Hub
Cloud

AWS CloudTrail Management Events

AWS CloudTrail audit trail — API calls across EC2, IAM, STS, and S3 from a multi-account organization. Includes console logins, role assumptions, error injection, and 4 identity types.

Quick Start

uv tool install eventum-generator
git clone https://github.com/eventum-generator/content-packs.git
cd content-packs
eventum generate \
  --path generators/cloud-aws-cloudtrail/generator.yml \
  --id cloudtrail \
  --live-mode true

Event Types

Event IDDescriptionFrequencyCategory
AssumeRoleAssume an IAM role (STS)~33%authentication
DescribeInstancesList/describe EC2 instances~15%host
GetCallerIdentityRetrieve caller identity (STS)~9%authentication
ConsoleLoginAWS Management Console sign-in~6%authentication
DescribeSecurityGroupsList/describe security groups~7%network
RunInstancesLaunch new EC2 instances~2%host
CreateUserCreate a new IAM user<1%iam
AttachRolePolicyAttach managed policy to role<1%iam

Realism Features

  • Jinja2 macros eliminate boilerplate across 22 templates
  • 4 identity types — AssumedRole (65%), IAMUser (20%), AWSService (12%), Root (0.5%)
  • Shared state correlations — AssumeRole generates temp credentials reused by subsequent API calls
  • Error injection (~4%) — 20 realistic error scenarios mapped to specific API operations
  • Console login flow with MFA tracking and ~5% login failure rate
  • Multi-account environment — 3 AWS accounts (production, staging, development)
  • 10 IAM users across 7 departments, 12 IAM roles with distinct trust services

Sample Output

{
    "@timestamp": "2026-03-04T14:22:31+00:00",
    "cloud": {
        "account": { "id": "123456789012", "name": "acme-production" },
        "provider": "aws",
        "region": "us-east-1"
    },
    "event": {
        "action": "AssumeRole",
        "category": ["authentication"],
        "dataset": "aws.cloudtrail",
        "kind": "event",
        "module": "aws",
        "outcome": "success"
    },
    "user": {
        "name": "michael.chen",
        "id": "AIDAEXAMPLE3MCHEN001"
    },
    "aws": {
        "cloudtrail": {
            "event_source": "sts.amazonaws.com",
            "event_name": "AssumeRole",
            "event_type": "AwsApiCall",
            "user_identity": {
                "type": "IAMUser",
                "arn": "arn:aws:iam::123456789012:user/michael.chen"
            }
        }
    }
}

Parameters

ParameterDefaultDescription
agent_ida1b2c3d4-...Filebeat agent UUID
agent_version8.17.0Elastic Agent version
event_version1.09CloudTrail event version
error_rate4Error injection rate (percentage, 0-100)

Related Generators