Downloads of 3.3.270.0
The AWS Tools for PowerShell Core lets developers and administrators manage their AWS services from the PowerShell Core scripting environment.
PS> Save-Module -Name AWSPowerShell.NetCore -Path <path>
PS> Install-Module -Name AWSPowerShell.NetCore
See Documentation for more details.
### 3.3.270.0 (2018-04-25)
* The CmdletsToExport property in the module manifest has been temporarily set to '*-*' instead of the individual cmdlet names to work around a limitation publishing modules that contain over 4000 cmdlets to the PowerShell Gallery. The net effect of this change is to disable tab completion for cmdlet names unless the module is explicitly imported. We are investigating approaches to work around or fix this issue and will re-instate the list of cmdlets as soon as possible.
* AWS Secrets Manager
* Added cmdlets to support the new AWS Secrets Manager service that enables you to store, manage, and retrieve, secrets. Cmdlets for the service have the noun prefix SEC and can be listed with the command *Get-AWSCmdletName -Service SEC*.
* AWS Certificate Manager Private Certificate Authority
* Added cmdlets to support the new AWS Certificate Manager (ACM) Private Certificate Authority (CA), a managed private CA service that helps you easily and securely manage the lifecycle of your private certificates. ACM Private CA provides you a highly-available private CA service without the upfront investment and ongoing maintenance costs of operating your own private CA. ACM Private CA extends ACM's certificate management capabilities to private certificates, enabling you to manage public and private certificates centrally. Cmdlets for the service have the noun prefix PCA and can be listed with the command *Get-AWSCmdletName -Service PCA*.
* Firewall Management Service
* Added cmdlets to support the Firewall Management Service, a new AWS service that makes it easy for customers to centrally configure WAF rules across all their resources (ALBs and CloudFront distributions) and across accounts. Cmdlets for the service have the noun prefix FMS and can be listed with the command *Get-AWSCmdletName -Service FMS*.
* AWS Certificate Manager
* Updated the New-ACMCertificate and added new cmdlet Update-ACMCertificateOption (UpdateCertificateOption API) to support disabling Certificate Transparency logging on a per-certificate basis.
* Added support for new service features for requesting and exporting private certificates. This API enables you to collect batch amounts of metric data and optionally perform math expressions on the data. With one GetMetricData call you can retrieve as many as 100 different metrics and a total of 100,800 data points.
* Amazon CloudWatch
* Added cmdlet Get-CWMetricData to support the new GetMetricData API.
* Amazon DynamoDB
* Added cmdlets restore-DDBTableToPointInTime (RestoreTableToPointInTime API) and Update-DDBContinuousBackup (UpdateContinuousBackups API) t o support Point-in-time recovery (PITR) continuous backups of your DynamoDB table data. With PITR, you do not have to worry about creating, maintaining, or scheduling backups. You enable PITR on your table and your backup is available for restore at any point in time from the moment you enable it, up to a maximum of the 35 preceding days. PITR provides continuous backups until you explicitly disable it.
* AWS Identity and Access Management
* Updated the New-IAMRole cmdlet with parameter -MaxSessionDuration, and added cmdlet Update-IAMRole (UpdateRole API) to support the new longer role sessions.
* AWS Cloudwatch Logs
* Fixed bad links to the service API references in the help details for the service's cmdlets.
* Amazon Inspector
* Fixed bad links to the service API references in the help details for the service's cmdlets.
* Alexa for Business
* Added cmdlets to support new operations related to creating and managing address books of contacts for use in A4B managed shared devices.
* AWS CloudFormation
* Updated cmdlets to support use of a customized AdministrationRole to create security boundaries between different users.
* Amazon CloudFront
* Added cmdlets to support Field-Level Encryption to further enhance the security of sensitive data, such as credit card numbers or personally identifiable information (PII) like social security numbers. CloudFront's field-level encryption further encrypts sensitive data in an HTTPS form using field-specific encryption keys (which you supply) before a POST request is forwarded to your origin. This ensures that sensitive data can only be decrypted and viewed by certain components or services in your application stack. Field-level encryption is easy to setup. Simply configure the fields that have to be further encrypted by CloudFront using the public keys you specify and you can reduce attack surface for your sensitive data.
