diff --git a/roles/wazuh/ansible-wazuh-agent/defaults/main.yml b/roles/wazuh/ansible-wazuh-agent/defaults/main.yml
index 88c560fa..9db5406d 100644
--- a/roles/wazuh/ansible-wazuh-agent/defaults/main.yml
+++ b/roles/wazuh/ansible-wazuh-agent/defaults/main.yml
@@ -30,7 +30,8 @@ wazuh_managers:
api_port: 55000
api_proto: 'http'
api_user: null
-wazuh_profile: null
+wazuh_profile_centos: 'centos, centos7, centos7.6'
+wazuh_profile_ubuntu: 'ubuntu, ubuntu18, ubuntu18.04'
wazuh_auto_restart: 'yes'
wazuh_agent_authd:
enable: false
@@ -102,7 +103,7 @@ wazuh_agent_config:
directories:
- dirs: /etc,/usr/bin,/usr/sbin
checks: 'check_all="yes"'
- - dirs: /bin,/sbin
+ - dirs: /bin,/sbin,/boot
checks: 'check_all="yes"'
win_directories:
- dirs: '%WINDIR%\regedit.exe'
diff --git a/roles/wazuh/ansible-wazuh-agent/templates/var-ossec-etc-ossec-agent.conf.j2 b/roles/wazuh/ansible-wazuh-agent/templates/var-ossec-etc-ossec-agent.conf.j2
index 6629da08..424410b8 100644
--- a/roles/wazuh/ansible-wazuh-agent/templates/var-ossec-etc-ossec-agent.conf.j2
+++ b/roles/wazuh/ansible-wazuh-agent/templates/var-ossec-etc-ossec-agent.conf.j2
@@ -19,8 +19,12 @@
{% endif %}
{% endfor %}
- {% if wazuh_profile is not none %}
- {{ wazuh_profile }}
+ {% if wazuh_profile_centos is not none or wazuh_profile_ubuntu is not none %}
+ {% if ansible_distribution == 'CentOS' %}
+ {{ wazuh_profile_centos }}
+ {% elif ansible_distribution == "Ubuntu" %}
+ {{ wazuh_profile_ubuntu }}
+ {% endif %}
{% endif %}
{% if wazuh_notify_time is not none and wazuh_time_reconnect is not none %}
{{ wazuh_notify_time }}
@@ -37,16 +41,6 @@
{{ wazuh_agent_config.client_buffer.events_per_sec }}
-
- {{ wazuh_agent_config.log_format }}
-
-
-
- {{ wazuh_agent_config.active_response.ar_disabled|default('no') }}
- {% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.active_response.ca_store_win }}{% else %}{{ wazuh_agent_config.active_response.ca_store }}{% endif %}
- {{ wazuh_agent_config.active_response.ca_verification }}
-
-
{% if wazuh_agent_config.rootcheck is defined %}
no
@@ -75,95 +69,10 @@
{% endif %}
-
- {% if wazuh_agent_config.syscheck is defined %}
-
- no
-
-
- {{ wazuh_agent_config.syscheck.frequency }}
- {% if ansible_system == "Linux" %}
-
- /etc,/usr/bin,/usr/sbin
- /bin,/sbin,/boot
- {{ wazuh_agent_config.syscheck.auto_ignore }}
- {{ wazuh_agent_config.syscheck.scan_on_start }}
- {% endif %}
-
-
- {% if wazuh_agent_config.syscheck.directories is defined and ansible_system == "Linux" %}
- {% for directory in wazuh_agent_config.syscheck.directories %}
- {{ directory.dirs }}
- {% endfor %}
- {% endif %}
-
-
- {% if wazuh_agent_config.syscheck.win_directories is defined and ansible_system == "Windows" %}
- {% for directory in wazuh_agent_config.syscheck.win_directories %}
- {{ directory.dirs }}
- {% endfor %}
- {% endif %}
-
-
- {% if wazuh_agent_config.syscheck.ignore is defined and ansible_system == "Linux" %}
- {% for ignore in wazuh_agent_config.syscheck.ignore %}
- {{ ignore }}
- {% endfor %}
- {% endif %}
-
-
- {% if wazuh_agent_config.syscheck.ignore_linux_type is defined and ansible_distribution == 'CentOS' and ansible_distribution_major_version == '7' %}
- {% for ignore in wazuh_agent_config.syscheck.ignore_linux_type %}
- {{ ignore }}
- {% endfor %}
- {% endif %}
-
- {% if wazuh_agent_config.syscheck.ignore is defined and ansible_system == "Windows" %}
