Understanding Amazon IoT Events log file entries - Amazon IoT Events
Services or capabilities described in Amazon Web Services documentation might vary by Region. To see the differences applicable to the China Regions, see Getting Started with Amazon Web Services in China (PDF).

End of support notice: On May 20, 2026, Amazon end support for Amazon IoT Events. After May 20, 2026, you will no longer be able to access the Amazon IoT Events console or Amazon IoT Events resources. For more information, visit this Amazon IoT Events end of support.

Understanding Amazon IoT Events log file entries

A trail is a configuration that enables delivery of events as log files to an Amazon S3 bucket that you specify. Amazon CloudTrail log files contain one or more log entries. An event represents a single request from any source and includes information about the requested action, the date and time of the action, request parameters, and so on. CloudTrail log files are not an ordered stack trace of the public API calls, so they don't appear in any specific order.

When CloudTrail logging is enabled in your Amazon account, most API calls made to Amazon IoT Events actions are tracked in CloudTrail log files where they are written with other Amazon service records. CloudTrail determines when to create and write to a new file based on a time period and file size.

Every log entry contains information about who generated the request. The user identity information in the log entry helps you determine the following:

  • Whether the request was made with root or IAM user credentials.

  • Whether the request was made with temporary security credentials for a role or federated user.

  • Whether the request was made by another Amazon service.

To be notified upon log file delivery, you can configure CloudTrail to publish Amazon SNS notifications when new log files are delivered. For more information, see Configuring Amazon SNS notifications for CloudTrail.

You can also aggregate Amazon IoT Events log files from multiple Amazon Regions and multiple Amazon accounts into a single Amazon S3 bucket.

For more information, see Receiving CloudTrail log files from multiple regions and Receiving CloudTrail log files from multiple accounts.

The following example shows a CloudTrail log entry that demonstrates the DescribeDetector action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:sts::123456789012:assumed-role/Admin/bertholt-brecht", "accountId": "123456789012", "accessKeyId": "access-key-id", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-08T18:53:58Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/Admin", "accountId": "123456789012", "userName": "Admin" } } }, "eventTime": "2019-02-08T19:02:44Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeDetector", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-cli/1.15.65 Python/3.7.1 Darwin/16.7.0 botocore/1.10.65", "requestParameters": { "detectorModelName": "pressureThresholdEventDetector-brecht", "keyValue": "1" }, "responseElements": null, "requestID": "00f41283-ea0f-4e85-959f-bee37454627a", "eventID": "5eb0180d-052b-49d9-a289-0eb8d08d4c27", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the CreateDetectorModel action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-Lambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEvents-RoleForIotEvents-ABC123DEF456/IotEvents-Lambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABC123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABC123DEF456" } } }, "eventTime": "2019-02-07T23:54:43Z", "eventSource": "iotevents.amazonaws.com", "eventName": "CreateDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel", "key": "HIDDEN_DUE_TO_SECURITY_REASONS", "roleArn": "arn:aws-cn:iam::123456789012:role/events_action_execution_role" }, "responseElements": null, "requestID": "cecfbfa1-e452-4fa6-b86b-89a89f392b66", "eventID": "8138d46b-50a3-4af0-9c5e-5af5ef75ea55", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the CreateInput action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-Lambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABC123DEF456/IotEvents-Lambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABC123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABC123DEF456" } } }, "eventTime": "2019-02-07T23:54:43Z", "eventSource": "iotevents.amazonaws.com", "eventName": "CreateInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "inputName": "batchputmessagedetectorupdated", "inputDescription": "batchputmessagedetectorupdated" }, "responseElements": null, "requestID": "fb315af4-39e9-4114-94d1-89c9183394c1", "eventID": "6d8cf67b-2a03-46e6-bbff-e113a7bded1e", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the DeleteDetectorModel action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:54:11Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DeleteDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel" }, "responseElements": null, "requestID": "149064c1-4e24-4160-a5b2-1065e63ee2e4", "eventID": "7669db89-dcc0-4c42-904b-f24b764dd808", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the DeleteInput action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:54:38Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DeleteInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "errorCode": "ResourceNotFoundException", "errorMessage": "Input of name: NoSuchInput not found", "requestParameters": { "inputName": "NoSuchInput" }, "responseElements": null, "requestID": "ce6d28ac-5baf-423d-a5c3-afd009c967e3", "eventID": "be0ef01d-1c28-48cd-895e-c3ff3172c08e", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the DescribeDetectorModel action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AAKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:54:20Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel" }, "responseElements": null, "requestID": "18a11622-8193-49a9-85cb-1fa6d3929394", "eventID": "1ad80ff8-3e2b-4073-ac38-9cb3385beb04", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the DescribeInput action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AAKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:56:09Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "inputName": "input_createinput" }, "responseElements": null, "requestID": "3af641fa-d8af-41c9-ba77-ac9c6260f8b8", "eventID": "bc4e6cc0-55f7-45c1-b597-ec99aa14c81a", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the DescribeLoggingOptions action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:23Z", "eventSource": "iotevents.amazonaws.com", "eventName": "DescribeLoggingOptions", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": null, "responseElements": null, "requestID": "b624b6c5-aa33-41d8-867b-025ec747ee8f", "eventID": "9c7ce626-25c8-413a-96e7-92b823d6c850", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the ListDetectorModels action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:23Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListDetectorModels", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "nextToken": "CkZEZXRlY3Rvck1vZGVsMl9saXN0ZGV0ZWN0b3Jtb2RlbHN0ZXN0X2VlOWJkZTk1YT", "maxResults": 3 }, "responseElements": null, "requestID": "6d70f262-da95-4bb5-94b4-c08369df75bb", "eventID": "2d01a25c-d5c7-4233-99fe-ce1b8ec05516", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the ListDetectorModelVersions action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:33Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListDetectorModelVersions", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel", "maxResults": 2 }, "responseElements": null, "requestID": "ebecb277-6bd8-44ea-8abd-fbf40ac044ee", "eventID": "fc6281a2-3fac-4e1e-98e0-ca6560b8b8be", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the ListDetectors action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:54Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListDetectors", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "batchputmessagedetectorinstancecreated", "stateName": "HIDDEN_DUE_TO_SECURITY_REASONS" }, "responseElements": null, "requestID": "4783666d-1e87-42a8-85f7-22d43068af94", "eventID": "0d2b7e9b-afe6-4aef-afd2-a0bb1e9614a9", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the ListInputs action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:57Z", "eventSource": "iotevents.amazonaws.com", "eventName": "ListInputs", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "nextToken": "CkhjYW5hcnlfdGVzdF9pbnB1dF9saXN0ZGV0ZWN0b3Jtb2RlbHN0ZXN0ZDU3OGZ", "maxResults": 3 }, "responseElements": null, "requestID": "dd6762a1-1f24-4e63-a986-5ea3938a03da", "eventID": "c500f6d8-e271-4366-8f20-da4413752469", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the PutLoggingOptions action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:56:43Z", "eventSource": "iotevents.amazonaws.com", "eventName": "PutLoggingOptions", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "loggingOptions": { "roleArn": "arn:aws-cn:iam::123456789012:role/logging__logging_role", "level": "INFO", "enabled": false } }, "responseElements": null, "requestID": "df570e50-fb19-4636-9ec0-e150a94bc52c", "eventID": "3247f928-26aa-471e-b669-e4a9e6fbc42c", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the UpdateDetectorModel action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:55:51Z", "eventSource": "iotevents.amazonaws.com", "eventName": "UpdateDetectorModel", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "requestParameters": { "detectorModelName": "myDetectorModel", "roleArn": "arn:aws-cn:iam::123456789012:role/Events_action_execution_role" }, "responseElements": null, "requestID": "add29860-c1c5-4091-9917-d2ef13c356cf", "eventID": "7baa9a14-6a52-47dc-aea0-3cace05147c3", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

