Now that our CloudTrail logs are streamed into ElasticSearch, we can really search through CloudTrail logs. In addition, we can create a dashboard to highlight some of the important events occurring on the AWS account.
To illustrate this point, we will simulate login attempts. Log out and log in a few times to the AWS console. Try also to log in using a wrong password to generate login failures in the logs.
Wait a few minutes for the data to be generated and sent to ElasticSearch, then go through the following steps to create a new index pattern:
- Open Kibana in your browser and go to the management menu.
- Click on Index Patterns.
- Click on Add New.
- In the Index name or pattern, give the name ...