Questions tagged with AWS CloudTrail
AWS CloudTrail monitors and records account activity across your AWS infrastructure, giving you control over storage, analysis, and remediation actions.
Content language: English
Select up to 5 tags to filter
Sort by most recent
Browse through the questions and answers listed below or filter and sort to narrow down your results.
231 results
This is something we have never seen before.
We usually deploy the same application stack multiple times during the day, and everything worked up until today.
At one point the stack creation...
I'm getting this error when I try to copy CloudTrail events into my CloudTrail Lake:
"Access denied. Verify that the IAM role policy, S3 bucket policy, and KMS key policy have adequate...
I was followed the article below to get the Telemetry data for the Greengrass component and tried to Link the metric data to Cloud watch in sequentially manner.
link1: ...
At my company we are testing an Organization CloudTrail as part of a centralized logging strategy.
For the most part this Org CloudTrail model seems to fit the bill; however I ran into a bit of a...
I am trying to create CloudTrail for a S3 bucket which has KMS enabled with type as Customer Managed Key. But I am getting insufficientS3BucketPolicyException Incorrect S3 bucket policy is detected...
I'm trying to find CloudTrail events for `my-s3-bucket` which can show me which account or resource is enabling events or other properties on the bucket. I thought API calls were logged by CloudTrail...
Hi,
Currently I would like to encrypt CloudTrail logs in my Root account via a KMS key managed by me.
This trail exists in all my environments due to the use of Control Tower, through the Root...
We'd like to create a CloudTrail trail for management events that targets only specific type of events, for example, EBS volume creation, modification, and deletion. I do not see any option to achieve...
I am following this tutorial https://docs.aws.amazon.com/eventbridge/latest/userguide/eb-log-api-call.html.
{
"source": ["aws.ec2"],
"detail-type": ["AWS API Call via...
I possess an IAM key for which the "last used" date indicates activity 15 hours ago. Yet, upon scrutinizing the CloudTrail logs filtered by the specific AWS access key for all events, there appears to...
Its an aws config managed rule, but I don't see a clear remediation process. is the only way to set up data events in cloudtrail via the console? I don't see any means in boto or the cli.
An IAM role was created to provide the access to S3 and lake formation as per [Requirements for roles used to register...