Monitoring activity within AWS can be complex, especially as the number of services and users grow. With the ChaosSearch CloudTrail integration, you can now audit all activity in a single pane of glass and be alerted to activity that is outside normal best practices. Because CloudTrail fields are extremely sparse, our indexing technology allows for every field to be indexed and analyzed for a deeper understanding on who is accessing which services and identify how those services are performing.
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource change tracking, and troubleshooting. In addition, you can use CloudTrail to detect unusual activity in your AWS accounts. These capabilities help simplify operational analysis and troubleshooting.