartphones, tablets, and PCs.
See Also https://aws.amazon.com/elastictranscoder/.
Amazon ElastiCache A web service that simplifies deploying, operating, and scaling an in-memory
cache in the cloud. The service improves the performance of web applications by
providing information retrieval from fast, managed, in-memory caches, instead of
relying entirely on slower disk-based databases.
See Also https://aws.amazon.com/elasticache/.
Amazon Elasticsearch Service An AWS managed service for deploying, operating, and scaling Elasticsearch, an
(Amazon ES) open-source search and analytics engine, in the AWS Cloud. Amazon Elasticsearch
Service (Amazon ES) also offers security options, high availability, data durability,
and direct access to the Elasticsearch API.
See Also https://aws.amazon.com/elasticsearch-service.
Amazon EMR A web service that makes it easy to process large amounts of data efficiently.
Amazon EMR uses Hadoop (p. 634) processing combined with several AWS
products to do such tasks as web indexing, data mining, log file analysis, machine
learning, scientific simulation, and data warehousing.
See Also https://aws.amazon.com/elasticmapreduce.
Amazon EventBridge A serverless event bus service that enables you to connect your applications
with data from a variety of sources and routes that data to targets such as AWS
Lambda. You can set up routing rules to determine where to send your data to
build application architectures that react in real time to all of your data sources.
See Also https://aws.amazon.com/eventbridge/.
Amazon GameLift A managed service for deploying, operating, and scaling session-based
multiplayer games.
See Also https://aws.amazon.com/gamelift/.
Amazon GuardDuty A continuous security monitoring service. Amazon GuardDuty can help to identify
unexpected and potentially unauthorized or malicious activity in your AWS
environment.
See Also https://aws.amazon.com/guardduty/.
Version 1.0
608
AWS General Reference Reference guide
Amazon Inspector An automated security assessment service that helps improve the security and
compliance of applications deployed on AWS. Amazon Inspector automatically
assesses applications for vulnerabilities or deviations from best practices. After
performing an assessment, Amazon Inspector produces a detailed report with
prioritized steps for remediation.
See Also https://aws.amazon.com/inspector.
Amazon Kinesis A platform for streaming data on AWS. Kinesis offers services that simplify the
loading and analysis of streaming data.
See Also https://aws.amazon.com/kinesis/.
Amazon Kinesis Data Firehose A fully managed service for loading streaming data into AWS. Kinesis Data
Firehose can capture and automatically load streaming data into Amazon
S3 (p. 611) and Amazon Redshift (p. 610), enabling near real-time analytics
with existing business intelligence tools and dashboards. Kinesis Data Firehose
automatically scales to match the throughput of your data and requires no
ongoing administration. It can also batch, compress, and encrypt the data before
loading it.
See Also https://aws.amazon.com/kinesis/firehose/.
Amazon Kinesis Data Streams A web service for building custom applications that process or analyze streaming
data for specialized needs. Amazon Kinesis Data Streams can continuously
capture and store terabytes of data per hour from hundreds of thousands of
sources.
See Also https://aws.amazon.com/kinesis/streams/.
Amazon Lightsail Lightsail is designed to be the easiest way to launch and manage a virtual private
server with AWS. Lightsail offers bundled plans that include everything you need
to deploy a virtual private server, for a low monthly rate.
See Also https://aws.amazon.com/lightsail/.
Amazon Lumberyard A cross-platform, 3D game engine for creating high-quality games. You can
connect games to the compute and storage of the AWS Cloud and engage fans on
Twitch.
See Also https://aws.amazon.com/lumberyard/.
Amazon Machine Image (AMI) An encrypted machine image stored in Amazon Elastic Block Store (Amazon
EBS) (p. 607) or Amazon Simple Storage Service (p. 611). AMIs are like a
template of a computer's root drive. They contain the operating system and can
also include software and layers of your application, such as database servers,
middleware, web servers, and so on.
Amazon Machine Learning A cloud-based service that creates machine learning (ML) models by finding
patterns in your data, and uses these models to process new data and generate
predictions.
See Also http://aws.amazon.com/machine-learning/.
Amazon Macie A security service that uses machine learning to automatically discover, classify,
and protect sensitive data in AWS.
See Also http://aws.amazon.com/macie/.
Amazon Managed Blockchain A fully managed service for creating and managing scalable blockchain networks
using popular open source frameworks.
See Also http://aws.amazon.com/managed-blockchain/.
Amazon Mobile Analytics A service for collecting, visualizing, understanding, and extracting mobile app
(Mobile Analytics) usage data at scale.
See Also https://aws.amazon.com/mobileanalytics.
Version 1.0
609
AWS General Reference Reference guide
Amazon Monitron An end-to-end system that uses machine learning (ML) to detect abnormal
behavior in industrial machinery. Use Amazon Monitron to implement predictive
maintenance and reduce unplanned downtime.
See Also https://aws.amazon.com/monitron/.
Amazon MQ A managed message broker service for Apache ActiveMQ that makes it easy to set
up and operate message brokers in the cloud.
See Also https://aws.amazon.com/amazon-mq/.
Amazon Neptune A managed graph database service that you can use to build and run applications
that work with highly connected datasets. Neptune supports the popular graph
query languages Apache TinkerPop Gremlin and W3C’s SPARQL, enabling you to
build queries that efficiently navigate highly connected datasets.
See Also https://aws.amazon.com/neptune/.
Amazon Personalize An artificial intelligence service for creating individualized product and content
recommendations.
See Also https://aws.amazon.com/personalize/.
Amazon QuickSight A fast, cloud-powered business analytics service that makes it easy to build
visualizations, perform analysis, and quickly get business insights from your data.
See Also https://aws.amazon.com/quicksight/.
Amazon Redshift A fully managed, petabyte-scale data warehouse service in the cloud. With
Amazon Redshift, you can analyze your data using your existing business
intelligence tools.
See Also https://aws.amazon.com/redshift/.
Amazon Relational Database A web service that makes it easier to set up, operate, and scale a relational
Service (Amazon RDS) database in the cloud. It provides cost-efficient, resizable capacity for an industry-
standard relational database and manages common database administration
tasks.
See Also https://aws.amazon.com/rds.
Amazon Resource Name A standardized way to refer to an AWS resource (p. 650). For example:
(ARN) arn:aws:iam::123456789012:user/division_abc/subdivision_xyz/Bob.
Amazon Route 53 A web service you can use to create a new DNS service or to migrate your existing
DNS service to the cloud.
See Also https://aws.amazon.com/route53.
Amazon S3 Storage for the internet. You can use it to store and retrieve any amount of data
at any time, from anywhere on the web.
See Also Amazon Simple Storage Service (Amazon S3), https://aws.amazon.com/
s3.
Amazon S3 Glacier A secure, durable, and low-cost storage service for data archiving and long-term
backup. You can reliably store large or small amounts of data for significantly
less than on-premises solutions. S3 Glacier is optimized for infrequently accessed
data, where a retrieval time of several hours is suitable.
See Also https://aws.amazon.com/glacier/.
AWS Security Hub A service that provides a comprehensive view of the security state of your AWS
resources. Security Hub collects security data from AWS accounts and services and
helps you analyze your security trends to identify and prioritize the security issues
across your AWS environment.
See Also https://aws.amazon.com/security-hub/.
Version 1.0
610
AWS General Reference Reference guide
Amazon Silk A next-generation web browser available only on Fire OS tablets and phones.
Built on a split architecture that divides processing between the client and the
AWS Cloud, Amazon Silk is designed to create a faster, more responsive mobile
browsing experience.
Amazon Simple Email Service An easy-to-use, cost-effective email solution for applications.
(Amazon SES) See Also https://aws.amazon.com/ses.
Amazon Simple Notification A web service that enables applications, users, and devices to instantly send and
Service (Amazon SNS) receive notifications from the cloud.
See Also https://aws.amazon.com/sns.
Amazon Simple Queue Reliable and scalable hosted queues for storing messages as they travel between
Service (Amazon SQS) computers.
See Also https://aws.amazon.com/sqs.
Amazon Simple Storage Storage for the internet. You can use it to store and retrieve any amount of data
Service (Amazon S3) at any time, from anywhere on the web.
See Also https://aws.amazon.com/s3.
Amazon Simple Workflow A fully managed service that helps developers build, run, and scale background
Service (Amazon SWF) jobs that have parallel or sequential steps. Amazon SWF is like a state tracker and
task coordinator in the cloud.
See Also https://aws.amazon.com/swf/.
Amazon Sumerian A set of tools for creating and running high-quality 3D, augmented reality (AR),
and virtual reality (VR) applications on the web.
See Also https://aws.amazon.com/sumerian/.
Amazon Textract A service that automatically extracts text and data from scanned documents.
Amazon Textract goes beyond simple optical character recognition (OCR) to also
identify the contents of fields in forms and information stored in tables.
See Also https://aws.amazon.com/textract/.
Amazon Virtual Private Cloud A web service for provisioning a logically isolated section of the AWS Cloud
(Amazon VPC) virtual network that you define. You control your virtual networking environment,
including selection of your own IP address range, creation of subnet (p. 656)s,
and configuration of route table (p. 651)s and network gateways.
See Also https://aws.amazon.com/vpc.
Amazon Web Services (AWS) An infrastructure web services platform in the cloud for companies of all sizes.
See Also https://aws.amazon.com/what-is-cloud-computing/.
Amazon WorkDocs A managed, secure enterprise document storage and sharing service with
administrative controls and feedback capabilities.
See Also https://aws.amazon.com/workdocs/.
Amazon WorkLink A cloud-based service that provides secure access to internal websites and web
apps from mobile devices.
See Also https://aws.amazon.com/worklink/.
Amazon WorkMail A managed, secure business email and calendar service with support for existing
desktop and mobile email clients.
See Also https://aws.amazon.com/workmail/.
Amazon WorkSpaces A managed, secure desktop computing service for provisioning cloud-
based desktops and providing users access to documents, applications, and
resource (p. 650)s from supported devices.
Version 1.0
611
AWS General Reference Reference guide
Amazon WorkSpaces A web service for deploying and managing applications for Amazon WorkSpaces.
Application Manager (Amazon Amazon WAM accelerates software deployment, upgrades, patching, and
WAM) retirement by packaging Windows desktop applications into virtualized
application containers.
See Also https://aws.amazon.com/workspaces/applicationmanager.
analysis scheme Amazon CloudSearch (p. 606): Language-specific text analysis options that
are applied to a text field to control stemming and configure stopwords and
synonyms.
application AWS Elastic Beanstalk (p. 615): A logical collection of components, including
environments, versions, and environment configurations. An application is
conceptually similar to a folder.
AWS CodeDeploy (p. 614): A name that uniquely identifies the application to be
deployed. AWS CodeDeploy uses this name to ensure the correct combination of
revision, deployment configuration, and deployment group are referenced during
a deployment.
Application Auto Scaling A web service that enables you to configure automatic scaling for AWS resources
beyond Amazon EC2, such as Amazon ECS services, Amazon EMR clusters, and
DynamoDB tables.
See Also https://aws.amazon.com/autoscaling/.
Application Billing The location where your customers manage the Amazon DevPay products they've
purchased. The web address is http://www.amazon.com/dp-applications.
application revision AWS CodeDeploy (p. 614): An archive file containing source content—such
as source code, webpages, executable files, and deployment scripts—along
with an application specification file (p. 612). Revisions are stored in Amazon
S3 (p. 611) bucket (p. 621)s or GitHub (p. 633) repositories. For Amazon S3, a
revision is uniquely identified by its Amazon S3 object key and its ETag, version, or
both. For GitHub, a revision is uniquely identified by its commit ID.
application specification file AWS CodeDeploy (p. 614): A YAML-formatted file used to map the source files
in an application revision to destinations on the instance. The file is also used to
specify custom permissions for deployed files and specify scripts to be run on
each instance at various stages of the deployment process.
application version AWS Elastic Beanstalk (p. 615): A specific, labeled iteration of an application
that represents a functionally consistent set of deployable application code. A
version points to an Amazon S3 (p. 611) object (a JAVA WAR file) that contains
the application code.
artifact AWS CodePipeline (p. 614): A copy of the files or changes that will be worked
upon by the pipeline.
asymmetric encryption Encryption (p. 630) that uses both a public key and a private key.
asynchronous bounce A type of bounce (p. 621) that occurs when a receiver (p. 648) initially accepts
an email message for delivery and then subsequently fails to deliver it.
Version 1.0
612
AWS General Reference Reference guide
attribute A fundamental data element, something that does not need to be broken
down any further. In DynamoDB, attributes are similar in many ways to fields or
columns in other database systems.
authenticated encryption Encryption (p. 630) that provides confidentiality, data integrity, and authenticity
assurances of the encrypted data.
Auto Scaling group A representation of multiple EC2 instance (p. 629)s that share similar
characteristics, and that are treated as a logical grouping for the purposes of
instance scaling and management.
Availability Zone A distinct location within a Region (p. 649) that is insulated from failures
in other Availability Zones, and provides inexpensive, low-latency network
connectivity to other Availability Zones in the same Region.
AWS Application Discovery A web service that helps you plan to migrate to AWS by identifying IT assets
Service in a data center—including servers, virtual machines, applications, application
dependencies, and network infrastructure.
See Also https://aws.amazon.com/about-aws/whats-new/2016/04/aws-
application-discovery-service/.
AWS AppSync An enterprise level, fully managed GraphQL service with real-time data
synchronization and offline programming features.
See Also https://aws.amazon.com/appsync/.
AWS Auto Scaling A fully managed service that enables you to quickly discover the scalable AWS
resources that are part of your application and configure dynamic scaling.
See Also https://aws.amazon.com/autoscaling/.
AWS Backup A managed backup service that you can use to centralize and automate the
backup of data across AWS services in the cloud and on premises.
See Also https://aws.amazon.com/backup/.
AWS Billing and Cost The AWS Cloud computing model in which you pay for services on demand and
Management use as much or as little as you need. While resource (p. 650)s are active under
your account, you pay for the cost of allocating those resources. You also pay for
any incidental usage associated with those resources, such as data transfer or
allocated storage.
Version 1.0
613
AWS General Reference Reference guide
AWS Blockchain Templates A service for creating and deploying open-source blockchain frameworks on AWS,
such as Ethereum and Hyperledger Fabric.
See Also https://aws.amazon.com/blockchain/templates/.
AWS Certificate Manager A web service for provisioning, managing, and deploying Secure Sockets
(ACM) Layer/Transport Layer Security (p. 659) (SSL/TLS) certificates for use with AWS
services.
See Also https://aws.amazon.com/certificate-manager/.
AWS Certificate Manager A hosted private certificate authority service for issuing and revoking private
Private Certificate Authority digital certificate (p. 622)s.
(ACM PCA) See Also https://aws.amazon.com/certificate-manager/private-certificate-
authority/.
AWS Cloud Development Kit An open-source software development framework for defining your cloud
(AWS CDK) infrastructure in code and provisioning it through AWS CloudFormation.
See Also https://aws.amazon.com/cdk/.
AWS Cloud Map A service that you use to create and maintain a map of the backend services and
resources that your applications depend on. AWS Cloud Map lets you name and
discover your cloud resources.
See Also https://aws.amazon.com/cloud-map.