* Amazon Elasticsearch
* Updated cmdlets to support Amazon Cognito authentication support to Kibana.
* AWS Config Service
* Added support for multi-account multi-region data aggregation features. Customers can create an aggregator (a new resource type) in AWS Config that collects AWS Config data from multiple source accounts and regions into an aggregator account. Customers can aggregate data from individual account(s) or an organization and multiple regions. In this release, AWS Config adds several API's for multi-account multi-region data aggregation.
* AWS Device Farm
* Added support for Private Device Management feature. Customers can now manage their private devices efficiently - view their status, set labels and apply profiles on them. Customers can also schedule automated tests and remote access sessions on individual instances in their private device fleet.
* Added cmdlets to support new service features for VPC endpoints.
* Amazon WorkMail
* Added cmdlets to support granting users and groups with "Full Access", "Send As" and "Send on Behalf" permissions on a given mailbox.
* AWS Glue
* Updated cmdlets to support timeout values for ETL jobs. With this release, all new ETL jobs have a default timeout value of 48 hours. AWS Glue also now supports the ability to start a schedule or job events trigger when it is created.
* Amazon Cloud Directory
* Added cmdlets to support new APIs to fetch attributes within a facet on an object or multiple facets or objects.
* AWS Batch
* Added support for specifying timeout when submitting jobs or registering job definitions.
* AWS Systems Manager
* Added cmdlets Get-SSMInventoryDeletionList (DescribeInventoryDeletions API) and Remove-SSMInventory (DeleteInventory API).
* AWS X-Ray
* Added cmdlets Get-XREncryptionConfig (GetEncryptionConfig API) and Write-XREncryptionConfig (PutEncryptionConfig API) to support managing data encryption settings. Use Write-XREncryptionConfig to configure X-Ray to use an AWS Key Management Service customer master key to encrypt trace data at rest.
Copyright 2012-2018 Amazon.com, Inc. or its affiliates. All Rights Reserved.
This module has no dependencies.
Minimum PowerShell version
|AWSPowerShell.NetCore 3.3.283.0 (latest stable)||649||Friday, May 18 2018|
|AWSPowerShell.NetCore 3.3.270.0 (this version)||1609||Wednesday, April 25 2018|
|AWSPowerShell.NetCore 22.214.171.124||1895||Monday, March 26 2018|
|AWSPowerShell.NetCore 126.96.36.199||1571||Friday, March 02 2018|
|AWSPowerShell.NetCore 188.8.131.52||1136||Tuesday, February 13 2018|
|AWSPowerShell.NetCore 184.108.40.206||1139||Thursday, January 25 2018|
|AWSPowerShell.NetCore 220.127.116.11||94||Tuesday, January 23 2018|
|AWSPowerShell.NetCore 18.104.22.168||390||Tuesday, January 16 2018|
|AWSPowerShell.NetCore 22.214.171.124||148||Friday, January 12 2018|
|AWSPowerShell.NetCore 126.96.36.199||395||Tuesday, January 02 2018|
|AWSPowerShell.NetCore 188.8.131.52||346||Tuesday, December 19 2017|
