Skip to content

Commit

Permalink
[docs] markdown-lint
Browse files Browse the repository at this point in the history
  • Loading branch information
vmdude committed Feb 11, 2025
1 parent 67acf50 commit 1357811
Showing 1 changed file with 5 additions and 1 deletion.
6 changes: 5 additions & 1 deletion docs/tables/aws_cloudtrail_lookup_event.md
Original file line number Diff line number Diff line change
Expand Up @@ -12,6 +12,7 @@ AWS CloudTrail Lookup Events is a feature within AWS CloudTrail, a service that
The `aws_cloudtrail_lookup_event` table in Steampipe provides you with information about each trail event within AWS CloudTrail. This table allows you, as a DevOps engineer, to query event-specific details, including event time, event name, resources involved, and more. You can utilize this table to gather insights on trail events, such as event source, user identity, and request parameters. The schema outlines the various attributes of the CloudTrail event for you, including the event ID, event version, read only, and associated tags.

**Important notes:**

- For improved performance, it is advised that you use the optional qual `start_time` and `end_time` to limit the result set to a specific time period.
- This table supports optional quals. Queries with optional quals are optimised to use CloudWatch filters. Optional quals are supported for the following columns:
- `read_only`
Expand All @@ -28,6 +29,7 @@ The `aws_cloudtrail_lookup_event` table in Steampipe provides you with informati
## Examples

### List events that occurred over the last five minutes

This query is useful for gaining insights into recent activity within your AWS environment. It provides a quick overview of the events that have taken place in the last five minutes, which can be particularly useful for immediate incident response or real-time monitoring.

```sql+postgres
Expand Down Expand Up @@ -59,6 +61,7 @@ where
```

### List all action events, i.e., not ReadOnly that occurred over the last hour

Explore which action events have occurred in the last hour on AWS Cloudtrail. This is useful for identifying recent activities that have potentially altered your system.

```sql+postgres
Expand Down Expand Up @@ -96,6 +99,7 @@ order by
```

### List events for a specific service (IAM) that occurred over the last hour

This query allows users to monitor recent activity for a specific service, in this case, AWS's Identity and Access Management (IAM). It is particularly useful for security audits, as it provides a chronological overview of events, including who initiated them and what actions were taken, over the last hour.

```sql+postgres
Expand All @@ -122,4 +126,4 @@ from
where
event_source = 'iam.amazonaws.com'
and event_time >= datetime('now', '-1 hour');
```
```

0 comments on commit 1357811

Please sign in to comment.