AWS Cloud9 A cloud-based integrated development environment (IDE) that you use to write,
run, and debug code.
See Also https://aws.amazon.com/cloud9/.
AWS CloudFormation A service for writing or changing templates that create and delete related AWS
resource (p. 650)s together as a unit.
See Also https://aws.amazon.com/cloudformation.
AWS CloudHSM A web service that helps you meet corporate, contractual, and regulatory
compliance requirements for data security by using dedicated hardware security
module (HSM) appliances within the AWS Cloud.
See Also https://aws.amazon.com/cloudhsm/.
AWS CloudTrail A web service that records AWS API calls for your account and delivers log files to
you. The recorded information includes the identity of the API caller, the time of
the API call, the source IP address of the API caller, the request parameters, and
the response elements returned by the AWS service.
See Also https://aws.amazon.com/cloudtrail/.
AWS CodeBuild A fully managed continuous integration service that compiles source code, runs
tests, and produces software packages that are ready to deploy.
See Also https://aws.amazon.com/codebuild.
AWS CodeCommit A fully managed source control service that makes it easy for companies to host
secure and highly scalable private Git repositories.
See Also https://aws.amazon.com/codecommit.
AWS CodeDeploy A service that automates code deployments to any instance, including EC2
instance (p. 629)s and instance (p. 636)s running on-premises.
See Also https://aws.amazon.com/codedeploy.
AWS CodeDeploy agent A software package that, when installed and configured on an instance, enables
that instance to be used in CodeDeploy deployments.
AWS CodePipeline A continuous delivery service for fast and reliable application updates.
Version 1.0
614
AWS General Reference Reference guide
AWS Command Line Interface A unified downloadable and configurable tool for managing AWS services.
(AWS CLI) Control multiple AWS services from the command line and automate them
through scripts.
See Also https://aws.amazon.com/cli/.
AWS Config A fully managed service that provides an AWS resource (p. 650) inventory,
configuration history, and configuration change notifications for better security
and governance. You can create rules that automatically check the configuration
of AWS resources that AWS Config records.
See Also https://aws.amazon.com/config/.
AWS Database Migration A web service that can help you migrate data to and from many widely used
Service commercial and open-source databases.
See Also https://aws.amazon.com/dms.
AWS Data Pipeline A web service for processing and moving data between different AWS compute
and storage services, as well as on-premises data sources, at specified intervals.
See Also https://aws.amazon.com/datapipeline.
AWS Device Farm (Device An app testing service that allows developers to test Android, iOS, and Fire OS
Farm) devices on real, physical phones and tablets that are hosted by AWS.
See Also https://aws.amazon.com/device-farm.
AWS Direct Connect A web service that simplifies establishing a dedicated network connection
from your premises to AWS. Using AWS Direct Connect, you can establish
private connectivity between AWS and your data center, office, or colocation
environment.
See Also https://aws.amazon.com/directconnect.
AWS Directory Service A managed service for connecting your AWS resource (p. 650)s to an existing
on-premises Microsoft Active Directory or to set up and operate a new,
standalone directory in the AWS Cloud.
See Also https://aws.amazon.com/directoryservice.
AWS Elastic Beanstalk A web service for deploying and managing applications in the AWS Cloud without
worrying about the infrastructure that runs those applications.
See Also https://aws.amazon.com/elasticbeanstalk.
AWS Elemental MediaConnect A service that lets broadcasters and other premium video providers reliably ingest
live video into the AWS Cloud and distribute it to multiple destinations inside or
outside the AWS Cloud.
See Also https://aws.amazon.com/mediaconnect.
AWS Elemental MediaConvert A file-based video conversion service that transforms media into formats required
for traditional broadcast and for internet streaming to multi-screen devices.
See Also https://aws.amazon.com/mediaconvert.
AWS Elemental MediaLive A video service that lets you create live outputs for broadcast and streaming
delivery.
See Also https://aws.amazon.com/medialive.
AWS Elemental MediaPackage A just-in-time packaging and origination service that lets you format highly
secure and reliable live outputs for a variety of devices.
See Also https://aws.amazon.com/mediapackage.
AWS Elemental MediaStore A storage service optimized for media that provides the performance, consistency,
and low latency required to deliver live and on-demand video content at scale.
See Also https://aws.amazon.com/mediastore.
Version 1.0
615
AWS General Reference Reference guide
AWS Elemental MediaTailor A video service that lets you serve targeted ads to viewers while maintaining
broadcast quality in over-the-top (OTT) video applications.
See Also https://aws.amazon.com/mediatailor.
AWS Encryption SDK A client-side encryption library designed to make it easy for everyone to encrypt
and decrypt data using industry standards and best practices.
See Also https://aws.amazon.com/blogs/security/tag/aws-encryption-sdk/.
AWS Firewall Manager A service that you use with AWS WAF to simplify your AWS WAF administration
and maintenance tasks across multiple accounts and resources. With AWS Firewall
Manager, you set up your firewall rules just once. The service automatically
applies your rules across your accounts and resources, even as you add new
resources.
See Also https://aws.amazon.com/firewall-manager.
AWS Global Accelerator A network layer service that you use to create accelerators that direct traffic to
optimal endpoints over the AWS global network. This improves the availability
and performance of your internet applications that are used by a global audience.
See Also https://aws.amazon.com/global-accelerator.
AWS Glue A fully managed extract, transform, and load (ETL) (p. 632) service that you can
use to catalog data and load it for analytics. With AWS Glue, you can discover
your data, develop scripts to transform sources into targets, and schedule and run
ETL jobs in a serverless environment.
See Also https://aws.amazon.com/glue.
AWS GovCloud (US) An isolated AWS Region designed to host sensitive workloads in the cloud,
ensuring that this work meets the US government's regulatory and compliance
requirements. The AWS GovCloud (US) Region adheres to United States
International Traffic in Arms Regulations (ITAR), Federal Risk and Authorization
Management Program (FedRAMP) requirements, Department of Defense (DOD)
Cloud Security Requirements Guide (SRG) Levels 2 and 4, and Criminal Justice
Information Services (CJIS) Security Policy requirements.
See Also https://aws.amazon.com/govcloud-us/.
AWS Identity and Access A web service that enables Amazon Web Services (AWS) (p. 611) customers to
Management (IAM) manage users and user permissions within AWS.
See Also https://aws.amazon.com/iam.
AWS Import/Export A service for transferring large amounts of data between AWS and portable
storage devices.
See Also https://aws.amazon.com/importexport.
AWS IoT Core A managed cloud platform that lets connected devices easily and securely
interact with cloud applications and other devices.
See Also https://aws.amazon.com/iot.
AWS IoT 1-Click A service that enables simple devices to trigger AWS Lambda functions that can
execute an action.
See Also https://aws.amazon.com/iot-1-click.
AWS IoT Analytics A fully managed service used to run sophisticated analytics on massive volumes
of IoT data.
See Also https://aws.amazon.com/iot-analytics.
AWS IoT Device Defender An AWS IoT security service that allows you to audit the configuration of your
devices, monitor your connected devices to detect abnormal behavior, and to
mitigate security risks.
See Also https://aws.amazon.com/iot-device-defender.
Version 1.0
616
AWS General Reference Reference guide
AWS IoT Device Management A service used to securely onboard, organize, monitor, and remotely manage IoT
devices at scale.
See Also https://aws.amazon.com/iot-device-management.
AWS IoT Events A fully managed AWS IoT service that makes it easy to detect and respond to
events from IoT sensors and applications.
See Also https://aws.amazon.com/iot-events.
AWS IoT Greengrass Software that lets you run local compute, messaging, data caching, sync, and ML
inference capabilities for connected devices in a secure way.
See Also https://aws.amazon.com/greengrass.
AWS IoT SiteWise A managed service that lets you collect, organize, and analyze data from
industrial equipment at scale.
See Also https://aws.amazon.com/iot-sitewise.
AWS IoT Things Graph A service that makes it easy to visually connect different devices and web services
to build IoT applications.
See Also https://aws.amazon.com/iot-things-graph.
AWS Key Management A managed service that simplifies the creation and control of
Service (AWS KMS) encryption (p. 630) keys that are used to encrypt data.
See Also https://aws.amazon.com/kms.
AWS Lambda A web service that lets you run code without provisioning or managing servers.
You can run code for virtually any type of application or backend service with zero
administration. You can set up your code to automatically trigger from other AWS
services or call it directly from any web or mobile app.
See Also https://aws.amazon.com/lambda/.
AWS managed key One type of customer master key (CMK) (p. 626) in AWS Key Management
Service (AWS KMS) (p. 617).
AWS managed policy An IAM (p. 616) managed policy (p. 640) that is created and managed by AWS.
AWS Management Console A graphical interface to manage compute, storage, and other cloud
resource (p. 650)s.
See Also https://aws.amazon.com/console.
AWS Management Portal for A web service for managing your AWS resource (p. 650)s using VMware
vCenter vCenter. You install the portal as a vCenter plugin within your existing vCenter
environment. Once installed, you can migrate VMware VMs to Amazon
EC2 (p. 607) and manage AWS resources from within vCenter.
See Also https://aws.amazon.com/ec2/vcenter-portal/.
AWS Marketplace A web portal where qualified partners market and sell their software to AWS
customers. AWS Marketplace is an online software store that helps customers
find, buy, and immediately start using the software and services that run on AWS.
See Also https://aws.amazon.com/partners/aws-marketplace/.
AWS Mobile Hub (Mobile Hub) An integrated console for building, testing, and monitoring mobile apps.
See Also https://aws.amazon.com/mobile.
AWS Mobile SDK A software development kit whose libraries, code examples, and documentation
help you build high quality mobile apps for the iOS, Android, Fire OS, Unity, and
Xamarin platforms.
See Also https://aws.amazon.com/mobile/sdk.
AWS OpsWorks A configuration management service that helps you use Chef to configure and
operate groups of instances and applications. You can define the application’s
Version 1.0
617
AWS General Reference Reference guide
AWS Organizations An account management service that enables you to consolidate multiple AWS
accounts into an organization that you create and centrally manage.
See Also https://aws.amazon.com/organizations/.
AWS Resource Access A service that lets you share your resources with any AWS account or organization
Manager in AWS Organizations.
See Also https://aws.amazon.com/ram/.
AWS ParallelCluster An AWS supported open source cluster management tool that helps you to
deploy and manage high performance computing (HPC) clusters in the AWS
Cloud.
AWS SDK for C++ A software development kit for that provides C++ APIs for many AWS
services including Amazon S3 (p. 611), Amazon EC2 (p. 607), Amazon
DynamoDB (p. 607), and more. The single, downloadable package includes the
AWS C++ library, code examples, and documentation.
See Also https://aws.amazon.com/sdk-for-cpp/.
AWS SDK for Go A software development kit for integrating your Go application with the full suite
of AWS services.
See Also https://aws.amazon.com/sdk-for-go/.
AWS SDK for Java A software development kit that provides Java APIs for many AWS
services including Amazon S3 (p. 611), Amazon EC2 (p. 607), Amazon
DynamoDB (p. 607), and more. The single, downloadable package includes the
AWS Java library, code examples, and documentation.
See Also https://aws.amazon.com/sdk-for-java/.
AWS SDK for JavaScript in the A software development kit for accessing AWS services from JavaScript code
Browser running in the browser. Authenticate users through Facebook, Google, or Login
with Amazon using web identity federation. Store application data in Amazon
DynamoDB (p. 607), and save user files to Amazon S3 (p. 611).
See Also https://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/.
AWS SDK for JavaScript in A software development kit for accessing AWS services from JavaScript in
Node.js Node.js. The SDK provides JavaScript objects for AWS services, including Amazon
S3 (p. 611), Amazon EC2 (p. 607), Amazon DynamoDB (p. 607), and Amazon
Simple Workflow Service (Amazon SWF) (p. 611) . The single, downloadable
package includes the AWS JavaScript library and documentation.
See Also https://docs.aws.amazon.com/sdk-for-javascript/v2/developer-guide/.
AWS SDK for .NET A software development kit that provides .NET API actions for AWS services
including Amazon S3 (p. 611), Amazon EC2 (p. 607), IAM (p. 616), and more.
You can download the SDK as multiple service-specific packages on NuGet.
See Also https://aws.amazon.com/sdk-for-net/.
AWS SDK for PHP A software development kit and open-source PHP library for integrating your
PHP application with AWS services like Amazon S3 (p. 611), Amazon S3
Glacier (p. 610), and Amazon DynamoDB (p. 607).
See Also https://aws.amazon.com/sdk-for-php/.
AWS SDK for Python (Boto) A software development kit for using Python to access AWS services like Amazon
EC2 (p. 607), Amazon EMR (p. 608), Amazon EC2 Auto Scaling (p. 607),
Amazon Kinesis (p. 609), AWS Lambda (p. 617), and more.
See Also http://boto.readthedocs.org/en/latest/.
Version 1.0
618
AWS General Reference Reference guide
AWS SDK for Ruby A software development kit for accessing AWS services from Ruby. The SDK
provides Ruby classes for many AWS services including Amazon S3 (p. 611),
Amazon EC2 (p. 607), Amazon DynamoDB (p. 607). and more. The single,
downloadable package includes the AWS Ruby Library and documentation.
See Also https://aws.amazon.com/sdk-for-ruby/.
AWS Secrets Manager A service for securely encrypting, storing, and rotating credentials for databases
and other services.
See Also https://aws.amazon.com/secrets-manager/.
AWS Security Token Service A web service for requesting temporary, limited-privilege credentials for AWS
(AWS STS) Identity and Access Management (IAM) (p. 616) users or for users that you
authenticate (federated users (p. 632)).
See Also https://aws.amazon.com/iam/.
AWS Service Catalog A web service that helps organizations create and manage catalogs of IT services
that are approved for use on AWS. These IT services can include everything from
virtual machine images, servers, software, and databases to complete multitier
application architectures.
See Also https://aws.amazon.com/servicecatalog/.
AWS Shield A service that helps to protect your resources—such as Amazon EC2 instances,
Elastic Load Balancing load balancers, Amazon CloudFront distributions, and
Route 53 hosted zones—against DDoS attacks. AWS Shield is automatically
included at no extra cost beyond what you already pay for AWS WAF and your
other AWS services. For added protection against DDoS attacks, AWS offers AWS
Shield Advanced.
See Also https://aws.amazon.com/shield.
AWS Single Sign-On A cloud-based service that simplifies managing SSO access to AWS accounts and
business applications. You can control SSO access and user permissions across all
your AWS accounts in AWS Organizations.
See Also https://aws.amazon.com/single-sign-on/.
AWS Step Functions A web service that coordinates the components of distributed applications as a
series of steps in a visual workflow.
See Also https://aws.amazon.com/step-functions/.
AWS Snowball A petabyte-scale data transport solution that uses devices designed to be secure
to transfer large amounts of data into and out of the AWS Cloud.
See Also https://aws.amazon.com/snowball.
AWS Storage Gateway A web service that connects an on-premises software appliance with cloud-based
storage. AWS Storage Gateway provides seamless and secure integration between
an organization’s on-premises IT environment and AWS storage infrastructure.
See Also https://aws.amazon.com/storagegateway/.
AWS Toolkit for Eclipse An open-source plugin for the Eclipse Java integrated development environment
(IDE) that makes it easier to develop, debug, and deploy Java applications using
Amazon Web Services.
