CfnTrailProps
- class aws_cdk.aws_cloudtrail.CfnTrailProps(*, is_logging, s3_bucket_name, advanced_event_selectors=None, cloud_watch_logs_log_group_arn=None, cloud_watch_logs_role_arn=None, enable_log_file_validation=None, event_selectors=None, include_global_service_events=None, insight_selectors=None, is_multi_region_trail=None, is_organization_trail=None, kms_key_id=None, s3_key_prefix=None, sns_topic_name=None, tags=None, trail_name=None)
Bases:
object
Properties for defining a
CfnTrail
.- Parameters:
is_logging (
Union
[bool
,IResolvable
]) – Whether the CloudTrail trail is currently logging AWS API calls.s3_bucket_name (
str
) – Specifies the name of the Amazon S3 bucket designated for publishing log files. See Amazon S3 Bucket Naming Requirements .advanced_event_selectors (
Union
[IResolvable
,Sequence
[Union
[IResolvable
,AdvancedEventSelectorProperty
,Dict
[str
,Any
]]],None
]) – Specifies the settings for advanced event selectors. You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use eitherAdvancedEventSelectors
orEventSelectors
, but not both. If you applyAdvancedEventSelectors
to a trail, any existingEventSelectors
are overwritten. For more information about advanced event selectors, see Logging data events in the AWS CloudTrail User Guide .cloud_watch_logs_log_group_arn (
Optional
[str
]) – Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered. You must use a log group that exists in your account. Not required unless you specifyCloudWatchLogsRoleArn
.cloud_watch_logs_role_arn (
Optional
[str
]) – Specifies the role for the CloudWatch Logs endpoint to assume to write to a user’s log group. You must use a role that exists in your account.enable_log_file_validation (
Union
[bool
,IResolvable
,None
]) – Specifies whether log file validation is enabled. The default is false. .. epigraph:: When you disable log file integrity validation, the chain of digest files is broken after one hour. CloudTrail does not create digest files for log files that were delivered during a period in which log file integrity validation was disabled. For example, if you enable log file integrity validation at noon on January 1, disable it at noon on January 2, and re-enable it at noon on January 10, digest files will not be created for the log files delivered from noon on January 2 to noon on January 10. The same applies whenever you stop CloudTrail logging or delete a trail.event_selectors (
Union
[IResolvable
,Sequence
[Union
[IResolvable
,EventSelectorProperty
,Dict
[str
,Any
]]],None
]) – Use event selectors to further specify the management and data event settings for your trail. By default, trails created without specific event selectors will be configured to log all read and write management events, and no data events. When an event occurs in your account, CloudTrail evaluates the event selector for all trails. For each trail, if the event matches any event selector, the trail processes and logs the event. If the event doesn’t match any event selector, the trail doesn’t log the event. You can configure up to five event selectors for a trail. For more information about how to configure event selectors, see Examples and Configuring event selectors in the AWS CloudTrail User Guide .include_global_service_events (
Union
[bool
,IResolvable
,None
]) – Specifies whether the trail is publishing events from global services such as IAM to the log files.insight_selectors (
Union
[IResolvable
,Sequence
[Union
[IResolvable
,InsightSelectorProperty
,Dict
[str
,Any
]]],None
]) – A JSON string that contains the insight types you want to log on a trail.ApiCallRateInsight
andApiErrorRateInsight
are valid Insight types. TheApiCallRateInsight
Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume. TheApiErrorRateInsight
Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.is_multi_region_trail (
Union
[bool
,IResolvable
,None
]) – Specifies whether the trail applies only to the current Region or to all Regions. The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.is_organization_trail (
Union
[bool
,IResolvable
,None
]) – Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account . The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account or delegated administrator account for an organization in AWS Organizations . If the trail is not an organization trail and this is set totrue
