Principal Technical Architect at LTI - Larsen & Toubro Infotech
Real User
Top 20
2025-06-20T03:33:13Z
Jun 20, 2025
I am a system admin and site reliability engineer. We work closely with the DBA team. While patching, we have to patch the server where the DB servers are. We patch DB servers also, and we are in touch with the DBA. We see the cluster; the DBA is always in a cluster. They will do instance by instance, they will remove the server from the cluster and allow us to patch. Then they add the server back and they monitor it. We maintain high availability; if any resource goes down, immediately a ticket is raised, and we troubleshoot the issue. I'm not a DBA specialist. The DBA works on the DB. My work is to monitor the DB servers continuously. I'm not going to write any queries for monitoring purposes. As a technical architect, my work is to maintain the server running continuously. We write some scripts for management. After three months, data is moved from S3 bucket to Glacier, according to our created policy. All logs stored in an S3 bucket, that information is triggered via Lambda. It is integrated with Lambda function. If any issue goes beyond, Lambda gets triggered. We have configured Lambda; it triggers and sends an SNS notification to us. Even if we are not watching the dashboard, we will get notifications via SMS and email services. SMS and simple mail services are already configured. Dynatrace is a full stack service that supports EC2. It supports infrastructure services as well as all services we can connect with Dynatrace. We have Kubernetes, Docker, and EC2 instances, and all heterogeneous services are connected by Dynatrace. Dynatrace not only logs but operates on service levels and host levels. We just need to install OneAgent software. Once OneAgent is configured, Dynatrace takes complete control of the information. AWS CloudTrail is a log, so we are not watching AWS CloudTrail directly. The AWS CloudTrail APIs are integrated with Dynatrace. From the Dynatrace dashboard, we monitor for any issue going beyond the limit; first, we watch the Dynatrace logs. In turn, Dynatrace is connected with AWS CloudTrail. If we click the logs inside Dynatrace, it directly links to AWS CloudTrail. Dynatrace is a third-party tool that gives support not only to AWS but also to all multi-cloud services. It is a heterogeneous tool that supports all services whereas AWS CloudTrail is limited to AWS. AWS CloudTrail only supports AWS, and Azure has its functions, GCP has their own. Dynatrace offers more flexible dashboards and services, making it more adaptable compared to AWS CloudTrail. AWS CloudTrail is mostly CLI based, with a little bit of UI interaction, but Dynatrace is more flexible. AWS CloudTrail features a totally cloud-based deployment. I rate AWS CloudTrail a nine out of ten.
It is essential to have AWS CloudTrail active to monitor API activity. Logs can be stored indefinitely, though the free version retains logs for ninety days. Logs can be sent to an S3 ( /products/amazon-s3-reviews ) bucket for long-term storage. I would rate the overall solution as 8 out of 10.
Customers should have a professional person configure CloudTrail. Hiring a non-professional at low prices can lead to configuration issues. Hiring a proper professional is advised. I'd rate the solution eight out of ten.
Cloud - Solution Architect at a tech vendor with 1,001-5,000 employees
Real User
Top 5
2024-08-22T17:45:36Z
Aug 22, 2024
AWS CloudTrail's most valuable feature in enhancing your compliance audit is that it gives me the ability to search for users who have made different API calls, which is something I find really helpful in AWS in most cases. I searched for the user who made that API call or identified it easily by using the search feature in AWS CloudTrail. My company has integrated AWS CloudTrail with Amazon EventBridge and Amazon Athena. When we integrated AWS CloudTrail with Amazon Athena, we could easily enhance our analysis. For example, if I want to identify the trend and isolate some activity by attribute or source IP address, then I will use CloudTrail logs integrated with Amazon Athena. I could easily isolate activities associated with the source IP address. The tool is easy to use, and I rate it seven out of ten. You need to have some knowledge of AWS CloudTrail because you have to run some queries or filter the source IP address. You should have some knowledge about the tool. I recommend the tool to others. I have not used the tool's AI capabilities. I rate the tool a nine out of ten.
