docs.aws.amazon.com Open in urlscan Pro
108.138.36.55  Public Scan

Submitted URL: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-concepts.html#cloudtrail-concepts-management-events
Effective URL: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-concepts.html
Submission: On June 14 via api from US — Scanned from DE

Form analysis 0 forms found in the DOM

Text Content

SELECT YOUR COOKIE PREFERENCES

We use essential cookies and similar tools that are necessary to provide our
site and services. We use performance cookies to collect anonymous statistics so
we can understand how customers use our site and make improvements. Essential
cookies cannot be deactivated, but you can click “Customize cookies” to decline
performance cookies.

If you agree, AWS and approved third parties will also use cookies to provide
useful site features, remember your preferences, and display relevant content,
including relevant advertising. To continue without accepting these cookies,
click “Continue without accepting.” To make more detailed choices or learn more,
click “Customize cookies.”

Accept all cookiesContinue without acceptingCustomize cookies


CUSTOMIZE COOKIE PREFERENCES

We use cookies and similar tools (collectively, "cookies") for the following
purposes.


ESSENTIAL

Essential cookies are necessary to provide our site and services and cannot be
deactivated. They are usually set in response to your actions on the site, such
as setting your privacy preferences, signing in, or filling in forms.




PERFORMANCE

Performance cookies provide anonymous statistics about how customers navigate
our site so we can improve site experience and performance. Approved third
parties may perform analytics on our behalf, but they cannot use the data for
their own purposes.

Allow performance category
Allowed


FUNCTIONAL

Functional cookies help us provide useful site features, remember your
preferences, and display relevant content. Approved third parties may set these
cookies to provide certain site features. If you do not allow these cookies,
then some or all of these services may not function properly.

Allow functional category
Allowed


ADVERTISING

Advertising cookies may be set through our site by us or our advertising
partners and help us deliver relevant marketing content. If you do not allow
these cookies, you will experience less relevant advertising.

Allow advertising category
Allowed

Blocking some types of cookies may impact your experience of our sites. You may
review and change your choices at any time by clicking Cookie preferences in the
footer of this site. We and selected third-parties use cookies or similar
technologies as specified in the AWS Cookie Notice

.

CancelSave preferences




UNABLE TO SAVE COOKIE PREFERENCES

We will only store essential cookies at this time, because we were unable to
save your cookie preferences.

If you want to change your cookie preferences, try again later using the link in
the AWS console footer, or contact support if the problem persists.

Dismiss


Contact Us
English


Create an AWS Account
 1. AWS
 2. ...
    
    
 3. Documentation
 4. AWS CloudTrail
 5. User Guide

Feedback
Preferences


AWS CLOUDTRAIL


USER GUIDE

 * What Is AWS CloudTrail?
    * How CloudTrail works
    * CloudTrail workflow
    * CloudTrail concepts
    * CloudTrail supported Regions
    * CloudTrail log file examples
    * CloudTrail supported services and integrations
       * CloudTrail unsupported services
   
    * Quotas in AWS CloudTrail

 * CloudTrail tutorial
 * Working with CloudTrail
    * Viewing events with CloudTrail Event history
       * Viewing CloudTrail events in the CloudTrail console
       * Viewing CloudTrail events with the AWS CLI
   
    * Viewing CloudTrail Insights events
       * Viewing CloudTrail Insights events in the CloudTrail console
       * Viewing CloudTrail Insights events with the AWS CLI
   
    * Creating a trail for your AWS account
       * Creating and updating a trail with the console
          * Creating a trail
          * Updating a trail
          * Deleting a trail
          * Turning off logging for a trail
      
       * Creating, updating, and managing trails with the AWS Command Line
         Interface
          * Using create-trail
          * Using update-trail
          * Managing trails with the AWS CLI
   
    * Creating a trail for an organization
       * Event history and organization trails
       * Best practices for moving from member account trails to organization
         trails
       * Prepare for creating a trail for your organization
       * Creating a trail for your organization in the console
       * Creating a trail for an organization with the AWS Command Line
         Interface
   
    * Copying trail events to CloudTrail Lake
    * Getting and viewing your CloudTrail log files
       * Finding your CloudTrail log files
       * Downloading your CloudTrail log files
   
    * Configuring Amazon SNS notifications for CloudTrail
    * Controlling user permissions for CloudTrail
    * Tips for managing trails
       * Managing CloudTrail costs
       * CloudTrail naming requirements
       * Amazon S3 bucket naming requirements
       * AWS KMS alias naming requirements
   
