🕳️
The Cyber Security Library
  • The Library
  • Offensive Security
    • Solar, Exploiting log4j
      • Reconnaissance
      • Discovery
      • Proof of Concept
      • Exploitation
    • Basic Authentication Bypass
      • Username Enumeration
      • Brute Force
      • Logic Flaw
      • Cookie Tampering
    • Insekube
      • Recon with Nmap
      • Checking out the web address
      • Creating a Reverse shell
      • Inside the Kubernetes pod
      • CVE-2021-43798
    • Snort
      • What is Snort? (For the uninitiated)
      • Task exercise
      • Traffic Generator
      • Brief overview of IDS and IPS
      • Checking Snort
      • Snort Sniffer mode
      • Packet Logger mode
    • Runtime Detection Evasion
      • Learning Objectives of AMSI
      • Runtime detections
      • AMSI Overview
      • AMSI Instrumentation
      • Powershell Downgrade
      • Powershell Reflection
      • Patching AMSI
    • Red team recon using OSINT
      • Taxonomy of Reconnaissance
      • Built-in tools
      • Advanced Searching
      • Specialized Search Engines
  • Malware
    • Introduction to Malware Analysis
      • What are the different types of malware analysis
      • Doing different types of analysis
      • Anti analysis techniques
    • Ransomeware: Maze
    • Exploring Steganography
    • Simple Trojan with Python
      • The Python Trojan
      • Breaking down the python code
  • Vulnerability Management
    • Nessus
      • Introduction
      • Nessus Essentials
      • Scans
      • Authenticated Scans
      • Results
      • Running custom scans
  • Cloud
    • AWS
      • AWS CDK: Deploy and using amazon SQS Que from Repo
        • Node modules and Bootstrapping troubleshooting
        • Sending and Receiving information from the stack
        • Destroying the stack and cleaning up
      • Using Different AWS Services with Splunk
        • AWS Config
          • How Does Config work?
          • How to enable Config
          • Settings
          • Aggregation
          • Creating Config Resource
          • Creating Aggregator
          • Adding Rules
        • CloudTrail
          • What is CloudTrail?
          • Features of CloudTrail
          • Benefits of CloudTrail
          • CloudTrail Event History
          • Securing CloudTrail
        • EventBridge
          • Configuring EventBridge and Event Patterns
          • EventBridge Targets
        • CloudWatch
          • The CloudWatch Dashboard
            • Virtual Machine
          • CloudWatch Alarms and Metric Filters
            • Searching logs using metric filters
            • CloudWatch Alarms
          • CloudWatch CIS Alarms
            • SNS
        • Configuring VPC Flow Logs
          • An introduction to VPC flow logs
        • Automating Incident Response with EventBridge
          • Creating Lambda functions
        • CloudTrail SIEM Integration (Splunk)
          • AWS architecture for integrating with Splunk
      • AWS DevOps EBS Volumes
        • CloudWatch
        • EBS Volume
        • Lambda
      • EKS Creating a deployment with AWS in the command Line
        • Setting up AWS Cloud9
        • Creating a Cluster
        • Creating Deployment
      • How to CloudShell SSH in to ec2 Instances
    • Azure
      • Worker CTF (Azure DevOps)
        • Enumeration
        • Using SVN
        • Exploring the Domain
        • Cracking Azure DevOps console
      • Software development environments and Azure DevOps pipeline abuse
        • Accessing Azure Devops
        • Exploring Project Pages
  • Splunk
    • Splunk SIEM Integration
      • AWS architecture for integrating with Splunk
    • Splunk Threat Hunting Ep.6 Credential Access
  • DevOps
    • Using AWS, Docker, Jenkins and SonarQube to improve code quality
      • Updating the Cloud Instance and Getting Docker
      • Installing SonarQube
      • Creating Jenkins Server
      • Manaing SonarQube and Jenkins
    • Creating a Codebuild project and getting the output with CloudWatch Logs
      • IAM
      • CodeBuild
  • CTF's
    • THM Wonderland
      • Nmap and Gobuster
      • Entering Wonderland
      • Privilege Escalation
    • Healthcare OpenEMR system -THM Plotted EMR
      • Recon with Nmap
      • Exploring the ports found
      • Gobuster
      • Searchsploit Open emr
    • Steam Cloud CTF Exploiting Kubernetes
      • SteamCloud Privilege Escalation
    • THM Flatline CTF
      • Recon with Nmap
      • Searchsploit for freeswitch
      • Using the exploit
      • Escalating my privileges
      • Gaining access inside the Windows RDP
    • Biteme CTF
      • Recon
      • Looking into the PHP code and decoding hexadecimal
      • Python script and Bash script
      • Bruteforcing MFA Code
      • Trying to gain access via SSH
      • Inside SSH
      • Fail2ban Privilege Escalation
    • Devoops CTF
      • Enumeration
      • Exploiting Web Page
      • Creating Python exploit
    • GoBox CTF
      • Enumeration
      • Using Burpsuite and creating Reverse shell
    • Explore: Android Box
      • Enumeration
      • Initial foothold
      • Privilege escalation
Powered by GitBook
On this page
  • What is CloudWatch?
  • Features of CloudWatch
  • Benefits of CloudWatch
  1. Cloud
  2. AWS
  3. Using Different AWS Services with Splunk