I highly recommend enabling CloudTrail because it keeps an eye on your environment when you're not looking. There's no case where I would say customers should not enable it because it's not something that you're paying for upfront. If it does activate, you might have to pay for things like Lambda functions, but it's worth it. This is especially important now with so many potential security risks. AWS locks logs for 90 days, but now you have them available indefinitely. However, keep in mind that storing these logs can incur costs. I rate the overall product a nine out of ten.
Principal Solution Architect at StarOne IT Solutions
MSP
Top 5
2024-02-15T08:55:40Z
Feb 15, 2024
My advice depends on whether you're a BFSA customer or a healthcare customer. Specific parameters need to be enabled based on your industry. With that configuration, you'll be able to trigger notifications and pull out data. Overall, I would rate the solution an eight out of ten because when you consider all business sectors like healthcare, shipping, retail, manufacturing, and research & development, each generates different types of files and events.
I'd advise to integrate it with your security solution and correlate logs across AWS. That's the single point to start understanding if your account is compromised. And always keep a backup of the logs. And make sure those logs are kept in a separate AWS account from the main one. First thing any attacker would do is delete those logs to cover their tracks. Forensics becomes very tough without them. Overall, I would rate the solution a ten out of ten.
Information Security Officer at Habib InsuranceSecurity Officer Habib Insurance
Real User
Top 20
2024-01-12T09:54:00Z
Jan 12, 2024
The solution’s maintenance depends on the situation. Sometimes there are critical issues like device issues, application issues, Internet issues, infrastructure issues, or HSA issues. It depends on the team, infrastructure size, and the scope of the cloud. If it is a set of three or four servers, there is no need for a team, the Microsoft support team handles it. The product is good. Overall, I rate the solution an eight out of ten.
The solution is a good, all-in-one product for logs, security, and compliance that are important in the cloud. Its logs automatically capture publishing, services, events, and anything you create in AWS. I rate the solution a nine out of ten.
AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. With CloudTrail, you can log, continuously monitor, and retain account activity related to actions across your AWS infrastructure. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. This event history simplifies security analysis, resource...
I am a system admin and site reliability engineer. We work closely with the DBA team. While patching, we have to patch the server where the DB servers are. We patch DB servers also, and we are in touch with the DBA. We see the cluster; the DBA is always in a cluster. They will do instance by instance, they will remove the server from the cluster and allow us to patch. Then they add the server back and they monitor it. We maintain high availability; if any resource goes down, immediately a ticket is raised, and we troubleshoot the issue. I'm not a DBA specialist. The DBA works on the DB. My work is to monitor the DB servers continuously. I'm not going to write any queries for monitoring purposes. As a technical architect, my work is to maintain the server running continuously. We write some scripts for management. After three months, data is moved from S3 bucket to Glacier, according to our created policy. All logs stored in an S3 bucket, that information is triggered via Lambda. It is integrated with Lambda function. If any issue goes beyond, Lambda gets triggered. We have configured Lambda; it triggers and sends an SNS notification to us. Even if we are not watching the dashboard, we will get notifications via SMS and email services. SMS and simple mail services are already configured. Dynatrace is a full stack service that supports EC2. It supports infrastructure services as well as all services we can connect with Dynatrace. We have Kubernetes, Docker, and EC2 instances, and all heterogeneous services are connected by Dynatrace. Dynatrace not only logs but operates on service levels and host levels. We just need to install OneAgent software. Once OneAgent is configured, Dynatrace takes complete control of the information. AWS CloudTrail is a log, so we are not watching AWS CloudTrail directly. The AWS CloudTrail APIs are integrated with Dynatrace. From the Dynatrace dashboard, we monitor for any issue going beyond the limit; first, we watch the Dynatrace logs. In turn, Dynatrace is connected with AWS CloudTrail. If we click the logs inside Dynatrace, it directly links to AWS CloudTrail. Dynatrace is a third-party tool that gives support not only to AWS but also to all multi-cloud services. It is a heterogeneous tool that supports all services whereas AWS CloudTrail is limited to AWS. AWS CloudTrail only supports AWS, and Azure has its functions, GCP has their own. Dynatrace offers more flexible dashboards and services, making it more adaptable compared to AWS CloudTrail. AWS CloudTrail is mostly CLI based, with a little bit of UI interaction, but Dynatrace is more flexible. AWS CloudTrail features a totally cloud-based deployment. I rate AWS CloudTrail a nine out of ten.
