Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
This PR adds a native way for ingesting AWS CloudTrail logs.
Logs are fetched in JSON format from the bucket and they are sent to Wazuh socket.
Requirements
Docs
Configuration sample
Parameters
bucket
(mandatory): AWS S3 Bucket where CloudTrail logs are stored.remove_from_bucket
(mandatory): Remove files from S3 Bucket once processed.interval
(mandatory): Time interval for fetching the logs from the bucket. Min allowed: 5 minutes.run_on_start
(mandatory): Trigger an scan every time the agent/manager is restarted.access_key
(optional): Access key for AWS account.secret_key
(optional): Secret key for AWS account.Applies to
The plugin can be used both in agent and manager, it can be used as well in centralized configuration (agent.conf).
Alert example
Logs samples
Tests