Logentries and AWS Partner to Centralize CloudTrail, CloudWatch and Log Data Monitoring
Logentries today announced a new partnership with Amazon Web Services (AWS), providing centralized monitoring and alerting for CloudTrail, CloudWatch and system log data. As a new AWS CloudTrail partner, Logentries enables recording of AWS API calls, publication of log files to an Amazon S3 bucket in JSON format, and real-time notification and monitoring of log data. Logentries also integrates directly with AWS CloudWatch to enable a single dashboard view across CloudTrail, CloudWatch and system log data for more efficient troubleshooting, security and compliance analysis, and system monitoring.
“Boxever’s customer intelligence and personalization platform depends on collecting and aggregating passenger information, from web behavior to transactions, to provide real-time actionable insights to travel retailers,” said Alan Giles, CTO, Boxever. “Security and compliance are of paramount importance to our architecture, and Logentries' integration with CloudTrail allows us to track what is happening across our AWS environment. Logentries makes it incredibly easy to centralize and protect our AWS log files using data encryption, obfuscation, and data filtering."
Logentries collects and centralizes CloudTrail data for a deeper understanding of AWS account activity and security assurance. The Logentries integration enables easy aggregation, correlation, and analysis of the CloudTrail log files with CloudWatch and application log information for security, troubleshooting and business analytics. When issues arise, Logentries offers out-of-the-box tags and alerts for common CloudTrail events that notify users immediately via email, SMS, or through a third-party service such as HipChat, PagerDuty, and Campfire.
"Logentries provides pre-defined queries for important events so that you do not have to write complex queries,” described Jeff Barr, AWS Chief Evangelist, in a recent blog post. “Additionally, Logentries provides out-of-the-box tagging and alerting to highlight and notify you when an important security event takes place.”
Real-time alerting for AWS log data and important events include:
- EC2 Security Group created, deleted, or edited
- New IAM user is created
- User's IAM permissions are changed