Questions tagged with AWS Command Line Interface
Content language: English
Sort by most recent

After I installed the Aws CLI it does not work and jump out
Got access to Healthlake imaging preview after making a request to AWS (In the preview stage, the service is not available in console, so I am working on CLI.)
--> Able to create, list and delete Healthlake-imaging datastores.
--> But when trying to start an import job, the keyword 'health-imaging' is not recognized in CLI and cloudshell. PS: Healthlake imaging is a service available only in Preview stage in US-East-1 and I have done all configurations from the same region.
It would be helpful if anyone could provide any input on it. Thanks in advance.
Hi everyone, I am trying to write a bash script and using the AWS CLI in a Linux environment to automate the creation of some AWS infrastructure. I am trying to use the aws rds create-db-instance command to create my RDS instance but I am running into an error: *Unknown options: groups, Subnet*
I have done some research and know that the groups and Subnet options are from AWS CLI v1 and is depreciated but I am using the latest version of AWS CLI and do not use those options in my command.
Interestingly enough if I run this command outside my bash script in my Linux terminal it does not have this issue and the RDS instance is created.
Any suggestions or ideas would be greatly appreciated thank you.
aws --version
aws-cli/2.10.1 Python/3.9.11 Linux/5.10.16.3-microsoft-standard-WSL2 exe/x86_64.ubuntu.22 prompt/off
aws rds create-db-instance \
--debug \
--db-name $rds_db_name \
--db-instance-identifier $rds_identifier \
--allocated-storage $rds_allocated_storage \
--db-instance-class $rds_instance_class \
--engine $rds_engine \
--master-username $rds_master_username \
--master-user-password $rds_master_user_password \
--vpc-security-group-ids $security_group_id_db \
--db-subnet-group-name $subnet_group_name
Debug logs
2023-02-19 09:58:27,509 - MainThread - botocore.hooks - DEBUG - Event building-command-table.main: calling handler <function change_name at 0x7f2265ee7040>
2023-02-19 09:58:27,509 - MainThread - botocore.hooks - DEBUG - Event building-command-table.main: calling handler <function alias_opsworks_cm at 0x7f2265a4e160>
2023-02-19 09:58:27,509 - MainThread - botocore.hooks - DEBUG - Event building-command-table.main: calling handler <function add_history_commands at 0x7f2265bd7e50>
2023-02-19 09:58:27,509 - MainThread - botocore.hooks - DEBUG - Event building-command-table.main: calling handler <bound method BasicCommand.add_command of <class 'awscli.customizations.devcommands.CLIDevCommand'>>
2023-02-19 09:58:27,509 - MainThread - botocore.hooks - DEBUG - Event building-command-table.main: calling handler <function add_waiters at 0x7f2265a473a0>
2023-02-19 09:58:27,510 - MainThread - botocore.hooks - DEBUG - Event building-command-table.main: calling handler <bound method AliasSubCommandInjector.on_building_command_table of <awscli.alias.AliasSubCommandInjector object at 0x7f22657a0190>>
2023-02-19 09:58:27,510 - MainThread - botocore.loaders - DEBUG - Loading JSON file: /usr/local/aws-cli/v2/2.10.1/dist/awscli/data/cli.json
2023-02-19 09:58:27,513 - MainThread - botocore.hooks - DEBUG - Event top-level-args-parsed: calling handler <function resolve_types at 0x7f2265b0d0d0>
2023-02-19 09:58:27,513 - MainThread - botocore.hooks - DEBUG - Event top-level-args-parsed: calling handler <function no_sign_request at 0x7f2265b0dc10>
2023-02-19 09:58:27,513 - MainThread - botocore.hooks - DEBUG - Event top-level-args-parsed: calling handler <function resolve_verify_ssl at 0x7f2265b0db80>
2023-02-19 09:58:27,513 - MainThread - botocore.hooks - DEBUG - Event top-level-args-parsed: calling handler <function resolve_cli_read_timeout at 0x7f2265b0dd30>
