🕳️
The Cyber Security Library
Ctrlk
  • The Library
  • Offensive Security
  • Malware
  • Vulnerability Management
  • Cloud
    • AWS
      • AWS CDK: Deploy and using amazon SQS Que from Repo
      • Using Different AWS Services with Splunk
        • AWS Config
        • CloudTrail
        • EventBridge
        • CloudWatch
        • Configuring VPC Flow Logs
        • Automating Incident Response with EventBridge
        • CloudTrail SIEM Integration (Splunk)
      • AWS DevOps EBS Volumes
      • EKS Creating a deployment with AWS in the command Line
      • How to CloudShell SSH in to ec2 Instances
    • Azure
  • Splunk
  • DevOps
  • CTF's
    • THM Wonderland
    • Healthcare OpenEMR system -THM Plotted EMR
    • Steam Cloud CTF Exploiting Kubernetes
    • THM Flatline CTF
    • Biteme CTF
    • Devoops CTF
    • GoBox CTF
    • Explore: Android Box
Powered by GitBook
On this page
  1. Cloud
  2. AWS

Using Different AWS Services with Splunk

AWS ConfigCloudTrailEventBridgeCloudWatchConfiguring VPC Flow LogsAutomating Incident Response with EventBridgeCloudTrail SIEM Integration (Splunk)
PreviousDestroying the stack and cleaning upNextAWS Config