Hi
I am running an splunk instance within my AWS account, and i'm trying to setup an Cloudtrail SQS based S3 imput. The cloud trail logs are stored in a bucket (auditlogs) in separate account, which I access via a switch role.
I have done the following however no data appears in index I have selected
Questions
- The documentation seems very unclear on the need to have an SNS topic in the middle here? Is it a requirement that SQS is updated via a subscription to an SNS topic. Specifically S3 > SNS > SQS > Splunk? Or would S3 > SQS > Splunk also work?
I would appreciate any guidance here!
Thanks
You need to follow the second option.
2> aws cloudtrail/config > S3 bucket > Event notification trigger as SNS > SQS subscription > Splunk
Enable the cloudtrail sending notification to SNS
Create SQS and subscribe the SNS to it
In splunk, create the cloudtrail input and choose the SQS that was created in the last step.
don't forget upvote if the answer helped you.
I am also confused at this. Document is very unclear. I tried to google it. went through few blogs and videos. All are different. there are 3 ways to do this as far as I know,
1> aws cloudtrail/config > SNS notification enabled at source with S3 bucket > SQS subscription > Splunk (in this case there is a no event notification trigger in S3 bucket)
2> aws cloudtrail/config > S3 bucket > Event notification trigger as SNS > SQS subscription > Splunk
3> aws cloudtrail/config > S3 bucket > Event notification trigger as SQS > Splunk
I am confused which on to follow. So far, I have tried 3rd option. it's working but I am seeing couple of errors "Unable to parse message" from both aws cloudtrail and aws config.
Will be great if someone can explain!
The option 2 is the best one to go for.