AWS Cloudtrail Integration
Last updated
Last updated
(c) 2011 - 2024 ilert GmbH
AWS CloudTrail is a service that records and monitors all actions taken within an AWS account, providing detailed logs of API calls and activity across resources. When connected to ilert, CloudTrail enhances incident response by triggering real-time alerts for critical changes or suspicious activity, such as unauthorized access attempts or modifications to security settings.
AWS CloudTrail logs and monitors account activity across your AWS infrastructure. Activity logs are published to specific Amazon Simple Notification Service (SNS) topics; the events are sent to ilert.
Go to Alert sources -> Alert sources and click on Create new alert source
Search for Amazon SNS in the search field, click on the Amazon SNS tile, and click on Next.
Give your alert source a name, optionally assign teams, and click Next.
Select an escalation policy by creating a new one or assigning an existing one.
Select your Alert grouping preference and click Continue setup. You may click Do not group alerts for now and change it later.
The next page shows additional settings, such as customer alert templates or notification priority. Click on Finish setup for now.
On the final page, an API key and / or webhook URL will be generated, which you will need later in this guide.
On the sidebar, click on Topics -> Create topic.
Choose Standard and enter a topic Name.
Save the topic.
Now click on Create subscription.
Select 'HTTPS' as Protocol and enter the alert source URL previously generated in ilert into the Endpoint field.
Choose a desired trail by clicking on the name.
In the General details tab, click on Edit.
Under Additional settings, enable SNS notification delivery.
Choose Existing and search for the newly created topic from before.
Will alerts in ilert be resolved automatically?
No, but you can use the eventType custom attribute to resolve an incident in specified incidentKey.