We have introduced the new CROC Cloud service – Activity Log.
This new tool allows your administrators to get data on user's actions in the cloud infrastructure, such as:
- Discover which changes were made by specified user in the given time frame.
- Determine whether any infrastructure changes were made in the given time frame.
- Find a user who has terminated specified instance.
The service can be accessed via web interface, in a new section "Activity Log", as well as via new CloudTrail API. Analysis of the collected data (events) can be performed via filtered search on the "Events" page. The data can also be downloaded in JSON and CSV formats.
Web interface and CloudTrail API can be used to access all events for the last 30 days. Trails can be used for more durable storage. The Trail setting specifies to which Object storage bucket events must be saved. Trail aggregates events every 5 minutes and stores them as an archive in the specified bucket.
All actions related to EC2 API, CloudWatch API and CloudTrail API are being logged. Any other user actions are not being logged at this moment.
Access to Activity Log is disabled by default for all users. You can consult the documentation on how to access and use Activity Log.
Activity Log is our first subscription-based service. You can activate the subscription in the "Billing" section at any point. Subscription will be valid a month from the activation, even if it is subsequently cancelled.