Examples of using Cloudtrail logs in English and their translations into German
{-}
-
Colloquial
-
Official
-
Ecclesiastic
-
Medicine
-
Financial
-
Ecclesiastic
-
Political
-
Computer
-
Programming
-
Official/political
-
Political
By default, CloudTrail logs bucket-level actions.
Examine Athena requests using CloudTrail logs.
Creating a Table for CloudTrail Logs in the CloudTrail Console.
As a best practice, use a dedicated S3 bucket for CloudTrail logs.
The examples assume CloudTrail logs are appropriately configured.
For more information, see Creating the Table for CloudTrail Logs.
You can use CloudTrail logs to troubleshoot API creation, deployment and updates.
Manually Creating the Table for CloudTrail Logs in Athena.
CloudTrail logs include details about any API calls made to your AWS services, including the console.
You give IAM user Bob permission to decrypt CloudTrail logs in the S3 bucket.
The API event names used in CloudTrail logs are PutBucketEncryption, GetBucketEncryption, and DeleteBucketEncryption.
The Amazon Resource Name(ARN) of a log group to which CloudTrail logs will be delivered.
AWS CloudTrail logs all console and API actions for point-in-time recovery to enable logging, continuous monitoring, and auditing.
For example, when a user signs in to your account, CloudTrail logs the ConsoleLogin event.
Refer to your CloudTrail logs as the authoritative source for information about all API calls and whether they were successful or denied access.
For information, see Creating a Table for CloudTrail Logs in the CloudTrail Console.
The AWS Key Management Service(AWS KMS)key ID that you want to use to encrypt CloudTrail logs.
The following table lists the regions and how CloudTrail logs AWS STS requests in each region.
In addition, some AWS services can be used to analyze and act upon data collected in CloudTrail logs.
You can learn more about the specifics of how CloudTrail logs events for a specific service by consulting the documentation for that service.
If it is not the first table, delete the existing table using the following command:DROP TABLE cloudtrail_logs;
You can learn more about how the events forindividual AWS services are recorded in CloudTrail logs, including example events for that service in log files.
Since AWS CodeCommit uses AWS Key Management Service to encrypt and decrypt repositories, you will also see calls from AWS CodeCommit to Encrypt andDecrypt actions from AWS KMS in CloudTrail logs.
Although ListRepositories returns a list of repositories,non-mutable responses are not recorded in CloudTrail logs, so responseElements is shown as null in the log file.
CloudTrail logs provide you with detailed API tracking for Amazon S3 bucket-level and object-level operations, while server access logs for Amazon S3 provide you visibility into object-level operations on your data in Amazon S3.
For more information,see CloudTrail Supported Services and Integrations and Creating a Table for CloudTrail Logs in the CloudTrail Console.
You can use CloudTrail logs for object-level Amazon S3 actions to track PUT and POST requests to Amazon S3 to verify whether default encryption is being used to encrypt objects when incoming PUT requests don't have encryption headers.
Before querying the logs, verify that your logs tablelooks the same as the one in Manually Creating the Table for CloudTrail Logs in Athena.