Skip to content

Commit 773a79e

Browse files
committed
Paterns edits
1 parent 640648f commit 773a79e

File tree

10 files changed

+8
-457
lines changed

10 files changed

+8
-457
lines changed

eventbridge-pipes-dynamodbstream-to-sqs-terraform/eventbridge-pipes-ddb-streams-sqs-terraform.json

-87
This file was deleted.

eventbridge-pipes-sqs-to-cwlog/eventbridge-pipes-sqs-cwlog.json

-93
This file was deleted.

eventbridge-pipes-sqs-to-cwlog/example-pattern.json

+2-2
Original file line numberDiff line numberDiff line change
@@ -1,13 +1,13 @@
11
{
2-
"title": "Amazon SQS to CloudWatch Log group via Amazon EventBridge",
2+
"title": "Amazon SQS to Amazon CloudWatch Log group via Amazon EventBridge Pipes",
33
"description": "Amazon SQS to CloudWatch Log group via Amazon EventBridge Pipes filter and transformation",
44
"language": "",
55
"level": "200",
66
"framework": "SAM",
77
"introBox": {
88
"headline": "How it works",
99
"text": [
10-
"This sample project demonstrates how to use Amazon EventBridge Pipes to connect an Amazon SQS queue with an AWS CloudWatch Log group. The pipe will apply a filter and transformation before sending the message to AWS CloudWatch Log group.",
10+
"This sample project shows how to use Amazon EventBridge Pipes to connect an Amazon SQS queue with an AWS CloudWatch Log group. The pipe will apply a filter and transformation before sending the message to AWS CloudWatch Log group.",
1111
"This pattern deploys one SQS queue, EventBridge Pipe, and CloudWatch Log group"
1212
]
1313
},

eventbridge-pipes-sqs-to-stepfunctions-terraform/eventbridge-pipes-sqs-sfn-tf.json

-84
This file was deleted.

eventbridge-pipes-sqs-to-stepfunctions-terraform/example-pattern.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,5 +1,5 @@
11
{
2-
"title": "SQS to Step Functions with EventBridge Pipes",
2+
"title": "Invoke AWS Step Functions state machine from Amazon SQS messages using Amazon EventBridge Pipes",
33
"description": "This pattern shows how to use EventBridge Pipes to launch a Step Functions state machine with a message coming from SQS Queue.",
44
"language": "",
55
"level": "200",

guardduty-malware-s3/example-pattern.json

+3-3
Original file line numberDiff line numberDiff line change
@@ -1,14 +1,14 @@
11
{
2-
"title": "AWS S3 to AWS GuardDuty to EventBridge to SNS",
3-
"description": "Configure Malware Protection for S3 bucket using Amazon GuardDuty",
2+
"title": "Amazon GuardDuty Malware Protection for Amazon S3",
3+
"description": "Configure Malware Protection for Amazon S3 bucket using Amazon GuardDuty",
44
"language": "yaml",
55
"level": "200",
66
"framework": "SAM",
77
"introBox": {
88
"headline": "How it works",
99
"text": [
1010
"This pattern protects an S3 bucket with malware protection by using GuardDuty to detect malicious file uploads.",
11-
"The SAM template creates an IAM role that allows GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. Another EventBridge rule, created by the template, monitors the S3 object scan results and sends notifications to the user’s email address, which is subscribed to an Amazon SNS topic.",
11+
"The AWS SAM template creates an IAM role that allows GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. Another EventBridge rule, created by the template, monitors the S3 object scan results and sends notifications to the user’s email address, which is subscribed to an Amazon SNS topic.",
1212
"This pattern deploys one S3 Bucket, one SNS topic, one SNS subscription, one IAM role, one EventBridge rule and one Malware protection plan resources "
1313
]
1414
},

guardduty-malware-s3/guardduty-malware-s3.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -8,7 +8,7 @@
88
"headline": "How it works",
99
"text": [
1010
"This pattern demonstrates creating an Amazon S3 Malware Protection plan and integrating the findings with Amazon EventBridge and Amazon SNS to notify users of the scan results.",
11-
"The SAM template creates an IAM role that includes permissions required for GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. The template also creates an EventBridge managed rule, which is used to route S3 `put-object` and S3 bucket-level event notifications to GuardDuty's S3 Malware Protection Service.",
11+
"The AWS SAM template creates an IAM role that includes permissions required for GuardDuty to receive S3 put object and bucket-level event notifications through an EventBridge managed rule. The template also creates an EventBridge managed rule, which is used to route S3 `put-object` and S3 bucket-level event notifications to GuardDuty's S3 Malware Protection Service.",
1212
"Another EventBridge rule monitors the S3 object scan results and sends notifications to an SNS topic where users can subscribe via email.",
1313
"This pattern deploys one S3 Bucket, one SNS topic, one SNS subscription, one IAM role, one EventBridge rule, and one Malware protection plan."
1414
]

s3-lambda-bedrock-js-sam/example-pattern.json

+1-1
Original file line numberDiff line numberDiff line change
@@ -1,6 +1,6 @@
11
{
22
"title": "Amazon S3 to AWS Lambda to Amazon Bedrock using AWS SAM",
3-
"description": "This pattern facilitates generating vector embeddings for text data uploaded to S3.",
3+
"description": "This pattern uses AWS Lambda to generate vector embeddings from text data uploaded to S3 using Amazon Bedrock.",
44
"language": "Node.js",
55
"level": "200",
66
"framework": "SAM",

0 commit comments

Comments
 (0)