- {% for ignore in wazuh_agent_config.syscheck.ignore_win %}
- {{ ignore }}
- {% endfor %}
- {% endif %}
-
- {% if ansible_system == "Linux" %}
-
- {% for no_diff in wazuh_agent_config.syscheck.no_diff %}
- {{ no_diff }}
- {% endfor %}
-
- {{ wazuh_agent_config.syscheck.skip_nfs }}
- {% endif %}
-
- {% if ansible_os_family == "Windows" %}
- {% for registry_key in wazuh_agent_config.syscheck.windows_registry %}
- {% if registry_key.arch is defined %}
- {{ registry_key.key }}
- {% else %}
- {{ registry_key.key }}
- {% endif %}
- {% endfor %}
- {% endif %}
-
- {% if ansible_os_family == "Windows" %}
- {% for registry_key in wazuh_agent_config.syscheck.windows_registry_ignore %}
- {% if registry_key.type is defined %}
- {{ registry_key.key }}
- {% else %}
- {{ registry_key.key }}
- {% endif %}
- {% endfor %}
- {% endif %}
-
- {% if ansible_os_family == "Windows" %}
-
- {{ wazuh_agent_config.syscheck.win_audit_interval }}
- {% endif %}
-
- {% endif %}
-
- {% if ansible_system == "Linux" and wazuh_agent_config.openscap.disable == 'no' %}
+ {% if ansible_system == "Linux" %}
- no
+ {{ wazuh_agent_config.openscap.disable }}
{{ wazuh_agent_config.openscap.timeout }}
{{ wazuh_agent_config.openscap.interval }}
{{ wazuh_agent_config.openscap.scan_on_start }}
@@ -214,9 +123,8 @@
{% endif %}
- {% if wazuh_agent_config.cis_cat.disable == 'no' %}
- no
+ {{ wazuh_agent_config.cis_cat.disable }}
{{ wazuh_agent_config.cis_cat.timeout }}
{{ wazuh_agent_config.cis_cat.interval }}
{{ wazuh_agent_config.cis_cat.scan_on_start }}
@@ -229,7 +137,6 @@
{% endif %}
{% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.cis_cat.ciscat_path_win }}{% else %}{{ wazuh_agent_config.cis_cat.ciscat_path }}{% endif %}
- {% endif %}
@@ -280,6 +187,88 @@
{% endif %}
+
+
+ {% if wazuh_agent_config.syscheck is defined %}
+
+ no
+
+
+ {{ wazuh_agent_config.syscheck.frequency }}
+ {% if ansible_system == "Linux" %}
+ {{ wazuh_agent_config.syscheck.scan_on_start }}
+
+ {% if wazuh_agent_config.syscheck.directories is defined and ansible_system == "Linux" %}
+ {% for directory in wazuh_agent_config.syscheck.directories %}
+ {{ directory.dirs }}
+ {% endfor %}
+ {% endif %}
+ {% endif %}
+
+
+ {% if wazuh_agent_config.syscheck.win_directories is defined and ansible_system == "Windows" %}
+ {% for directory in wazuh_agent_config.syscheck.win_directories %}
+ {{ directory.dirs }}
+ {% endfor %}
+ {% endif %}
+
+
+ {% if wazuh_agent_config.syscheck.ignore is defined and ansible_system == "Linux" %}
+ {% for ignore in wazuh_agent_config.syscheck.ignore %}
+ {{ ignore }}
+ {% endfor %}
+ {% endif %}
+
+
+ {% if wazuh_agent_config.syscheck.ignore_linux_type is defined %}
+ {% for ignore in wazuh_agent_config.syscheck.ignore_linux_type %}
+ {{ ignore }}
+ {% endfor %}
+ {% endif %}
+
+ {% if wazuh_agent_config.syscheck.ignore is defined and ansible_system == "Windows" %}
+ {% for ignore in wazuh_agent_config.syscheck.ignore_win %}
+ {{ ignore }}
+ {% endfor %}
+ {% endif %}
+
+ {% if ansible_system == "Linux" %}
+
+ {% for no_diff in wazuh_agent_config.syscheck.no_diff %}
+ {{ no_diff }}
+ {% endfor %}
+
+ {{ wazuh_agent_config.syscheck.skip_nfs }}
+ {% endif %}
+
+ {% if ansible_os_family == "Windows" %}
+ {% for registry_key in wazuh_agent_config.syscheck.windows_registry %}
+ {% if registry_key.arch is defined %}