    * Using AWS CloudTrail with interface VPC endpoints
    * Viewing service-linked channels by using the AWS CLI

 * Working with CloudTrail Lake
    * CloudTrail Lake supported Regions
    * Create an event data store
       * Create an event data store for CloudTrail events
       * Create an event data store for AWS Config configuration items
          * Configuration item schema
      
       * Create an event data store for events outside of AWS
   
    * Manage event data store lifecycles
       * Stop an event data store from ingesting events
   
    * Copy trail events to an event data store
       * Event copy details
   
    * Create an integration with an event source outside of AWS
       * CloudTrail Lake integrations event schema
   
    * View Lake dashboards
    * Create or edit a query
       * Example queries
       * Run a query and save query results
          * Additional information about saved query results
      
       * View query results
       * Get and download saved query results
          * Find your CloudTrail Lake saved query results
          * Download saved query results
      
       * Validate saved query results
          * Validate query results with the command line
          * CloudTrail sign file structure
          * Custom implementations of CloudTrail query results validation
   
    * Learning resources
    * Managing CloudTrail Lake by using the AWS CLI
    * CloudTrail Lake SQL constraints
    * Supported CloudWatch metrics

 * CloudTrail log files
    * Create multiple trails
    * Logging management events
    * Logging data events
    * Logging Insights events for trails
    * Receiving CloudTrail log files from multiple Regions
    * Managing data consistency
    * Monitoring CloudTrail log files with Amazon CloudWatch Logs
       * Sending events to CloudWatch Logs
       * Creating CloudWatch alarms with an AWS CloudFormation template
       * Creating CloudWatch alarms for CloudTrail events: examples
       * Stopping CloudTrail from sending events to CloudWatch Logs
       * CloudWatch log group and log stream naming for CloudTrail
       * Role policy document for CloudTrail to use CloudWatch Logs for
         monitoring
   
    * Receiving CloudTrail log files from multiple accounts
       * Setting bucket policy for multiple accounts
       * Turning on CloudTrail in additional accounts
   
    * Sharing CloudTrail log files between AWS accounts
       * Creating a role
       * Creating an access policy to grant access to accounts you own
       * Creating an access policy to grant access to a third party
       * Assuming a role
       * Stop sharing CloudTrail log files between AWS accounts
   
    * Validating CloudTrail log file integrity
       * Enabling log file integrity validation for CloudTrail
       * Validating CloudTrail log file integrity with the AWS CLI
       * CloudTrail digest file structure
       * Custom implementations of CloudTrail log file integrity validation
   
    * Using the CloudTrail Processing Library

 * Settings
    * Organization delegated administrator
       * Required permissions to assign a delegated administrator
       * Add a CloudTrail delegated administrator
       * Remove a CloudTrail delegated administrator

 * Security
    * Data protection
    * Identity and Access Management
       * How AWS CloudTrail works with IAM
       * Identity-based policy examples
       * Resource-based policy examples
       * Amazon S3 bucket policy for CloudTrail
       * Amazon S3 bucket policy for CloudTrail Lake query results
       * Amazon SNS topic policy for CloudTrail
       * Troubleshooting
       * Using service-linked roles
       * AWS managed policies
   
    * Compliance validation
    * Resilience
    * Infrastructure security
    * Cross-service confused deputy prevention
    * Security best practices
    * Encrypting CloudTrail log files with AWS KMS keys (SSE-KMS)
       * Granting permissions to create a KMS key
       * Configure AWS KMS key policies for CloudTrail
          * Default KMS key policy created in CloudTrail console
      
       * Updating a resource to use your KMS key
       * Enabling and disabling CloudTrail log file encryption with the AWS CLI

 * Log event reference
    * CloudTrail record contents
       * Example sharedEventID
       * Services that support TLS details in CloudTrail
   
    * CloudTrail userIdentity element
    * Insights insightDetails element
    * Non-API events captured by CloudTrail
       * AWS service events
       * AWS Management Console sign-in events

 * Document history
 * AWS glossary

CloudTrail concepts - AWS CloudTrail
AWSDocumentationAWS CloudTrailUser Guide
What are CloudTrail events?What is CloudTrail event history?What are trails?What
are organization trails?How do you manage CloudTrail?How do you control access
to CloudTrail?How do you log management and data events?How do you log
CloudTrail Insights events?How do you run complex queries on events logged by
CloudTrail?How do you perform monitoring with CloudTrail?How does CloudTrail
behave regionally and globally?Global service events How does CloudTrail relate
to other AWS monitoring services?Partner solutions


CLOUDTRAIL CONCEPTS

PDFRSS

This section summarizes basic concepts related to CloudTrail.

