Complete the code to enable AWS Config recording for all supported resource types.
aws configservice start-configuration-recorder --configuration-recorder-name [1]The configuration recorder name must match the one created in AWS Config setup, commonly 'config-recorder'.
Complete the code to create an AWS Config rule that checks whether S3 buckets have versioning enabled.
aws configservice put-config-rule --config-rule file://[1]The JSON file 's3-versioning-check.json' contains the rule definition for checking S3 bucket versioning compliance.
Fix the error in the AWS Config delivery channel creation command by completing the missing parameter.
aws configservice put-delivery-channel --delivery-channel '{"name":"default","s3BucketName":"[1]"}'
The S3 bucket name must be the exact bucket created for AWS Config delivery, here 'config-bucket-123'.
Fill both blanks to create a compliance summary command filtering by resource type and compliance status.
aws configservice get-compliance-summary --compliance-types [1] --resource-types [2]
The command filters for non-compliant S3 buckets to check compliance status.
Fill all three blanks to create a command that lists all AWS Config rules with a specific tag key and value.
aws configservice describe-config-rules --filters Key=[1],Value=[2],Values=[3]
The filter uses 'tag-key' with key 'Environment' and value 'Production' to list matching config rules.