You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: articles/sentinel/connect-aws.md
+7-7Lines changed: 7 additions & 7 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -25,7 +25,7 @@ The Amazon Web Services (AWS) service log connector is available in two versions
25
25
26
26
This tab explains how to configure the AWS S3 connector using one of two methods:
27
27
28
-
-[Automatic setup](#automatic-setup)(Recommended)
28
+
-[Automatic setup](#automatic-setup)(Recommended)
29
29
-[Manual setup](#manual-setup)
30
30
31
31
## Prerequisites
@@ -101,7 +101,7 @@ To run the script to set up the connector, use the following steps:
101
101
102
102
## Manual setup
103
103
104
-
Microsoft recommends using the automatic setup script to deploy this connector. If for whatever reason you do not want to take advantage of this convenience, follow the steps below to set up the connector manually.
104
+
We recommend using the automatic setup script to deploy this connector. If for whatever reason you do not want to take advantage of this convenience, follow the steps below to set up the connector manually.
105
105
106
106
1. Set up your AWS environment as described in [Set up your Amazon Web Services environment to collect AWS logs to Microsoft Sentinel](connect-aws-configure-environment.md#manual-setup).
107
107
@@ -218,29 +218,29 @@ To deploy the lambda function:
218
218
1. In the AWS Management Console, select the lambda service.
219
219
1. Select **Create function**.
220
220
221
-
:::image type="content" source="media/cloudwatch-lambda-function/lambda-basic-information.png" alt-text="Screenshot of the AWS Management Console Basic information screen." lightbox="media/cloudwatch-lambda-function/lambda-basic-information.png":::
221
+
:::image type="content" source="media/cloudwatch-lambda-function/lambda-basic-information.png" alt-text="Screenshot of the AWS Management Console Basic information screen." lightbox="media/cloudwatch-lambda-function/lambda-basic-information.png":::
222
222
223
223
1. Type a name for the function and select **Python 3.9** as the runtime and **x86_64** as the architecture.
224
224
1. Select **Create function**.
225
225
1. Under **Choose a layer**, select a layer and select **Add**.
226
226
227
-
:::image type="content" source="media/cloudwatch-lambda-function/lambda-add-layer.png" alt-text="Screenshot of the AWS Management Console Add layer screen." lightbox="media/cloudwatch-lambda-function/lambda-add-layer.png":::
227
+
:::image type="content" source="media/cloudwatch-lambda-function/lambda-add-layer.png" alt-text="Screenshot of the AWS Management Console Add layer screen." lightbox="media/cloudwatch-lambda-function/lambda-add-layer.png":::
228
228
229
229
1. Select **Permissions**, and under **Execution role**, select **Role name**.
230
230
1. Under **Permissions policies**, select **Add permissions** > **Attach policies**.
231
231
232
-
:::image type="content" source="media/cloudwatch-lambda-function/lambda-permissions.png" alt-text="Screenshot of the AWS Management Console Permissions tab." lightbox="media/cloudwatch-lambda-function/lambda-permissions.png":::
232
+
:::image type="content" source="media/cloudwatch-lambda-function/lambda-permissions.png" alt-text="Screenshot of the AWS Management Console Permissions tab." lightbox="media/cloudwatch-lambda-function/lambda-permissions.png":::
233
233
234
234
1. Search for the *AmazonS3FullAccess* and *CloudWatchLogsReadOnlyAccess* policies and attach them.
235
235
236
-
:::image type="content" source="media/cloudwatch-lambda-function/lambda-other-permissions-policies.png" alt-text="Screenshot of the AWS Management Console Add permissions policies screen." lightbox="media/cloudwatch-lambda-function/lambda-other-permissions-policies.png":::
236
+
:::image type="content" source="media/cloudwatch-lambda-function/lambda-other-permissions-policies.png" alt-text="Screenshot of the AWS Management Console Add permissions policies screen." lightbox="media/cloudwatch-lambda-function/lambda-other-permissions-policies.png":::
237
237
238
238
1. Return to the function, select **Code**, and paste the code link under **Code source**.
239
239
1. The default values for the parameters are set using environment variables. If necessary, you can manually adjust these values directly in the code.
240
240
1. Select **Deploy**, and then select **Test**.
241
241
1. Create an event by filling in the required fields.
242
242
243
-
:::image type="content" source="media/cloudwatch-lambda-function/lambda-configure-test-event.png" alt-text="Screenshot of the AWS Management Configure test event screen." lightbox="media/cloudwatch-lambda-function/lambda-configure-test-event.png":::
243
+
:::image type="content" source="media/cloudwatch-lambda-function/lambda-configure-test-event.png" alt-text="Screenshot of the AWS Management Configure test event screen." lightbox="media/cloudwatch-lambda-function/lambda-configure-test-event.png":::
244
244
245
245
1. Select **Test** to see how the event appears in the S3 bucket.
0 commit comments