CONTENTS

 * What are CloudTrail events?
   * What are management events?
   * What are data events?
   * What are Insights events?
 * What is CloudTrail event history?
 * What are trails?
 * What are organization trails?
 * How do you manage CloudTrail?
   * CloudTrail console
   * CloudTrail CLI
   * CloudTrail APIs
   * AWS SDKs
   * Why use tags for trails?
 * How do you control access to CloudTrail?
 * How do you log management and data events?
 * How do you log CloudTrail Insights events?
 * How do you run complex queries on events logged by CloudTrail?
 * How do you perform monitoring with CloudTrail?
   * CloudWatch Logs, EventBridge, and CloudTrail
 * How does CloudTrail behave regionally and globally?
   * What are the advantages of applying a trail to all Regions?
   * What happens when you apply a trail to all Regions?
   * Multiple trails per Region
   * AWS Security Token Service and CloudTrail
 * Global service events
 * How does CloudTrail relate to other AWS monitoring services?
 * Partner solutions


WHAT ARE CLOUDTRAIL EVENTS?

An event in CloudTrail is the record of an activity in an AWS account. This
activity can be an action taken by an IAM identity, or service that is
monitorable by CloudTrail. CloudTrail events provide a history of both API and
non-API account activity made through the AWS Management Console, AWS SDKs,
command line tools, and other AWS services. There are three types of events that
can be logged in CloudTrail: management events, data events, and CloudTrail
Insights events. By default, trails log management events, but not data or
Insights events.

All event types use a CloudTrail JSON log format.

NOTE

CloudTrail does not log all AWS services and all events. For more information
about which APIs are logged for a specific service, see documentation for that
service in CloudTrail supported services and integrations.


WHAT ARE MANAGEMENT EVENTS?

Management events provide information about management operations that are
performed on resources in your AWS account. These are also known as control
plane operations. Example management events include:

 * Configuring security (for example, AWS Identity and Access Management
   AttachRolePolicy API operations).

 * Registering devices (for example, Amazon EC2 CreateDefaultVpc API
   operations).

 * Configuring rules for routing data (for example, Amazon EC2 CreateSubnet API
   operations).

 * Setting up logging (for example, AWS CloudTrail CreateTrail API operations).

Management events can also include non-API events that occur in your account.
For example, when a user signs in to your account, CloudTrail logs the
ConsoleLogin event. For more information, see Non-API events captured by
CloudTrail. For a list of management events that CloudTrail logs for AWS
services, see CloudTrail supported services and integrations.


WHAT ARE DATA EVENTS?

Data events provide information about the resource operations performed on or in
a resource. These are also known as data plane operations. Data events are often
high-volume activities.

The following table shows the data event types available for trails and event
data stores. The Data event type (console) column shows the appropriate
selection in the console. The resources.Type column shows the resources.Type
value that you would specify to include data events of that type in your trail
or event data store.

For trails, you can use basic or advanced event selectors to log data events for
Amazon S3 buckets and bucket objects, Lambda functions, and DynamoDB tables
(shown in the first three rows of the table). You can use only advanced event
selectors to log the data event types shown in the remaining rows.

For event data stores, you can use only advanced event selectors to include data
events.

AWS service Description Data event type (console) resources.Type Amazon DynamoDB

Amazon DynamoDB object-level API activity on tables (for example, PutItem,
DeleteItem, and UpdateItem API operations). For more information about DynamoDB
events, see DynamoDB data plane events in CloudTrail.

DynamoDB AWS::DynamoDB::Table AWS Lambda

AWS Lambda function execution activity (the Invoke API).

Lambda AWS::Lambda::Function Amazon S3

Amazon S3 object-level API activity (for example, GetObject, DeleteObject, and
PutObject API operations) on buckets and objects in buckets.

S3 AWS::S3::Object AWS CloudTrail

CloudTrail PutAuditEvents activity on a CloudTrail Lake channel that is used to
log events from outside AWS.

CloudTrail AWS::CloudTrail::Channel Amazon CodeWhisperer Amazon CodeWhisperer
API activity on a profile. CodeWhisperer AWS::CodeWhisperer::Profile Amazon
Cognito

Amazon Cognito API activity on Amazon Cognito identity pools.

Cognito Identity Pools AWS::Cognito::IdentityPool Amazon DynamoDB

Amazon DynamoDB API activity on streams.

