This whitepaper is for historical reference only. Some content might be outdated and some links might not be available.
Collecting and Processing Logs
CloudWatch Logs can be used to monitor, store, and access your log files from Amazon EC2 instances, AWS CloudTrail, RouteĀ 53, and other sources. See the AWS Services That Publish Logs to CloudWatch Logs documentation page.
Logs information includes, for example:
Granular logging of access to Amazon S3 objects
Detailed information about flows in the network through VPC-Flow Logs
Rule-based configuration verification and actions with AWS Config rules
Filtering and monitoring of HTTP access to applications with web application firewall (WAF) functions in CloudFront
Custom application metrics and logs can also be published to CloudWatch Logs by installing the CloudWatch Agent on Amazon EC2 instances or on-premises servers.
Logs can be analyzed interactively using CloudWatch Logs Insights, performing queries to help you respond more efficiently and effectively to operational issues.
CloudWatch Logs can be processed in near real-time by configuring subscription filters and
      delivered to other services such as an Amazon OpenSearch Service
CloudWatch metric filters can be used to define patterns to look for in log data,
      transform them into numerical CloudWatch metrics, and set up alarms based on your business
      requirements. For example, following the AWS recommendation not to use the root user for
      everyday tasks, it is possible to set up a specific CloudWatch metric filter
Logs such as Amazon S3 server access logs, Elastic Load Balancing access logs, VPC flow logs, and
      AWS Global Accelerator flow logs can be delivered directly to an Amazon S3 bucket. For example, when
      you enable Amazon Simple Storage Service server access logs, you can get detailed information regarding the requests that
      are made to your Amazon S3; bucket. An access log record contains details about the request, such as
      the request type, the resources specified in the request, and the time and date the request
      was processed. For more information about the contents of a log message, see Amazon Simple Storage Service Server Access
        Log Format in the Amazon Simple Storage Service Developer
        Guide. Server access logs are useful for many applications because they give
      bucket owners insight into the nature of requests made by clients that are not under their
      control. By default, Amazon S3 does not collect service access logs, but when you enable logging, Amazon S3
      usually delivers access logs to your bucket within a few hours. If you require a faster
      delivery or need to deliver logs to multiple destinations, consider using
        CloudTrail logs or a combination of both CloudTrail logs and Amazon S3. Logs can be
      encrypted at rest by configuring default object encryption in the destination bucket. The
      objects are encrypted using server-side encryption with either Amazon S3-managed keys (SSE-S3) or
      KMS keys (formerly AWS KMS Key) stored in AWS Key Management Service
Logs stored in an Amazon S3 bucket can be queried and analyzed using Amazon Athena
Logs are also a useful source of information for automated threat detection. Amazon GuardDuty
      Amazon Security Lake