|AWSPowerShell.NetCore 184.108.40.206||274||Wednesday, December 13 2017|
|AWSPowerShell.NetCore 220.127.116.11||274||Friday, December 08 2017|
|AWSPowerShell.NetCore 18.104.22.168||265||Saturday, December 02 2017|
|AWSPowerShell.NetCore 22.214.171.124||177||Tuesday, November 28 2017|
|AWSPowerShell.NetCore 126.96.36.199||78||Saturday, November 25 2017|
|AWSPowerShell.NetCore 188.8.131.52||397||Tuesday, November 14 2017|
|AWSPowerShell.NetCore 184.108.40.206||224||Thursday, November 09 2017|
|AWSPowerShell.NetCore 220.127.116.11||287||Wednesday, November 01 2017|
|AWSPowerShell.NetCore 18.104.22.168||101||Monday, October 30 2017|
|AWSPowerShell.NetCore 22.214.171.124||266||Tuesday, October 24 2017|
|AWSPowerShell.NetCore 126.96.36.199||311||Tuesday, October 17 2017|
|AWSPowerShell.NetCore 188.8.131.52||412||Monday, October 09 2017|
|AWSPowerShell.NetCore 184.108.40.206||542||Friday, September 29 2017|
|AWSPowerShell.NetCore 220.127.116.11||436||Friday, September 22 2017|
|AWSPowerShell.NetCore 18.104.22.168||662||Sunday, September 17 2017|
|AWSPowerShell.NetCore 22.214.171.124||307||Sunday, September 10 2017|
|AWSPowerShell.NetCore 126.96.36.199||775||Friday, August 25 2017|
|AWSPowerShell.NetCore 188.8.131.52||479||Thursday, August 17 2017|
|AWSPowerShell.NetCore 184.108.40.206||746||Friday, August 04 2017|
|AWSPowerShell.NetCore 220.127.116.11||392||Friday, July 28 2017|
|AWSPowerShell.NetCore 18.104.22.168||693||Friday, July 07 2017|
|AWSPowerShell.NetCore 22.214.171.124||488||Friday, June 23 2017|
|AWSPowerShell.NetCore 126.96.36.199||200||Monday, June 19 2017|
|AWSPowerShell.NetCore 188.8.131.52||282||Friday, June 09 2017|
|AWSPowerShell.NetCore 184.108.40.206||178||Monday, June 05 2017|
|AWSPowerShell.NetCore 220.127.116.11||59||Friday, June 02 2017|
|AWSPowerShell.NetCore 18.104.22.168||83||Wednesday, May 31 2017|
|AWSPowerShell.NetCore 22.214.171.124||128||Friday, May 26 2017|
|AWSPowerShell.NetCore 126.96.36.199||240||Friday, May 19 2017|
|AWSPowerShell.NetCore 188.8.131.52||197||Friday, May 12 2017|
|AWSPowerShell.NetCore 184.108.40.206||185||Friday, May 05 2017|
|AWSPowerShell.NetCore 220.127.116.11||165||Monday, May 01 2017|
|AWSPowerShell.NetCore 18.104.22.168||157||Monday, April 24 2017|
|AWSPowerShell.NetCore 22.214.171.124||236||Wednesday, April 12 2017|
|AWSPowerShell.NetCore 126.96.36.199||38||Tuesday, April 11 2017|
|AWSPowerShell.NetCore 188.8.131.52||73||Friday, April 07 2017|
|AWSPowerShell.NetCore 184.108.40.206||705||Saturday, April 01 2017|
|AWSPowerShell.NetCore 220.127.116.11||90||Wednesday, March 29 2017|
|AWSPowerShell.NetCore 18.104.22.168||125||Friday, March 24 2017|
|AWSPowerShell.NetCore 22.214.171.124||65||Wednesday, March 22 2017|
|AWSPowerShell.NetCore 126.96.36.199||116||Friday, March 17 2017|
|AWSPowerShell.NetCore 188.8.131.52||41||Thursday, March 16 2017|
|AWSPowerShell.NetCore 184.108.40.206||60||Monday, March 13 2017|
|AWSPowerShell.NetCore 220.127.116.11||126||Tuesday, March 07 2017|
|AWSPowerShell.NetCore 18.104.22.168||137||Tuesday, February 28 2017|
