Support and Feedback for Amazon Web Services Secrets Manager
We welcome your feedback. Send your comments to awssecretsmanager-feedback@amazon.com, or post your feedback and questions in the Amazon Web Services Secrets Manager Discussion Forum. For more information about the Amazon Web Services Discussion Forums, see Forums Help.
Logging API Requests
Amazon Web Services Secrets Manager supports Amazon Web Services CloudTrail, a service that records Amazon Web Services API calls for your Amazon Web Services account and delivers log files to an Amazon S3 bucket. By using information that's collected by Amazon Web Services CloudTrail, you can determine the requests successfully made to Secrets Manager, who made the request, when it was made, and so on. For more about Amazon Web Services Secrets Manager and support for Amazon Web Services CloudTrail, see Logging Amazon Web Services Secrets Manager Events with Amazon Web Services CloudTrail
in the Amazon Web Services Secrets Manager User Guide. To learn more about CloudTrail, including enabling it and find your log files, see the Amazon Web Services CloudTrail User Guide.
credentials: Optional credentials shorthand for the config parameter
creds :
access_key_id : AWS access key ID
secret_access_key : AWS secret access key
session_token : AWS temporary session token
profile : The name of a profile to use. If not given, then the default profile is used.
anonymous : Set anonymous credentials.
endpoint: Optional shorthand for complete URL to use for the constructed client.
region: Optional shorthand for AWS Region used in instantiating the client.
Returns
A client for the service. You can call the service's operations using syntax like svc$operation(...), where svc is the name you've assigned to the client. The available operations are listed in the Operations section.
Retrieves the contents of the encrypted fields SecretString or SecretBinary for up to 20 secrets
cancel_rotate_secret
Turns off automatic rotation, and if a rotation is currently in progress, cancels the rotation
create_secret
Creates a new secret
delete_resource_policy
Deletes the resource-based permission policy attached to the secret
delete_secret
Deletes a secret and all of its versions
describe_secret
Retrieves the details of a secret
get_random_password
Generates a random password
get_resource_policy
Retrieves the JSON text of the resource-based policy document attached to the secret
get_secret_value
Retrieves the contents of the encrypted fields SecretString or SecretBinary from the specified version of a secret, whichever contains content
list_secrets
Lists the secrets that are stored by Secrets Manager in the Amazon Web Services account, not including secrets that are marked for deletion
list_secret_version_ids
Lists the versions of a secret
put_resource_policy
Attaches a resource-based permission policy to a secret
put_secret_value
Creates a new version with a new encrypted secret value and attaches it to the secret
remove_regions_from_replication
For a secret that is replicated to other Regions, deletes the secret replicas from the Regions you specify
replicate_secret_to_regions
Replicates the secret to a new Regions
restore_secret
Cancels the scheduled deletion of a secret by removing the DeletedDate time stamp
rotate_secret
Configures and starts the asynchronous process of rotating the secret
stop_replication_to_replica
Removes the link between the replica secret and the primary secret and promotes the replica to a primary secret in the replica Region
tag_resource
Attaches tags to a secret
untag_resource
Removes specific tags from a secret
update_secret
Modifies the details of a secret, including metadata and the secret value
update_secret_version_stage
Modifies the staging labels attached to a version of a secret
validate_resource_policy
Validates that a resource policy does not grant a wide range of principals access to your secret
Examples
## Not run:svc <- secretsmanager()# The following example shows how to cancel rotation for a secret. The# operation sets the RotationEnabled field to false and cancels all# scheduled rotations. To resume scheduled rotations, you must re-enable# rotation by calling the rotate-secret operation.svc$cancel_rotate_secret( SecretId ="MyTestDatabaseSecret")## End(Not run)