+ {{ registry_key.key }}
+ {% else %}
+ {{ registry_key.key }}
+ {% endif %}
+ {% endfor %}
+ {% endif %}
+
+ {% if ansible_os_family == "Windows" %}
+ {% for registry_key in wazuh_agent_config.syscheck.windows_registry_ignore %}
+ {% if registry_key.type is defined %}
+ {{ registry_key.key }}
+ {% else %}
+ {{ registry_key.key }}
+ {% endif %}
+ {% endfor %}
+ {% endif %}
+
+ {% if ansible_os_family == "Windows" %}
+
+ {{ wazuh_agent_config.syscheck.win_audit_interval }}
+ {% endif %}
+
+ {% endif %}
+
+
{% if ansible_system == "Linux" and wazuh_agent_config.vuls.disable == 'no' %}
no
@@ -369,4 +358,14 @@
{% endif %}
+
+ {{ wazuh_agent_config.active_response.ar_disabled|default('no') }}
+ {% if ansible_os_family == "Windows" %}{{ wazuh_agent_config.active_response.ca_store_win }}{% else %}{{ wazuh_agent_config.active_response.ca_store }}{% endif %}
+ {{ wazuh_agent_config.active_response.ca_verification }}
+
+
+
+ {{ wazuh_agent_config.log_format }}
+
+
diff --git a/roles/wazuh/ansible-wazuh-manager/defaults/main.yml b/roles/wazuh/ansible-wazuh-manager/defaults/main.yml
index 21faa35c..638fa90b 100644
--- a/roles/wazuh/ansible-wazuh-manager/defaults/main.yml
+++ b/roles/wazuh/ansible-wazuh-manager/defaults/main.yml
@@ -95,7 +95,7 @@ wazuh_manager_config:
use_source_ip: 'yes'
force_insert: 'yes'
force_time: 0
- purge: 'no'
+ purge: 'yes'
use_password: 'no'
limit_maxagents: 'yes'
ciphers: 'HIGH:!ADH:!EXP:!MD5:!RC4:!3DES:!CAMELLIA:@STRENGTH'
@@ -126,7 +126,7 @@ wazuh_manager_config:
- enable: false
category: 'syscheck'
title: 'Daily report: File changes'
- email_to: 'admin@example.net'
+ email_to: 'recipient@example.wazuh.com'
location: null
group: null
rule: null
@@ -174,7 +174,7 @@ wazuh_manager_config:
rootcheck:
frequency: 43200
openscap:
- disable: 'no'
+ disable: 'yes'
timeout: 1800
interval: '1d'
scan_on_start: 'yes'
@@ -263,6 +263,7 @@ wazuh_manager_config:
frequency: '360'
- format: 'full_command'
command: 'last -n 20'
+ frequency: '360'
- format: 'syslog'
location: '/var/ossec/logs/active-responses.log'
debian:
@@ -295,7 +296,6 @@ wazuh_manager_config:
- name: 'restart-ossec'
executable: 'restart-ossec.sh'
expect: ''
- timeout_allowed: 'no'
- name: 'firewall-drop'
executable: 'firewall-drop.sh'
expect: 'srcip'
@@ -327,6 +327,10 @@ wazuh_manager_config:
ruleset:
rules_path: 'custom_ruleset/rules/'
decoders_path: 'custom_ruleset/decoders/'
+ cdb_lists:
+ - 'audit-keys'
+ - 'security-eventchannel'
+ - 'amazon/aws-eventnames'
rule_exclude:
- '0215-policy_rules.xml'
syslog_outputs:
diff --git a/roles/wazuh/ansible-wazuh-manager/handlers/main.yml b/roles/wazuh/ansible-wazuh-manager/handlers/main.yml
index 46f1097b..f422b85d 100644
--- a/roles/wazuh/ansible-wazuh-manager/handlers/main.yml
+++ b/roles/wazuh/ansible-wazuh-manager/handlers/main.yml
@@ -1,7 +1,4 @@
---
-- name: rebuild cdb_lists
- command: /var/ossec/bin/ossec-makelists
-
- name: restart wazuh-manager
service:
name: wazuh-manager
diff --git a/roles/wazuh/ansible-wazuh-manager/tasks/main.yml b/roles/wazuh/ansible-wazuh-manager/tasks/main.yml
index 0bb00fef..842d33a6 100644
--- a/roles/wazuh/ansible-wazuh-manager/tasks/main.yml
+++ b/roles/wazuh/ansible-wazuh-manager/tasks/main.yml
@@ -198,11 +198,6 @@
tags:
- config
-- name: Retrieving CDB lists
- include_vars: cdb_lists.yml
- tags:
- - config
-
