Datadog-AWS CloudTrail Integration



AWS CloudTrail provides an audit trail for your AWS account. Datadog reads this audit trail and creates events you can search for in your stream and use for correlation on your dashboards. Here is an example of a CloudTrail event:

For information about the rest of the AWS services, see the AWS tile



Configure CloudWatch on AWS and ensure that the policy you created has the equivalent of the AWSCloudTrailReadOnlyAccess policy assigned. The actions in that policy are s3:ListBucket, s3:GetBucketLocation, and s3:GetObject. Also ensure that the policy gives access to the S3 bucket you selected for the CloudTrail Trail. Here is an example policy to give access to an S3 bucket.

  "Version": "2012-10-17",
  "Statement": [
    "Action": [
    "Effect": "Allow",
    "Resource": [
  } ]


Open the AWS CloudTrail tile. The accounts you configured in the Amazon Web Services tile are shown here and you can choose what kinds of events will be collected by Datadog. If you would like to see other events that are not mentioned here, please reach out to our support team.


I don’t see a CloudTrail tile or there are no accounts listed

You need to first configure the Amazon Web Services tile. Once you complete this, the CloudTrail tile will be available and configurable.