2023-02-19 09:58:27,513 - MainThread - botocore.hooks - DEBUG - Event top-level-args-parsed: calling handler <function resolve_cli_connect_timeout at 0x7f2265b0dca0>
2023-02-19 09:58:27,513 - MainThread - botocore.hooks - DEBUG - Event top-level-args-parsed: calling handler <built-in method update of dict object at 0x7f22657a9b80>
2023-02-19 09:58:27,514 - MainThread - awscli.clidriver - DEBUG - CLI version: aws-cli/2.10.1 Python/3.9.11 Linux/5.10.16.3-microsoft-standard-WSL2 exe/x86_64.ubuntu.22 prompt/off
2023-02-19 09:58:27,514 - MainThread - awscli.clidriver - DEBUG - Arguments entered to CLI: ['rds', 'create-db-instance', '--debug', '--db-name', 'bookstack_db', '--db-instance-identifier', 'Assignment2-rds', '--allocated-storage', '5', '--db-instance-class', 'db.m6i.large', '--engine', 'mysql', '--master-username', 'root', '--master-user-password', 'password', '--vpc-security-group-ids', 'sg-044926a269ca7870c', '--db-subnet-group-name', 'RDS', 'Subnet', 'group']
2023-02-19 09:58:27,514 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function add_timestamp_parser at 0x7f2265abadc0>
2023-02-19 09:58:27,514 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function register_uri_param_handler at 0x7f2266354dc0>
2023-02-19 09:58:27,514 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function add_binary_formatter at 0x7f22657e4670>
2023-02-19 09:58:27,514 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function no_pager_handler at 0x7f22663510d0>
2023-02-19 09:58:27,515 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function inject_assume_role_provider_cache at 0x7f2266337ca0>
2023-02-19 09:58:27,516 - MainThread - botocore.utils - DEBUG - IMDS ENDPOINT: http://169.254.169.254/
2023-02-19 09:58:27,518 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function attach_history_handler at 0x7f2265bd7d30>
2023-02-19 09:58:27,518 - MainThread - botocore.hooks - DEBUG - Event session-initialized: calling handler <function inject_json_file_cache at 0x7f2265e43ee0>
2023-02-19 09:58:27,531 - MainThread - botocore.loaders - DEBUG - Loading JSON file: /usr/local/aws-cli/v2/2.10.1/dist/awscli/botocore/data/rds/2014-10-31/service-2.json
2023-02-19 09:58:27,540 - MainThread - botocore.loaders - DEBUG - Loading JSON file: /usr/local/aws-cli/v2/2.10.1/dist/awscli/botocore/data/rds/2014-10-31/service-2.sdk-extras.json
2023-02-19 09:58:27,547 - MainThread - botocore.hooks - DEBUG - Event building-command-table.rds: calling handler <function _building_command_table at 0x7f2265b25e50>
2023-02-19 09:58:27,548 - MainThread - botocore.hooks - DEBUG - Event building-command-table.rds: calling handler <function _add_generate_db_auth_token at 0x7f2265b25ca0>
2023-02-19 09:58:27,548 - MainThread - botocore.hooks - DEBUG - Event building-command-table.rds: calling handler <function add_waiters at 0x7f2265a473a0>
2023-02-19 09:58:27,559 - MainThread - botocore.loaders - DEBUG - Loading JSON file: /usr/local/aws-cli/v2/2.10.1/dist/awscli/botocore/data/rds/2014-10-31/waiters-2.json
2023-02-19 09:58:27,561 - MainThread - botocore.hooks - DEBUG - Event building-command-table.rds: calling handler <bound method AliasSubCommandInjector.on_building_command_table of <awscli.alias.AliasSubCommandInjector object at 0x7f22657a0190>>
2023-02-19 09:58:27,564 - MainThread - awscli.clidriver - DEBUG - OrderedDict([('db-name', <awscli.arguments.CLIArgument object at 0x7f2264fa9550>), ('db-instance-identifier', <awscli.arguments.CLIArgument object at 0x7f2264fa9580>), ('allocated-storage', <awscli.arguments.CLIArgument object at 0x7f2264f43070>), ('db-instance-class', <awscli.arguments.CLIArgument object at 0x7f2264f430a0>), ('engine', <awscli.arguments.CLIArgument object at 0x7f2264f430d0>), ('master-username', <awscli.arguments.CLIArgument object at 0x7f2264f43100>), ('master-user-password', <awscli.arguments.CLIArgument object at 0x7f2264f43130>), ('db-security-groups', <awscli.arguments.ListArgument object at 