Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.

...

Rw ui steps macro
Rw step

Once the bucket has been created, you will need to set up the data feed into this S3 bucket via CloudTrail, so navigate here:

0d3c8a85-49fd-4ffa-a194-bac52adf0115.png
Rw step

Click Create trail and follow these steps:

image.webpImage Removedfrfr.pngImage Added
  1. When setting up the trail in the screen, make sure to choose the S3 bucket you want CloudTrail to send data into accordingly. If you have an existing S3 bucket, choose that box and enter your S3 bucket name. Otherwise, create a new S3 bucket here.

  2. A prefix is optional but highly recommended for easier setup of S3 event notifications to different SQS queues.

  3. All other options on this page are optional but default settings do work, check with your infra team to figure out what they want to do.

f6d09bb5-d203-4851-9d3a-73a5a9fa27d2.png
  1. In the next area, choose the log events you wish for CloudTrail to capture. At the very least, we recommend Management events to be enabled. Data events and Insight events are additional charges so check with your team about this. Data events can generate A LOT of data if your account are power users of S3, please check with your AWS team to see if these are worthwhile to track.

e0a61f26-032a-4826-8733-8ed25080b488.png71cbe818-a536-492a-837f-a5d72c974bb5.png
  1. Finish up and create the trail. You can always come back to this and edit it in the future.

Rw step

Setup is complete and data should now be flowing into your S3 bucket.

...

Rw ui steps macro
Rw step

Access the Roles area in the IAM console and click Create role.

wesw.png
Rw step

Create a role with the scope Another AWS account and use Account ID:837131528613

Rw step

Add the policy you created in the previous steps (for example: devo-xaccount-cs-policy)

eded.png
Rw step

Give this role a name that you will provide to Devo.

cccc.png
Rw step

Go to the newly created role and access Trust relationshipsEdit trust relationship.

bhbh.png
Rw step

Change the existing policy document to the following, which will only allow for our collector server role to access the policy.

Code Block
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {}
    }
  ]
}

Optionally, you may add an external ID (see more information here). Add in an external ID generated by customer and hand it to Devo as well.

Code Block
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {"StringEquals": {"sts:ExternalId": "ABCDEFGHIJKL0123"}} <-- Change this
    }
  ]
}

For a Devo developer to access your collector, we will need you to add another principal. This will allow us to debug your collector quickly. It will look something like this:

Code Block
{
  "Version": "2012-10-17",
  "Statement": [
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::476382791543:role/devo-xaccount-cc"
      },
      "Action": "sts:AssumeRole",
      "Condition": {}
    },
    {
      "Effect": "Allow",
      "Principal": {
        "AWS": "arn:aws:iam::837131528613:role/devo-xaccount-cs-role"
      },
      "Action": "sts:AssumeRole",
      "Condition": {}
    }
  ]
}
Rw step

Click Update Trust Policy to finish.

Info

New role

If you’re deploying your collector using the Cloud collector app, you should use the following role instead of the one above:

arn:aws:iam::476382791543:role/devo-xaccount-cc

This role is for the legacy collector server and now is deprecated

arn:aws:iam::837131528614:role/devo-xaccount-cs-role

For more information, please contact us.

Information provided to Devo

...