- name: Check if syslog output is enabled
set_fact: syslog_output=true
when: item.server is not none
@@ -334,27 +329,6 @@
tags:
- config
-- name: CDB Lists
- template:
- src: cdb_lists.j2
- dest: "/var/ossec/etc/lists/{{ item.name }}"
- owner: root
- group: ossec
- mode: 0640
- no_log: true
- register: wazuh_manager_cdb_lists
- until: wazuh_manager_cdb_lists is succeeded
- notify:
- - rebuild cdb_lists
- - restart wazuh-manager
- with_items:
- - "{{ cdb_lists }}"
- when:
- - cdb_lists is defined
- - cdb_lists is iterable
- tags:
- - config
-
- name: Ensure Wazuh Manager, wazuh API service is started and enabled
service:
name: "{{ item }}"
diff --git a/roles/wazuh/ansible-wazuh-manager/templates/var-ossec-etc-ossec-server.conf.j2 b/roles/wazuh/ansible-wazuh-manager/templates/var-ossec-etc-ossec-server.conf.j2
index a3dcbb46..43853bec 100644
--- a/roles/wazuh/ansible-wazuh-manager/templates/var-ossec-etc-ossec-server.conf.j2
+++ b/roles/wazuh/ansible-wazuh-manager/templates/var-ossec-etc-ossec-server.conf.j2
@@ -26,6 +26,11 @@
{{ wazuh_manager_config.email_level }}
+
+
+ {{ wazuh_manager_config.log_format }}
+
+
{% if wazuh_manager_config.extra_emails is defined %}
{% for mail in wazuh_manager_config.extra_emails %}
{% if mail.enable == true %}
@@ -57,10 +62,7 @@
{% endfor %}
{% endif %}
-
-
- {{ wazuh_manager_config.log_format }}
-
+
{% for connection in wazuh_manager_config.connection %}
@@ -126,8 +128,8 @@
{{ wazuh_manager_config.rootcheck.frequency }}
- /var/ossec/etc/shared/default/rootkit_files.txt
- /var/ossec/etc/shared/default/rootkit_trojans.txt
+ /var/ossec/etc/rootcheck/rootkit_files.txt
+ /var/ossec/etc/rootcheck/rootkit_trojans.txt
yes
@@ -292,7 +294,6 @@
{{ wazuh_manager_config.syscheck.disable }}
- {{ wazuh_manager_config.syscheck.auto_ignore }}
{{ wazuh_manager_config.syscheck.alert_new_files }}
{{ wazuh_manager_config.syscheck.frequency }}
@@ -318,7 +319,7 @@
{% endif %}
- {% if wazuh_manager_config.syscheck.ignore_linux_type is defined and ansible_distribution == 'CentOS' and ansible_distribution_major_version == '7' %}
+ {% if wazuh_manager_config.syscheck.ignore_linux_type is defined %}
{% for ignore in wazuh_manager_config.syscheck.ignore_linux_type %}
{{ ignore }}
{% endfor %}
@@ -346,96 +347,12 @@
{{ command.name }}
{{ command.executable }}
{{ command.expect }}
- {{ command.timeout_allowed }}
+ {% if command.timeout_allowed is defined %}
+ {{ command.timeout_allowed }}
+ {% endif %}
{% endfor %}
-
-
- ruleset/decoders
- ruleset/rules
- {% if wazuh_manager_config.rule_exclude is defined %}
- {% for rule in wazuh_manager_config.rule_exclude %}
- {{ rule }}
- {% endfor %}
- {% endif %}
- {% if cdb_lists is defined %}
- {% for list in cdb_lists %}
- etc/lists/{{ list.name }}
- {% endfor %}
- {% endif %}
-
-
- etc/decoders
- etc/rules
-
-
-{% if wazuh_manager_config.authd.enable == true %}
-
- no
- {% if wazuh_manager_config.authd.port is not none %}
- {{wazuh_manager_config.authd.port}}
- {% else %}
- 1515
- {% endif %}
- {% if wazuh_manager_config.authd.use_source_ip is not none %}
- {{wazuh_manager_config.authd.use_source_ip}}
- {% endif %}
- {% if wazuh_manager_config.authd.force_insert is not none %}
- {{wazuh_manager_config.authd.force_insert}}
- {% endif %}
- {% if wazuh_manager_config.authd.force_time is not none %}
- {{wazuh_manager_config.authd.force_time}}
- {% endif %}
