AWS IoT Events ログファイルエントリについて - AWS IoT Events

翻訳は機械翻訳により提供されています。提供された翻訳内容と英語版の間で齟齬、不一致または矛盾がある場合、英語版が優先します。

AWS IoT Events ログファイルエントリについて

証跡は、指定した Amazon S3 バケットにログファイルとしてイベントを配信できるようにする設定です。 AWS CloudTrail ログファイルには 1 つ以上のログエントリが含まれます。イベントは任意のソースからの単一のリクエストを表し、リクエストされたアクション、アクションの日時、リクエストパラメータなどに関する情報が含まれます。 CloudTrail ログファイルはパブリックAPIコールの順序付けられたスタックトレースではないため、特定の順序では表示されません。

AWS アカウントで CloudTrail ログ記録を有効にすると、 AWS IoT Events アクションに対するほとんどのAPI呼び出しは CloudTrail ログファイルに記録され、他の AWS サービスレコードとともに書き込まれます。 CloudTrail は、期間とファイルサイズに基づいて、新しいファイルの作成と書き込みのタイミングを決定します。

各ログエントリには、リクエストの生成者に関する情報が含まれます。ログエントリのユーザーアイデンティティ情報は、次のことを確認するのに役立ちます。

  • リクエストが、ルートと IAM ユーザー認証情報のどちらを使用して送信されたか。

  • リクエストが、ロールとフェデレーションユーザーの一時的なセキュリティ認証情報のどちらを使用して送信されたか。

  • リクエストが別の AWS サービスによって行われたかどうか。

必要な場合はログファイルを自身の Amazon S3 バケットに保存できますが、ログファイルを自動的にアーカイブまたは削除するにように Amazon S3 ライフサイクルルールを定義することもできます。デフォルトでは、ログファイルは Amazon S3 サーバー側の暗号化 () で暗号化されますSSE。

ログファイルの配信時に通知を受け取るには、新しいログファイルの配信時に Amazon SNS通知を発行 CloudTrail するように を設定できます。詳細については、「Amazon SNS通知の設定 CloudTrail」を参照してください。

複数の AWS リージョンと複数の AWS アカウントの AWS IoT Events ログファイルを 1 つの Amazon S3 バケットに集約することもできます。

詳細については、「複数のリージョンからの CloudTrail ログファイルの受信」および「複数のアカウントからの CloudTrail ログファイルの受信」を参照してください。

