You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
* feat(updater): implement UTMStack Updater service
* feat(agent): enhance updater service integration and management
* feat(pipeline): update build process for Linux and Windows binaries of the updater service
* refactor(agent): remove obsolete CleanOldServices function
* refactor(agent): remove self
* feat(aws): optimize AWS log collection
* feat(guide): enhance AWS IAM user setup instructions and improve clarity
Signed-off-by: Manuel Abascal <mjabascal10@gmail.com>
* Revert "refactor(agent): remove self"
This reverts commit 865588b.
* Revert "refactor(agent): remove obsolete CleanOldServices function"
This reverts commit eea8f42.
* Revert "feat(pipeline): update build process for Linux and Windows binaries of the updater service"
This reverts commit 0a35cd4.
* Revert "feat(agent): enhance updater service integration and management"
This reverts commit dcda957.
* Revert "feat(updater): implement UTMStack Updater service"
This reverts commit c2a6b80.
* chore: update CHANGELOG for UTMStack v11.1.7 release
* feat(guide): enhance AWS IAM user setup instructions and improve clarity
Signed-off-by: Manuel Abascal <mjabascal10@gmail.com>
* feat(guide): enhance AWS IAM user setup instructions and improve clarity
Signed-off-by: Manuel Abascal <mjabascal10@gmail.com>
---------
Signed-off-by: Manuel Abascal <mjabascal10@gmail.com>
Co-authored-by: Yadian Llada Lopez <yadian.llada@gmail.com>
<strong>Create a CloudWatch Log Group.</strong> Open the CloudWatch console, choose <strong>Log management</strong> and click <strong>Create log group</strong>.
<strong>Name and retention.</strong> Enter the log group name <code>utmstack</code> and set retention to <strong>1 day</strong>. Click <strong>Create log group</strong>.
<strong>Open CloudTrail and start trail creation.</strong> In the CloudTrail console click <strong>Create trail</strong> to begin configuring a new trail.
<li><strong>Trail name and scope:</strong> enter a descriptive name; enable <strong>Apply trail to all accounts in my organization</strong> if you require org‑wide collection.</li>
148
+
<li><strong>S3 destination:</strong> choose <strong>Create new S3 bucket</strong> (or select an existing bucket) for raw log delivery.</li>
149
+
<li><strong>Encryption:</strong> enable <strong>Log file SSE‑KMS</strong> and select the appropriate KMS key.</li>
150
+
<li><strong>Log file validation:</strong> enable to ensure integrity of delivered logs (recommended).</li>
151
+
<li><strong>CloudWatch Logs:</strong> enable delivery to CloudWatch and select <strong>Use existing log group</strong>, then enter the exact name <code>utmstack</code>.</li>
152
+
<li><strong>IAM role:</strong> provide or create the role CloudTrail will assume to write to S3 and publish to CloudWatch (example: <code>CloudTrail-UTMStack-DeliveryRole</code>).</li>
153
+
</ul>
154
+
155
+
<imgalt="CloudTrail configuration: S3, SSE-KMS, Log file validation, CloudWatch Logs and IAM role" class="step-img"
Click on the button shown below, to activate the UTMStack features related to this integration
162
+
<strong>Select event types.</strong>
163
+
On this screen enable the event categories required for monitoring and auditing. Follow the three sections below and match the checkboxes shown in each screenshot.
<li>Enable <strong>Management events</strong> and select <strong>All</strong> (or the equivalent option) to record all API activity that manages AWS resources (create, update, delete).</li>
171
+
<li>Reason: captures administrative changes and configuration actions needed for auditing and incident investigation.</li>
<pclass="step-desc pt-1"><strong>2. Data events</strong></p>
180
+
<ulclass="pl-3">
181
+
<li>Add at least one <strong>Data event</strong>. Choose <strong>S3</strong> and select <strong>Log all events</strong> (or <em>All S3 object-level events</em>) to capture object-level operations such as GetObject and PutObject.</li>
182
+
</ul>
183
+
<imgalt="CloudTrail select data events" class="step-img"
<li>In the Network Activities section add at least one service. For example, select <code>ec2.amazonaws.com</code> and enable <strong>Log all events</strong> for that service.</li>
After confirming these selections, click <strong>Next</strong> to continue. Ensure the options match the screenshots and cover the resources you need to audit.
199
+
</p>
200
+
201
+
</li>
202
+
203
+
204
+
<li>
205
+
<pclass="step-guide">
206
+
<spanclass="step_number">16</span>
207
+
<strong>Configure aggregation and review.</strong> On the <strong>Configure event aggregation</strong> screen accept the defaults (or adjust if required). Review all settings and click <strong>Create trail</strong>.
208
+
</p>
209
+
<imgalt="CloudTrail configure aggregation and review" class="step-img"
<strong>Activate the integration.</strong> After the trail is created and events are flowing to <code>utmstack</code>, click the button below to enable UTMStack features for this integration.
0 commit comments