Skip to main content

CDK Constructs for AWS CloudTrail

Project description

AWS CloudTrail Construct Library

---

cfn-resources: Stable

All classes with the Cfn prefix in this module (CFN Resources) are always stable and safe to use.

cdk-constructs: Experimental

The APIs of higher level constructs in this module are experimental and under active development. They are subject to non-backward compatible changes or removal in any future version. These are not subject to the Semantic Versioning model and breaking changes will be announced in the release notes. This means that while you may use them, you may need to update your source code when upgrading to a newer version of this package.


Add a CloudTrail construct - for ease of setting up CloudTrail logging in your account

Example usage:

# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
import aws_cdk.aws_cloudtrail as cloudtrail

trail = cloudtrail.Trail(self, "CloudTrail")

You can instantiate the CloudTrail construct with no arguments - this will by default:

  • Create a new S3 Bucket and associated Policy that allows CloudTrail to write to it

  • Create a CloudTrail with the following configuration:

    • Logging Enabled
    • Log file validation enabled
    • Multi Region set to true
    • Global Service Events set to true
    • The created S3 bucket
    • CloudWatch Logging Disabled
    • No SNS configuartion
    • No tags
    • No fixed name

You can override any of these properties using the CloudTrailProps configuraiton object.

For example, to log to CloudWatch Logs

# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
import aws_cdk.aws_cloudtrail as cloudtrail

trail = cloudtrail.Trail(self, "CloudTrail",
    send_to_cloud_watch_logs=True
)

This creates the same setup as above - but also logs events to a created CloudWatch Log stream. By default, the created log group has a retention period of 365 Days, but this is also configurable via the cloudWatchLogsRetention property. If you would like to specify the log group explicitly, use the cloudwatchLogGroup property.

For using CloudTrail event selector to log specific S3 events, you can use the CloudTrailProps configuration object. Example:

# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
import aws_cdk.aws_cloudtrail as cloudtrail

trail = cloudtrail.Trail(self, "MyAmazingCloudTrail")

# Adds an event selector to the bucket magic-bucket.
# By default, this includes management events and all operations (Read + Write)
trail.log_all_s3_data_events()

# Adds an event selector to the bucket foo
trail.add_s3_event_selector([
    bucket=foo_bucket
])

For using CloudTrail event selector to log events about Lambda functions, you can use addLambdaEventSelector.

# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
import aws_cdk.aws_cloudtrail as cloudtrail
import aws_cdk.aws_lambda as lambda

trail = cloudtrail.Trail(self, "MyAmazingCloudTrail")
lambda_function = lambda.Function(stack, "AnAmazingFunction",
    runtime=lambda.Runtime.NODEJS_10_X,
    handler="hello.handler",
    code=lambda.Code.from_asset("lambda")
)

# Add an event selector to log data events for all functions in the account.
trail.log_all_lambda_data_events()

# Add an event selector to log data events for the provided Lambda functions.
trail.add_lambda_event_selector([lambda_function.function_arn])

Using the Trail.onEvent() API, an EventBridge rule can be created that gets triggered for every event logged in CloudTrail. To only use the events that are of interest, either from a particular service, specific account or time range, they can be filtered down using the APIs available in aws-events. The following code filters events for S3 from a specific AWS account and triggers a lambda function. See Events delivered via CloudTrail to learn more about the event structure for events from CloudTrail.

# Example automatically generated without compilation. See https://github.com/aws/jsii/issues/826
import aws_cdk.aws_cloudtrail as cloudtrail
import aws_cdk.aws_events_targets as event_targets
import aws_cdk.aws_lambda as lambda

my_function_handler = lambda.Function(self, "MyFunction",
    code=lambda.Code.from_asset("resource/myfunction"),
    runtime=lambda.Runtime.NODEJS_12_X,
    handler="index.handler"
)

event_rule = Trail.on_event(self, "MyCloudWatchEvent",
    target=event_targets.LambdaFunction(my_function_handler)
)

event_rule.add_event_pattern(
    account="123456789012",
    source="aws.s3"
)

Project details


Release history Release notifications | RSS feed

Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

aws-cdk.aws-cloudtrail-1.42.0.tar.gz (74.8 kB view details)

Uploaded Source

Built Distribution

If you're not sure about the file name format, learn more about wheel file names.

aws_cdk.aws_cloudtrail-1.42.0-py3-none-any.whl (73.1 kB view details)

Uploaded Python 3

File details

Details for the file aws-cdk.aws-cloudtrail-1.42.0.tar.gz.

File metadata

  • Download URL: aws-cdk.aws-cloudtrail-1.42.0.tar.gz
  • Upload date:
  • Size: 74.8 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/39.0.1 requests-toolbelt/0.9.1 tqdm/4.46.0 CPython/3.6.5

File hashes

Hashes for aws-cdk.aws-cloudtrail-1.42.0.tar.gz
Algorithm Hash digest
SHA256 8327fb9ff34209792211ea86cfc482322452e49d23c5da36d1ef0dbbe62d1f34
MD5 0847906c3a8a7c522826083abb172a29
BLAKE2b-256 f337e00a97001d2d5593473ed3b4fd8f00e5103e0627a70fe3588e42e19dd6c2

See more details on using hashes here.

File details

Details for the file aws_cdk.aws_cloudtrail-1.42.0-py3-none-any.whl.

File metadata

  • Download URL: aws_cdk.aws_cloudtrail-1.42.0-py3-none-any.whl
  • Upload date:
  • Size: 73.1 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/3.1.1 pkginfo/1.5.0.1 requests/2.23.0 setuptools/39.0.1 requests-toolbelt/0.9.1 tqdm/4.46.0 CPython/3.6.5

File hashes

Hashes for aws_cdk.aws_cloudtrail-1.42.0-py3-none-any.whl
Algorithm Hash digest
SHA256 fb889f48ca439aabc2102c36192e7c2f588fec952e20c9a01d1068c7d332b64a
MD5 bc7680fdef7c17100321786631c459b3
BLAKE2b-256 d24dc35d0d9fe18b4fe1811a7045fcbe00de4938fc965c5ffa87b65caeb1f24f

See more details on using hashes here.

Supported by

AWS Cloud computing and Security Sponsor Datadog Monitoring Depot Continuous Integration Fastly CDN Google Download Analytics Pingdom Monitoring Sentry Error logging StatusPage Status page