Open kbroughton opened 4 years ago
Do have any update here ?
I'm not sure if my answer will help, but anyway :
That mean you need to generate a new trumpet template (with CloudTrial selected) and run it in Virginia Region (us-east-1). Because as you saw in the image, IAM pushes all IAM activity to Virginia Region ONLY.
We deployed trumpet via the CloudFormation template. We noticed a lot of events which we could see in CloudTrail were missing in splunk. What could be causing this?
To investigate, we created equivalent dashboards in Splunk and CloudWatch to group events over the previous 3 days by service and eventName.
CloudWatch fields @timestamp, @message, eventName | stats count(*) as cnt by eventSource, eventName | sort eventSource desc
we get 390 distinct eventName's over the last 3 days in account X. There are 16 distinct ECR eventNames.
Splunk In splunk over the same time period, there are 59 distinct eventNames and only 8 distinct ECR eventNames.
sourcetype="aws-cloudtrail" aws_account_id="X" region="*" | stats count(eventName) as countEventName by eventName, eventSource | sort eventSource
Exporting both to CSV and doing a little munging with pandas I get the following info.
CloudWatch eventNames - Splunk eventNames =
Similarly, the services in CloudWatch - services in Splunk =
I would expect by default that all logs to CloudTrail would show up in Splunk. Note that on the items where data shows up in both CloudWatch and Splunk, the counts were equal, so it seems like more of a filtering issue than a transmission failure issue.