Skip to main content
Sumo Logic

AWS CloudTrail

Configure a CloudTrail source on a hosted collector to ingest CloudTrail log messages to be parsed by CSE's CloudTrail system parser.

This page has instructions for collecting AWS CloudTrail log messages and sending them to Sumo Logic to be ingested by CSE.

Sumo Logic CSE supports the default AWS CloudTrail log format which includes all version 2 fields. See AWS CloudTrail log records documentation for more details.

Step 1: Enable AWS CloudTrail logs

In this step, you configure AWS CloudTrail logging in AWS as described in AWS Help.

  1. Unless you’ve already done so, Configure CloudTrail in AWS.
  2. Before configuring collection, you need to grant Sumo Logic permission to access your AWS data. For more information see Grant Access to an AWS Product.

Step 2: Configure collection

In this step, you configure an HTTP Source to collect AWS CloudTrail log messages. You can configure the source on an existing Hosted Collector or create a new collector. If you’re going to use an existing collector, jump to Configure an CloudTrail Source below. Otherwise, create a new collector as described in Configure a hosted collector below, and then create the HTTP Source on the collector.

Configure a Hosted Collector

  1. In the Sumo Logic platform, select Manage Data > Collection > Collection.
  2. Click Add Collector.
  3. Click Hosted Collector.
  4. The Add Hosted Collector popup appears.
    add-hosted-collector.png
  5. Name. Provide a Name for the Collector.
  6. Description. (Optional)
  7. Category. Enter a string to tag the output collected from the source. The string that you supply will be saved in a metadata field called _sourceCategory
  8. Fields
    1. If you are planning that all the sources you add to this collector will forward log messages to CSE, click the +Add Field link, and add a field whose name is _siemForward and value is true. This will cause the collector to forward all of the logs collected by all of the sources on the collector to CSE.
    2. If all sources in this collector will be AWS CloudTrail sources, add an additional field with key _parser and value /Parsers/System/AWS/CloudTrail.

Configure an AWS CloudTrail Source

  1. In the Sumo Logic web app, select Manage Data > Collection > Collection
  2. Navigate to the Hosted Collector where you want to create the source.
  3. On the Collectors page, click Add Source next to a Hosted Collector.
  4. Select AWS CloudTrail
  5. The page refreshes.
    cloudtrail-source.png
  6. Name. Enter a name for the source. 
  7. Description. (Optional) 
  8. S3 Region. Choose the AWS Region the S3 bucket resides in.
  9. Bucket Name. The name of your organizations S3 bucket as it appears in AWS.
  10. Path Expression. The path expression of the log file(s) in S3, can contain wildcards to include multiple log files.
  11. Source Category. Enter a string to tag the output collected from the source. The string that you supply will be saved in a metadata field called _sourceCategory.
  12. Fields.
    1. If you are not forwarding all sources in the hosted collector to CSE, click the +Add Field link, and add a field whose name is _siemForward and value is true. This will ensure all logs for this source are forwarded to CSE.
    2. Add another field named _parser with value /Parsers/System/AWS/CloudTrail.
  13. AWS Access. For AWS Access you have two Access Method options. Select Role-based access or Key access based on the AWS authentication you are providing. Role-based access is preferred. Note that Sumo Logic access to AWS (instructions are provided above in Step 1)  is a prerequisite for role-based access
    • Role-based access. Enter the Role ARN that was provided by AWS after creating the role. 
      role-arn.png
    • Key access. Enter the Access Key ID and Secret Access Key. See AWS Access Key ID and AWS Secret Access Key for details.
  14. Click Save.

Step 3: Verify ingestion

In this step, you verify that your logs are successfully making it into CSE. 

  1. Click the gear icon, and select Log Mappings under Incoming Data.
    log-mappings-link.png
  2. On the Log Mappings page search for "CloudTrail" and check under Record Volume
    cloudtrail-record-volume.png
  3. For a more granular look at the incoming records, you can also search the Sumo Logic platform for CloudTrail security records.
    cloudtrail-search.png