DynamoDB Streams AWS::DynamoDB::Stream Amazon Elastic Block Store

Amazon Elastic Block Store (EBS) direct APIs, such as PutSnapshotBlock,
GetSnapshotBlock, and ListChangedBlocks on Amazon EBS snapshots.

Amazon EBS direct APIs AWS::EC2::Snapshot Amazon EMR Amazon EMR API activity on
a write-ahead log workspace. EMR write-ahead log workspace
AWS::EMRWAL::Workspace Amazon FinSpace

Amazon FinSpace API activity on environments.

FinSpace AWS::FinSpace::Environment AWS Glue

AWS Glue API activity on tables that were created by Lake Formation.

NOTE

AWS Glue data events for tables are currently supported only in the following
regions:

 * US East (N. Virginia)

 * US East (Ohio)

 * US West (Oregon)

 * Europe (Ireland)

 * Asia Pacific (Tokyo) Region

Lake Formation AWS::Glue::Table Amazon GuardDuty

Amazon GuardDuty API activity for a detector.

GuardDuty detector AWS::GuardDuty::Detector Amazon Kendra Intelligent Ranking

Amazon Kendra Intelligent Ranking API activity on rescore execution plans.

Kendra Ranking AWS::KendraRanking::ExecutionPlan Amazon Managed Blockchain

Amazon Managed Blockchain JSON-RPC calls on Ethereum nodes, such as
eth_getBalance or eth_getBlockByNumber.

Managed Blockchain AWS::ManagedBlockchain::Node Amazon SageMaker

Amazon SageMaker API activity on feature stores.

SageMaker feature store AWS::SageMaker::FeatureGroup Amazon SageMaker

Amazon SageMaker API activity on experiment trial components.

SageMaker metrics experiment trial component
AWS::SageMaker::ExperimentTrialComponent Amazon S3

Amazon S3 API activity on access points.

S3 Access Point AWS::S3::AccessPoint Amazon S3

Amazon S3 Object Lambda access points API activity, such as calls to
CompleteMultipartUpload and GetObject.

S3 Object Lambda AWS::S3ObjectLambda::AccessPoint Amazon S3 on Outposts

Amazon S3 on Outposts object-level API activity.

S3 Outposts AWS::S3Outposts::Object Amazon Verified Permissions

Amazon Verified Permissions API activity on a policy store.

Amazon Verified Permissions AWS::VerifiedPermissions::PolicyStore

Data events are not logged by default when you create a trail or event data
store. To record CloudTrail data events, you must explicitly add the supported
resources or resource types for which you want to collect activity. For more
information, see Creating a trail and Create an event data store for CloudTrail
events.

Additional charges apply for logging data events. For CloudTrail pricing, see
AWS CloudTrail Pricing.


WHAT ARE INSIGHTS EVENTS?

CloudTrail Insights events capture unusual API call rate or error rate activity
in your AWS account by analyzing CloudTrail management activity. If you have
Insights events enabled, and CloudTrail detects unusual activity, Insights
events are logged to a different folder or prefix in the destination S3 bucket
for your trail. You can also see the type of insight and the incident time
period when you view Insights events on the CloudTrail console. Insights events
provide relevant information, such as the associated API, error code, incident
time, and statistics, that help you understand and act on unusual activity.
Unlike other types of events captured in a CloudTrail trail, Insights events are
logged only when CloudTrail detects changes in your account's API usage or error
rate logging that differ significantly from the account's typical usage
patterns. Examples of activity that might generate Insights events include:

 * Your account typically logs no more than 20 Amazon S3 deleteBucket API calls
   per minute, but your account starts to log an average of 100 deleteBucket API
   calls per minute. An Insights event is logged at the start of the unusual
   activity, and another Insights event is logged to mark the end of the unusual
   activity.

 * Your account typically logs 20 calls per minute to the Amazon EC2
   AuthorizeSecurityGroupIngress API, but your account starts to log zero calls
   to AuthorizeSecurityGroupIngress. An Insights event is logged at the start of
   the unusual activity, and ten minutes later, when the unusual activity ends,
   another Insights event is logged to mark the end of the unusual activity.

 * Your account typically logs less than one AccessDeniedException error in a
   seven-day period on the AWS Identity and Access Management API,
   DeleteInstanceProfile. Your account starts to log an average of 12
   AccessDeniedException errors per minute on the DeleteInstanceProfile API
   call. An Insights event is logged at the start of the unusual error rate
   activity, and another Insights event is logged to mark the end of the unusual
   activity.

These examples are provided for illustration purposes only. Your results may
vary depending on your use case.

