AWS CloudTrail Logs

Get CloudTrail log creation alerts into Squadcast using SNS endpoints

Please use this integration guide to configure CloudTrail log alerts so they can be received in Squadcast. This integration should be used only for getting CloudTrail log alerts via an SNS endpoint.

For CloudTrail alerts, use the AWS CloudTrail via CloudWatch integration.

For regular AWS CloudWatch alarms (like EC2 alerts), use the AWS CloudWatch Integration.

Using AWS CloudTrail Logs via SNS as an Alert Source

  1. Navigate to Services -> Service Overview -> select or search for your Service. Expand the accordion -> In the Alert Sources section, click Add.

2. Select AWS CloudTrail Logs. Copy the displayed Webhook URL to configure it within AWS CloudTrail Logs. Finish by clicking Add Alert Source -> Done.

Important:

When an alert source turns Active, it’ll show up under Configured Alert Sources. You can either generate a test alert from the integration or wait for a real-time alert to be generated by the Alert Source. An Alert Source is active if there is a recorded incident via that Alert Source for the Service.

Create CloudTrail logs Endpoint in AWS SNS

  1. Now log in to your AWS account and proceed to SNS.

  2. Click on "Create topic" to get "Create new topic" dialog box. Fill in the details as per your requirements and then click on "Create topic"

  1. Now inside the topic, click on "Create subscription" to get "Create subscription" dialog box. Select the protocol as "HTTPS" and in the endpoint enter the URL you obtained from previous step. Finally, click on "Create subscription" to create the subscription.

  1. The "Subscription ID" for the subscription should to "Confirmed" immediately change from "PendingConfirmation". Click on the refresh button to verify the same.

Then you can configure your CloudTrail log alerts and assign this topic as the notification option and you are good to go.

Have any questions? Ask the community.

Last updated