Created on
‎11-04-2025
12:22 AM
Edited on
‎11-13-2025
02:03 AM
By
Jean-Philippe_P
| Description | This article describes CloudTrail Integration checks, including validation of SQS, S3, and IAM permissions to ensure that FortiSIEM can successfully pull CloudTrail logs from AWS. |
| Scope | FortiSIEM. |
| Solution |
Check the credentials part in the access method definition, what exactly is being used, and make sure to use the SQS Queue URL without: https://.
For example:
Access Method Definition example: Verification from FortiSIEM : The device is added under CMDB → Devices check:
Once permissions and credentials are validated, the following success message is seen in the FortiSIEM logs:
2025-11-03T09:43:18.357687+02:00 fsm740 phAgentManager[1086205]: Common error messages :
{ [\"AWSLogs/111111/CloudTrail/us-west-2/2022/05/27/111111_CloudTrail_us-west-2_20220527T1540Z_ ILkwe2zAtDS.json.gz\"]}", Qr7m16uW5SRIkMRb05L/ 5ioNrhm+DcRwjsmAEUm3ZzIFrFMaFeSy0hGD/vJEcPmvcs3ExVbz1NL1ZQcBU3LHMkrnwKKi6xFubkJWAj8nPZPUPFio7 iqEHWUGHdvjqDVPkX+M7Kpwshze5q2cF6W7oPeXsUjTaV+iqFxlxi7P7TZRXsRw502wVSUYl8uVSsMKB3JdEkAJaEm3Ro/ wcwxl8gbuWGwrFYwrXQoipJqv4xtrAp1ebIk/wcfMJur3mfJQ8A==",
To resolve these types of errors, run all tests from the same host, like FortiSIEM Collector for the CloudTrail job, using the same credentials and region configured in the Access Method. Check each thing one by one, have to replace xxxxxxx with the actual account, and it must have AWS CLI configured:
Check if the SQS queue is accessible and messages are available (it returns messages or an empty list):
aws sqs receive-message --queue-url https://sqs.us-west-2.amazonaws.com/xxxxxxx/fortisiem-s3-test --region us-west
Expected Output:
{
Ensure FortiSIEM has permission to list S3 objects for the CloudTrail logs.
aws s3 ls s3://shub9335test/AWSLogs/xxxxxxx/CloudTrail/ --recursive --region us-west-2
Expected Output:
2025-11-03 08:42:28 34069 AWSLogs/xxxxxxx/CloudTrail/us-west-2/2025/11/03/xxxxxxx_CloudTrail_us-west-2_20250926T0315Z_GFRHmLmFiWsQabhf.json.gz
To verify read access to the CloudTrail object:
aws s3api get-object --bucket shub9335test --key "AWSLogs/xxxxxxx/CloudTrail/us-west-2/2025/11/03/xxxxxxx_CloudTrail_us-west-2_20250926T0315Z_GFRHmLmFiWsQabhf.json.gz" --region us-west-2
{
Expected Output:
2025-11-03T10:34:50.022Z::AWSLogs/810801871376/CloudTrail/us-west-2/2025/10/17/xxxxxxx_CloudTrail_us-west-2_20251017T1035Z_mNQYEytGZTegVqBN.json.gz
|
The Fortinet Security Fabric brings together the concepts of convergence and consolidation to provide comprehensive cybersecurity protection for all users, devices, and applications and across all network edges.
Copyright 2025 Fortinet, Inc. All Rights Reserved.