, the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set tofalse
, the trail will remain in the current AWS account but be deleted from all member accounts in the organization.kms_key_id (
Optional
[str
]) – Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail. The value can be an alias name prefixed by “alias/”, a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier. CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see Using multi-Region keys in the AWS Key Management Service Developer Guide . Examples: - alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:alias/MyAliasName - arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012 - 12345678-1234-1234-1234-123456789012s3_key_prefix (
Optional
[str
]) – Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery. For more information, see Finding Your CloudTrail Log Files . The maximum length is 200 characters.sns_topic_name (
Optional
[str
]) – Specifies the name of the Amazon SNS topic defined for notification of log file delivery. The maximum length is 256 characters.tags (
Optional
[Sequence
[Union
[CfnTag
,Dict
[str
,Any
]]]]) – A custom set of tags (key-value pairs) for this trail.trail_name (
Optional
[str
]) – Specifies the name of the trail. The name must meet the following requirements:. - Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), or dashes (-) - Start with a letter or number, and end with a letter or number - Be between 3 and 128 characters - Have no adjacent periods, underscores or dashes. Names likemy-_namespace
andmy--namespace
are not valid. - Not be in IP address format (for example, 192.168.5.4)
- Link:
http://docs.aws.amazon.com/AWSCloudFormation/latest/UserGuide/aws-resource-cloudtrail-trail.html
- ExampleMetadata:
fixture=_generated
Example:
# The code below shows an example of how to instantiate this type. # The values are placeholders you should change. import aws_cdk.aws_cloudtrail as cloudtrail cfn_trail_props = cloudtrail.CfnTrailProps( is_logging=False, s3_bucket_name="s3BucketName", # the properties below are optional advanced_event_selectors=[cloudtrail.CfnTrail.AdvancedEventSelectorProperty( field_selectors=[cloudtrail.CfnTrail.AdvancedFieldSelectorProperty( field="field", # the properties below are optional ends_with=["endsWith"], equal_to=["equalTo"], not_ends_with=["notEndsWith"], not_equals=["notEquals"], not_starts_with=["notStartsWith"], starts_with=["startsWith"] )], # the properties below are optional name="name" )], cloud_watch_logs_log_group_arn="cloudWatchLogsLogGroupArn", cloud_watch_logs_role_arn="cloudWatchLogsRoleArn", enable_log_file_validation=False, event_selectors=[cloudtrail.CfnTrail.EventSelectorProperty( data_resources=[cloudtrail.CfnTrail.DataResourceProperty( type="type", # the properties below are optional values=["values"] )], exclude_management_event_sources=["excludeManagementEventSources"], include_management_events=False, read_write_type="readWriteType" )], include_global_service_events=False, insight_selectors=[cloudtrail.CfnTrail.InsightSelectorProperty( insight_type="insightType" )], is_multi_region_trail=False, is_organization_trail=False, kms_key_id="kmsKeyId", s3_key_prefix="s3KeyPrefix", sns_topic_name="snsTopicName", tags=[CfnTag( key="key", value="value" )], trail_name="trailName" )
Attributes
- advanced_event_selectors
Specifies the settings for advanced event selectors.
You can add advanced event selectors, and conditions for your advanced event selectors, up to a maximum of 500 values for all conditions and selectors on a trail. You can use either
AdvancedEventSelectors
orEventSelectors
, but not both. If you applyAdvancedEventSelectors
to a trail, any existingEventSelectors
are overwritten. For more information about advanced event selectors, see Logging data events in the AWS CloudTrail User Guide .
- cloud_watch_logs_log_group_arn
Specifies a log group name using an Amazon Resource Name (ARN), a unique identifier that represents the log group to which CloudTrail logs are delivered.
You must use a log group that exists in your account.
Not required unless you specify
CloudWatchLogsRoleArn
.
- cloud_watch_logs_role_arn
Specifies the role for the CloudWatch Logs endpoint to assume to write to a user’s log group.
You must use a role that exists in your account.
- enable_log_file_validation
Specifies whether log file validation is enabled. The default is false.
When you disable log file integrity validation, the chain of digest files is broken after one hour. CloudTrail does not create digest files for log files that were delivered during a period in which log file integrity validation was disabled. For example, if you enable log file integrity validation at noon on January 1, disable it at noon on January 2, and re-enable it at noon on January 10, digest files will not be created for the log files delivered from noon on January 2 to noon on January 10. The same applies whenever you stop CloudTrail logging or delete a trail.
- event_selectors
Use event selectors to further specify the management and data event settings for your trail.
By default, trails created without specific event selectors will be configured to log all read and write management events, and no data events. When an event occurs in your account, CloudTrail evaluates the event selector for all trails. For each trail, if the event matches any event selector, the trail processes and logs the event. If the event doesn’t match any event selector, the trail doesn’t log the event.
You can configure up to five event selectors for a trail.
For more information about how to configure event selectors, see Examples and Configuring event selectors in the AWS CloudTrail User Guide .
- include_global_service_events
Specifies whether the trail is publishing events from global services such as IAM to the log files.
- insight_selectors
A JSON string that contains the insight types you want to log on a trail.
ApiCallRateInsight
andApiErrorRateInsight
are valid Insight types.The
ApiCallRateInsight
Insights type analyzes write-only management API calls that are aggregated per minute against a baseline API call volume.The
ApiErrorRateInsight
Insights type analyzes management API calls that result in error codes. The error is shown if the API call is unsuccessful.
- is_logging
Whether the CloudTrail trail is currently logging AWS API calls.
- is_multi_region_trail
Specifies whether the trail applies only to the current Region or to all Regions.
The default is false. If the trail exists only in the current Region and this value is set to true, shadow trails (replications of the trail) will be created in the other Regions. If the trail exists in all Regions and this value is set to false, the trail will remain in the Region where it was created, and its shadow trails in other Regions will be deleted. As a best practice, consider using trails that log events in all Regions.
- is_organization_trail
Specifies whether the trail is applied to all accounts in an organization in AWS Organizations , or only for the current AWS account .
The default is false, and cannot be true unless the call is made on behalf of an AWS account that is the management account or delegated administrator account for an organization in AWS Organizations . If the trail is not an organization trail and this is set to
true
, the trail will be created in all AWS accounts that belong to the organization. If the trail is an organization trail and this is set tofalse
, the trail will remain in the current AWS account but be deleted from all member accounts in the organization.
- kms_key_id
Specifies the AWS KMS key ID to use to encrypt the logs delivered by CloudTrail.
The value can be an alias name prefixed by “alias/”, a fully specified ARN to an alias, a fully specified ARN to a key, or a globally unique identifier.
CloudTrail also supports AWS KMS multi-Region keys. For more information about multi-Region keys, see Using multi-Region keys in the AWS Key Management Service Developer Guide .
Examples:
alias/MyAliasName
arn:aws:kms:us-east-2:123456789012:alias/MyAliasName
arn:aws:kms:us-east-2:123456789012:key/12345678-1234-1234-1234-123456789012
12345678-1234-1234-1234-123456789012
- s3_bucket_name
Specifies the name of the Amazon S3 bucket designated for publishing log files.
- s3_key_prefix
Specifies the Amazon S3 key prefix that comes after the name of the bucket you have designated for log file delivery.
For more information, see Finding Your CloudTrail Log Files . The maximum length is 200 characters.
- sns_topic_name
Specifies the name of the Amazon SNS topic defined for notification of log file delivery.
The maximum length is 256 characters.
- tags
A custom set of tags (key-value pairs) for this trail.
- trail_name
.
Contain only ASCII letters (a-z, A-Z), numbers (0-9), periods (.), underscores (_), or dashes (-)
Start with a letter or number, and end with a letter or number
Be between 3 and 128 characters
Have no adjacent periods, underscores or dashes. Names like
my-_namespace
andmy--namespace
are not valid.Not be in IP address format (for example, 192.168.5.4)
- Link:
- Type:
Specifies the name of the trail. The name must meet the following requirements