CloudTrail Partitioner Logo

CloudTrail Partitioner

0
Free
Updated 11 March 2025
Visit Website

This project sets up partitioned Athena tables for your CloudTrail logs and updates the partitions nightly. It is based on work by Alex Smolen in his post Partitioning CloudTrail Logs in Athena. You can immediately deploy the CDK app, but I recommend first running this manually to ensure everything is configured, and also because running it manually will (by default) create 90 days of partitions, whereas the nightly CDK will not run until 0600 UTC, and will only create partitions for the current day and tomorrow. Tables are created for each account as cloudtrail_000000000000 and also a view is created that unions all these tables. Related projects This project was based on work by Alex Smolen. This project works great for many, but at enough scale (roughly 100GB of Cloudtrail logs), the way in which Athena is used with this project runs into problems. For this and other reasons, Alex released a new project cloudtrail-parquet-glue which is described in his post Use AWS Glue to make Cloudtrail Parquet partitions and resolves issues #13 and #14 with this project. Setup.

FEATURES

SIMILAR TOOLS

Collection of Kubernetes manifests creating pods with elevated privileges for security testing.

An open-source framework for testing and validating the security of AWS services and resources.

A Python script that lists all main resources of your AWS account, helping you find resources that affect billing and/or security.

A CLI tool to simplify the use of AWS Systems Manager Session Manager

An AWS Lambda auditing tool that provides asset visibility and actionable results through statistical analysis and security checks.

A Lambda Function that disables AWS IAM User Access Keys after a set amount of time to reduce the risk associated with old access keys.

Managed Kubernetes Inspection Tool leveraging FOSS tools to query and validate security-related settings.

A tool that determines what AWS API calls are logged by CloudTrail and what they are logged as, and can also be used as an attack simulation framework.

A security tool to identify interesting files in AWS S3 buckets

CyberSecTools logoCyberSecTools

Explore the largest curated directory of cybersecurity tools and resources to enhance your security practices. Find the right solution for your domain.

Operated by:

Mandos Cyber • KVK: 97994448

Netherlands • contact@mandos.io

VAT: NL005301434B12

Copyright © 2025 - All rights reserved