Event bridge not invoking

0

Testing for directory service whenever resource is created or deleted it will invoke my lambda. my eventbridge rule is: { "source": ["aws.lambda", "aws.events", "aws.cloudfront", "aws.s3", "aws.ec2", "aws.sns", "aws.sqs", "aws.secretsmanager", "aws.cloudformation", "aws.codepipeline", "aws.apigateway", "aws.cloudtrail", "aws.cognito-idp", "aws.config", "aws.directoryservice", "aws.cloudtrail", "aws.elasticloadbalancing", "aws.pinpoint", "aws.vpc", "aws.waf", "aws.workspaces", "aws.ses", "aws.ssm", "aws.states", "aws.globalaccelerator", "aws.amplify", "aws.kinesis", "aws.kms", "aws.dynamodb", "aws.athena", "aws.acm"], "detail-type": ["AWS API Call via CloudTrail"], "detail": { "eventName": ["CreateFunction20150331", "DeleteFunction20150331", "CreateBucket", "PutRule", "DeleteRule", "AllocateAddress", "ReleaseAddress", "CreateDistribution", "DeleteDistribution", "ImportApi", "DeleteBucket", "CreateApi", "DeleteApi", "CreateRestApi", "DeleteRestApi", "RunInstances", "TerminateInstances", "CreateSecret", "DeleteSecret", "CreateSecurityGroup", "DeleteSecurityGroup", "CreateTopic", "DeleteTopic", "CreateQueue", "DeleteQueue", "CreateSubnet", "DeleteSubnet", "CreateStack", "DeleteStack", "CreatePipeline", "DeletePipeline", "StartLogging", "CreateTrail", "DeleteTrail", "DeleteUserPool", "CreateUserPool", "PutConfigRule", "DeleteConfigRule",** "CreateDirectory", "CreateMicrosoftAD", "DeleteDirectory",** "CreateLoadBalancer", "DeleteLoadBalancer", "CreateTargetGroup", "DeleteTargetGroup", "CreateVolume", "DeleteVolume", "CreateVpc", "DeleteVpc", "CreateApp", "DeleteApp", "CreateWebACL", "DeleteWebACL", "CreateWorkspace", "DeleteWorkspace", "CreateEmailIdentity", "DeleteEmailIdentity", "CreateSnapshot", "DeleteSnapshot", "CreateStateMachine", "DeleteStateMachine", "CreateAccelerator", "DeleteAccelerator", "CreateApp", "DeleteApp", "CreateDeliveryStream", "DeleteDeliveryStream", "CreateKey", "DeleteKey", "CreateTable", "DeleteTable", "CreateNamedQuery", "DeleteNamedQuery", "RequestCertificate", "DeleteCertificate"] } }

1 Answer
1
Accepted Answer

Hello.

Try adding "aws.ds" to the "source" list.
You need to add an AWS Directory Service event source.
https://docs.aws.amazon.com/service-authorization/latest/reference/list_awsdirectoryservice.html

AWS Directory Service (service prefix: ds) provides the following service-specific resources, actions, and condition context keys for use in IAM permission policies.

profile picture
EXPERT
answered 6 days ago
profile picture
EXPERT
reviewed 6 days ago
profile picture
EXPERT
A_J
reviewed 6 days ago