CloudWatch

PreviousEventBridge TargetsNextThe CloudWatch Dashboard

Last updated 1 year ago

What is CloudWatch?

CloudWatch . A metric is a variable that can change over time. These can come from AWS resources that integrate with CloudWatch, or you can supply custom data for monitoring.

An example of an AWS service that publishes metrics to CloudWatch is EC2. CloudWatch receives metrics such as average CPU utilization (as a percentage) and network traffic received (measured in bytes). View the CloudWatch documentation for a .

With your metrics stored in CloudWatch, AWS can calculate statistics to give you a better insight into the performance of your resources. This information is displayed in customizable dashboards in the console (we'll cover more about this, and alarms, later in the lab). You can also configure alarms to be triggered when the metric meets specific criteria. You can set these alarms to alert your team via SNS or to take automated actions within AWS.

Alongside the metric functionality provided by CloudWatch, CloudWatch Logs also allows you to store logs from various services. Once the logs are stored in CloudWatch, they can be viewed directly in the AWS console and analyzed using the metric functionality. For example, you can set up a metric to look for the number of logs containing a specific response and trigger an alarm when a set number of these logs are received within a particular time period.

Features of CloudWatch

  • Metrics: Metrics are how CloudWatch handles data. A metric is a collection of time-ordered data points. The data point value is the information you’re interested in, what percent CPU utilization an EC2 instance is at, or how many objects were uploaded to your S3 bucket. The metric then shows what these values have been at different times. They can be displayed in a graph to see at what times the values peaked or troughed.

  • Alarms: As metrics change over time, you may want to be notified if their values pass a specific threshold value over a certain time period. This is what alarms can do. You give them a threshold value and a metric to monitor, and if the metric value exceeds the threshold, the alarm state changes. Actions can then be configured for when the state of an alarm changes. These actions could involve sending the events to EventBridge, which can automatically message via SNS or perform auto-remediation via Lambda.

  • Log groups and log streams: CloudWatch allows you to store logs from different AWS services in one place where they can be monitored and analyzed. This includes logs from CloudTrail and bespoke logs from other services such as EC2 and Route53. Logs from the same source are stored as a log stream. Log streams with the same configuration settings (retention settings, access controls, etc.) can be bundled into a log group to streamline management.

Benefits of CloudWatch

Aggregation: Keeping all the data and logs from across your application in one place will allow you to diagnose problems more quickly. You should take care when giving permissions to CloudWatch, as blanket access may provide users with access to unauthorized information.

Automation: CloudWatch allows you to react to security and operational events automatically. This can help stop security incidents in their tracks rather than progressing until a team's office hours start or somebody notices something.

Visibility: Being able to query and monitor logs and data from multiple sources will greatly improve your ability to dig deeper into issues with your application and determine the true root causes.

Dashboards: These pages in the AWS console can be customized to show different widgets. AWS generates some default dashboards for your whole account and individual services, but you can also create your own. There are many types of widgets that include graphs of metric values over time, alarm statuses, a simple number widget that displays the latest value of a metric, and text widgets that can be written in markdown. You can also alter the Dashboard scope to only display information about certain AWS services or regions, and that look at data from multiple accounts.

set up centralized dashboards
acts as a repository that stores metrics within AWS
complete list of services that publish metrics to CloudWatch