Insights events are disabled by default when you create a trail. To log
CloudTrail Insights events, you must explicitly enable Insights event collection
on a new or existing trail, and the trail must log CloudTrail management events.
For more information, see Creating a trail and Logging Insights events for
trails.

Additional charges apply for logging CloudTrail Insights events. For CloudTrail
pricing, see AWS CloudTrail Pricing.


WHAT IS CLOUDTRAIL EVENT HISTORY?

CloudTrail event history provides a viewable, searchable, downloadable, and
immutable record of the past 90 days of CloudTrail management events in an AWS
Region. You can use this history to gain visibility into actions taken in your
AWS account in the AWS Management Console, AWS SDKs, command line tools, and
other AWS services. You can customize your view of event history in the
CloudTrail console by selecting which columns are displayed. For more
information, see Viewing events with CloudTrail Event history.


WHAT ARE TRAILS?

A trail is a configuration that enables delivery of CloudTrail events to an
Amazon S3 bucket, CloudWatch Logs, and Amazon EventBridge. You can use a trail
to filter the CloudTrail events you want delivered, encrypt your CloudTrail
event log files with an AWS KMS key, and set up Amazon SNS notifications for log
file delivery. For more information about how to create and manage a trail, see
Creating a trail for your AWS account.


WHAT ARE ORGANIZATION TRAILS?

An organization trail is a configuration that enables delivery of CloudTrail
events in the management account, delegated administrator account, and all
member accounts in an AWS Organizations organization to the same Amazon S3
bucket, CloudWatch Logs, and Amazon EventBridge. Creating an organization trail
helps you define a uniform event logging strategy for your organization.

When you create an organization trail, a trail with the name that you give it
will be created in every AWS account that belongs to your organization. Users
with CloudTrail permissions in member accounts will be able to see this trail
(including the trail ARN) when they log into the AWS CloudTrail console from
their AWS accounts, or when they run AWS CLI commands such as describe-trails
(although member accounts must use the ARN for the organization trail, and not
the name, when using the AWS CLI). However, users in member accounts will not
have sufficient permissions to delete the organization trail, turn logging on or
off, change what types of events are logged, or otherwise alter the organization
trail in any way. For more information about AWS Organizations, see
Organizations Terminology and Concepts. For more information about creating and
working with organization trails, see Creating a trail for an organization.


HOW DO YOU MANAGE CLOUDTRAIL?


CLOUDTRAIL CONSOLE

You can use and manage the service with the AWS CloudTrail console. The console
provides a user interface for performing many CloudTrail tasks such as:

 * Viewing recent events and event history for your AWS account.

 * Downloading a filtered or complete file of the last 90 days of events.

 * Creating and editing CloudTrail trails.

 * Creating and editing CloudTrail Lake event data stores.

 * Running queries on event data stores.

 * Configuring CloudTrail trails, including:
   
    * Selecting an Amazon S3 bucket for trails.
   
    * Setting a prefix.
   
    * Configuring delivery to CloudWatch Logs.
   
    * Using AWS KMS keys for encryption of trail data.
   
    * Enabling Amazon SNS notifications for log file delivery on trails.
   
    * Adding and managing tags for your trails.

 * Configuring CloudTrail Lake event data stores, including:
   
    * Integrating event data stores with CloudTrail partners or with your own
      applications, to log events from sources outside of AWS.
   
    * Using AWS KMS keys for encryption of event data store data.
   
    * Adding and managing tags for your event data stores.

Beginning on April 12, 2019, trails will be viewable only in the AWS Regions
where they log events. If you create a trail that logs events in all AWS
Regions, it will appear in the console in all AWS Regions. If you create a trail
that only logs events in a single AWS Region, you can view and manage it only in
that AWS Region.

For more information about the AWS Management Console, see AWS Management
Console.


CLOUDTRAIL CLI

The AWS Command Line Interface is a unified tool that you can use to interact
with CloudTrail from the command line. For more information, see the AWS Command
Line Interface User Guide. For a complete list of CloudTrail CLI commands, see
Available Commands.


CLOUDTRAIL APIS

In addition to the console and the CLI, you can also use the CloudTrail RESTful
APIs to program CloudTrail directly. For more information, see the AWS
CloudTrail API Reference.


AWS SDKS

As an alternative to using the CloudTrail API, you can use one of the AWS SDKs.
Each SDK consists of libraries and sample code for various programming languages
and platforms. The SDKs provide a convenient way to create programmatic access
to CloudTrail. For example, you can use the SDKs to sign requests
cryptographically, manage errors, and retry requests automatically. For more
information, see the Tools for Amazon Web Services page.


