HEX

Warning: set_time_limit() [function.set-time-limit]: Cannot set time limit - prohibited by configuration in /home/u547966/brikov.ru/www/wp-content/plugins/admin-menu-editor/menu-editor.php on line 745
Server: Apache
System: Linux 4.19.0-0.bpo.9-amd64 x86_64 at red40
User: u547966 (5490)
PHP: 5.3.29-mh2
Disabled: syslog, dl, popen, proc_open, proc_nice, proc_get_status, proc_close, proc_terminate, posix_mkfifo, chown, chgrp, accelerator_reset, opcache_reset, accelerator_get_status, opcache_get_status, pcntl_alarm, pcntl_fork, pcntl_waitpid, pcntl_wait, pcntl_wifexited, pcntl_wifstopped, pcntl_wifsignaled, pcntl_wifcontinued, pcntl_wexitstatus, pcntl_wtermsig, pcntl_wstopsig, pcntl_signal, pcntl_signal_dispatch, pcntl_get_last_error, pcntl_strerror, pcntl_sigprocmask, pcntl_sigwaitinfo, pcntl_sigtimedwait, pcntl_exec, pcntl_getpriority, pcntl_setpriority
Upload Files
File: //usr/share/filebeat/module/aws/cloudtrail/README.md
Filebeat module for AWS CloudTrail Logs
===

Module for AWS CloudTrail logs which captures information about
actions taken by a user, role or an AWS service.  Events include
actions taken in the AWS Management Console, AWS Command Line
interface and AWS SDKs and APIs. These logs can
help with:

* Governance
* Compliance
* Operational and risk auditing

Implementation based on the description of CloudTrail from the
documentation that can be found in:

* CloudTrail Record Contents: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-event-reference-record-contents.html
* CloudTrail Log File Examples: https://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-log-file-examples.html

It should be noted that the `cloudtrail` fileset does not read the
CloudTrail Digest files that are delivered to the S3 bucket when Log
File Integrity is turned on, it only reads the CloudTrail logs.

How to manual test this module
===

* Create a CloudTrail with a S3 bucket as the storage location
* Configure this S3 bucket to send "All object create events" to a SQS queue
* Configure filebeat, using the SQS queue url with s3 notification setup in 
previous step.
```
filebeat.modules:
- module: aws
  cloudtrail:
    enabled: true
    var.queue_url: <queue url>
    var.credential_profile_name: <profile name>
```
* Check parsed logs