次の例は、 DescribeDetectorアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:sts::123456789012:assumed-role/Admin/bertholt-brecht", "accountId": "123456789012", "accessKeyId": "access-key-id", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-08T18:53:58Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" } } }, "eventTime": "2019-02-08T19:02:44Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeDetector", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-cli/1.15.65 Python/3.7.1 Darwin/16.7.0 botocore/1.10.65", "requestParameters": { "detectorModelName": "pressureThresholdEventDetector-brecht", "keyValue": "1" }, "responseElements": null, "requestID": "00f41283-ea0f-4e85-959f-bee37454627a", "eventID": "5eb0180d-052b-49d9-a289-0eb8d08d4c27", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 CreateDetectorModelアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-Lambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEvents-RoleForIotEvents-ABC123DEF456/IotEvents-Lambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABC123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABC123DEF456" } } }, "eventTime": "2019-02-07T23:54:43Z", "eventSource": "iotevents.amazonaws.com", "eventName": "CreateDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel", "key": "HIDDEN_DUE_TO_SECURITY_REASONS", "roleArn": "arn:aws:iam::123456789012:role/events_action_execution_role" }, "responseElements": null, "requestID": "cecfbfa1-e452-4fa6-b86b-89a89f392b66", "eventID": "8138d46b-50a3-4af0-9c5e-5af5ef75ea55", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 CreateInputアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-Lambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABC123DEF456/IotEvents-Lambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABC123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABC123DEF456" } } }, "eventTime": "2019-02-07T23:54:43Z", "eventSource": "iotevents.amazonaws.com", "eventName": "CreateInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "inputName": "batchputmessagedetectorupdated", "inputDescription": "batchputmessagedetectorupdated" }, "responseElements": null, "requestID": "fb315af4-39e9-4114-94d1-89c9183394c1", "eventID": "6d8cf67b-2a03-46e6-bbff-e113a7bded1e", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 DeleteDetectorModelアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:54:11Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DeleteDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel" }, "responseElements": null, "requestID": "149064c1-4e24-4160-a5b2-1065e63ee2e4", "eventID": "7669db89-dcc0-4c42-904b-f24b764dd808", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 DeleteInputアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:54:38Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DeleteInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "errorCode": "ResourceNotFoundException", "errorMessage": "Input of name: NoSuchInput not found", "requestParameters": { "inputName": "NoSuchInput" }, "responseElements": null, "requestID": "ce6d28ac-5baf-423d-a5c3-afd009c967e3", "eventID": "be0ef01d-1c28-48cd-895e-c3ff3172c08e", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 DescribeDetectorModelアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AAKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:54:20Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel" }, "responseElements": null, "requestID": "18a11622-8193-49a9-85cb-1fa6d3929394", "eventID": "1ad80ff8-3e2b-4073-ac38-9cb3385beb04", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 DescribeInputアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AAKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:56:09Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "inputName": "input_createinput" }, "responseElements": null, "requestID": "3af641fa-d8af-41c9-ba77-ac9c6260f8b8", "eventID": "bc4e6cc0-55f7-45c1-b597-ec99aa14c81a", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 DescribeLoggingOptionsアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:23Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeLoggingOptions", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": null, "responseElements": null, "requestID": "b624b6c5-aa33-41d8-867b-025ec747ee8f", "eventID": "9c7ce626-25c8-413a-96e7-92b823d6c850", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 ListDetectorModelsアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:23Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListDetectorModels", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "nextToken": "CkZEZXRlY3Rvck1vZGVsMl9saXN0ZGV0ZWN0b3Jtb2RlbHN0ZXN0X2VlOWJkZTk1YT", "maxResults": 3 }, "responseElements": null, "requestID": "6d70f262-da95-4bb5-94b4-c08369df75bb", "eventID": "2d01a25c-d5c7-4233-99fe-ce1b8ec05516", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 ListDetectorModelVersionsアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:33Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListDetectorModelVersions", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel", "maxResults": 2 }, "responseElements": null, "requestID": "ebecb277-6bd8-44ea-8abd-fbf40ac044ee", "eventID": "fc6281a2-3fac-4e1e-98e0-ca6560b8b8be", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 ListDetectorsアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:54Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListDetectors", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "batchputmessagedetectorinstancecreated", "stateName": "HIDDEN_DUE_TO_SECURITY_REASONS" }, "responseElements": null, "requestID": "4783666d-1e87-42a8-85f7-22d43068af94", "eventID": "0d2b7e9b-afe6-4aef-afd2-a0bb1e9614a9", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 ListInputsアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:57Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListInputs", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "nextToken": "CkhjYW5hcnlfdGVzdF9pbnB1dF9saXN0ZGV0ZWN0b3Jtb2RlbHN0ZXN0ZDU3OGZ", "maxResults": 3 }, "responseElements": null, "requestID": "dd6762a1-1f24-4e63-a986-5ea3938a03da", "eventID": "c500f6d8-e271-4366-8f20-da4413752469", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 PutLoggingOptionsアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:56:43Z", "eventSource": "iotevents.amazonaws.com", "eventName": "PutLoggingOptions", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "loggingOptions": { "roleArn": "arn:aws:iam::123456789012:role/logging__logging_role", "level": "INFO", "enabled": false } }, "responseElements": null, "requestID": "df570e50-fb19-4636-9ec0-e150a94bc52c", "eventID": "3247f928-26aa-471e-b669-e4a9e6fbc42c", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 UpdateDetectorModelアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:55:51Z", "eventSource": "iotevents.amazonaws.com", "eventName": "UpdateDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel", "roleArn": "arn:aws:iam::123456789012:role/Events_action_execution_role" }, "responseElements": null, "requestID": "add29860-c1c5-4091-9917-d2ef13c356cf", "eventID": "7baa9a14-6a52-47dc-aea0-3cace05147c3", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

次の例は、 UpdateInputアクションを示す CloudTrail ログエントリを示しています。

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:00Z", "eventSource": "iotevents.amazonaws.com", "eventName": "UpdateInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "errorCode": "ResourceNotFoundException", "errorMessage": "Input of name: NoSuchInput not found", "requestParameters": { "inputName": "NoSuchInput", "inputDescription": "this is a description of an input" }, "responseElements": null, "requestID": "58d5d2bb-4110-4c56-896a-ee9156009f41", "eventID": "c2df241a-fd53-4fd0-936c-ba309e5dc62d", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

AWS IoT Events では、データプレーンのAPIログ記録に CloudTrail 統合を使用できます。この例では、 BatchPutMessageアクションを通じてデータイベントの詳細を追加します。

{ "eventVersion": "1.09", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:PrincipalId", "arn": "arn:aws:sts::123456789012:assumed-role/my-iam-role/my-iam-role-entity", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws:iam::123456789012:role/my-iam-role", "accountId": "123456789012", "userName": "sample_user_name" }, "attributes": { "creationDate": "2024-11-22T18:32:41Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-11-22T18:57:35Z", "eventSource": "iotevents.amazonaws.com", "eventName": "BatchPutMessage", "awsRegion": "us-east-1", "sourceIPAddress": "3.239.107.128", "userAgent": "aws-internal/3", "requestParameters": { "messages": [ { "messageId": "e306d827-b2e4-4439-9c86-411d4242a397", "payload": "HIDDEN_DUE_TO_SECURITY_REASONS", "inputName": "my_input_name" } ] }, "responseElements": { "batchPutMessageErrorEntries": [] }, "requestID": "cefc6b63-9ccf-4e31-9177-4aec8e701bfe", "eventID": "b994b52c-6011-4e3c-ad5f-e784e732fde0", "readOnly": false, "resources": [ { "accountId": "123456789012", "type": "AWS::IoTEvents::Input", "ARN": "arn:aws:iotevents:us-east-1:123456789012:input/my_input_name" } ], "eventType": "AwsApiCall", "managementEvent": false, "recipientAccountId": "123456789012", "eventCategory": "Data", "tlsDetails": { "tlsVersion": "TLSv1.3", "cipherSuite": "TLS_AES_128_GCM_SHA256", "clientProvidedHostHeader": "iotevents.us-east-1.amazonaws.com" } },