WHY USE TAGS FOR TRAILS?

A tag is a customer-defined key and optional value that can be assigned to AWS
resources, such as CloudTrail trails, Amazon S3 buckets used to store CloudTrail
log files, AWS Organizations organizations and organizational units, and many
more. By adding the same tags to trails and to the Amazon S3 buckets you use to
store log files for trails, you can make it easier to manage, search for, and
filter these resources with AWS Resource Groups. You can implement tagging
strategies to help you consistently, effectively, and easily find and manage
your resources. For more information, see AWS Tagging Strategies.


HOW DO YOU CONTROL ACCESS TO CLOUDTRAIL?

AWS Identity and Access Management is a web service that enables Amazon Web
Services (AWS) customers to securely control access to AWS resources. Using IAM,
you can centrally manage permissions that control which CloudTrail resources
users can access. For more information about controlling user permissions, see
Controlling user permissions for CloudTrail.


HOW DO YOU LOG MANAGEMENT AND DATA EVENTS?

By default, trails log management events for your AWS account and don't include
data events. You can choose to create or update trails to log data events. Only
events that match your trail settings are delivered to your Amazon S3 bucket,
and optionally to an Amazon CloudWatch Logs log group. If the event doesn't
match the settings for a trail, the trail doesn't log the event. For more
information, see Working with CloudTrail log files.


HOW DO YOU LOG CLOUDTRAIL INSIGHTS EVENTS?

AWS CloudTrail Insights helps AWS users identify and respond to unusual volumes
of API calls or errors logged on API calls by continuously analyzing CloudTrail
management events. An Insights event is a record of unusual levels of write
management API activity, or unusual levels of errors returned on management API
activity. The details page of an Insights event shows the event as a graph of
unusual activity, and shows the start and end times of the unusual activity,
along with the baseline that is used to determine whether the activity is
unusual. By default, trails don't log CloudTrail Insights events. In the
console, you can choose to log Insights events when you create or update a
trail. When you use the CloudTrail API, you can log Insights events by editing
the settings of an existing trail with the PutInsightSelectors API. Additional
charges apply for logging CloudTrail Insights events. For more information, see
Logging Insights events for trails and AWS CloudTrail Pricing.


HOW DO YOU RUN COMPLEX QUERIES ON EVENTS LOGGED BY CLOUDTRAIL?

CloudTrail Lake lets you run fine-grained SQL-based queries on your events, and
log events from sources outside AWS, including from your own applications, and
from partners who are integrated with CloudTrail. You do not need to have a
trail configured in your account to use CloudTrail Lake. Event data stores are
immutable collections of events based on criteria that you select by applying
advanced event selectors. You can keep the event data in an event data store for
up to seven years. You can save Lake queries for future use, and view results of
queries for up to seven days. You can also save query results to an Amazon
Simple Storage Service bucket. CloudTrail Lake can also store events from an
organization in AWS Organizations in an event data store, or events from
multiple Regions and accounts. CloudTrail Lake is part of an auditing solution
that helps you perform security investigations and troubleshooting. For more
information, see Working with AWS CloudTrail Lake.


HOW DO YOU PERFORM MONITORING WITH CLOUDTRAIL?


CLOUDWATCH LOGS, EVENTBRIDGE, AND CLOUDTRAIL

Amazon CloudWatch is a web service that collects and tracks metrics to monitor
your Amazon Web Services (AWS) resources and the applications that you run on
AWS. Amazon CloudWatch Logs is a feature of CloudWatch that you can use
specifically to monitor log data. Integration with CloudWatch Logs enables
CloudTrail to send events containing API activity in your AWS account to a
CloudWatch Logs log group. CloudTrail events that are sent to CloudWatch Logs
can trigger alarms according to the metric filters you define. You can
optionally configure CloudWatch alarms to send notifications or make changes to
the resources that you are monitoring based on log stream events that your
metric filters extract. Using CloudWatch Logs, you can also track CloudTrail
events alongside events from the operating system, applications, or other AWS
services that are sent to CloudWatch Logs. For more information, see Monitoring
CloudTrail Log Files with Amazon CloudWatch Logs.

Amazon EventBridge is an AWS service that delivers a near real-time stream of
system events that describe changes in AWS resources. In EventBridge, you can
create rules that respond to events recorded by CloudTrail. For more
information, see Create a rule in Amazon EventBridge.

You can deliver events that you are subscribed to on your trail to EventBridge.
When you create a rule with the EventBridge console, choose either the AWS API
Call via CloudTrail detail-type to deliver CloudTrail data and management
events, or the AWS Insight via CloudTrail detail-type to deliver Insights
events.

