Overview
The UTMStack AWS plugin is a connector developed in Golang that receives logs from AWS CloudWatch and sends them to the UTMStack processing server for security analysis and monitoring.How It Works
The AWS integration:- Uses the AWS Go SDK to communicate with CloudWatch Logs service
- Connects to UTMStack via GRPC through a Unix socket
- Automatically pulls logs from specified CloudWatch log groups
- Processes and forwards events to UTMStack for correlation and analysis
PrerequisitesYou need a valid AWS account with:
- Access to CloudWatch Logs
- IAM credentials with appropriate permissions to read CloudWatch logs
- CloudWatch log groups configured with the resources you want to monitor
Configuration Steps
1. Create IAM User for UTMStack
Create an IAM user in AWS with the following permissions:2. Gather Required Information
Collect the following information from AWS:- Access Key ID: IAM user access key
- Secret Access Key: IAM user secret key
- Region: AWS region where your CloudWatch logs are located (e.g.,
us-east-1) - Log Group Names: Names of CloudWatch log groups to monitor
3. Configure in UTMStack
- Navigate to Integrations in the UTMStack console
- Select AWS CloudWatch
- Enter the required credentials:
- Access Key ID
- Secret Access Key
- AWS Region
- Log Group Names (comma-separated)
- Click Save to activate the integration
4. Verify Integration
Once configured, the plugin will:- Connect to AWS CloudWatch using the provided credentials
- Begin pulling logs from specified log groups
- Forward events to UTMStack for processing
- Checking the integration status in UTMStack console
- Viewing incoming AWS events in the Events dashboard
- Monitoring the plugin logs for any connection errors
Supported Log Sources
The AWS integration can collect logs from any CloudWatch log group, including:- VPC Flow Logs: Network traffic monitoring
- CloudTrail: API activity and governance
- Lambda: Serverless function logs
- EC2: Instance system logs
- RDS: Database logs
- ECS/EKS: Container orchestration logs
- API Gateway: API request logs
- WAF: Web application firewall logs
Troubleshooting
Authentication Errors
- Verify IAM credentials are correct
- Ensure the IAM user has the required permissions
- Check if MFA is required for the account
No Data Received
- Verify log groups contain recent data
- Check the AWS region is correct
- Ensure CloudWatch is generating logs for your resources
- Review plugin logs for specific error messages
Performance Considerations
- The plugin polls CloudWatch at regular intervals
- High-volume log groups may require additional tuning
- Consider filtering logs at the CloudWatch level to reduce data volume