aws-secretsmanager
Verified for current stable LTS
Aws Secretsmanager Command: Rotate Secret Automatically Every 30 Days
Use for rotate secret automatically every 30 days with Aws Secretsmanager. Exact CLI syntax to rotate secret automatically every 30 days using Aws Secretsmanager.
When to use this: Use for rotate secret automatically every 30 days with Aws Secretsmanager.
Command Syntax
aws secretsmanager rotate-secret --secret-id <name|arn> --rotation-lambda-arn <arn_of_lambda_function> --rotation-rules AutomaticallyAfterDays=<30> aws secretsmanager rotate-secret --secret-id <name|arn> --rotation-lambda-arn <arn_of_lambda_function> --rotation-rules AutomaticallyAfterDays=<30> Command Breakdown
--secret-id- Command Option
- Tool-specific option used by this command invocation.
--rotation-lambda-arn- Command Option
- Tool-specific option used by this command invocation.
--rotation-rules- Command Option
- Tool-specific option used by this command invocation.
FAQ
Purpose: Exact syntax to rotate secret automatically every 30 days using Aws Secretsmanager.
Test path: Replace placeholders and run destructive commands in a disposable workspace first.
Flag behavior: Tool version, platform, and shell can change behavior.
Improve This Command
Suggest a correction, safer default, or version-specific note for this entry.
Related Operations
Aws Secretsmanager Command: Create Secret
aws secretsmanager create-secret --name <name> --description "<secret_description>" --secret-string '<secret>' Aws Secretsmanager Command: Delete Secret aws secretsmanager delete-secret --secret-id <name|arn> Aws Secretsmanager Command: Delete Secret Force aws secretsmanager delete-secret --secret-id <name|arn> --force-delete-without-recovery Aws Secretsmanager Command: Describe Secret aws secretsmanager describe-secret --secret-id <name|arn> Aws Secretsmanager Command: Get Secret Value aws secretsmanager get-secret-value --secret-id <name|arn> --version-stage <version_of_secret>