- {% if wazuh_manager_config.authd.purge is not none %}
- {{wazuh_manager_config.authd.purge}}
- {% endif %}
- {% if wazuh_manager_config.authd.use_password is not none %}
- {{wazuh_manager_config.authd.use_password}}
- {% endif %}
- {% if wazuh_manager_config.authd.limit_maxagents is not none %}
- {{wazuh_manager_config.authd.limit_maxagents}}
- {% endif %}
- {% if wazuh_manager_config.authd.ciphers is not none %}
- {{wazuh_manager_config.authd.ciphers}}
- {% endif %}
- {% if wazuh_manager_config.authd.ssl_agent_ca is not none %}
- /var/ossec/etc/{{wazuh_manager_config.authd.ssl_agent_ca | basename}}
- {% endif %}
- {% if wazuh_manager_config.authd.ssl_verify_host is not none %}
- {{wazuh_manager_config.authd.ssl_verify_host}}
- {% endif %}
- {% if wazuh_manager_config.authd.ssl_manager_cert is not none %}
- /var/ossec/etc/{{wazuh_manager_config.authd.ssl_manager_cert | basename}}
- {% endif %}
- {% if wazuh_manager_config.authd.ssl_manager_key is not none %}
- /var/ossec/etc/{{wazuh_manager_config.authd.ssl_manager_key | basename}}
- {% endif %}
- {% if wazuh_manager_config.authd.ssl_auto_negotiate is not none %}
- {{wazuh_manager_config.authd.ssl_auto_negotiate}}
- {% endif %}
-
-{% endif %}
-
-
- {{ wazuh_manager_config.cluster.disable }}
- {{ wazuh_manager_config.cluster.name }}
- {{ wazuh_manager_config.cluster.node_name }}
- {{ wazuh_manager_config.cluster.node_type }}
- {{ wazuh_manager_config.cluster.key }}
- {% if wazuh_manager_config.cluster.interval is defined %}
- {{ wazuh_manager_config.cluster.interval }}
- {% endif %}
- {{ wazuh_manager_config.cluster.port }}
- {{ wazuh_manager_config.cluster.bind_addr }}
-
- {% for node in wazuh_manager_config.cluster.nodes %}
- {{ node }}
- {% endfor %}
-
- {{ wazuh_manager_config.cluster.hidden }}
-
-
{% if ansible_system == "Linux" and wazuh_manager_config.vuls.disable == 'no' %}
no
@@ -613,4 +530,91 @@
{% endif %}
+
+
+
+ ruleset/decoders
+ ruleset/rules
+ {% if wazuh_manager_config.rule_exclude is defined %}
+ {% for rule in wazuh_manager_config.rule_exclude %}
+ {{ rule }}
+ {% endfor %}
+ {% endif %}
+ {% if wazuh_manager_config.ruleset.cdb_lists is defined %}
+ {% for list in wazuh_manager_config.ruleset.cdb_lists %}
+ etc/lists/{{ list }}
+ {% endfor %}
+ {% endif %}
+
+
+ etc/decoders
+ etc/rules
+
+
+{% if wazuh_manager_config.authd.enable == true %}
+
+ no
+ {% if wazuh_manager_config.authd.port is not none %}
+ {{wazuh_manager_config.authd.port}}
+ {% else %}
+ 1515
+ {% endif %}
+ {% if wazuh_manager_config.authd.use_source_ip is not none %}
+ {{wazuh_manager_config.authd.use_source_ip}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.force_insert is not none %}
+ {{wazuh_manager_config.authd.force_insert}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.force_time is not none %}
+ {{wazuh_manager_config.authd.force_time}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.purge is not none %}
+ {{wazuh_manager_config.authd.purge}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.use_password is not none %}
+ {{wazuh_manager_config.authd.use_password}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.limit_maxagents is not none %}
+ {{wazuh_manager_config.authd.limit_maxagents}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.ciphers is not none %}