See Also https://aws.amazon.com/eclipse/.
AWS Toolkit for JetBrains An open-source plugin for the integrated development environments (IDEs)
from JetBrains that makes it easier to develop, debug, and deploy serverless
applications using Amazon Web Services.
See Also https://aws.amazon.com/intellij/, https://aws.amazon.com/pycharm/.
AWS Toolkit for Visual Studio An extension for Visual Studio that helps in developing, debugging, and
deploying .NET applications using Amazon Web Services.
See Also https://aws.amazon.com/visualstudio/.
Version 1.0
619
AWS General Reference Reference guide
AWS Toolkit for Visual Studio An open-source plugin for the Visual Studio Code (VS Code) editor that makes it
Code easier to develop, debug, and deploy applications using Amazon Web Services.
See Also https://aws.amazon.com/visualstudiocode/.
AWS Tools for Windows A set of PowerShell cmdlets to help developers and administrators manage their
PowerShell AWS services from the Windows PowerShell scripting environment.
See Also https://aws.amazon.com/powershell/.
AWS Toolkit for Microsoft Provides tasks you can use in build and release definitions in VSTS to interact with
Azure DevOps AWS services.
See Also https://aws.amazon.com/vsts/.
AWS Trusted Advisor A web service that inspects your AWS environment and makes recommendations
for saving money, improving system availability and performance, and helping to
close security gaps.
See Also https://aws.amazon.com/premiumsupport/trustedadvisor/.
AWS VPN CloudHub Enables secure communication between branch offices using a simple hub-and-
spoke model, with or without a VPC (p. 661).
AWS WAF A web application firewall service that controls access to content by allowing or
blocking web requests based on criteria that you specify. For example, you can
filter access based on the header values or the IP addresses that the requests
originate from. AWS WAF helps protect web applications from common web
exploits that could affect application availability, compromise security, or
consume excessive resources.
See Also https://aws.amazon.com/waf/.
AWS X-Ray A web service that collects data about requests that your application serves. X-
Ray provides tools that you can use to view, filter, and gain insights into that data
to identify issues and opportunities for optimization.
See Also https://aws.amazon.com/xray/.
B
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
BGP ASN Border Gateway Protocol Autonomous System Number. A unique identifier for a
network, for use in BGP routing. Amazon EC2 (p. 607) supports all 2-byte ASN
numbers in the range of 1 – 65335, with the exception of 7224, which is reserved.
batch prediction Amazon Machine Learning: An operation that processes multiple input data
observations at one time (asynchronously). Unlike real-time predictions, batch
predictions are not available until all predictions have been processed.
See Also real-time predictions.
binary attribute Amazon Machine Learning: An attribute for which one of two possible values is
possible. Valid positive values are 1, y, yes, t, and true answers. Valid negative
values are 0, n, no, f, and false. Amazon Machine Learning outputs 1 for positive
values and 0 for negative values.
Version 1.0
620
AWS General Reference Reference guide
binary classification model Amazon Machine Learning: A machine learning model that predicts the answer to
questions where the answer can be expressed as a binary variable. For example,
questions with answers of “1” or “0”, “yes” or “no”, “will click” or “will not click”
are questions that have binary answers. The result for a binary classification
model is always either a “1” (for a “true” or affirmative answers) or a “0” (for a
“false” or negative answers).
block A dataset. Amazon EMR (p. 608) breaks large amounts of data into subsets. Each
subset is called a data block. Amazon EMR assigns an ID to each block and uses a
hash table to keep track of block processing.
block device A storage device that supports reading and (optionally) writing data in fixed-size
blocks, sectors, or clusters.
block device mapping A mapping structure for every AMI (p. 609) and instance (p. 636) that specifies
the block devices attached to the instance.
bootstrap action A user-specified default or custom action that runs a script or an application on
all nodes of a job flow before Hadoop (p. 634) starts.
breach Amazon EC2 Auto Scaling (p. 607): The condition in which a user-set
threshold (upper or lower boundary) is passed. If the duration of the breach is
significant, as set by a breach duration parameter, it can possibly start a scaling
activity (p. 651).
bucket Amazon Simple Storage Service (Amazon S3) (p. 611): A container for stored
objects. Every object is contained in a bucket. For example, if the object named
photos/puppy.jpg is stored in the DOC-EXAMPLE-BUCKET bucket, then
authorized users can access the object with the URL https://s3-bucket-
endpoint/DOC-EXAMPLE-BUCKET/photos/puppy.jpg.
bucket owner The person or organization that owns a bucket (p. 621) in Amazon S3 (p. 611).
Just as Amazon is the only owner of the domain name Amazon.com, only one
person or organization can own a bucket.
bundling A commonly used term for creating an Amazon Machine Image (AMI) (p. 609). It
specifically refers to creating instance store-backed AMI (p. 636)s.
C
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
cache cluster A logical cache distributed over multiple cache node (p. 622)s. A cache cluster
can be set up with a specific number of cache nodes.
Version 1.0
621
AWS General Reference Reference guide
cache cluster identifier Customer-supplied identifier for the cache cluster that must be unique for that
customer in an AWS Region (p. 649).
cache engine version The version of the Memcached service that is running on the cache node.
cache node A fixed-size chunk of secure, network-attached RAM. Each cache node runs an
instance of the Memcached service, and has its own DNS name and port. Multiple
types of cache nodes are supported, each with varying amounts of associated
memory.
cache node type An EC2 instance (p. 629) type used to run the cache node.
cache parameter group A container for cache engine parameter values that can be applied to one or more
cache clusters.
cache security group A group maintained by ElastiCache that combines inbound authorizations
to cache nodes for hosts belonging to Amazon EC2 (p. 607) security
group (p. 652)s specified through the console or the API or command line tools.
campaign Amazon Personalize (p. 610): A deployed solution version (trained model)
with provisioned dedicated transaction capacity for creating real-time
recommendations for your application users. After you create a campaign, you
use the getRecommendations or getPersonalizedRanking personalization
operations to get recommendations.
See Also recommendations, solution version.
canned access policy A standard access control policy that you can apply to a bucket (p. 621)
or object. Options include: private, public-read, public-read-write, and
authenticated-read.
canonicalization The process of converting data into a standard format that a service such as
Amazon S3 (p. 611) can recognize.
capacity The amount of available compute size at a given time. Each Auto Scaling
group (p. 613) is defined with a minimum and maximum compute size. A scaling
activity (p. 651) increases or decreases the capacity within the defined minimum
and maximum values.
Cartesian product processor A processor that calculates a Cartesian product. Also known as a Cartesian data
processor.
Cartesian product A mathematical operation that returns a product from multiple sets.
certificate A credential that some AWS products use to authenticate AWS account (p. 605)s
and users. Also known as an X.509 certificate (p. 661) . The certificate is paired
with a private key.
chargeable resources Features or services whose use incurs fees. Although some AWS products are
free, others include charges. For example, in an AWS CloudFormation (p. 614)
stack (p. 655), AWS resource (p. 650)s that have been created incur charges.
The amount charged depends on the usage load. Use the Amazon Web Services
Simple Monthly Calculator to estimate your cost prior to creating instances,
stacks, or other resources.
CIDR block Classless Inter-Domain Routing. An internet protocol address allocation and route
aggregation methodology.
See Also Classless Inter-Domain Routing in Wikipedia.
Version 1.0
622
AWS General Reference Reference guide
ciphertext Information that has been encrypted (p. 630), as opposed to plaintext (p. 645),
which is information that has not.
ClassicLink A feature for linking an EC2-Classic instance (p. 636) to a VPC (p. 661),
allowing your EC2-Classic instance to communicate with VPC instances using
private IP addresses.
See Also link to VPC, unlink from VPC.
classification In machine learning, a type of problem that seeks to place (classify) a data sample
into a single category or “class.” Often, classification problems are modeled to
choose one category (class) out of two. These are binary classification problems.
Problems with more than two available categories (classes) are called "multiclass
classification" problems.
See Also binary classification model, multiclass classification model.
cloud service provider (CSP) A company that provides subscribers with access to internet-hosted computing,
storage, and software services.
cluster A logical grouping of container instance (p. 624)s that you can place
task (p. 657)s on.
Amazon Elasticsearch Service (Amazon ES) (p. 608): A logical grouping of one or
more data nodes, optional dedicated master nodes, and storage required to run
Amazon Elasticsearch Service (Amazon ES) and operate your Amazon ES domain.
See Also data node, dedicated master node, node.
cluster compute instance A type of instance (p. 636) that provides a great amount of CPU power
coupled with increased networking performance, making it well suited for High
Performance Compute (HPC) applications and other demanding network-bound
applications.
cluster placement group A logical cluster compute instance (p. 623) grouping to provide lower latency
and high-bandwidth connectivity between the instance (p. 636)s.
cluster status Amazon Elasticsearch Service (Amazon ES) (p. 608): An indicator of the health
of a cluster. A status can be green, yellow, or red. At the shard level, green means
that all shards are allocated to nodes in a cluster, yellow means that the primary
shard is allocated but the replica shards are not, and red means that the primary
and replica shards of at least one index are not allocated. The shard status
determines the index status, and the index status determines the cluster status.
CNAME Canonical Name Record. A type of resource record (p. 650) in the Domain
Name System (DNS) that specifies that the domain name is an alias of another,
canonical domain name. More simply, it is an entry in a DNS table that lets you
alias one fully qualified domain name to another.
Code Signing for AWS IoT A service for signing code that you create for any IoT device that is supported by
Amazon Web Services (AWS).
complaint The event in which a recipient (p. 648) who does not want to receive an email
message clicks "Mark as Spam" within the email client, and the internet service
provider (ISP) (p. 636) sends a notification to Amazon SES (p. 611).
Version 1.0
623
AWS General Reference Reference guide
compound query Amazon CloudSearch (p. 606): A search request that specifies multiple search
criteria using the Amazon CloudSearch structured search syntax.
condition IAM (p. 616): Any restriction or detail about a permission. The condition is D in
the statement "A has permission to do B to C where D applies."
AWS WAF (p. 620): A set of attributes that AWS WAF searches for in web
requests to AWS resource (p. 650)s such as Amazon CloudFront (p. 606)
distributions. Conditions can include values such as the IP addresses that web
requests originate from or values in request headers. Based on the specified
conditions, you can configure AWS WAF to allow or block web requests to AWS
resources.
configuration API Amazon CloudSearch (p. 606): The API call that you use to create, configure, and
manage search domains.
configuration template A series of key–value pairs that define parameters for various AWS products so
that AWS Elastic Beanstalk (p. 615) can provision them for an environment.
consistency model The method a service uses to achieve high availability. For example, it could
involve replicating data across multiple servers in a data center.
See Also eventual consistency.
consolidated billing A feature of the AWS Organizations service for consolidating payment for
multiple AWS accounts. You create an organization that contains your AWS
accounts, and you use the management account of your organization to pay for
all member accounts. You can see a combined view of AWS costs that are incurred
by all accounts in your organization, and you can get detailed cost reports for
individual accounts.
container A Linux container that was created from a Docker image as part of a
task (p. 657).
container definition Specifies which Docker image (p. 628) to use for a container (p. 624), how
much CPU and memory the container is allocated, and more options. The
container definition is included as part of a task definition (p. 657).
container instance An EC2 instance (p. 629) that is running the Amazon Elastic Container Service
(Amazon ECS) (p. 608) agent and has been registered into a cluster (p. 623).
Amazon ECS task (p. 657)s are placed on active container instances.
container registry Stores, manages, and deploys Docker image (p. 628)s.
content delivery network A web service that speeds up distribution of your static and dynamic web content
(CDN) —such as .html, .css, .js, media files, and image files—to your users by using
a worldwide network of data centers. When a user requests your content, the
request is routed to the data center that provides the lowest latency (time delay).
If the content is already in the location with the lowest latency, the CDN delivers
it immediately. If not, the CDN retrieves it from an origin that you specify (for
example, a web server or an Amazon S3 bucket). With some CDNs, you can help
secure your content by configuring an HTTPS connection between users and data
centers, and between data centers and your origin. Amazon CloudFront is an
example of a CDN.
contextual metatdata Amazon Personalize (p. 610): Interactions data that you collect about a user's
browsing context (such as device used or location) when an event (such as a click)
Version 1.0
624
AWS General Reference Reference guide
occurs. Contextual metadata can improve recommendation relevance for new and
existing users.
See Also Interactions dataset, event.
continuous delivery A software development practice in which code changes are automatically built,
tested, and prepared for a release to production.
See Also https://aws.amazon.com/devops/continuous-delivery/.
continuous integration A software development practice in which developers regularly merge code
changes into a central repository, after which automated builds and tests are run.
See Also https://aws.amazon.com/devops/continuous-integration/.
cooldown period Amount of time during which Amazon EC2 Auto Scaling (p. 607) does not allow
the desired size of the Auto Scaling group (p. 613) to be changed by any other
notification from an Amazon CloudWatch (p. 606) alarm (p. 605).
core node An EC2 instance (p. 629) that runs Hadoop (p. 634) map and reduce tasks and
stores data using the Hadoop Distributed File System (HDFS). Core nodes are
managed by the master node (p. 640), which assigns Hadoop tasks to nodes and
monitors their status. The EC2 instances you assign as core nodes are capacity
that must be allotted for the entire job flow run. Because core nodes store data,
you can't remove them from a job flow. However, you can add more core nodes to
a running job flow.
Core nodes run both the DataNodes and TaskTracker Hadoop daemons.
corpus Amazon CloudSearch (p. 606): A collection of data that you want to search.
coverage Amazon Personalize (p. 610): An evaluation metric that tells you the proportion
of unique items that Amazon Personalize might recommend using your model
out of the total number of unique items in Interactions and Items datasets. To
make sure Amazon Personalize recommends more of your items, use a model
with a higher coverage score. Recipes that feature item exploration, such as user-
personalization, have higher coverage than those that don’t, such as popularity-
count.
See Also metrics, Items dataset, Interactions dataset, item exploration, user-
personalization recipe, popularity-count recipe.
credential helper AWS CodeCommit (p. 614): A program that stores credentials for repositories
and supplies them to Git when making connections to those repositories. The
AWS CLI (p. 615) includes a credential helper that you can use with Git when
connecting to CodeCommit repositories.
cross-account access The process of permitting limited, controlled use of resource (p. 650)s in one
AWS account (p. 605) by a user in another AWS account. For example, in AWS
CodeCommit (p. 614) and AWS CodeDeploy (p. 614) you can configure cross-
account access so that a user in AWS account A can access an CodeCommit
repository created by account B. Or a pipeline in AWS CodePipeline (p. 614)
created by account A can use CodeDeploy resources created by account B. In
IAM (p. 616) you use a role (p. 650) to delegate (p. 627) temporary access to
a user (p. 659) in one account to resources in another.
cross-Region replication A solution for replicating data across different AWS Region (p. 649)s, in near-
real time.
Version 1.0
625
AWS General Reference Reference guide
customer gateway A router or software application on your side of a VPN tunnel that is managed
by Amazon VPC (p. 611). The internal interfaces of the customer gateway are
attached to one or more devices in your home network. The external interface is
attached to the virtual private gateway (VGW) (p. 660) across the VPN tunnel.
customer managed policy An IAM (p. 616) managed policy (p. 640) that you create and manage in your
AWS account (p. 605).
customer master key (CMK) The fundamental resource (p. 650) that AWS Key Management Service (AWS
KMS) (p. 617) manages. CMKs can be either customer managed keys or AWS
managed keys. Use CMKs inside AWS KMS to encrypt (p. 630) or decrypt up to 4
kilobytes of data directly or to encrypt generated data keys, which are then used
to encrypt or decrypt larger amounts of data outside of the service.
D
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
data consistency A concept that describes when data is written or updated successfully and
all copies of the data are updated in all AWS Region (p. 649)s. However, it
takes time for the data to propagate to all storage locations. To support varied
application requirements, Amazon DynamoDB (p. 607) supports both eventually
consistent and strongly consistent reads.
See Also eventual consistency, eventually consistent read, strongly consistent
read.
data node Amazon Elasticsearch Service (Amazon ES) (p. 608): An Elasticsearch instance
that holds data and responds to data upload requests.
See Also dedicated master node, node.
data source The database, file, or repository that provides information required by an
application or database. For example, in AWS OpsWorks (p. 617), valid data
sources include an instance (p. 636) for a stack’s MySQL layer or a stack’s
Amazon RDS (p. 610) service layer. In Amazon Redshift (p. 610), valid data
sources include text files in an Amazon S3 (p. 611) bucket (p. 621), in an
Amazon EMR (p. 608) cluster, or on a remote host that a cluster can access
through an SSH connection.
See Also datasource.
database engine The database software and version running on the DB instance (p. 627).
database name The name of a database hosted in a DB instance (p. 627). A DB instance can host
multiple databases, but databases hosted by the same DB instance must each
have a unique name within that instance.
dataset Amazon Personalize (p. 610): A container for the data used by Amazon
Personalize. There are three types of Amazon Personalize datasets: Users, Items,
and Interactions.
See Also Interactions dataset, Users dataset, Items dataset.
dataset group Amazon Personalize (p. 610): A container for Amazon Personalize components,
including datasets, event trackers, solutions, filters, campaigns, and batch
Version 1.0
626
AWS General Reference Reference guide
datasource Amazon Machine Learning (p. 609): An object that contains metadata about the
input data. Amazon ML reads the input data, computes descriptive statistics on its
attributes, and stores the statistics—along with a schema and other information
—as part of the datasource object. Amazon ML uses datasources to train and
evaluate a machine learning model and generate batch predictions.
See Also data source.
DB compute class The size of the database compute platform used to run the instance.
DB instance An isolated database environment running in the cloud. A DB instance can contain
multiple user-created databases.
DB instance identifier User-supplied identifier for the DB instance. The identifier must be unique for
that user in an AWS Region (p. 649).
DB parameter group A container for database engine parameter values that apply to one or more DB
instance (p. 627)s.
DB security group A method that controls access to the DB instance (p. 627). By default, network
access is turned off to DB instances. After inbound traffic is configured for a
security group (p. 652), the same rules apply to all DB instances associated with
that group.
Dedicated Host A physical server with EC2 instance (p. 629) capacity fully dedicated to a user.
Dedicated Instance An instance (p. 636) that is physically isolated at the host hardware level and
launched within a VPC (p. 661).
dedicated master node Amazon Elasticsearch Service (Amazon ES) (p. 608): An Elasticsearch instance
that performs cluster management tasks, but does not hold data or respond to
data upload requests. Amazon Elasticsearch Service (Amazon ES) uses dedicated
master nodes to increase cluster stability.
See Also data node, node.
Dedicated Reserved Instance An option that you purchase to guarantee that sufficient capacity will be available
to launch Dedicated Instance (p. 627)s into a VPC (p. 661).
delegation Within a single AWS account (p. 605): Giving AWS user (p. 659)s access to
resource (p. 650)s in your AWS account.
Between two AWS accounts: Setting up a trust between the account that owns
the resource (the trusting account), and the account that contains the users that
need to access the resource (the trusted account).
See Also trust policy.
delete marker An object with a key and version ID, but without content. Amazon S3 (p. 611)
inserts delete markers automatically into versioned bucket (p. 621)s when an
object is deleted.
deliverability The likelihood that an email message will arrive at its intended destination.
deliveries The number of email messages, sent through Amazon SES (p. 611), that
were accepted by an internet service provider (ISP) (p. 636) for delivery to
recipient (p. 648)s over a period of time.
Version 1.0
627
AWS General Reference Reference guide
deny The result of a policy (p. 645) statement that includes deny as the effect, so
that a specific action or actions are expressly forbidden for a user, group, or role.
Explicit deny take precedence over explicit allow (p. 606).
deployment configuration AWS CodeDeploy (p. 614): A set of deployment rules and success and failure
conditions used by the service during a deployment.
deployment group AWS CodeDeploy (p. 614): A set of individually tagged instance (p. 636)s, EC2
instance (p. 629)s in Auto Scaling group (p. 613)s, or both.
Description property A property added to parameters, resource (p. 650)s, resource properties,
mappings, and outputs to help you to document AWS CloudFormation (p. 614)
template elements.
discussion forums A place where AWS users can post technical questions and feedback to help
accelerate their development efforts and to engage with the AWS community.
The discussion forums are located at https://forums.aws.amazon.com/.
DKIM DomainKeys Identified Mail. A standard that email senders use to sign their
messages. ISPs use those signatures to verify that messages are legitimate. For
more information, see https://tools.ietf.org/html/rfc6376.
Docker image A layered file system template that is the basis of a Docker container (p. 624).
Docker images can comprise specific operating systems or applications.
document Amazon CloudSearch (p. 606): An item that can be returned as a search result.
Each document has a collection of fields that contain the data that can be
searched or returned. The value of a field can be either a string or a number. Each
document must have a unique ID and at least one field.
document batch Amazon CloudSearch (p. 606): A collection of add and delete document
operations. You use the document service API to submit batches to update the
data in your search domain.
document service API Amazon CloudSearch (p. 606): The API call that you use to submit document
batches to update the data in a search domain.
document service endpoint Amazon CloudSearch (p. 606): The URL that you connect to when sending
document updates to an Amazon CloudSearch domain. Each search domain has
a unique document service endpoint that remains the same for the life of the
domain.
domain Amazon Elasticsearch Service (Amazon ES) (p. 608): The hardware, software,
and data exposed by Amazon Elasticsearch Service (Amazon ES) endpoints.
An Amazon ES domain is a service wrapper around an Elasticsearch cluster. An
Amazon ES domain encapsulates the engine instances that process Amazon ES
requests, the indexed data that you want to search, snapshots of the domain,
access policies, and metadata.
Version 1.0
628
AWS General Reference Reference guide
Domain Name System A service that routes internet traffic to websites by translating friendly domain
names like www.example.com into the numeric IP addresses like 192.0.2.1 that
computers use to connect to each other.
Donation button An HTML-coded button to provide an easy and secure way for US-based, IRS-
certified 501(c)3 nonprofit organizations to solicit donations.
E
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
EC2 compute unit (ECU) An AWS standard for compute CPU and memory. You can use this measure to
evaluate the CPU capacity of different EC2 instance (p. 629) types.
EC2 instance A compute instance (p. 636) in the Amazon EC2 (p. 607) service. Other AWS
services use the term EC2 instance to distinguish these instances from other types
of instances they support.
edge location A data center that an AWS service uses to perform service-specific operations.
For example, CloudFront (p. 606) uses edge locations to cache copies of
your content, so the content is closer to your users and can be delivered faster
regardless of their location. Route 53 (p. 610) uses edge locations to speed up
the response to public DNS queries.
Elastic Block Store See Amazon Elastic Block Store (Amazon EBS).
Elastic IP address A fixed (static) IP address that you have allocated in Amazon EC2 (p. 607) or
Amazon VPC (p. 611) and then attached to an instance (p. 636). Elastic IP
addresses are associated with your account, not a specific instance. They are
elastic because you can easily allocate, attach, detach, and free them as your
Version 1.0
629
AWS General Reference Reference guide
needs change. Unlike traditional static IP addresses, Elastic IP addresses allow you
to mask instance or Availability Zone (p. 613) failures by rapidly remapping your
public IP addresses to another instance.
Elastic Load Balancing A web service that improves an application's availability by distributing incoming
traffic between two or more EC2 instance (p. 629)s.
See Also https://aws.amazon.com/elasticloadbalancing.
elastic network interface An additional network interface that can be attached to an instance (p. 636).
Elastic network interfaces include a primary private IP address, one or more
secondary private IP addresses, an Elastic IP Address (optional), a MAC address,
membership in specified security group (p. 652)s, a description, and a source/
destination check flag. You can create an elastic network interface, attach it to an
instance, detach it from an instance, and attach it to another instance.
Elasticsearch An open-source, real-time distributed search and analytics engine used for full-
text search, structured search, and analytics. Elasticsearch was developed by the
Elastic company.
encryption context A set of key–value pairs that contains additional information associated with AWS
Key Management Service (AWS KMS) (p. 617)–encrypted information.
endpoint A URL that identifies a host and port as the entry point for a web service. Every
web service request contains an endpoint. Most AWS products provide endpoints
for a Region to enable faster connectivity.
Amazon ElastiCache (p. 608): The DNS name of a cache node (p. 622).
Amazon RDS (p. 610): The DNS name of a DB instance (p. 627).
AWS CloudFormation (p. 614): The DNS name or IP address of the server that
receives an HTTP request.
endpoint port Amazon ElastiCache (p. 608): The port number used by a cache node (p. 622).
Amazon RDS (p. 610): The port number used by a DB instance (p. 627).
envelope encryption The use of a master key and a data key to algorithmically protect data. The
master key is used to encrypt and decrypt the data key and the data key is used to
encrypt and decrypt the data itself.
Version 1.0
630
AWS General Reference Reference guide
environment configuration A collection of parameters and settings that define how an environment and its
associated resources behave.
epoch The date from which time is measured. For most Unix environments, the epoch is
January 1, 1970.
evaluation Amazon Machine Learning: The process of measuring the predictive performance
of a machine learning (ML) model.
Also a machine learning object that stores the details and result of an ML model
evaluation.
evaluation datasource The data that Amazon Machine Learning uses to evaluate the predictive accuracy
of a machine learning model.
event tracker Amazon Personalize (p. 610): Specifies a destination dataset group for event
data that you record in real time. When you record events in real time, you
provide the ID of the event tracker so that Amazon Personalize knows where to
add the data.
See Also dataset group, event.
eventual consistency The method through which AWS products achieve high availability, which involves
replicating data across multiple servers in Amazon's data centers. When data is
written or updated and Success is returned, all copies of the data are updated.
However, it takes time for the data to propagate to all storage locations. The data
will eventually be consistent, but an immediate read might not show the change.
Consistency is usually reached within seconds.
See Also data consistency, eventually consistent read, strongly consistent read.
eventually consistent read A read process that returns data from only one Region and might not show the
most recent write information. However, if you repeat your read request after a
short time, the response should eventually return the latest data.
See Also data consistency, eventual consistency, strongly consistent read.
expiration For CloudFront (p. 606) caching, the time when CloudFront stops responding
to user requests with an object. If you don't use headers or CloudFront
distribution (p. 628) settings to specify how long you want objects to stay in
an edge location (p. 629), the objects expire after 24 hours. The next time a
user requests an object that has expired, CloudFront forwards the request to the
origin (p. 644).
Version 1.0
631
AWS General Reference Reference guide
explicit impressions Amazon Personalize (p. 610): A list of items that you manually add to an
Amazon Personalize Interactions dataset to influence future recommendations.
Unlike implicit impressions, where Amazon Personalize automatically derives the
impressions data, you choose what to include in explicit impressions.
See Also recommendations, Interactions dataset, impressions data, implicit
impressions.
explicit launch permission An Amazon Machine Image (AMI) (p. 609) launch permission granted to a
specific AWS account (p. 605).
exponential backoff A strategy that incrementally increases the wait between retry attempts in order
to reduce the load on the system and increase the likelihood that repeated
requests will succeed. For example, client applications might wait up to 400
milliseconds before attempting the first retry, up to 1600 milliseconds before the
second, up to 6400 milliseconds (6.4 seconds) before the third, and so on.
expression Amazon CloudSearch (p. 606): A numeric expression that you can use to control
how search hits are sorted. You can construct Amazon CloudSearch expressions
using numeric fields, other rank expressions, a document's default relevance
score, and standard numeric operators and functions. When you use the sort
option to specify an expression in a search request, the expression is evaluated for
each search hit and the hits are listed according to their expression values.
extract, transform, and load A process that is used to integrate data from multiple sources. Data is collected
(ETL) from sources (extract), converted to an appropriate format (transform), and
written to a target data store (load) for purposes of analysis and querying.
ETL tools combine these three functions to consolidate and move data from one
environment to another. AWS Glue (p. 616) is a fully managed ETL service for
discovering and organizing data, transforming it, and making it available for
search and analytics.
F
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
facet Amazon CloudSearch (p. 606): An index field that represents a category that you
want to use to refine and filter search results.
facet enabled Amazon CloudSearch (p. 606): An index field option that enables facet
information to be calculated for the field.
feature transformation Amazon Machine Learning: The machine learning process of constructing more
predictive input representations or “features” from the raw input variables to
optimize a machine learning model’s ability to learn and generalize. Also known
as data transformation or feature engineering.
federated identity Allows individuals to sign in to different networks or services, using the same
management (FIM) group or personal credentials to access data across all networks. With identity
federation in AWS, external identities (federated users) are granted secure access
to resource (p. 650)s in an AWS account (p. 605) without having to create IAM
user (p. 659)s. These external identities can come from a corporate identity
store (such as LDAP or Windows Active Directory) or from a third party (such as
Version 1.0
632
AWS General Reference Reference guide
Login with Amazon, Facebook, or Google). AWS federation also supports SAML
2.0.
feedback loop (FBL) The mechanism by which a mailbox provider (for example, an internet service
provider (ISP) (p. 636)) forwards a recipient (p. 648)'s complaint (p. 623) back
to the sender (p. 652).
field weight The relative importance of a text field in a search index. Field weights control how
much matches in particular text fields affect a document's relevance score.
filter A criterion that you specify to limit the results when you list or describe your
Amazon EC2 (p. 607) resource (p. 650)s.
filter query A way to filter search results without affecting how the results are scored and
sorted. Specified with the Amazon CloudSearch (p. 606) fq parameter.
fuzzy search A simple search query that uses approximate string matching (fuzzy matching) to
correct for typographical errors and misspellings.
G
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
geospatial search A search query that uses locations specified as a latitude and longitude to
determine matches and sort the results.
gibibyte (GiB) A contraction of giga binary byte, a gibibyte is 2^30 or 1,073,741,824 bytes.
A gigabyte (GB) is 10^9 or 1,000,000,000 bytes. 1,024 GiB is a tebibyte
(TiB) (p. 658).
global secondary index An index with a partition key and a sort key that can be different from those on
the table. A global secondary index is considered global because queries on the
index can span all of the data in a table, across all partitions.
See Also local secondary index.
grant AWS Key Management Service (AWS KMS) (p. 617): A mechanism for giving
AWS principal (p. 646)s long-term permissions to use customer master key
(CMK) (p. 626)s.
grant token A type of identifier that allows the permissions in a grant (p. 633) to take effect
immediately.
Version 1.0
633
AWS General Reference Reference guide
ground truth The observations used in the machine learning (ML) model training process
that include the correct value for the target attribute. To train an ML model to
predict house sales prices, the input observations would typically include prices
of previous house sales in the area. The sale prices of these houses constitute the
ground truth.
group A collection of IAM (p. 616) user (p. 659)s. You can use IAM groups to simplify
specifying and managing permissions for multiple users.
H
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
Hadoop Software that enables distributed processing for big data by using clusters
and simple programming models. For more information, see http://
hadoop.apache.org.
hard bounce A persistent email delivery failure such as "mailbox does not exist."
health check A system call to check on the health status of each instance in an Amazon EC2
Auto Scaling (p. 607) group.
high-quality email Email that recipients find valuable and want to receive. Value means different
things to different recipients and can come in the form of offers, order
confirmations, receipts, newsletters, etc.
highlights Amazon CloudSearch (p. 606): Excerpts returned with search results that show
where the search terms appear within the text of the matching documents.
highlight enabled Amazon CloudSearch (p. 606): An index field option that enables matches within
the field to be highlighted.
hit A document that matches the criteria specified in a search request. Also referred
to as a search result.
hosted zone A collection of resource record (p. 650) sets that Amazon Route 53 (p. 610)
hosts. Like a traditional DNS zone file, a hosted zone represents a collection of
records that are managed together under a single domain name.
HRNN Amazon Personalize (p. 610): A hierarchical recurrent neural network machine
learning algorithm that models changes in user behavior and predicts the items
that a user might interact with in personal recommendation applications.
HVM virtualization Hardware Virtual Machine virtualization. Allows the guest VM to run as though it
is on a native hardware platform, except that it still uses paravirtual (PV) network
and storage drivers for improved performance.
See Also PV virtualization.
Version 1.0
634
AWS General Reference Reference guide
I
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
Identity and Access See AWS Identity and Access Management (IAM).
Management
identity provider (IdP) An IAM (p. 616) entity that holds metadata about external identity providers.
import/export station A machine that uploads or downloads your data to or from Amazon S3 (p. 611).
import log A report that contains details about how AWS Import/Export (p. 616) processed
your data.
implicit impressions Amazon Personalize (p. 610): The recommendations that your application shows
a user. Unlike explicit impressions, where you manually record each impression,
Amazon Personalize automatically derives implicit impressions from your
recommendation data.
See Also recommendations, impressions data, explicit impressions.
impressions data Amazon Personalize (p. 610): The list of items that you presented to a user
when they interacted with a particular item by clicking it, watching it, purchasing
it, and so on. Amazon Personalize uses impressions data to calculate the relevance
of new items for a user based on how frequently users have selected or ignored
the same item.
See Also explicit impressions, implicit impressions.
in-place deployment CodeDeploy: A deployment method in which the application on each instance in
the deployment group is stopped, the latest application revision is installed, and
the new version of the application is started and validated. You can choose to use
a load balancer so each instance is deregistered during its deployment and then
restored to service after the deployment is complete.
index field A name–value pair that is included in an Amazon CloudSearch (p. 606) domain's
index. An index field can contain text or numeric data, dates, or a location.
indexing options Configuration settings that define an Amazon CloudSearch (p. 606) domain's
index fields, how document data is mapped to those index fields, and how the
index fields can be used.
inline policy An IAM (p. 616) policy (p. 645) that is embedded in a single IAM
user (p. 659), group (p. 634), or role (p. 650).
Version 1.0
635
AWS General Reference Reference guide
input data Amazon Machine Learning: The observations that you provide to Amazon
Machine Learning to train and evaluate a machine learning model and generate
predictions.
instance A copy of an Amazon Machine Image (AMI) (p. 609) running as a virtual server in
the AWS Cloud.
instance family A general instance type (p. 636) grouping using either storage or CPU capacity.
instance group A Hadoop (p. 634) cluster contains one master instance group that contains
one master node (p. 640), a core instance group containing one or more core
node (p. 625) and an optional task node (p. 657) instance group, which can
contain any number of task nodes.
instance profile A container that passes IAM (p. 616) role (p. 650) information to an EC2
instance (p. 629) at launch.
instance store Disk storage that is physically attached to the host computer for an EC2
instance (p. 629), and therefore has the same lifespan as the instance. When the
instance is terminated, you lose any data in the instance store.
instance store-backed AMI A type of Amazon Machine Image (AMI) (p. 609) whose instance (p. 636)s use
an instance store (p. 636) volume (p. 661) as the root device. Compare this
with instances launched from Amazon EBS (p. 607)-backed AMIs, which use an
Amazon EBS volume as the root device.
instance type A specification that defines the memory, CPU, storage capacity, and usage
cost for an instance (p. 636). Some instance types are designed for standard
applications, whereas others are designed for CPU-intensive, memory-intensive
applications, and so on.
Interactions dataset Amazon Personalize (p. 610): A container for historical and real-time data
collected from interactions between users and items (called events). Interactions
data can include impressions data and contextual metadata.
See Also dataset, event, impressions data, contextual metatdata.
internet gateway Connects a network to the internet. You can route traffic for IP addresses outside
your VPC (p. 661) to the internet gateway.
internet service provider (ISP) A company that provides subscribers with access to the internet. Many ISPs are
also mailbox provider (p. 639)s. Mailbox providers are sometimes referred to as
ISPs, even if they only provide mailbox services.
intrinsic function A special action in a AWS CloudFormation (p. 614) template that assigns values
to properties not available until runtime. These functions follow the format
Fn::Attribute, such as Fn::GetAtt. Arguments for intrinsic functions can be
parameters, pseudo parameters, or the output of other intrinsic functions.
IP address A numerical address (for example, 192.0.2.44) that networked devices use
to communicate with one another using the Internet Protocol (IP). All EC2
instance (p. 629)s are assigned two IP addresses at launch, which are directly
mapped to each other through network address translation (NAT (p. 642)):
a private IP address (following RFC 1918) and a public IP address. Instances
launched in a VPC (p. 611) are assigned only a private IP address. Instances
launched in your default VPC are assigned both a private IP address and a public
IP address.
IP match condition AWS WAF (p. 620): An attribute that specifies the IP addresses or IP
address ranges that web requests originate from. Based on the specified IP
Version 1.0
636
AWS General Reference Reference guide
addresses, you can configure AWS WAF to allow or block web requests to AWS
resource (p. 650)s such as Amazon CloudFront (p. 606) distributions.
issuer The person who writes a policy (p. 645) to grant permissions to a
resource (p. 650). The issuer (by definition) is always the resource owner. AWS
does not permit Amazon SQS (p. 611) users to create policies for resources they
don't own. If John is the resource owner, AWS authenticates John's identity when
he submits the policy he's written to grant permissions for that resource.
item A group of attributes that is uniquely identifiable among all of the other items.
Items in Amazon DynamoDB (p. 607) are similar in many ways to rows, records,
or tuples in other database systems.
item exploration Amazon Personalize (p. 610): The process that Amazon Personalize uses to test
different item recommendations, including recommendations of new items with
no or very little interaction data, and learn how users respond. You configure item
exploration at the campaign level for solution versions created with the user-
personalization recipe.
See Also recommendations, campaign, solution version, user-personalization
recipe.
item-to-item similarities Amazon Personalize (p. 610): A RELATED_ITEMS recipe that uses the data from
(SIMS) recipe an Interactions dataset to make recommendations for items that are similar to
a specified item. The SIMS recipe calculates similarity based on the way users
interact with items instead of matching item metadata, such as price or age.
See Also recipe, RELATED_ITEMS recipes, Interactions dataset.
Items dataset Amazon Personalize (p. 610): A container for metadata about items, such as
price, genre, or availability.
See Also dataset.
J
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
job flow Amazon EMR (p. 608): One or more step (p. 655)s that specify all of the
functions to be performed on the data.
job prefix An optional string that you can add to the beginning of an AWS Import/
Export (p. 616) log file name to prevent collisions with objects of the same
name.
See Also key prefix.
junk folder The location where email messages that various filters determine to be of lesser
value are collected so that they do not arrive in the recipient (p. 648)'s inbox but
are still accessible to the recipient. This is also referred to as a spam (p. 654) or
bulk folder.
Version 1.0
637
AWS General Reference Reference guide
K
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
key A credential that identifies an AWS account (p. 605) or user (p. 659) to AWS
(such as the AWS secret access key (p. 652)).
Amazon Simple Storage Service (Amazon S3) (p. 611), Amazon EMR (p. 608):
The unique identifier for an object in a bucket (p. 621). Every object in a bucket
has exactly one key. Because a bucket and key together uniquely identify each
object, you can think of Amazon S3 as a basic data map between the bucket + key,
and the object itself. You can uniquely address every object in Amazon S3 through
the combination of the web service endpoint, bucket name, and key, as in this
example: http://doc.s3.amazonaws.com/2006-03-01/AmazonS3.wsdl,
where doc is the name of the bucket, and 2006-03-01/AmazonS3.wsdl is the
key.
IAM (p. 616): In a policy (p. 645), a specific characteristic that is the basis for
restricting access (such as the current time, or the IP address of the requester).
Tagging resources: A general tag (p. 657) label that acts like a category for more
specific tag values. For example, you might have EC2 instance (p. 629) with the
tag key of Owner and the tag value of Jan. You can tag an AWS resource (p. 650)
with up to 10 key–value pairs. Not all AWS resources can be tagged.
key pair A set of security credentials that you use to prove your identity electronically. A
key pair consists of a private key and a public key.
key prefix A logical grouping of the objects in a bucket (p. 621). The prefix value is similar
to a directory name that enables you to store similar data under the same
directory in a bucket.
kibibyte (KiB) A contraction of kilo binary byte, a kibibyte is 2^10 or 1,024 bytes. A kilobyte (KB)
is 10^3 or 1,000 bytes. 1,024 KiB is a mebibyte (MiB) (p. 640).
L
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
labeled data In machine learning, data for which you already know the target or “correct”
answer.
launch configuration A set of descriptive parameters used to create new EC2 instance (p. 629)s in an
Amazon EC2 Auto Scaling (p. 607) activity.
Version 1.0
638
AWS General Reference Reference guide
A template that an Auto Scaling group (p. 613) uses to launch new EC2
instances. The launch configuration contains information such as the Amazon
Machine Image (AMI) (p. 609) ID, the instance type, key pairs, security
group (p. 652)s, and block device mappings, among other configuration
settings.
launch permission An Amazon Machine Image (AMI) (p. 609) attribute that allows users to launch
an AMI.
lifecycle The lifecycle state of the EC2 instance (p. 629) contained in an Auto Scaling
group (p. 613). EC2 instances progress through several states over their lifespan;
these include Pending, InService, Terminating and Terminated.
lifecycle action An action that can be paused by Auto Scaling, such as launching or terminating
an EC2 instance.
lifecycle hook Enables you to pause Auto Scaling after it launches or terminates an EC2 instance
so that you can perform a custom action while the instance is not in service.
link to VPC The process of linking (or attaching) an EC2-Classic instance (p. 636) to a
ClassicLink-enabled VPC (p. 661).
See Also ClassicLink, unlink from VPC.
load balancer A DNS name combined with a set of ports, which together provide a destination
for all requests intended for your application. A load balancer can distribute
traffic to multiple application instances across every Availability Zone (p. 613)
within a Region (p. 649). Load balancers can span multiple Availability Zones
within an AWS Region into which an Amazon EC2 (p. 607) instance was
launched. But load balancers cannot span multiple Regions.
local secondary index An index that has the same partition key as the table, but a different sort key. A
local secondary index is local in the sense that every partition of a local secondary
index is scoped to a table partition that has the same partition key value.
See Also local secondary index.
logical name A case-sensitive unique string within an AWS CloudFormation (p. 614) template
that identifies a resource (p. 650), mapping (p. 640), parameter, or output. In
an AWS CloudFormation template, each parameter, resource (p. 650), property,
mapping, and output must be declared with a unique logical name. You use the
logical name when dereferencing these items using the Ref function.
M
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
Mail Transfer Agent (MTA) Software that transports email messages from one computer to another by using
a client-server architecture.
mailbox provider An organization that provides email mailbox hosting services. Mailbox providers
are sometimes referred to as internet service provider (ISP) (p. 636)s, even if
they only provide mailbox services.
mailbox simulator A set of email addresses that you can use to test an Amazon SES (p. 611)-based
email sending application without sending messages to actual recipients. Each
Version 1.0
639
AWS General Reference Reference guide
main route table The default route table (p. 651) that any new VPC (p. 661) subnet (p. 656)
uses for routing. You can associate a subnet with a different route table of your
choice. You can also change which route table is the main route table.
managed policy A standalone IAM (p. 616) policy (p. 645) that you can attach to
multiple user (p. 659)s, group (p. 634)s, and role (p. 650)s in your IAM
account (p. 605). Managed policies can either be AWS managed policies (which
are created and managed by AWS) or customer managed policies (which you
create and manage in your AWS account).
manifest When sending a create job request for an import or export operation, you describe
your job in a text file called a manifest. The manifest file is a YAML-formatted
file that specifies how to transfer data between your storage device and the AWS
Cloud.
manifest file Amazon Machine Learning: The file used for describing batch predictions. The
manifest file relates each input data file with its associated batch prediction
results. It is stored in the Amazon S3 output location.
mapping A way to add conditional parameter values to an AWS CloudFormation (p. 614)
template. You specify mappings in the template's optional Mappings section and
retrieve the desired value using the FN::FindInMap function.
master node A process running on an Amazon Machine Image (AMI) (p. 609) that keeps track
of the work its core and task nodes complete.
maximum price The maximum price you will pay to launch one or more Spot Instance (p. 655)s.
If your maximum price exceeds the current Spot price (p. 655) and your
restrictions are met, Amazon EC2 (p. 607) launches instances on your behalf.
maximum send rate The maximum number of email messages that you can send per second using
Amazon SES (p. 611).
mean reciprocal rank at 25 Amazon Personalize (p. 610): An evaluation metric that assesses the relevance
of a model’s highest ranked recommendation. Amazon Personalize calculates
this metric using the average accuracy of the model when ranking the most
relevant recommendation out of the top 25 recommendations over all requests
for recommendations.
See Also metrics, recommendations.
mebibyte (MiB) A contraction of mega binary byte, a mebibyte is 2^20 or 1,048,576 bytes.
A megabyte (MB) is 10^6 or 1,000,000 bytes. 1,024 MiB is a gibibyte
(GiB) (p. 633).
message ID Amazon Simple Email Service (Amazon SES) (p. 611): A unique identifier that is
assigned to every email message that is sent.
Amazon Simple Queue Service (Amazon SQS) (p. 611): The identifier returned
when you send a message to a queue.
metadata Information about other data or objects. In Amazon Simple Storage Service
(Amazon S3) (p. 611) and Amazon EMR (p. 608) metadata takes the form
Version 1.0
640
AWS General Reference Reference guide
of name–value pairs that describe the object. These include default metadata
such as the date last modified and standard HTTP metadata such as Content-
Type. Users can also specify custom metadata at the time they store an object. In
Amazon EC2 (p. 607) metadata includes data about an EC2 instance (p. 629)
that the instance can retrieve to determine things about itself, such as the
instance type, the IP address, and so on.
metrics Amazon Personalize (p. 610): Evaluation data that Amazon Personalize
generates when you train a model. You use metrics to evaluate the performance
of the model, view the effects of modifying a solution’s configuration, and
compare results between solutions that use the same training data but were
created with different recipes.
