Example: How to use S3 audit events for tracking and security
Learn how to interpret and use an S3 audit event generated by the WEKA S3 system.
The S3 audit events are essential for tracking access and modifications to data, ensuring compliance with organizational and regulatory requirements, detecting unauthorized activity, and troubleshooting suspicious or failed S3 operations. By understanding the structure and content of these logs, users can conduct forensic analysis and validate that operations were executed according to policy.
The following example illustrates a PutObject
operation and describes the key elements in the event log.
Key elements and descriptions
bucket: Identifies the S3 bucket involved in the event.
name: Specifies the S3 operation type (for example,
PutObject
,GetObject
).object: Name of the object on which the operation was performed.
status / statusCode: Indicates the result of the operation (for example,
OK
, HTTP status200
).remotehost: The IP address from which the request originated.
Authorization: Credentials used for API authorization.
userAgent: The user agent string from the requesting client, useful for identifying the client software.
clusterName / serverIP / serverName: Provides information about the WEKA cluster and access point.
version: The software version of the WEKA system handling the request.
Last updated