+ {{wazuh_manager_config.authd.ciphers}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.ssl_agent_ca is not none %}
+ /var/ossec/etc/{{wazuh_manager_config.authd.ssl_agent_ca | basename}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.ssl_verify_host is not none %}
+ {{wazuh_manager_config.authd.ssl_verify_host}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.ssl_manager_cert is not none %}
+ /var/ossec/etc/{{wazuh_manager_config.authd.ssl_manager_cert | basename}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.ssl_manager_key is not none %}
+ /var/ossec/etc/{{wazuh_manager_config.authd.ssl_manager_key | basename}}
+ {% endif %}
+ {% if wazuh_manager_config.authd.ssl_auto_negotiate is not none %}
+ {{wazuh_manager_config.authd.ssl_auto_negotiate}}
+ {% endif %}
+
+{% endif %}
+
+
+ {{ wazuh_manager_config.cluster.disable }}
+ {{ wazuh_manager_config.cluster.name }}
+ {{ wazuh_manager_config.cluster.node_name }}
+ {{ wazuh_manager_config.cluster.node_type }}
+ {{ wazuh_manager_config.cluster.key }}
+ {% if wazuh_manager_config.cluster.interval is defined %}
+ {{ wazuh_manager_config.cluster.interval }}
+ {% endif %}
+ {{ wazuh_manager_config.cluster.port }}
+ {{ wazuh_manager_config.cluster.bind_addr }}
+
+ {% for node in wazuh_manager_config.cluster.nodes %}
+ {{ node }}
+ {% endfor %}
+
+ {{ wazuh_manager_config.cluster.hidden }}
+
+
diff --git a/roles/wazuh/ansible-wazuh-manager/vars/cdb_lists.yml b/roles/wazuh/ansible-wazuh-manager/vars/cdb_lists.yml
deleted file mode 100644
index 8e904e14..00000000
--- a/roles/wazuh/ansible-wazuh-manager/vars/cdb_lists.yml
+++ /dev/null
@@ -1,87 +0,0 @@
----
-cdb_lists:
- - name: 'audit-keys'
- content: |
- audit-wazuh-w:write
- audit-wazuh-r:read
- audit-wazuh-a:attribute
- audit-wazuh-x:execute
- audit-wazuh-c:command
- - name: 'aws-source'
- content: |
- ec2.amazonaws.com:
- elasticloadbalancing.amazonaws.com:
- iam.amazonaws.com:
- signin.amazonaws.com:
- kms.amazonaws.com:
- s3.amazonaws.com:
- - name: 'aws-eventnames'
- content: |
- AddUserToGroup:
- AllocateAddress:
- AssociateAddress:
- AssociateDhcpOptions:
- AssociateRouteTable:
- AttachGroupPolicy:
- AttachNetworkInterface:
- AttachRolePolicy:
- AttachUserPolicy:
- AttachVolume:
- AuthorizeSecurityGroupIngress:
- ConsoleLogin:
- CopySnapshot:
- CreateAccountAlias:
- CreateGroup:
- CreateImage:
- CreateLoadBalancer:
- CreatePlacementGroup:
- CreatePolicy:
- CreateRole:
- CreateRouteTable:
- CreateSecurityGroup:
- CreateSnapshot:
- CreateSubnet:
- CreateTags:
- CreateUser:
- CreateVolume:
- CreateVpc:
- DeleteAccountAlias:
- DeleteLoadBalancer:
- DeletePlacementGroup:
- DeleteSecurityGroup:
- DeleteSnapshot:
- DeleteTags:
- DeleteUser:
- DeleteVolume:
- DeregisterImage:
- DetachGroupPolicy:
- DetachNetworkInterface:
- DetachRolePolicy:
- DetachVolume:
- DisableKey:
- DisassociateAddress:
- DisassociateAddress:
- DisassociateRouteTable:
- GetGroup:
- ListAliases:
- ListGroups:
- ListUsers:
- ModifyImageAttribute:
- ModifyInstanceAttribute:
- ModifyNetworkInterfaceAttribute:
- ModifySnapshotAttribute:
- ModifySubnetAttribute:
- ModifyVolumeAttribute:
- MonitorInstances:
- RebootInstances:
- RegisterImage:
- RemoveUserFromGroup:
- RevokeSecurityGroupIngress:
- RunInstances:
- StartInstances:
- StopInstances:
- TerminateInstances:
- UnmonitorInstances:
- UpdateAccessKey:
- UpdateAccountPasswordPolicy:
- UpdateInstanceAlias: