Easy to use command line tool to quickly query cloudtrail events using filter lists.
The following query will return all write cloudtrail events excluding those performed by jason or by users containing peter12 for the last 72 hours. The events returned contain the eu-west-1 events as well as the global AWS events from us-east-1:
easycloudtrail write-history --since 72h --region eu-west-1 -i peter12*,jasonThe following query will display the events in a raw format:
easycloudtrail write-history --since 72h --region eu-west-1 -i peter12*,jason --rawFor further information, see the --help option.
The following query will return all permission denied cloudtrail events excluding those performed by jason or by users containing peter12 for the last 72 hours. The events returned contain the eu-west-1 events as well as the global AWS events from us-east-1:
easycloudtrail permission-denied-history --since 72h --region eu-west-1 -i peter12*,jasonThe following query will display the events in a raw format:
easycloudtrail permission-denied-history --since 72h --region eu-west-1 -i peter12*,jason --rawFor further information, see the --help option.
Currently, easycloudtrail is only available as self built binary.
Prerequisites:
GOPATHenvironment variable is setGOBINenvironment variable is set andGOBINis in your system'sPATH
Installation:
make install