TrailTool Installation (Alpha)

WARNING: This is alpha software and may have bugs.

Prerequisites

Before installing TrailTool, make sure you have:

IMPORTANT: You must deploy this CloudFormation stack in the AWS account and region that contains your CloudTrail S3 bucket. You need permissions to create IAM roles, Lambda functions, EventBridge rules, and modify S3 bucket policies.

Installation Steps

Step 1: Enter your information below to generate a CloudFormation console link.

Step 2: Click the generated link - it opens the AWS CloudFormation console with pre-filled parameters.

Step 3: In the CloudFormation console, review the permissions and click "Create Stack".

Step 4: Wait 2-3 minutes for the stack to complete (status will show CREATE_COMPLETE).

Step 5: Check your email inbox for a magic link from TrailTool to log in.

What Gets Installed

The CloudFormation stack (view template) creates the following resources in your AWS account:

1. Custom Lambda Function (BucketPolicyHelperFunction)

A temporary Lambda that runs during stack creation to:

2. EventBridge Rule (CloudTrailEventsRule)

Monitors your CloudTrail S3 bucket for new log files and automatically invokes TrailTool's ingestor Lambda when logs arrive. Pattern matches:

3. IAM Role (EventBridgeInvokeRole)

Allows your EventBridge rule to invoke our Lambda function (arn:aws:lambda:REGION:468087121425:function:trailtool-ingestor) cross-account.

4. Customer Registration (TrailToolRegistration)

A CloudFormation custom resource that registers your account with TrailTool and sends you a magic link email for authentication.

Data flow: Your logs stay in your S3 bucket. When new CloudTrail logs arrive, EventBridge notifies our Lambda which reads and processes them. TrailTool runs in AWS account 468087121425.

Support

Email: info@engseclabs.com

Expect rough edges.