The following example shows a CloudTrail log entry that demonstrates the UpdateInput action.

{ "eventVersion": "1.05", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:IotEvents-EventsLambda", "arn": "arn:aws-cn:sts::123456789012:assumed-role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456/IotEvents-EventsLambda", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "attributes": { "mfaAuthenticated": "false", "creationDate": "2019-02-07T22:22:30Z" }, "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/IotEventsLambda-RoleForIotEvents-ABCD123DEF456", "accountId": "123456789012", "userName": "IotEventsLambda-RoleForIotEvents-ABCD123DEF456" } } }, "eventTime": "2019-02-07T23:53:00Z", "eventSource": "iotevents.amazonaws.com", "eventName": "UpdateInput", "awsRegion": "us-east-1", "sourceIPAddress": "192.168.0.1", "userAgent": "aws-internal/3", "errorCode": "ResourceNotFoundException", "errorMessage": "Input of name: NoSuchInput not found", "requestParameters": { "inputName": "NoSuchInput", "inputDescription": "this is a description of an input" }, "responseElements": null, "requestID": "58d5d2bb-4110-4c56-896a-ee9156009f41", "eventID": "c2df241a-fd53-4fd0-936c-ba309e5dc62d", "eventType": "AwsApiCall", "recipientAccountId": "123456789012" }

Amazon IoT Events can use a CloudTrail integration for data plane API logging. This example adds details on data events through the BatchPutMessage action.

{ "eventVersion": "1.09", "userIdentity": { "type": "AssumedRole", "principalId": "AKIAI44QH8DHBEXAMPLE:PrincipalId", "arn": "arn:aws-cn:sts::123456789012:assumed-role/my-iam-role/my-iam-role-entity", "accountId": "123456789012", "accessKeyId": "AKIAI44QH8DHBEXAMPLE", "sessionContext": { "sessionIssuer": { "type": "Role", "principalId": "AKIAI44QH8DHBEXAMPLE", "arn": "arn:aws-cn:iam::123456789012:role/my-iam-role", "accountId": "123456789012", "userName": "sample_user_name" }, "attributes": { "creationDate": "2024-11-22T18:32:41Z", "mfaAuthenticated": "false" } } }, "eventTime": "2024-11-22T18:57:35Z", "eventSource": "iotevents.amazonaws.com", "eventName": "BatchPutMessage", "awsRegion": "us-east-1", "sourceIPAddress": "3.239.107.128", "userAgent": "aws-internal/3", "requestParameters": { "messages": [ { "messageId": "e306d827-b2e4-4439-9c86-411d4242a397", "payload": "HIDDEN_DUE_TO_SECURITY_REASONS", "inputName": "my_input_name" } ] }, "responseElements": { "batchPutMessageErrorEntries": [] }, "requestID": "cefc6b63-9ccf-4e31-9177-4aec8e701bfe", "eventID": "b994b52c-6011-4e3c-ad5f-e784e732fde0", "readOnly": false, "resources": [ { "accountId": "123456789012", "type": "AWS::IoTEvents::Input", "ARN": "arn:aws-cn:iotevents:us-east-1:123456789012:input/my_input_name" } ], "eventType": "AwsApiCall", "managementEvent": false, "recipientAccountId": "123456789012", "eventCategory": "Data", "tlsDetails": { "tlsVersion": "TLSv1.3", "cipherSuite": "TLS_AES_128_GCM_SHA256", "clientProvidedHostHeader": "iotevents.us-east-1.amazonaws.com" } },