|AWSPowerShell.NetCore 22.214.171.124||157||Friday, February 24 2017|
|AWSPowerShell.NetCore 126.96.36.199||42||Thursday, February 23 2017|
|AWSPowerShell.NetCore 188.8.131.52||60||Monday, February 20 2017|
|AWSPowerShell.NetCore 184.108.40.206||29||Friday, February 17 2017|
|AWSPowerShell.NetCore 220.127.116.11||30||Wednesday, February 15 2017|
|AWSPowerShell.NetCore 18.104.22.168||96||Friday, February 10 2017|
|AWSPowerShell.NetCore 22.214.171.124||56||Wednesday, February 08 2017|
|AWSPowerShell.NetCore 126.96.36.199||160||Friday, January 27 2017|
|AWSPowerShell.NetCore 188.8.131.52||30||Thursday, January 26 2017|
|AWSPowerShell.NetCore 184.108.40.206||42||Wednesday, January 25 2017|
|AWSPowerShell.NetCore 220.127.116.11||237||Wednesday, January 18 2017|
|AWSPowerShell.NetCore 18.104.22.168||22||Tuesday, January 17 2017|
|AWSPowerShell.NetCore 22.214.171.124||57||Friday, January 13 2017|
|AWSPowerShell.NetCore 126.96.36.199||53||Monday, January 09 2017|
|AWSPowerShell.NetCore 188.8.131.52||46||Thursday, January 05 2017|
|AWSPowerShell.NetCore 184.108.40.206||55||Friday, December 30 2016|
|AWSPowerShell.NetCore 220.127.116.11||98||Friday, December 23 2016|
|AWSPowerShell.NetCore 18.104.22.168||24||Thursday, December 22 2016|
|AWSPowerShell.NetCore 22.214.171.124||117||Tuesday, December 20 2016|
|AWSPowerShell.NetCore 126.96.36.199||182||Friday, December 16 2016|
|AWSPowerShell.NetCore 188.8.131.52||109||Friday, December 09 2016|
|AWSPowerShell.NetCore 184.108.40.206||15||Thursday, December 08 2016|
|AWSPowerShell.NetCore 220.127.116.11||24||Wednesday, December 07 2016|
|AWSPowerShell.NetCore 18.104.22.168||65||Saturday, December 03 2016|
|AWSPowerShell.NetCore 22.214.171.124||242||Wednesday, November 23 2016|
|AWSPowerShell.NetCore 126.96.36.199||34||Tuesday, November 22 2016|
|AWSPowerShell.NetCore 188.8.131.52||40||Saturday, November 19 2016|
|AWSPowerShell.NetCore 184.108.40.206||29||Thursday, November 17 2016|
|AWSPowerShell.NetCore 220.127.116.11||49||Monday, November 14 2016|
|AWSPowerShell.NetCore 18.104.22.168||613||Wednesday, October 26 2016|
|AWSPowerShell.NetCore 22.214.171.124||90||Thursday, October 20 2016|
|AWSPowerShell.NetCore 126.96.36.199||20||Wednesday, October 19 2016|
|AWSPowerShell.NetCore 188.8.131.52||31||Monday, October 17 2016|
|AWSPowerShell.NetCore 184.108.40.206||37||Friday, October 14 2016|
|AWSPowerShell.NetCore 220.127.116.11||40||Wednesday, October 12 2016|
|AWSPowerShell.NetCore 18.104.22.168||52||Friday, October 07 2016|
|AWSPowerShell.NetCore 22.214.171.124||65||Friday, September 30 2016|
|AWSPowerShell.NetCore 126.96.36.199||37||Wednesday, September 28 2016|
|AWSPowerShell.NetCore 188.8.131.52||66||Thursday, September 22 2016|
|AWSPowerShell.NetCore 184.108.40.206||15||Wednesday, September 21 2016|
|AWSPowerShell.NetCore 220.127.116.11||36||Monday, September 19 2016|
|AWSPowerShell.NetCore 18.104.22.168||54||Thursday, September 08 2016|
|AWSPowerShell.NetCore 22.214.171.124||141||Tuesday, August 23 2016|