See Also solution, recipe.
micro instance A type of EC2 instance (p. 629) that is more economical to use if you have
occasional bursts of high CPU activity.
Multi-AZ deployment A primary DB instance (p. 627) that has a synchronous standby replica in a
different Availability Zone (p. 613). The primary DB instance is synchronously
replicated across Availability Zones to the standby replica.
multiclass classification A machine learning model that predicts values that belong to a limited, pre-
model defined set of permissible values. For example, "Is this product a book, movie, or
clothing?"
multi-factor authentication An optional AWS account (p. 605) security feature. Once you enable AWS
(MFA) MFA, you must provide a six-digit, single-use code in addition to your sign-in
credentials whenever you access secure AWS webpages or the AWS Management
Console (p. 617). You get this single-use code from an authentication device
that you keep in your physical possession.
See Also https://aws.amazon.com/mfa/.
multipart upload A feature that allows you to upload a single object as a set of parts.
Multipurpose Internet Mail An internet standard that extends the email protocol to include non-ASCII text
Extensions (MIME) and nontext elements like attachments.
Version 1.0
641
AWS General Reference Reference guide
N
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
namespace An abstract container that provides context for the items (names, or technical
terms, or words) it holds, and allows disambiguation of homonym items residing
in different namespaces.
NAT gateway A NAT (p. 642) device, managed by AWS, that performs network address
translation in a private subnet (p. 656), to secure inbound internet traffic. A NAT
gateway uses both NAT and port address translation.
See Also NAT instance.
NAT instance A NAT (p. 642) device, configured by a user, that performs network address
translation in a VPC (p. 661) public subnet (p. 656) to secure inbound internet
traffic.
See Also NAT gateway.
network ACL An optional layer of security that acts as a firewall for controlling traffic in and
out of a subnet (p. 656). You can associate multiple subnets with a single
network ACL (p. 604), but a subnet can be associated with only one network ACL
at a time.
Network Address Translation (NAT (p. 642)-PT) An internet protocol standard defined in RFC 2766.
and Protocol Translation See Also NAT instance, NAT gateway.
n-gram transformation Amazon Machine Learning: A transformation that aids in text string analysis.
An n-gram transformation takes a text variable as input and outputs strings by
sliding a window of size n words, where n is specified by the user, over the text,
and outputting every string of words of size n and all smaller sizes. For example,
specifying the n-gram transformation with window size =2 returns all the two-
word combinations and all of the single words.
NICE Desktop Cloud A remote visualization technology for securely connecting users to graphic-
Visualization intensive 3D applications hosted on a remote, high-performance server.
node Amazon Elasticsearch Service (Amazon ES) (p. 608): An Elasticsearch instance. A
node can be either a data instance or a dedicated master instance.
See Also dedicated master node.
NoEcho A property of AWS CloudFormation (p. 614) parameters that prevent the
otherwise default reporting of names and values of a template parameter.
Version 1.0
642
AWS General Reference Reference guide
Declaring the NoEcho property causes the parameter value to be masked with
asterisks in the report by the cfn-describe-stacks command.
normalized discounted Amazon Personalize (p. 610): An evaluation metric that tells you about the
cumulative gain (NCDG) at K relevance of your model’s highly ranked recommendations, where K is a sample
(5/10/25) size of 5, 10, or 25 recommendations. Amazon Personalize calculates this by
assigning weight to recommendations based on their position in a ranked list,
where each recommendation is discounted (given a lower weight) by a factor
dependent on its position. The normalized discounted cumulative gain at K
assumes that recommendations that are lower on a list are less relevant than
recommendations higher on the list.
See Also metrics, recommendations.
NoSQL Nonrelational database systems that are highly available, scalable, and optimized
for high performance. Instead of the relational model, NoSQL databases (like
Amazon DynamoDB (p. 607)) use alternate models for data management, such
as key–value pairs or document storage.
null object A null object is one whose version ID is null. Amazon S3 (p. 611) adds a null
object to a bucket (p. 621) when versioning (p. 660) for that bucket is
suspended. It is possible to have only one null object for each key in a bucket.
number of passes The number of times that you allow Amazon Machine Learning to use the same
data records to train a machine learning model.
O
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
object Amazon Simple Storage Service (Amazon S3) (p. 611): The fundamental entity
type stored in Amazon S3. Objects consist of object data and metadata. The data
portion is opaque to Amazon S3.
Amazon CloudFront (p. 606): Any entity that can be served either over HTTP or
a version of RTMP.
observation Amazon Machine Learning: A single instance of data that Amazon Machine
Learning (Amazon ML) uses to either train a machine learning model how to
predict or to generate a prediction. Each row in an Amazon ML input data file is
an observation.
On-Demand Instance An Amazon EC2 (p. 607) pricing option that charges you for compute capacity
by the hour or second (minimum of 60 seconds) with no long-term commitment.
optimistic locking A strategy to ensure that an item that you want to update has not been modified
by others before you perform the update. For Amazon DynamoDB (p. 607),
optimistic locking support is provided by the AWS SDKs.
organization AWS Organizations (p. 618): An entity that you create to consolidate and
manage your AWS accounts. An organization has one management account along
with zero or more member accounts.
organizational unit AWS Organizations (p. 618): A container for accounts within a root (p. 650) of
an organization. An organizational unit (OU) can contain other OUs.
Version 1.0
643
AWS General Reference Reference guide
origin access identity Also called OAI. When using Amazon CloudFront (p. 606) to serve content with
an Amazon S3 (p. 611) bucket (p. 621) as the origin, a virtual identity that you
use to require users to access your content through CloudFront URLs instead of
Amazon S3 URLs. Usually used with CloudFront private content (p. 646).
origin server The Amazon S3 (p. 611) bucket (p. 621) or custom origin containing
the definitive original version of the content you deliver through
CloudFront (p. 606).
original environment The instances in a deployment group at the start of an CodeDeploy blue/green
deployment.
output location Amazon Machine Learning: An Amazon S3 location where the results of a batch
prediction are stored.
P
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
pagination The process of responding to an API request by returning a large list of records in
small separate parts. Pagination can occur in the following situations:
• The client sets the maximum number of returned records to a value below the
total number of records.
• The service has a default maximum number of returned records that is lower
than the total number of records.
When an API response is paginated, the service sends a subset of the large list
of records and a pagination token that indicates that more records are available.
The client includes this pagination token in a subsequent API request, and the
service responds with the next subset of records. This continues until the service
responds with a subset of records and no pagination token, indicating that all
records have been sent.
pagination token A marker that indicates that an API response contains a subset of a larger list of
records. The client can return this marker in a subsequent API request to retrieve
the next subset of records until the service responds with a subset of records and
no pagination token, indicating that all records have been sent.
See Also pagination.
paid AMI An Amazon Machine Image (AMI) (p. 609) that you sell to other Amazon
EC2 (p. 607) users on AWS Marketplace (p. 617).
Version 1.0
644
AWS General Reference Reference guide
partition key A simple primary key, composed of one attribute (also known as a hash attribute).
See Also partition key, sort key.
permission A statement within a policy (p. 645) that allows or denies access to a particular
resource (p. 650). You can state any permission like this: "A has permission
to do B to C." For example, Jane (A) has permission to read messages (B) from
John's Amazon SQS (p. 611) queue (C). Whenever Jane sends a request to
Amazon SQS to use John's queue, the service checks to see if she has permission.
It further checks to see if the request satisfies the conditions John set forth in the
permission.
persistent storage A data storage solution where the data remains intact until it is deleted. Options
within AWS (p. 611) include: Amazon S3 (p. 611), Amazon RDS (p. 610),
Amazon DynamoDB (p. 607), and other services.
PERSONALIZED_RANKING Amazon Personalize (p. 610): Recipes that provide item recommendations in
recipes ranked order based on the predicted interest for a user.
See Also recipe, recommendations, personalized-ranking recipe, popularity-count
recipe.
personalized-ranking recipe Amazon Personalize (p. 610): A PERSONALIZED_RANKING recipe that ranks a
collection of items that you provide based on the predicted interest level for a
specific user. Use the personalized-ranking recipe to create curated lists of items
or ordered search results that are personalized for a specific user.
See Also recipe, PERSONALIZED_RANKING recipes.
physical name A unique label that AWS CloudFormation (p. 614) assigns to each
resource (p. 650) when creating a stack (p. 655). Some AWS CloudFormation
commands accept the physical name as a value with the --physical-name
parameter.
pipeline AWS CodePipeline (p. 614): A workflow construct that defines the way software
changes go through a release process.
plaintext Information that has not been encrypted (p. 630), as opposed to
ciphertext (p. 623).
policy IAM (p. 616): A document defining permissions that apply to a user, group,
or role; the permissions in turn determine what users can do in AWS. A
policy typically allow (p. 606)s access to specific actions, and can optionally
grant that the actions are allowed for specific resource (p. 650)s, like EC2
instance (p. 629)s, Amazon S3 (p. 611) bucket (p. 621)s, and so on. Policies
can also explicitly deny (p. 628) access.
Amazon EC2 Auto Scaling (p. 607): An object that stores the information
needed to launch or terminate instances for an Auto Scaling group. Executing
the policy causes instances to be launched or terminated. You can configure an
alarm (p. 605) to invoke an Auto Scaling policy.
policy generator A tool in the IAM (p. 616) AWS Management Console (p. 617) that helps you
build a policy (p. 645) by selecting elements from lists of available options.
Version 1.0
645
AWS General Reference Reference guide
policy simulator A tool in the IAM (p. 616) AWS Management Console (p. 617) that helps you
test and troubleshoot policies (p. 645) so you can see their effects in real-world
scenarios.
policy validator A tool in the IAM (p. 616) AWS Management Console (p. 617) that examines
your existing IAM access control policies (p. 645) to ensure that they comply
with the IAM policy grammar.
precision at K (5/10/25) Amazon Personalize (p. 610): An evaluation metric that tells you how relevant
your model’s recommendations are based on a sample size of K (5, 10, or 25)
recommendations. Amazon Personalize calculates this metric based on the
number of relevant recommendations out of the top K recommendations, divided
by K, where K is 5, 10, or 25.
See Also metrics, recommendations.
Premium Support A one-on-one, fast-response support channel that AWS customers can subscribe
to for support for AWS infrastructure services.
See Also https://aws.amazon.com/premiumsupport/.
presigned URL A web address that uses query string authentication (p. 647).
primary key One or two attributes that uniquely identify each item in a Amazon
DynamoDB (p. 607) table, so that no two items can have the same key.
See Also partition key, sort key.
principal The user (p. 659), service, or account (p. 605) that receives permissions that
are defined in a policy (p. 645). The principal is A in the statement "A has
permission to do B to C."
private content When using Amazon CloudFront (p. 606) to serve content with an Amazon
S3 (p. 611) bucket (p. 621) as the origin, a method of controlling access to
your content by requiring users to use signed URLs. Signed URLs can restrict
user access based on the current date and time and/or the IP addresses that the
requests originate from.
private IP address A private numerical address (for example, 192.0.2.44) that networked devices
use to communicate with one another using the Internet Protocol (IP). All EC2
instance (p. 629)ss are assigned two IP addresses at launch, which are directly
mapped to each other through network address translation (NAT (p. 642)): a
private address (following RFC 1918) and a public address. Exception: Instances
launched in Amazon VPC (p. 611) are assigned only a private IP address.
private subnet A VPC (p. 661) subnet (p. 656) whose instances cannot be reached from the
internet.
product code An identifier provided by AWS when you submit a product to AWS
Marketplace (p. 617).
property rule A JSON (p. 637)-compliant markup standard for declaring properties, mappings,
and output values in an AWS CloudFormation (p. 614) template.
Version 1.0
646
AWS General Reference Reference guide
Provisioned IOPS A storage option designed to deliver fast, predictable, and consistent I/O
performance. When you specify an IOPS rate while creating a DB instance,
Amazon RDS (p. 610) provisions that IOPS rate for the lifetime of the DB
instance.
pseudo parameter A predefined setting, such as AWS:StackName that can be used in AWS
CloudFormation (p. 614) templates without having to declare them. You can use
pseudo parameters anywhere you can use a regular parameter.
public AMI An Amazon Machine Image (AMI) (p. 609) that all AWS account (p. 605)s have
permission to launch.
public dataset A large collection of public information that can be seamlessly integrated into
applications that are based in the AWS Cloud. Amazon stores public datasets at
no charge to the community and, like all AWS services, users pay only for the
compute and storage they use for their own applications. These datasets currently
include data from the Human Genome Project, the U.S. Census, Wikipedia, and
other sources.
See Also https://aws.amazon.com/publicdatasets.
public IP address A public numerical address (for example, 192.0.2.44) that networked devices
use to communicate with one another using the Internet Protocol (IP). EC2
instance (p. 629)s are assigned two IP addresses at launch, which are directly
mapped to each other through Network Address Translation (NAT (p. 642)): a
private address (following RFC 1918) and a public address. Exception: Instances
launched in Amazon VPC (p. 611) are assigned only a private IP address.
public subnet A subnet (p. 656) whose instances can be reached from the internet.
PV virtualization Paravirtual virtualization. Allows guest VMs to run on host systems that do
not have special support extensions for full hardware and CPU virtualization.
Because PV guests run a modified operating system that does not use hardware
emulation, they cannot provide hardware-related features such as enhanced
networking or GPU support.
See Also HVM virtualization.
Q
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
quartile binning Amazon Machine Learning: A process that takes two inputs, a numerical variable
transformation and a parameter called a bin number, and outputs a categorical variable. Quartile
binning transformations discover non-linearity in a variable's distribution by
enabling the machine learning model to learn separate importance values for
parts of the numeric variable’s distribution.
Query A type of web service that generally uses only the GET or POST HTTP method and
a query string with parameters in the URL.
See Also REST.
query string authentication An AWS feature that lets you place the authentication information in the HTTP
request query string instead of in the Authorization header, which enables
URL-based access to objects in a bucket (p. 621).
queue A sequence of messages or jobs that are held in temporary storage awaiting
transmission or processing.
Version 1.0
647
AWS General Reference Reference guide
quota The maximum value for your resources, actions, and items in your AWS account
R
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
range GET A request that specifies a byte range of data to get for a download. If an object is
large, you can break up a download into smaller units by sending multiple range
GET requests that each specify a different byte range to GET.
raw email A type of sendmail request with which you can specify the email headers and
MIME types.
read replica Amazon RDS (p. 610): An active copy of another DB instance. Any updates to
the data on the source DB instance are replicated to the read replica DB instance
using the built-in replication feature of MySQL 5.1.
real-time predictions Amazon Machine Learning: Synchronously generated predictions for individual
data observations.