0x7f2264f43160>), ('vpc-security-group-ids', <awscli.arguments.ListArgument object at 0x7f2264f43190>), ('availability-zone', <awscli.arguments.CLIArgument object at 0x7f2264f431c0>), ('db-subnet-group-name', <awscli.arguments.CLIArgument object at 0x7f2264f431f0>), ('preferred-maintenance-window', <awscli.arguments.CLIArgument object at 0x7f2264f43220>), ('db-parameter-group-name', <awscli.arguments.CLIArgument object at 0x7f2264f43250>), ('backup-retention-period', <awscli.arguments.CLIArgument object at 0x7f2264f43280>), ('preferred-backup-window', <awscli.arguments.CLIArgument object at 0x7f2264f432b0>), ('port', <awscli.arguments.CLIArgument object at 0x7f2264f432e0>), ('multi-az', <awscli.arguments.BooleanArgument object at 0x7f2264f43310>), ('no-multi-az', <awscli.arguments.BooleanArgument object at 0x7f2264f43340>), ('engine-version', <awscli.arguments.CLIArgument object at 0x7f2264f43370>), ('auto-minor-version-upgrade', <awscli.arguments.BooleanArgument object at 0x7f2264f433a0>), ('no-auto-minor-version-upgrade', <awscli.arguments.BooleanArgument object at 0x7f2264f433d0>), ('license-model', <awscli.arguments.CLIArgument object at 0x7f2264f43400>), ('iops', <awscli.arguments.CLIArgument object at 0x7f2264f43430>), ('option-group-name', <awscli.arguments.CLIArgument object at 0x7f2264f43460>), ('character-set-name', <awscli.arguments.CLIArgument object at 0x7f2264f43490>), ('nchar-character-set-name', <awscli.arguments.CLIArgument object at 0x7f2264f434c0>), ('publicly-accessible', <awscli.arguments.BooleanArgument object at 0x7f2264f434f0>), ('no-publicly-accessible', <awscli.arguments.BooleanArgument object at 0x7f2264f43520>), ('tags', <awscli.arguments.ListArgument object at 0x7f2264f43550>), ('db-cluster-identifier', <awscli.arguments.CLIArgument object at 0x7f2264f43580>), ('storage-type', <awscli.arguments.CLIArgument object at 0x7f2264f435b0>), ('tde-credential-arn', <awscli.arguments.CLIArgument object at 0x7f2264f435e0>), ('tde-credential-password', <awscli.arguments.CLIArgument object at 0x7f2264f43610>), ('storage-encrypted', <awscli.arguments.BooleanArgument object at 0x7f2264f43640>), ('no-storage-encrypted', <awscli.arguments.BooleanArgument object at 0x7f2264f43670>), ('kms-key-id', <awscli.arguments.CLIArgument object at 0x7f2264f436a0>), ('domain', <awscli.arguments.CLIArgument object at 0x7f2264f436d0>), ('copy-tags-to-snapshot', <awscli.arguments.BooleanArgument object at 0x7f2264f43700>), ('no-copy-tags-to-snapshot', <awscli.arguments.BooleanArgument object at 0x7f2264f43730>), ('monitoring-interval', <awscli.arguments.CLIArgument object at 0x7f2264f43760>), ('monitoring-role-arn', <awscli.arguments.CLIArgument object at 0x7f2264f43790>), ('domain-iam-role-name', <awscli.arguments.CLIArgument object at 0x7f2264f437c0>), ('promotion-tier', <awscli.arguments.CLIArgument object at 0x7f2264f437f0>), ('timezone', <awscli.arguments.CLIArgument object at 0x7f2264f43820>), ('enable-iam-database-authentication', <awscli.arguments.BooleanArgument object at 0x7f2264f43850>), ('no-enable-iam-database-authentication', <awscli.arguments.BooleanArgument object at 0x7f2264f43880>), ('enable-performance-insights', <awscli.arguments.BooleanArgument object at 0x7f2264f438b0>), ('no-enable-performance-insights', <awscli.arguments.BooleanArgument object at 0x7f2264f438e0>), ('performance-insights-kms-key-id', <awscli.arguments.CLIArgument object at 0x7f2264f43910>), ('performance-insights-retention-period', <awscli.arguments.CLIArgument object at 0x7f2264f43940>), ('enable-cloudwatch-logs-exports', <awscli.arguments.ListArgument object at 0x7f2264f43970>), ('processor-features', <awscli.arguments.ListArgument object at 0x7f2264f439a0>), ('deletion-protection', <awscli.arguments.BooleanArgument object at 0x7f2264f439d0>), ('no-deletion-protection', <awscli.arguments.BooleanArgument object at 