404

[ Avaa Bypassed ]




Upload:

Command:

botdev@18.217.203.133: ~ $
**To configure event selectors for a trail**

To create an event selector, run the ''put-event-selectors'' command. When an event occurs in your account, CloudTrail evaluates 
the configuration for your trails. If the event matches any event selector for a trail, the trail processes and logs the event. 
You can configure up to 5 event selectors for a trail and up to 250 data resources for a trail.

The following example creates an event selector for a trail named ''TrailName'' to include read-only and write-only management events, 
data events for two Amazon S3 bucket/prefix combinations, and data events for a single AWS Lambda function named ''hello-world-python-function''::



  aws cloudtrail put-event-selectors --trail-name TrailName --event-selectors '[{"ReadWriteType": "All","IncludeManagementEvents": true,"DataResources": [{"Type":"AWS::S3::Object", "Values": ["arn:aws:s3:::mybucket/prefix","arn:aws:s3:::mybucket2/prefix2"]},{"Type": "AWS::Lambda::Function","Values": ["arn:aws:lambda:us-west-2:999999999999:function:hello-world-python-function"]}]}]'

Output::

  {
    "EventSelectors": [
        {
            "IncludeManagementEvents": true,
            "DataResources": [
                {
                    "Values": [
                        "arn:aws:s3:::mybucket/prefix",
                        "arn:aws:s3:::mybucket2/prefix2"
                    ],
                    "Type": "AWS::S3::Object"
                },
                {
                    "Values": [
                        "arn:aws:lambda:us-west-2:123456789012:function:hello-world-python-function"
                    ],
                    "Type": "AWS::Lambda::Function"
                },
            ],
            "ReadWriteType": "All"
        }
    ],
    "TrailARN": "arn:aws:cloudtrail:us-east-2:123456789012:trail/TrailName"
  }

The following example creates an event selector for a trail named ''TrailName2'' that includes all events, including read-only and write-only management events, and all data events for all Amazon S3 buckets and AWS Lambda functions in the AWS account::

  aws cloudtrail put-event-selectors --trail-name TrailName2 --event-selectors '[{"ReadWriteType": "All","IncludeManagementEvents": true,"DataResources": [{"Type":"AWS::S3::Object", "Values": ["arn:aws:s3:::"]},{"Type": "AWS::Lambda::Function","Values": ["arn:aws:lambda"]}]}]'

Output::

  {
    "EventSelectors": [
        {
            "IncludeManagementEvents": true,
            "DataResources": [
                {
                    "Values": [
                        "arn:aws:s3:::"
                    ],
                    "Type": "AWS::S3::Object"
                },
                {
                    "Values": [
                        "arn:aws:lambda"
                    ],
                    "Type": "AWS::Lambda::Function"
                },
            ],
            "ReadWriteType": "All"
        }
    ],
    "TrailARN": "arn:aws:cloudtrail:us-east-2:123456789012:trail/TrailName2"
  }
  

Filemanager

Name Type Size Permission Actions
add-tags.rst File 244 B 0644
create-trail.rst File 513 B 0644
delete-trail.rst File 149 B 0644
describe-trails.rst File 1.31 KB 0644
get-event-selectors.rst File 451 B 0755
get-trail-status.rst File 825 B 0644
list-public-keys.rst File 890 B 0644
list-tags.rst File 953 B 0644
lookup-events.rst File 1.67 KB 0644
put-event-selectors.rst File 2.94 KB 0755
remove-tags.rst File 252 B 0644
start-logging.rst File 159 B 0644
stop-logging.rst File 153 B 0644
update-trail.rst File 472 B 0644
validate-logs.rst File 583 B 0644