See Also batch prediction.
recommendations Amazon Personalize (p. 610): A list of items that Amazon Personalize predicts
that a user will interact with. Depending on the Amazon Personalize recipe used,
recommendations can be either a list of items (with USER_PERSONALIZATION
recipes and RELATED_ITEMS recipes), or a ranking of a collection of items you
provided (with PERSONALIZED_RANKING recipes).
See Also recipe, campaign, solution version, USER_PERSONALIZATION recipes,
RELATED_ITEMS recipes, PERSONALIZED_RANKING recipes.
receipt handle Amazon SQS (p. 611): An identifier that you get when you receive a message
from the queue. This identifier is required to delete a message from the queue or
when changing a message's visibility timeout.
receiver The entity that consists of the network systems, software, and policies that
manage email delivery for a recipient (p. 648).
recipient Amazon Simple Email Service (Amazon SES) (p. 611): The person or entity
receiving an email message. For example, a person named in the "To" field of a
message.
Redis A fast, open-source, in-memory key-value data structure store. Redis comes with
a set of versatile in-memory data structures with which you can easily create a
variety of custom applications.
Version 1.0
648
AWS General Reference Reference guide
reference A means of inserting a property from one AWS resource (p. 650) into another.
For example, you could insert an Amazon EC2 (p. 607) security group (p. 652)
property into an Amazon RDS (p. 610) resource.
Region A named set of AWS resource (p. 650)s in the same geographical area. A Region
comprises at least two Availability Zone (p. 613)s.
regression model Amazon Machine Learning: Preformatted instructions for common data
transformations that fine-tune machine learning model performance.
regression model A type of machine learning model that predicts a numeric value, such as the exact
purchase price of a house.
regularization A machine learning (ML) parameter that you can tune to obtain higher-quality
ML models. Regularization helps prevent ML models from memorizing training
data examples instead of learning how to generalize the patterns it sees (called
overfitting). When training data is overfitted, the ML model performs well on the
training data but does not perform well on the evaluation data or on new data.
RELATED_ITEMS recipes Amazon Personalize (p. 610): Recipes, such as the item-to-item similarities
(SIMS) recipe, that recommend items that are similar to a specified item.
See Also recipe, item-to-item similarities (SIMS) recipe.
replacement environment The instances in a deployment group after the CodeDeploy blue/green
deployment.
reply path The email address to which an email reply is sent. This is different from the return
path (p. 650).
reputation 1. An Amazon SES (p. 611) metric, based on factors that might include
bounce (p. 621)s, complaint (p. 623)s, and other metrics, regarding whether or
not a customer is sending high-quality email.
requester The person (or application) that sends a request to AWS to perform a specific
action. When AWS receives a request, it first evaluates the requester's permissions
to determine whether the requester is allowed to perform the request action (if
applicable, for the requested resource (p. 650)).
Requester Pays An Amazon S3 (p. 611) feature that allows a bucket owner (p. 621) to specify
that anyone who requests access to objects in a particular bucket (p. 621) must
pay the data transfer and request costs.
reservation A collection of EC2 instance (p. 629)s started as part of the same launch
request. Not to be confused with a Reserved Instance (p. 649).
Reserved Instance A pricing option for EC2 instance (p. 629)s that discounts the on-
demand (p. 643) usage charge for instances that meet the specified parameters.
Customers pay for the entire term of the instance, regardless of how they use it.
Reserved Instance An online exchange that matches sellers who have reserved capacity that they
Marketplace no longer need with buyers who are looking to purchase additional capacity.
Reserved Instance (p. 649)s that you purchase from third-party sellers have less
Version 1.0
649
AWS General Reference Reference guide
than a full standard term remaining and can be sold at different upfront prices.
The usage or reoccurring fees remain the same as the fees set when the Reserved
Instances were originally purchased. Full standard terms for Reserved Instances
available from AWS run for one year or three years.
resource An entity that users can work with in AWS, such as an EC2 instance (p. 629), an
Amazon DynamoDB (p. 607) table, an Amazon S3 (p. 611) bucket (p. 621), an
IAM (p. 616) user, an AWS OpsWorks (p. 617) stack (p. 655), and so on.
resource property A value required when including an AWS resource (p. 650) in an AWS
CloudFormation (p. 614) stack (p. 655). Each resource may have one or more
properties associated with it. For example, an AWS::EC2::Instance resource
may have a UserData property. In an AWS CloudFormation template, resources
must declare a properties section, even if the resource has no properties.
resource record Also called resource record set. The fundamental information elements in the
Domain Name System (DNS).
See Also Domain Name System in Wikipedia.
REST Representational state transfer. A simple stateless architecture that generally runs
over HTTPS/TLS. REST emphasizes that resources have unique and hierarchical
identifiers (URIs), are represented by common media types (HTML, XML,
JSON (p. 637), and so on), and that operations on the resources are either
predefined or discoverable within the media type. In practice, this generally
results in a limited number of operations.
See Also Query, WSDL, SOAP.
RESTful web service Also known as RESTful API. A web service that follows REST (p. 650)
architectural constraints. The API operations must use HTTP methods explicitly;
expose hierarchical URIs; and transfer either XML, JSON (p. 637), or both.
return enabled Amazon CloudSearch (p. 606): An index field option that enables the field's
values to be returned in the search results.
return path The email address to which bounced email is returned. The return path is
specified in the header of the original email. This is different from the reply
path (p. 649).
revision AWS CodePipeline (p. 614): A change made to a source that is configured in a
source action, such as a pushed commit to a GitHub (p. 633) repository or an
update to a file in a versioned Amazon S3 (p. 611) bucket (p. 621).
role A tool for giving temporary access to AWS resource (p. 650)s in your AWS
account (p. 605).
rollback A return to a previous state that follows the failure to create an object, such as
AWS CloudFormation (p. 614) stack (p. 655). All resource (p. 650)s associated
with the failure are deleted during the rollback. For AWS CloudFormation, you can
override this behavior using the --disable-rollback option on the command
line.
root AWS Organizations (p. 618): A parent container for the accounts in your
organization. If you apply a service control policy (p. 653) to the root, it applies
to every organizational unit (p. 643) and account in the organization.
root credentials Authentication information associated with the AWS account (p. 605) owner.
root device volume A volume (p. 661) that contains the image used to boot the instance (p. 636)
(also known as a root device). If you launched the instance from an AMI (p. 609)
backed by instance store (p. 636), this is an instance store volume (p. 661)
Version 1.0
650
AWS General Reference Reference guide
created from a template stored in Amazon S3 (p. 611). If you launched the
instance from an AMI backed by Amazon EBS (p. 607), this is an Amazon EBS
volume created from an Amazon EBS snapshot.
route table A set of routing rules that controls the traffic leaving any subnet (p. 656) that is
associated with the route table. You can associate multiple subnets with a single
route table, but a subnet can be associated with only one route table at a time.
row identifier Amazon Machine Learning: An attribute in the input data that you can include
in the evaluation or prediction output to make it easier to associate a prediction
with an observation.
rule AWS WAF (p. 620): A set of conditions that AWS WAF searches for in web
requests to AWS resource (p. 650)s such as Amazon CloudFront (p. 606)
distributions. You add rules to a web ACL (p. 661), and then specify whether you
want to allow or block web requests based on each rule.
S
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
sampling period A defined duration of time, such as one minute, over which Amazon
CloudWatch (p. 606) computes a statistic (p. 655).
sandbox A testing location where you can test the functionality of your application without
affecting production, incurring charges, or purchasing products.
Amazon SES (p. 611): An environment that is designed for developers to test
and evaluate the service. In the sandbox, you have full access to the Amazon SES
API, but you can only send messages to verified email addresses and the mailbox
simulator. To get out of the sandbox, you need to apply for production access.
Accounts in the sandbox also have lower sending limits (p. 653) than production
accounts.
scale in To remove EC2 instances from an Auto Scaling group (p. 613).
scale out To add EC2 instances to an Auto Scaling group (p. 613).
scaling policy A description of how Auto Scaling should automatically scale an Auto Scaling
group (p. 613) in response to changing demand.
See Also scale in, scale out.
scaling activity A process that changes the size, configuration, or makeup of an Auto Scaling
group (p. 613) by launching or terminating instances.
scheduler The method used for placing task (p. 657)s on container instance (p. 624)s.
schema Amazon Machine Learning: The information needed to interpret the input data
for a machine learning model, including attribute names and their assigned data
types, and the names of special attributes.
score cut-off value Amazon Machine Learning: A binary classification model outputs a score that
ranges from 0 to 1. To decide whether an observation should be classified as 1
or 0, you pick a classification threshold, or cut-off, and Amazon ML compares the
Version 1.0
651
AWS General Reference Reference guide
score against it. Observations with scores higher than the cut-off are predicted as
target equals 1, and scores lower than the cut-off are predicted as target equals 0.
search API Amazon CloudSearch (p. 606): The API that you use to submit search requests to
a search domain (p. 652).
search domain Amazon CloudSearch (p. 606): Encapsulates your searchable data and the
search instances that handle your search requests. You typically set up a separate
Amazon CloudSearch domain for each different collection of data that you want
to search.
search domain configuration Amazon CloudSearch (p. 606): An domain's indexing options, analysis
scheme (p. 612)s, expression (p. 632)s, suggester (p. 656)s, access policies,
and scaling and availability options.
search enabled Amazon CloudSearch (p. 606): An index field option that enables the field data
to be searched.
search endpoint Amazon CloudSearch (p. 606): The URL that you connect to when sending
search requests to a search domain. Each Amazon CloudSearch domain has a
unique search endpoint that remains the same for the life of the domain.
search index Amazon CloudSearch (p. 606): A representation of your searchable data that
facilitates fast and accurate data retrieval.
search instance Amazon CloudSearch (p. 606): A compute resource (p. 650) that indexes
your data and processes search requests. An Amazon CloudSearch domain
has one or more search instances, each with a finite amount of RAM and CPU
resources. As your data volume grows, more search instances or larger search
instances are deployed to contain your indexed data. When necessary, your index
is automatically partitioned across multiple search instances. As your request
volume or complexity increases, each search partition is automatically replicated
to provide additional processing capacity.
search request Amazon CloudSearch (p. 606): A request that is sent to an Amazon CloudSearch
domain's search endpoint to retrieve documents from the index that match
particular search criteria.
search result Amazon CloudSearch (p. 606): A document that matches a search request. Also
referred to as a search hit.
secret access key A key that is used in conjunction with the access key ID (p. 604) to
cryptographically sign programmatic AWS requests. Signing a request identifies
the sender and prevents the request from being altered. You can generate secret
access keys for your AWS account (p. 605), individual IAM user (p. 659)s, and
temporary sessions.
security group A named set of allowed inbound network connections for an instance. (Security
groups in Amazon VPC (p. 611) also include support for outbound connections.)
Each security group consists of a list of protocols, ports, and IP address ranges. A
security group can apply to multiple instances, and multiple groups can regulate a
single instance.
Version 1.0
652
AWS General Reference Reference guide
sending limits The sending quota (p. 653) and maximum send rate (p. 640) that are
associated with every Amazon SES (p. 611) account.
sending quota The maximum number of email messages that you can send using Amazon
SES (p. 611) in a 24-hour period.
server-side encryption (SSE) The encrypting (p. 630) of data at the server level. Amazon S3 (p. 611)
supports three modes of server-side encryption: SSE-S3, in which Amazon S3
manages the keys; SSE-C, in which the customer manages the keys; and SSE-KMS,
in which AWS Key Management Service (AWS KMS) (p. 617) manages keys.
service control policy AWS Organizations (p. 618): A policy-based control that specifies the services
and actions that users and roles can use in the accounts that the service control
policy (SCP) affects.
service health dashboard A webpage showing up-to-the-minute information about AWS service availability.
The dashboard is located at http://status.aws.amazon.com/.
Service Quotas A service for viewing and managing your quotas easily and at scale as your AWS
workloads grow. Quotas, also referred to as limits, are the maximum number of
resources that you can create in an AWS account.
service role An IAM (p. 616) role (p. 650) that grants permissions to an AWS service so it
can access AWS resource (p. 650)s. The policies that you attach to the service
role determine which AWS resources the service can access and what it can do
with those resources.
session The period during which the temporary security credentials provided by AWS
Security Token Service (AWS STS) (p. 619) allow access to your AWS account.
SHA Secure Hash Algorithm. SHA1 is an earlier version of the algorithm, which AWS
has deprecated in favor of SHA256.
shard Amazon Elasticsearch Service (Amazon ES) (p. 608): A partition of data in an
index. You can split an index into multiple shards, which can include primary
shards (original shards) and replica shards (copies of the primary shards). Replica
shards provide failover, which means that a replica shard is promoted to a primary
shard if a cluster node that contains a primary shard fails. Replica shards also can
handle requests.
shared AMI An Amazon Machine Image (AMI) (p. 609) that a developer builds and makes
available for others to use.
shutdown action Amazon EMR (p. 608): A predefined bootstrap action that launches a script that
executes a series of commands in parallel before terminating the job flow.
SIGNATURE file AWS Import/Export (p. 616): A file you copy to the root directory of your
storage device. The file contains a job ID, manifest file, and a signature.
Signature Version 4 Protocol for authenticating inbound API requests to AWS services in all AWS
Regions.
Version 1.0
653
AWS General Reference Reference guide
Simple Storage Service See Amazon Simple Storage Service (Amazon S3).
Single-AZ DB instance A standard (non-Multi-AZ) DB instance (p. 627) that is deployed in one
Availability Zone (p. 613), without a standby replica in another Availability Zone.
See Also Multi-AZ deployment.
sloppy phrase search A search for a phrase that specifies how close the terms must be to one another
to be considered a match.
SMTP Simple Mail Transfer Protocol. The standard that is used to exchange email
messages between internet hosts for the purpose of routing and delivery.
snapshot Amazon Elastic Block Store (Amazon EBS) (p. 607): A backup of your
volume (p. 661)s that is stored in Amazon S3 (p. 611). You can use these
snapshots as the starting point for new Amazon EBS volumes or to protect your
data for long-term durability.
See Also DB snapshot.
SOAP Simple Object Access Protocol. An XML-based protocol that lets you exchange
information over a particular protocol (HTTP or SMTP, for example) between
applications.
See Also REST, WSDL.
soft bounce A temporary email delivery failure such as one resulting from a full mailbox.
solution Amazon Personalize (p. 610): The recipe, customized parameters, and trained
models (solution versions) that can be used to generate recommendations.
See Also recipe, solution version, recommendations.
solution version Amazon Personalize (p. 610): A trained model that you create as part of a
solution in Amazon Personalize. You deploy a solution version in a campaign to
generate recommendations.
See Also solution, campaign, recommendations.
sort enabled Amazon CloudSearch (p. 606): An index field option that enables a field to be
used to sort the search results.
sort key An attribute used to sort the order of partition keys in a composite primary key
(also known as a range attribute).
See Also partition key, primary key.
source/destination checking A security measure to verify that an EC2 instance (p. 629) is the origin of all
traffic that it sends and the ultimate destination of all traffic that it receives; that
is, that the instance is not relaying traffic. Source/destination checking is enabled
by default. For instances that function as gateways, such as VPC (p. 661)
NAT (p. 642) instances, source/destination checking must be disabled.
Version 1.0
654
AWS General Reference Reference guide
spamtrap An email address that is set up by an anti-spam (p. 654) entity, not for
correspondence, but to monitor unsolicited email. This is also called a honeypot.
