Logentries Announces New AWS CloudTrail Alerting
Free log management service for monitoring AWS account activity and performance issues; developed to track and audit most common AWS log alerts
May 29, 2014
Boston, Massachusetts (May 29, 2014) – Logentries, a leading SaaS service for log management and real-time analytics, today announced integrated log monitoring and alerting services for AWS CloudTrail. With the new free CloudTrail support, Logentries users can easily centralize, search and analyze their AWS log data in minutes. Logentries worked closely with Amazon and AWS customers to identify the most important CloudTrail-specific log events and top priority alerts from across the Logentries AWS Community. Logentries’ out-of-the-box configuration for CloudTrail assures the new service is easily accessible to all AWS users without requiring technical expertise.
Complete visibility into CloudTrail logs enables users to fully monitor and audit any activity occurring in their Amazon account including resource utilization, individual activities and a live record of changes that have occurred. The AWS CloudTrail log files include the ability to identify an API caller, the time of the API call, the source IP address of the API caller, the request parameters, and the response elements returned by the AWS service. With the Logentries and AWS CloudTrail integration, users are able to easily address the most common log monitoring requests coming from the AWS community.
Now, with Logentries support, AWS users can easily access CloudTrail log data for:
- Security monitoring including default compliance policies creating, updating and removing security groups
- AWS account user and activity tracking
- Performance troubleshooting
“CloudTrail logs are incredibly valuable to understanding who is doing what in our systems, and quickly identifying performance and security issues,” said Kirill Bensonoff, Co-Founder & Principle at ComputerSupport.com. “Logentries has built a custom integration with CloudTrail focused on the most useful monitoring and alerting configuration that is ready to go in minutes.”
“AWS is an important platform for a big part of our Community so we developed CloudTrail support that was easy to get up and running with automatically configured alerts,” said Trevor Parsons, Chief-scientist and Co-founder, Logentries. “We are excited to now offer out-of-the-box tags and alerts to our users for immediate insight into what is happening across their AWS systems for performance, security and compliance.”
The Logentries’ CloudTrail support is available today in the free Logentries account. For more information please visit the CloudTrail documentation page, or contact us directly at firstname.lastname@example.org.
Logentries is a leading SaaS-delivered log management and real-time analytics service, making business insights from machine-generated log data simply accessible to development, IT and business operations teams of all sizes. While traditional log management tools require advanced technical skills to use, and are costly to set-up, Logentries provides a simply accessible alternative for managing huge amounts of data, visualizing insights that matter, and sharing that information across its global user community. With more than 35,000 users in over 100 countries, Logentries is processing billions of events every day. To sign up for the free Logentries service, visit logentries.com.
Recent Press Releases
New Elastic Logging Enhancements Enable Users to Analyze their Docker Log Data Using Dynamic Time-Slice Views to Identify Rare Events & Outlier Issues
New Logentries Community Pack for Puppet Enterprise Enables SysAdmins to Easily Analyze Puppet Event Data
New Puppet Log Analyzer Monitors Puppet Configuration Changes With Out-of-the-Box Queries, Dashboards and Alerting Tools