0x7f2264f43a00>), ('max-allocated-storage', <awscli.arguments.CLIArgument object at 0x7f2264f43a30>), ('enable-customer-owned-ip', <awscli.arguments.BooleanArgument object at 0x7f2264f43a60>), ('no-enable-customer-owned-ip', <awscli.arguments.BooleanArgument object at 0x7f2264f43a90>), ('custom-iam-instance-profile', <awscli.arguments.CLIArgument object at 0x7f2264f43ac0>), ('backup-target', <awscli.arguments.CLIArgument object at 0x7f2264f43af0>), ('network-type', <awscli.arguments.CLIArgument object at 0x7f2264f43b20>), ('storage-throughput', <awscli.arguments.CLIArgument object at 0x7f2264f43b50>), ('manage-master-user-password', <awscli.arguments.BooleanArgument object at 0x7f2264f43b80>), ('no-manage-master-user-password', <awscli.arguments.BooleanArgument object at 0x7f2264f43bb0>), ('master-user-secret-kms-key-id', <awscli.arguments.CLIArgument object at 0x7f2264f43be0>), ('ca-certificate-identifier', <awscli.arguments.CLIArgument object at 0x7f2264f43c10>)])
2023-02-19 09:58:27,565 - MainThread - botocore.hooks - DEBUG - Event building-argument-table.rds.create-db-instance: calling handler <function add_streaming_output_arg at 0x7f2265abf0d0>
2023-02-19 09:58:27,565 - MainThread - botocore.hooks - DEBUG - Event building-argument-table.rds.create-db-instance: calling handler <function add_cli_input_json at 0x7f226633d4c0>
2023-02-19 09:58:27,565 - MainThread - botocore.hooks - DEBUG - Event building-argument-table.rds.create-db-instance: calling handler <function add_cli_input_yaml at 0x7f226633d700>
2023-02-19 09:58:27,565 - MainThread - botocore.hooks - DEBUG - Event building-argument-table.rds.create-db-instance: calling handler <function unify_paging_params at 0x7f2265e50820>
2023-02-19 09:58:27,577 - MainThread - botocore.loaders - DEBUG - Loading JSON file: /usr/local/aws-cli/v2/2.10.1/dist/awscli/botocore/data/rds/2014-10-31/paginators-1.json
2023-02-19 09:58:27,578 - MainThread - botocore.hooks - DEBUG - Event building-argument-table.rds.create-db-instance: calling handler <function add_generate_skeleton at 0x7f2265b01670>
2023-02-19 09:58:27,579 - MainThread - botocore.hooks - DEBUG - Event before-building-argument-table-parser.rds.create-db-instance: calling handler <bound method OverrideRequiredArgsArgument.override_required_args of <awscli.customizations.cliinput.CliInputJSONArgument object at 0x7f2264f43d00>>
2023-02-19 09:58:27,579 - MainThread - botocore.hooks - DEBUG - Event before-building-argument-table-parser.rds.create-db-instance: calling handler <bound method OverrideRequiredArgsArgument.override_required_args of <awscli.customizations.cliinput.CliInputYAMLArgument object at 0x7f2264f43d30>>
2023-02-19 09:58:27,579 - MainThread - botocore.hooks - DEBUG - Event before-building-argument-table-parser.rds.create-db-instance: calling handler <bound method GenerateCliSkeletonArgument.override_required_args of <awscli.customizations.generatecliskeleton.GenerateCliSkeletonArgument object at 0x7f2264f43dc0>>
2023-02-19 09:58:27,579 - MainThread - botocore.hooks - DEBUG - Event building-command-table.rds_create-db-instance: calling handler <function add_waiters at 0x7f2265a473a0>
2023-02-19 09:58:27,579 - MainThread - botocore.hooks - DEBUG - Event building-command-table.rds_create-db-instance: calling handler <bound method AliasSubCommandInjector.on_building_command_table of <awscli.alias.AliasSubCommandInjector object at 0x7f22657a0190>>
2023-02-19 09:58:27,582 - MainThread - awscli.clidriver - DEBUG - Exception caught in main()
Traceback (most recent call last):
File "awscli/clidriver.py", line 460, in main
File "awscli/clidriver.py", line 595, in __call__
File "awscli/clidriver.py", line 764, in __call__
awscli.arguments.UnknownArgumentError: Unknown options: group, Subnet
I've been sitting here waiting to SSH into my new instance for ten minutes and this thing is STILL installing. Why is it so painfully slow? This is insane.
Created in launch template with script:
```
curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
unzip awscliv2.zip
sudo ./aws/install
```
I am trying to copy a file from an existing bucket, to another bucket. I tried the copy and sync command , but it fails . I am assuming, that the bucket owner doesn't have full access to this file/object. where/how can i find the access/permission info for this object via cli. also , when we copy files from one bucket to another , say via aws s3 cp or sync command , how do i give full access to the owner of the destination bucket?
We used a simulator to check whether a policy has the permission to perform specific actions on specific ELB resources. The simulator returned `implicitDeny` instead of `allowed`. This result is erroneous, because the actions and the resources in the policy document were the same as the parameters of the simulator. To test this, we attached the policy to a role and used this role to perform the actions on the resources in a live AWS environment, and we were successful.
We will now attempt to reproduce this error as minimally as possible.
Both the AWS SDK for Python (a.k.a. `boto3`)
```python
import boto3
policy_input_list = [
"""{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"elasticloadbalancing:AddTags"
],
"Resource": [
"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*"
]
}
]
}"""
]
action_names = ["elasticloadbalancing:AddTags"]
resource_arns = ["arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*"]
boto3.client("iam").simulate_custom_policy(
PolicyInputList=policy_input_list,
ActionNames=action_names,
ResourceArns=resource_arns,
)
```
and the AWS CLI
```bash
policy_input_list='{"Version":"2012-10-17","Statement":[{"Effect":"Allow","Action":["elasticloadbalancing:AddTags"],"Resource":["arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*"]}]}'
action_names='elasticloadbalancing:AddTags'
resource_arns='arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*'
aws iam simulate-custom-policy \
--policy-input-list $policy_input_list \
--action-names $action_names \
--resource-arns $resource_arns
```
*erroneously* evaluate this to `implicitDeny`.
Interestingly, the IAM Policy Simulator
[IAM Policy Simulator](/media/postImages/original/IMdG9fTE2ASeqa9lEG610T3A)
*correctly* evaluates this to `allowed`.
The problematic statement
```json
{
"Effect": "Allow",
"Action": [
"elasticloadbalancing:AddTags",
"elasticloadbalancing:RemoveTags"
],
"Resource": [
"arn:aws:elasticloadbalancing:*:*:listener/net/*/*/*",
"arn:aws:elasticloadbalancing:*:*:listener/app/*/*/*",
"arn:aws:elasticloadbalancing:*:*:listener-rule/net/*/*/*",
"arn:aws:elasticloadbalancing:*:*:listener-rule/app/*/*/*"
]
}
```
originates from the policy document of the AWS Load Balancer Controller (https://raw.githubusercontent.com/kubernetes-sigs/aws-load-balancer-controller/main/docs/install/iam_policy.json). Any combination of these actions and resources (and only them) will be evaluated correctly by the IAM Policy Simulator, but incorrectly by `boto3` and the AWS CLI.
Note that we are using the latest versions of `boto3` (`v1.27.72`) and the AWS CLI (`v1.27.72`).
Is there a way to check with the AWS SDK or CLI whether instances are created at a specific time for users inside the SageMaker Studio domain?
I use AWS as an off-site emergancy-in-case-the-house-burns-down back-up. I deliberately don't want it to automatically sync to the cloud (since if I frack something up, I like to have something from an older back-up just in case).
I perform this back up peroidically (a few times a year) back-up via synchronisation my data to AWS via the Powershell interface. However, as I have a lot of files and I move them around sometimes, It can get quite tedious to manually search through and change all the changed/new/updated files from Standard to Glacier Flexible Retrieval. This is especially time-consuming when dealing with the folders which cannot be sorted.
I have avoided generally doing whole folders, since I am under the impression that that does count towards the file usage and I don't want to be wasting money (I am on an extremely tight budget) changing something that's glacier to glacier.
I am currently using the command line (which was provided to me by someone, as my understanding of the command lines is negligable) as follows (for example):
aws s3 sync Documents s3://[bucket]/Documents
How (or even can I) change this command line so that it syncs directly the flexible glacier, and thus eliminate this part of the back-up? I presume, if possible, it would mean changing the "s3" parts, but I wouldn't know exactly what to.
(Or am I whittling about nothing and could, in fact, do it by folders?)
Any help would be greatly appreciated.
I'm working on a CLI tool that will open AWS console URLs without needing authentication. User credentials are already available via ~/.aws/credentials.
I've mainly been following the steps in this article:
https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_providers_enable-console-custom-url.html
The guide works for generating URLs that contain credentials that automatically log you in (either as a role or as a federate identity). Unfortunately, subsequent invocations of the tool log you out of earlier sessions. All existing tabs in browser popup a message asking user to refresh page.
Is there a way to prevent the "/federaton?Action=login" endpoint from invalidating earlier sessions to AWS console? Or a way to instruct this endpoint to re-use an existing session, rather than create a new one?
I have a use case where I am trying to use CLI to see the policies attached to each role that list write based policies.
However, the only data I hae is the service of the role. Opposed to the actuall role itself.
I'm wondering if there's a process to do this and receive this information for services such as Lambdas, EC2, and ECS instances?
I had to update my CLI on a few devices, and I am now unable to access anything pertaining to gamelift's API via an explicit denial. I double checked the permission policy that I assigned to the IAM user, and while it is set to allow full access to resources, it will not work.
Any suggestions or recommendations? I have also tried re-creating the policy via JSON and the visual GUI. I even tried creating a new user to use, and nothing works. I even ended up uninstalling the CLI tool and deleting the configuration and credential files multiple times trying to see if that would fix the issue.
Policy below:
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "gamelift:*",
"Resource": "*"
}
}
I'm using aws s3api put-bucket-lifecycle --bucket bkp --lifecycle-configuration file://move-to-glacier.json --debug, for create lifecycle rule in many buckets, this is my move-to-glacier.json:
```
{
"Rules": [
{
"ID": "MoveToGlacier",
"Prefix": "",
"Status": "Enabled",
"Transition": [
{
"Days": 365,
"StorageClass": "GLACIER"
},
{
"Days": 1825,
"StorageClass": "DEEP_ARCHIVE"
}
]
}
]
}
```
First 365 day move to GLACIER, Second 1825 move to DEEP_ARCHIVE, all bucket, but return error:
```
File "botocore/client.py", line 617, in _convert_to_request_dict
File "botocore/validate.py", line 319, in serialize_to_request
botocore.exceptions.ParamValidationError: Parameter validation failed:
Invalid type for parameter LifecycleConfiguration.Rules[0].Transition, value: [OrderedDict([('Days', 365), ('StorageClass', 'GLACIER')]), OrderedDict([('Days', 1825), ('StorageClass', 'DEEP_ARCHIVE')])], type: <class 'list'>, valid types: <class 'dict'>
```
If i using my move-to-glacier.json with one transition it run ok, example:
```
{
"Rules": [
{
"ID": "MoveToGlacier",
"Prefix": "",
"Status": "Enabled",
"Transition":
{
"Days": 365,
"StorageClass": "GLACIER"
}
}
]
}
```
With this move-to-glacier the command s3api put-bucket-lifecycle run ok.