Skip to content

Commit

Permalink
Paterns edits
Browse files Browse the repository at this point in the history
  • Loading branch information
julianwood committed Aug 21, 2024
1 parent 640648f commit 773a79e
Show file tree
Hide file tree
Showing 10 changed files with 8 additions and 457 deletions.

This file was deleted.

93 changes: 0 additions & 93 deletions eventbridge-pipes-sqs-to-cwlog/eventbridge-pipes-sqs-cwlog.json

This file was deleted.

4 changes: 2 additions & 2 deletions eventbridge-pipes-sqs-to-cwlog/example-pattern.json
Original file line number Diff line number Diff line change
@@ -1,13 +1,13 @@
{
"title": "Amazon SQS to CloudWatch Log group via Amazon EventBridge",
"title": "Amazon SQS to Amazon CloudWatch Log group via Amazon EventBridge Pipes",
"description": "Amazon SQS to CloudWatch Log group via Amazon EventBridge Pipes filter and transformation",
"language": "",
"level": "200",
"framework": "SAM",
"introBox": {
"headline": "How it works",
"text": [
"This sample project demonstrates how to use Amazon EventBridge Pipes to connect an Amazon SQS queue with an AWS CloudWatch Log group. The pipe will apply a filter and transformation before sending the message to AWS CloudWatch Log group.",
"This sample project shows how to use Amazon EventBridge Pipes to connect an Amazon SQS queue with an AWS CloudWatch Log group. The pipe will apply a filter and transformation before sending the message to AWS CloudWatch Log group.",
"This pattern deploys one SQS queue, EventBridge Pipe, and CloudWatch Log group"
]
},
Expand Down

This file was deleted.

Original file line number Diff line number Diff line change
@@ -1,5 +1,5 @@
{
"title": "SQS to Step Functions with EventBridge Pipes",
"title": "Invoke AWS Step Functions state machine from Amazon SQS messages using Amazon EventBridge Pipes",
"description": "This pattern shows how to use EventBridge Pipes to launch a Step Functions state machine with a message coming from SQS Queue.",
"language": "",
"level": "200",
Expand Down
6 changes: 3 additions & 3 deletions guardduty-malware-s3/example-pattern.json
Original file line number Diff line number Diff line change
@@ -1,14 +1,14 @@
{
"title": "AWS S3 to AWS GuardDuty to EventBridge to SNS",
"description": "Configure Malware Protection for S3 bucket using Amazon GuardDuty",
"title": "Amazon GuardDuty Malware Protection for Amazon S3",
"description": "Configure Malware Protection for Amazon S3 bucket using Amazon GuardDuty",
"language": "yaml",
"level": "200",
"framework": "SAM",
"introBox": {
"headline": "How it works",
"text": [
"This pattern protects an S3 bucket with malware protection by using GuardDuty to detect malicious file uploads.",
"The SAM template creates an IAM role that allows GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. Another EventBridge rule, created by the template, monitors the S3 object scan results and sends notifications to the user’s email address, which is subscribed to an Amazon SNS topic.",
"The AWS SAM template creates an IAM role that allows GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. Another EventBridge rule, created by the template, monitors the S3 object scan results and sends notifications to the user’s email address, which is subscribed to an Amazon SNS topic.",
"This pattern deploys one S3 Bucket, one SNS topic, one SNS subscription, one IAM role, one EventBridge rule and one Malware protection plan resources "
]
},
Expand Down
2 changes: 1 addition & 1 deletion guardduty-malware-s3/guardduty-malware-s3.json
Original file line number Diff line number Diff line change
Expand Up @@ -8,7 +8,7 @@
"headline": "How it works",
"text": [
"This pattern demonstrates creating an Amazon S3 Malware Protection plan and integrating the findings with Amazon EventBridge and Amazon SNS to notify users of the scan results.",
"The SAM template creates an IAM role that includes permissions required for GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. The template also creates an EventBridge managed rule, which is used to route S3 `put-object` and S3 bucket-level event notifications to GuardDuty's S3 Malware Protection Service.",
"The AWS SAM template creates an IAM role that includes permissions required for GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. The template also creates an EventBridge managed rule, which is used to route S3 `put-object` and S3 bucket-level event notifications to GuardDuty's S3 Malware Protection Service.",
"Another EventBridge rule monitors the S3 object scan results and sends notifications to an SNS topic where users can subscribe via email.",
"This pattern deploys one S3 Bucket, one SNS topic, one SNS subscription, one IAM role, one EventBridge rule, and one Malware protection plan."
]
Expand Down
2 changes: 1 addition & 1 deletion s3-lambda-bedrock-js-sam/example-pattern.json
Original file line number Diff line number Diff line change
@@ -1,6 +1,6 @@
{
"title": "Amazon S3 to AWS Lambda to Amazon Bedrock using AWS SAM",
"description": "This pattern facilitates generating vector embeddings for text data uploaded to S3.",
"description": "This pattern uses AWS Lambda to generate vector embeddings from text data uploaded to S3 using Amazon Bedrock.",
"language": "Node.js",
"level": "200",
"framework": "SAM",
Expand Down
Loading

0 comments on commit 773a79e

Please sign in to comment.