To record events with a detail-type value of AWS API Call via CloudTrail, you
must have an active trail that is logging management or data events. For more
information about how to create a trail, see Creating a trail.

To record events with a detail-type value of AWS Insight via CloudTrail, you
must have an active trail that is logging Insights events. For information about
logging Insights events, see Logging Insights events for trails.


HOW DOES CLOUDTRAIL BEHAVE REGIONALLY AND GLOBALLY?

A trail can be applied to all Regions or a single Region. As a best practice,
create a trail that applies to all Regions in the AWS partition in which you are
working. This is the default setting when you create a trail in the CloudTrail
console.

NOTE

Turning on a trail means that you create a trail and start delivery of
CloudTrail event log files to an Amazon S3 bucket. In the CloudTrail console,
logging is turned on automatically when you create a trail.


WHAT ARE THE ADVANTAGES OF APPLYING A TRAIL TO ALL REGIONS?

A trail that applies to all AWS Regions has the following advantages:

 * The configuration settings for the trail apply consistently across all AWS
   Regions.

 * You receive CloudTrail events from all AWS Regions in a single Amazon S3
   bucket and, optionally, in a CloudWatch Logs log group.

 * You manage trail configuration for all AWS Regions from one location.

 * You immediately receive events from a new AWS Region. When a new AWS Region
   is launched, CloudTrail automatically creates a copy of all of your Region
   trails for you in the new Region with the same settings as your original
   trail.

 * You don't need to create trails in AWS Regions that you don't use often in
   order to monitor for unusual activity. Any activity in any AWS Region is
   logged in a trail that applies to all AWS Regions.


WHAT HAPPENS WHEN YOU APPLY A TRAIL TO ALL REGIONS?

When you apply a trail to all AWS Regions, CloudTrail uses the trail that you
create in a particular Region to create trails with identical configurations in
all other Regions in your account.

This has the following effects:

 * CloudTrail delivers log files for account activity from all AWS Regions to
   the single Amazon S3 bucket that you specify, and, optionally, to a
   CloudWatch Logs log group.

 * If you configured an Amazon SNS topic for the trail, SNS notifications about
   log file deliveries in all AWS Regions are sent to that single SNS topic.

 * If you enabled it, log file integrity validation is enabled for the trail in
   all AWS Regions. For information, see Validating CloudTrail log file
   integrity.

Regardless of whether a trail is multi-Region or single-Region, events sent to
Amazon EventBridge are received in each Region's event bus, rather than in one
single event bus.


MULTIPLE TRAILS PER REGION

If you have different but related user groups, such as developers, security
personnel, and IT auditors, you can create multiple trails per Region. This
allows each group to receive its own copy of the log files.

CloudTrail supports five trails per Region. A trail that applies to all AWS
Regions counts as one trail in every Region.

The following example is a Region with five trails:

 * You create two trails in the US West (N. California) Region that apply to
   this Region only.

 * You create two more trails in US West (N. California) Region that apply to
   all AWS Regions.

 * You create a trail in the Asia Pacific (Sydney) Region that applies to all
   AWS Regions. This trail also exists as a trail in the US West (N. California)
   Region.

Trails appear in the AWS Region where they exist. Trails that log events in all
AWS Regions appear in every Region. You can view a list of trails in an AWS
Region in the Trails page of the CloudTrail console. For more information, see
Updating a trail. For CloudTrail pricing, see AWS CloudTrail Pricing.


AWS SECURITY TOKEN SERVICE AND CLOUDTRAIL

AWS Security Token Service (AWS STS) is a service that has a global endpoint and
also supports Region-specific endpoints. An endpoint is a URL that is the entry
point for web service requests. For example,
https://cloudtrail.us-west-2.amazonaws.com is the US West (Oregon) regional
entry point for the AWS CloudTrail service. Regional endpoints help reduce
latency in your applications.

When you use an AWS STS Region-specific endpoint, the trail in that Region
delivers only the AWS STS events that occur in that Region. For example, if you
are using the endpoint sts.us-west-2.amazonaws.com, the trail in us-west-2
delivers only the AWS STS events that originate from us-west-2. For more
information about AWS STS regional endpoints, see Activating and Deactivating
AWS STS in an AWS Region in the IAM User Guide.

For a complete list of AWS regional endpoints, see AWS Regions and Endpoints in
the AWS General Reference. For details about events from the global AWS STS
endpoint, see Global service events.