Spot Instance A type of EC2 instance (p. 629) that you can bid on to take advantage of unused
Amazon EC2 (p. 607) capacity.
Spot price The price for a Spot Instance (p. 655) at any given time. If your maximum price
exceeds the current price and your restrictions are met, Amazon EC2 (p. 607)
launches instances on your behalf.
SQL injection match condition AWS WAF (p. 620): An attribute that specifies the part of web requests, such
as a header or a query string, that AWS WAF inspects for malicious SQL code.
Based on the specified conditions, you can configure AWS WAF to allow or block
web requests to AWS resource (p. 650)s such as Amazon CloudFront (p. 606)
distributions.
stack AWS CloudFormation (p. 614): A collection of AWS resource (p. 650)s that you
create and delete as a single unit.
AWS OpsWorks (p. 617): A set of instances that you manage collectively,
typically because they have a common purpose such as serving PHP applications.
A stack serves as a container and handles tasks that apply to the group of
instances as a whole, such as managing applications and cookbooks.
station AWS CodePipeline (p. 614): A portion of a pipeline workflow where one or more
actions are performed.
station A place at an AWS facility where your AWS Import/Export data is transferred on
to, or off of, your storage device.
statistic One of five functions of the values submitted for a given sampling
period (p. 651). These functions are Maximum, Minimum, Sum, Average, and
SampleCount.
stemming The process of mapping related words to a common stem. This enables matching
on variants of a word. For example, a search for "horse" could return matches for
horses, horseback, and horsing, as well as horse. Amazon CloudSearch (p. 606)
supports both dictionary based and algorithmic stemming.
step Amazon EMR (p. 608): A single function applied to the data in a job
flow (p. 637). The sum of all steps comprises a job flow.
step type Amazon EMR (p. 608): The type of work done in a step. There are a limited
number of step types, such as moving data from Amazon S3 (p. 611) to Amazon
EC2 (p. 607) or from Amazon EC2 to Amazon S3.
sticky session A feature of the Elastic Load Balancing (p. 630) load balancer that binds a user's
session to a specific application instance so that all requests coming from the user
Version 1.0
655
AWS General Reference Reference guide
during the session are sent to the same application instance. By contrast, a load
balancer defaults to route each request independently to the application instance
with the smallest load.
stopping The process of filtering stop words from an index or search request.
stopword A word that is not indexed and is automatically filtered out of search requests
because it is either insignificant or so common that including it would result in
too many matches to be useful. Stopwords are language specific.
streaming Amazon EMR (p. 608): A utility that comes with Hadoop (p. 634) that enables
you to develop MapReduce executables in languages other than Java.
Amazon CloudFront (p. 606): The ability to use a media file in real time—as it is
transmitted in a steady stream from a server.
streaming distribution A special kind of distribution (p. 628) that serves streamed media files using a
Real Time Messaging Protocol (RTMP) connection.
string-to-sign Before you calculate an HMAC (p. 634) signature, you first assemble the required
components in a canonical order. The preencrypted string is the string-to-sign.
string match condition AWS WAF (p. 620): An attribute that specifies the strings that AWS WAF
searches for in a web request, such as a value in a header or a query string. Based
on the specified strings, you can configure AWS WAF to allow or block web
requests to AWS resource (p. 650)s such as CloudFront (p. 606) distributions.
strongly consistent read A read process that returns a response with the most up-to-date data, reflecting
the updates from all prior write operations that were successful—regardless of
the Region.
See Also data consistency, eventual consistency, eventually consistent read.
structured query Search criteria specified using the Amazon CloudSearch (p. 606) structured
query language. You use the structured query language to construct compound
queries that use advanced search options and combine multiple search criteria
using Boolean operators.
subnet A segment of the IP address range of a VPC (p. 661) that EC2
instance (p. 629)s can be attached to. You can create subnets to group instances
according to security and operational needs.
Subscription button An HTML-coded button that enables an easy way to charge customers a recurring
fee.
suggester Amazon CloudSearch (p. 606): Specifies an index field you want to use to get
autocomplete suggestions and options that can enable fuzzy matches and control
how suggestions are sorted.
suggestions Documents that contain a match for the partial search string in the field
designated by the suggester (p. 656). Amazon CloudSearch (p. 606)
suggestions include the document IDs and field values for each matching
document. To be a match, the string must match the contents of the field starting
from the beginning of the field.
supported AMI An Amazon Machine Image (AMI) (p. 609) similar to a paid AMI (p. 644), except
that the owner charges for additional software or a service that customers use
with their own AMIs.
Version 1.0
656
AWS General Reference Reference guide
symmetric encryption Encryption (p. 630) that uses a private key only.
See Also asymmetric encryption.
synchronous bounce A type of bounce (p. 621) that occurs while the email servers of the
sender (p. 652) and receiver (p. 648) are actively communicating.
synonym A word that is the same or nearly the same as an indexed word and that should
produce the same results when specified in a search request. For example, a
search for "Rocky Four" or "Rocky 4" should return the fourth Rocky movie. This
can be done by designating that four and 4 are synonyms for IV. Synonyms are
language specific.
T
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
table A collection of data. Similar to other database systems, DynamoDB stores data in
tables.
tag Metadata that you can define and assign to AWS resource (p. 650)s, such as an
EC2 instance (p. 629). Not all AWS resources can be tagged.
tagging Tagging resources: Applying a tag (p. 657) to an AWS resource (p. 650).
Amazon SES (p. 611): Also called labeling. A way to format return path (p. 650)
email addresses so that you can specify a different return path for each
recipient of a message. Tagging enables you to support VERP (p. 660). For
example, if Andrew manages a mailing list, he can use the return paths andrew
[email protected] and [email protected] so that he can
determine which email bounced.
target attribute Amazon Machine Learning (Amazon ML ): The attribute in the input data that
contains the “correct” answers. Amazon ML uses the target attribute to learn how
to make predictions on new data. For example, if you were building a model for
predicting the sale price of a house, the target attribute would be “target sale
price in USD.”
target revision AWS CodeDeploy (p. 614): The most recent version of the application revision
that has been uploaded to the repository and will be deployed to the instances in
a deployment group. In other words, the application revision currently targeted
for deployment. This is also the revision that will be pulled for automatic
deployments.
task definition The blueprint for your task. Specifies the name of the task (p. 657), revisions,
container definition (p. 624)s, and volume (p. 661) information.
task node An EC2 instance (p. 629) that runs Hadoop (p. 634) map and reduce tasks,
but does not store data. Task nodes are managed by the master node (p. 640),
which assigns Hadoop tasks to nodes and monitors their status. While a job flow
is running you can increase and decrease the number of task nodes. Because they
Version 1.0
657
AWS General Reference Reference guide
don't store data and can be added and removed from a job flow, you can use task
nodes to manage the EC2 instance capacity your job flow uses, increasing capacity
to handle peak loads and decreasing it later.
tebibyte (TiB) A contraction of tera binary byte, a tebibyte is 2^40 or 1,099,511,627,776 bytes.
A terabyte (TB) is 10^12 or 1,000,000,000,000 bytes. 1,024 TiB is a pebibyte
(PiB) (p. 645).
template format version The version of an AWS CloudFormation (p. 614) template design that
determines the available features. If you omit the AWSTemplateFormatVersion
section from your template, AWS CloudFormation assumes the most recent
format version.
template validation The process of confirming the use of JSON (p. 637) code in an AWS
CloudFormation (p. 614) template. You can validate any AWS CloudFormation
template using the cfn-validate-template command.
temporary security Authentication information that is provided by AWS STS (p. 619) when you
credentials call an STS API action. Includes an access key ID (p. 604), a secret access
key (p. 652), a session (p. 653) token, and an expiration time.
throttling The automatic restricting or slowing down of a process based on one or more
limits. Examples: Amazon Kinesis Data Streams (p. 609) throttles operations if
an application (or group of applications operating on the same stream) attempts
to get data from a shard at a rate faster than the shard limit. Amazon API
Gateway (p. 606) uses throttling to limit the steady-state request rates for a
single account. Amazon SES (p. 611) uses throttling to reject attempts to send
email that exceeds the sending limits (p. 653).
time series data Data provided as part of a metric. The time value is assumed to be when the value
occurred. A metric is the fundamental concept for Amazon CloudWatch (p. 606)
and represents a time-ordered set of data points. You publish metric data points
into CloudWatch and later retrieve statistics about those data points as a time-
series ordered dataset.
tokenization The process of splitting a stream of text into separate tokens on detectable
boundaries such as white space and hyphens.
Traffic Mirroring An Amazon VPC feature that you can use to copy network traffic from an elastic
network interface of Amazon EC2 instances, and then send it to out-of-band
security and monitoring appliances for content inspection, threat monitoring, and
troubleshooting.
See Also https://aws.amazon.com/vpc/.
training datasource A datasource that contains the data that Amazon Machine Learning uses to train
the machine learning model to make predictions.
transition AWS CodePipeline (p. 614): The act of a revision in a pipeline continuing from
one stage to the next in a workflow.
Version 1.0
658
AWS General Reference Reference guide
Transport Layer Security (TLS) A cryptographic protocol that provides security for communication over the
internet. Its predecessor is Secure Sockets Layer (SSL).
trust policy An IAM (p. 616) policy (p. 645) that is an inherent part of an IAM
role (p. 650). The trust policy specifies which principal (p. 646)s are allowed to
use the role.
trusted key groups Amazon CloudFront key groups whose public keys CloudFront can use to verify
the signatures of CloudFront signed URLs and signed cookies.
tuning Selecting the number and type of AMIs (p. 609) to run a Hadoop (p. 634) job
flow most efficiently.
tunnel A route for transmission of private network traffic that uses the internet to
connect nodes in the private network. The tunnel uses encryption and secure
protocols such as PPTP to prevent the traffic from being intercepted as it passes
through public routing nodes.
U
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
unbounded The number of potential occurrences is not limited by a set number. This
value is often used when defining a data type that is a list (for example,
maxOccurs="unbounded"), in WSDL (p. 661).
unlink from VPC The process of unlinking (or detaching) an EC2-Classic instance (p. 636) from a
ClassicLink-enabled VPC (p. 661).
See Also ClassicLink, link to VPC.
usage report An AWS record that details your usage of a particular AWS service. You can
generate and download usage reports from https://aws.amazon.com/usage-
reports/.
user A person or application under an account (p. 605) that needs to make API calls
to AWS products. Each user has a unique name within the AWS account, and a set
of security credentials not shared with other users. These credentials are separate
from the AWS account's security credentials. Each user is associated with one and
only one AWS account.
Users dataset Amazon Personalize (p. 610): A container for metadata about your users, such as
age, gender, or loyalty membership.
See Also dataset.
Version 1.0
659
AWS General Reference Reference guide
USER_PERSONALIZATION Amazon Personalize (p. 610): Recipes used to build a recommendation system
recipes that predicts the items that a user will interact with based on data provided in
Interactions, Items, and Users datasets.
See Also recipe, user-personalization recipe, popularity-count recipe, HRNN.
V
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
value Instances of attributes (p. 613) for an item, such as cells in a spreadsheet. An
attribute might have multiple values.
Tagging resources: A specific tag (p. 657) label that acts as a descriptor within a
tag category (key). For example, you might have EC2 instance (p. 629) with the
tag key of Owner and the tag value of Jan. You can tag an AWS resource (p. 650)
with up to 10 key–value pairs. Not all AWS resources can be tagged.
verification The process of confirming that you own an email address or a domain so that you
can send email from or to it.
VERP Variable Envelope Return Path. A way in which email sending applications can
match bounce (p. 621)d email with the undeliverable address that caused
the bounce by using a different return path (p. 650) for each recipient. VERP
is typically used for mailing lists. With VERP, the recipient's email address is
embedded in the address of the return path, which is where bounced email is
returned. This makes it possible to automate the processing of bounced email
without having to open the bounce messages, which may vary in content.
versioning Every object in Amazon S3 (p. 611) has a key and a version ID. Objects with the
same key, but different version IDs can be stored in the same bucket (p. 621).
Versioning is enabled at the bucket layer using PUT Bucket versioning.
virtualization Allows multiple guest virtual machines (VM) to run on a host operating system.
Guest VMs can run on one or more levels above the host hardware, depending on
the type of virtualization.
See Also PV virtualization, HVM virtualization.
virtual private gateway (VGW) The Amazon side of a VPN connection (p. 661) that maintains connectivity. The
internal interfaces of the virtual private gateway connect to your VPC (p. 661)
through the VPN attachment. The external interfaces connect to the VPN
connection, which leads to the customer gateway (p. 626).
visibility timeout The period of time that a message is invisible to the rest of your application after
an application component gets it from the queue. During the visibility timeout,
the component that received the message usually processes it, and then deletes
it from the queue. This prevents multiple components from processing the same
message.
Version 1.0
660
AWS General Reference Reference guide
VM Import/Export A service for importing virtual machine (VM) images from your existing
virtualization environment to Amazon EC2 and then exporting them back.
See Also https://aws.amazon.com/ec2/vm-import.
volume A fixed amount of storage on an instance (p. 636). You can share volume
data between container (p. 624)s and persist the data on the container
instance (p. 624) when the containers are no longer running.
VPC endpoint A feature that enables you to create a private connection between your
VPC (p. 661) and another AWS service without requiring access over the
internet, through a NAT (p. 642) instance, a VPN connection (p. 661), or AWS
Direct Connect (p. 615).
VPN connection Amazon Web Services (AWS) (p. 611): The IPsec connection between a
VPC (p. 661) and some other network, such as a corporate data center, home
network, or colocation facility.
W
Numbers and symbols (p. 604) | A (p. 604) | B (p. 620) | C (p. 621) | D (p. 626) | E (p. 629) | F (p. 632) |
G (p. 633) | H (p. 634) | I (p. 635) | J (p. 637) | K (p. 638) | L (p. 638) | M (p. 639) | N (p. 642) | O (p. 643)
| P (p. 644) | Q (p. 647) | R (p. 648) | S (p. 651) | T (p. 657) | U (p. 659) | V (p. 660) | W (p. 661) | X, Y,
Z (p. 661)
web access control list (web AWS WAF (p. 620): A set of rules that defines the conditions that AWS WAF
ACL) searches for in web requests to AWS resource (p. 650)s such as Amazon
CloudFront (p. 606) distributions. A web access control list (web ACL) specifies
whether to allow, block, or count the requests.
WSDL Web Services Description Language. A language used to describe the actions
that a web service can perform, along with the syntax of action requests and
responses.
See Also REST, SOAP.
X, Y, Z
X.509 certificate A digital document that uses the X.509 public key infrastructure (PKI) standard to
verify that a public key belongs to the entity described in the certificate (p. 622).
Version 1.0
661
AWS General Reference Reference guide
zone awareness Amazon Elasticsearch Service (Amazon ES) (p. 608): A configuration that
distributes nodes in a cluster across two Availability Zone (p. 613)s in the same
Region. Zone awareness helps to prevent data loss and minimizes downtime in
the event of node and data center failure. If you enable zone awareness, you must
have an even number of data instances in the instance count, and you also must
use the Amazon Elasticsearch Service Configuration API to replicate your data for
your Elasticsearch cluster.
Version 1.0
662