It is essential to have AWS CloudTrail active to monitor API activity. Logs can be stored indefinitely, though the free version retains logs for ninety days. Logs can be sent to an S3 ( /products/amazon-s3-reviews ) bucket for long-term storage. I would rate the overall solution as 8 out of 10.
I would highly recommend AWS CloudTrail to others. It is the best service to monitor your infrastructure. I would rate AWS CloudTrail nine out of ten.
Customers should have a professional person configure CloudTrail. Hiring a non-professional at low prices can lead to configuration issues. Hiring a proper professional is advised. I'd rate the solution eight out of ten.
AWS CloudTrail's most valuable feature in enhancing your compliance audit is that it gives me the ability to search for users who have made different API calls, which is something I find really helpful in AWS in most cases. I searched for the user who made that API call or identified it easily by using the search feature in AWS CloudTrail. My company has integrated AWS CloudTrail with Amazon EventBridge and Amazon Athena. When we integrated AWS CloudTrail with Amazon Athena, we could easily enhance our analysis. For example, if I want to identify the trend and isolate some activity by attribute or source IP address, then I will use CloudTrail logs integrated with Amazon Athena. I could easily isolate activities associated with the source IP address. The tool is easy to use, and I rate it seven out of ten. You need to have some knowledge of AWS CloudTrail because you have to run some queries or filter the source IP address. You should have some knowledge about the tool. I recommend the tool to others. I have not used the tool's AI capabilities. I rate the tool a nine out of ten.
I highly recommend enabling CloudTrail because it keeps an eye on your environment when you're not looking. There's no case where I would say customers should not enable it because it's not something that you're paying for upfront. If it does activate, you might have to pay for things like Lambda functions, but it's worth it. This is especially important now with so many potential security risks. AWS locks logs for 90 days, but now you have them available indefinitely. However, keep in mind that storing these logs can incur costs. I rate the overall product a nine out of ten.
My advice depends on whether you're a BFSA customer or a healthcare customer. Specific parameters need to be enabled based on your industry. With that configuration, you'll be able to trigger notifications and pull out data. Overall, I would rate the solution an eight out of ten because when you consider all business sectors like healthcare, shipping, retail, manufacturing, and research & development, each generates different types of files and events.
I'd advise to integrate it with your security solution and correlate logs across AWS. That's the single point to start understanding if your account is compromised. And always keep a backup of the logs. And make sure those logs are kept in a separate AWS account from the main one. First thing any attacker would do is delete those logs to cover their tracks. Forensics becomes very tough without them. Overall, I would rate the solution a ten out of ten.
The solution’s maintenance depends on the situation. Sometimes there are critical issues like device issues, application issues, Internet issues, infrastructure issues, or HSA issues. It depends on the team, infrastructure size, and the scope of the cloud. If it is a set of three or four servers, there is no need for a team, the Microsoft support team handles it. The product is good. Overall, I rate the solution an eight out of ten.
I rate AWS CloudTrail an eight out of ten. I recommend the solution if you are auditing compliance and security for data usage.
The solution is a good, all-in-one product for logs, security, and compliance that are important in the cloud. Its logs automatically capture publishing, services, events, and anything you create in AWS. I rate the solution a nine out of ten.