AWS Auditing/Monitoring/Logging Services for Cloud/DevOps Engineers

AWS Auditing/Monitoring/Logging Services for Cloud/DevOps Engineers

Learning path for the AWS Cloud Practitioner exam

📝Introduction

This post will cover the main Technologies from AWS Deployment and Infrastructure Management Services.

📝Auditing/Monitoring/Logging

These types of services give us insight into how well your systems are performing and help you proactively find and resolve errors.

Using them, for example, we can check any changes performed on the AWS Management Console, the root cause of an Application error, which is the current CPU load EC2 instance, etc, and below we are describing the 2 main tools from AWS for that.

  • AWS CloudWatch -> It is a collection of services that help you monitor and observe your cloud resources.

    • Improve operational performance using alarms and automated actions set to activate at predetermined thresholds

    • Real-time logs, metrics, and event data

    • Scalable

    • Troubleshoot operational problems with actionable insights derived from logs and metrics

    • Cross-account observability across multiple AWS accounts

    • Container monitoring insights

    • Internet Monitor

    • Anomaly Detection

    • Set alarms

    • Integrated with AWS IAM for Compliance and Security

    • CloudWatch in the Real World Scenarios:

      • Provide real-time monitoring on EC2 instances. It can notify you if an EC2 instance goes into the stopped state or usage goes above a certain utilization.

  • AWS CloudTrail -> It tracks user activity and API calls within your account.

    • Log and retain account activity

    • Track activity through the console, SDKs, and CLI

    • Identify which user made changes

    • Detect unusual activity in your account

    • Compliance with regulations such as SOC, PCI, and HIPAA

    • Multi-Region

    • Multi-Account

    • Multicloud and multisource

    • Always On

    • ClouTrail in the Real World Scenarios:

      • Track the time a particular event occurred in your account. It can troubleshoot events over the past 90 days using the CloudTrail event history log to find the specific time an event occurred on a per-Region basis

Thank you for reading. I hope you were able to understand and learn something helpful from my blog.

Please follow me on Hashnode and on LinkedIn franciscojblsouza