GLOBAL SERVICE EVENTS

IMPORTANT

As of November 22, 2021, AWS CloudTrail changed how trails capture global
service events. Now, events created by CloudFront, IAM, and AWS STS are recorded
in the Region in which they were created, the US East (N. Virginia) Region,
us-east-1. This makes CloudTrail's treatment of these services consistent with
that of other AWS global services.

To continue receiving global service events outside of US East (N. Virginia), be
sure to convert single-Region trails using global service events outside of US
East (N. Virginia) into multi-Region trails. Also update the Region of your
lookup-events API calls to view global service events. For more information
about using the CLI to update or create trails for global service events and
update lookup events, see Viewing CloudTrail events with the AWS CLI and Using
update-trail.

For most services, events are recorded in the Region where the action occurred.
For global services such as AWS Identity and Access Management (IAM), AWS STS,
and Amazon CloudFront, events are delivered to any trail that includes global
services.

For most global services, events are logged as occurring in US East (N.
Virginia) Region, but some global service events are logged as occurring in
other Regions, such as US East (Ohio) Region or US West (Oregon) Region.

To avoid receiving duplicate global service events, remember the following:

 * Global service events are delivered by default to trails that are created
   using the CloudTrail console. Events are delivered to the bucket for the
   trail.

 * If you have multiple single Region trails, consider configuring your trails
   so that global service events are delivered in only one of the trails. For
   more information, see Enabling and disabling global service event logging.

 * If you change the configuration of a trail from logging all Regions to
   logging a single Region, global service event logging is turned off
   automatically for that trail. Similarly, if you change the configuration of a
   trail from logging a single Region to logging all Regions, global service
   event logging is turned on automatically for that trail.
   
   For more information about changing global service event logging for a trail,
   see Enabling and disabling global service event logging.

Example:

 1. You create a trail in the CloudTrail console. By default, this trail logs
    global service events.

 2. You have multiple single Region trails.

 3. You do not need to include global services for the single Region trails.
    Global service events are delivered for the first trail. For more
    information, see Creating, updating, and managing trails with the AWS
    Command Line Interface.

NOTE

When you create or update a trail with the AWS CLI, AWS SDKs, or CloudTrail API,
you can specify whether to include or exclude global service events for trails.
You cannot configure global service event logging from the CloudTrail console.


HOW DOES CLOUDTRAIL RELATE TO OTHER AWS MONITORING SERVICES?

CloudTrail adds another dimension to the monitoring capabilities already offered
by AWS. It does not change or replace logging features you might already be
using, such as those for Amazon S3 or Amazon CloudFront subscriptions. Amazon
CloudWatch focuses on performance monitoring and system health. CloudTrail
focuses on API activity. Although CloudTrail does not report on system
performance or health, you can use CloudTrail with CloudWatch alarms to notify
you about activity that you might be interested in.


PARTNER SOLUTIONS

AWS partners with third-party specialists in logging and analysis to provide
solutions that use CloudTrail output. For more information, visit the CloudTrail
detail page at AWS CloudTrail.

Javascript is disabled or is unavailable in your browser.

To use the Amazon Web Services Documentation, Javascript must be enabled. Please
refer to your browser's Help pages for instructions.

Document Conventions
CloudTrail workflow
CloudTrail supported Regions
Did this page help you? - Yes

Thanks for letting us know we're doing a good job!

If you've got a moment, please tell us what we did right so we can do more of
it.



Did this page help you? - No

Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.




Did this page help you?
Yes
No
Provide feedback
Next topic:CloudTrail supported Regions
Previous topic:CloudTrail workflow
Need help?
 * Try AWS re:Post 
 * Connect with an AWS IQ expert 

PrivacySite termsCookie preferences
© 2023, Amazon Web Services, Inc. or its affiliates. All rights reserved.


ON THIS PAGE

--------------------------------------------------------------------------------

 * What are CloudTrail events?
 * What is CloudTrail event history?
 * What are trails?
 * What are organization trails?
 * How do you manage CloudTrail?
 * How do you control access to CloudTrail?
 * How do you log management and data events?
 * How do you log CloudTrail Insights events?
 * How do you run complex queries on events logged by CloudTrail?
 * How do you perform monitoring with CloudTrail?
 * How does CloudTrail behave regionally and globally?
 * Global service events
 * How does CloudTrail relate to other AWS monitoring services?
 * Partner solutions





DID THIS PAGE HELP YOU? - NO



Thanks for letting us know this page needs work. We're sorry we let you down.

If you've got a moment, please tell us how we can make the documentation better.




Feedback