AWS CloudTrail Log Reference

Log Sample

Learn what a raw AWS CloudTrail event looks like before it’s processed in Logpoint:

{ "requestParameters": null, "awsRegion": "us-east-1", "additionalEventData": { "MFAUsed": "No", "LoginTo": "https://console.aws.amazon.com/console/home", "MobileVersion": "No" }, "userAgent": "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_2) AppleWebKit/537.36", "eventID": "798ebe60-4ea7-45e3-a0d1-d615eba6c455", "sourceIPAddress": "1.1.1.1", "eventVersion": "1.05", "eventSource": "signin.amazonaws.com", "eventType": "AwsConsoleSignIn", "recipientAccountId": "111111111111", "responseElements": { "ConsoleLogin": "Failure" }, "userIdentity": { "type": "IAMUser", "accountId": "111111111111", "accessKeyId": "", "userName": "JOHN_DOE" }, "eventTime": "2021-04-21 08:45:46.062452", "errorMessage": "No username found in supplied account", "eventName": "ConsoleLogin" }

Field Mapping Reference

Learn how AWS CloudTrail fields map to Logpoint fields:

AWS CloudTrail Field

Logpoint Field

Description

requestParameters_bucketName

repo

requestParameters_host

host

The host or endpoint specified in the request parameters. This indicates the destination system or resource the request targeted.

additionalEventData_MFAUsed

mfa_authenticated

Shows whether Multi-Factor Authentication (MFA) was used during the request. Helps identify if an action was secured with MFA.

responseElements_ConsoleLogin

status

Indicates the result of a console login attempt, such as Success or Failure. Useful for tracking authentication outcomes.

userIdentity_type

identity_type

The type of identity that initiated the action, such as IAMUser, AssumedRole, Root, or FederatedUser. This clarifies the context of who or what performed the operation.

userIdentity_userName

user

The username or identity that initiated the event. This identifies the AWS user, role, or service that performed the action.

sourceIPAddress

source_address

The IP address from which the request originated. Useful for identifying the source of the activity such as internal network, external client, or suspicious location.

eventName

event

The name of the API operation or action that was performed. Example: CreateUser, DeleteBucket, StartInstances.

eventSource

event_source

The AWS service where the event occurred. Example: ec2.amazonaws.com, iam.amazonaws.com.

eventTime

log_ts

The timestamp (in UTC) when the event occurred.

awsRegion

region

The AWS region in which the request was made. Example: us-east-1, ap-south-1).

recipientAccountId

receiver_id

The AWS account ID that received the request and on which the action was executed.

CloudTrail Labels

Learn how AWS CloudTrail events are given their own labels in Logpoint.

AWS Service

AWS CloudTrail Event

Label

AWS Service

AWS CloudTrail Event

Label

Amazon EC2

DescribeInstances

Describe Instances

Amazon EC2

GetCallerIdentity

Get Caller Identity

Amazon EC2

CreateKeyPair

Create Key Pair

Amazon EC2

DescribeKeyPairs

Describe Key Pair

Amazon EC2

CreateDefaultVpc

Create Default VPC

Identity and Access Management

CreateGroup

Create Group Management

Identity and Access Management

CreateUser

Create User Management

Identity and Access Management

DeleteGroup

Remove Group Management

Identity and Access Management

DeleteUser

Remove User Account Management

Identity and Access Management

UpdateGroup

Update Group Management

Identity and Access Management

UpdateUser

Update User Account Management

Identity and Access Management

AddUserToGroup

Add User Group Management

Identity and Access Management

RemoveUserFromGroup

Remove User Group Management

Last updated

Was this helpful?