×
Community Blog Infrastructure Auditing and Restoration using Alibaba Cloud ActionTrail

Infrastructure Auditing and Restoration using Alibaba Cloud ActionTrail

In this article, we will explore how Alibaba Cloud ActionTrail tracks the underlying details of an event for a live product.

By Afzaal Ahmad Zeeshan, Alibaba Cloud Community Blog author.

Monitoring your activities on a Cloud Platform

Auditability and traceability are two of the most integral and useful concepts which help developers and ops to collaborate within teams productively and throughout the enterprise. Dealing with increasing workloads and large applications is challenging and critical, teams require a mechanism that can help them track changes and actions in a manageable way. A smart action monitoring and tracking system in any systematic process enable users to collect vital information to track and analyze security and compliance checks.

Similarly, the growing demand for cloud services and the control of adding customized features introduce an overhead towards security as well as action credibility, which are being performed at any point in time. Cloud action and activity trailing service help users to enable granular-level security, compliance, and risk auditing of all the cloud services to which the user is subscribed. In this article, we will explore how Alibaba Cloud ActionTrail service aims to help a live product to track the underlying details of an event, including the action taken by the user, user role, location, IP, port and time. Activities which are occurred in any of your cloud services, it will be recorded and stored to OSS buckets.

We study the ActionTrail product and its application to DevSecOps environments to introduce security and compliance to products. We will look at how ActionTrail can help a live product, that I deployed in one of the previous articles that I wrote on Alibaba Cloud blog to deploy a MariaDB TX on Alibaba Cloud¡ªto be tracked for changes.

Alibaba Cloud ActionTrail

As mentioned earlier, ActionTrail is an Alibaba Cloud service that records and stores all the actions happening on your Alibaba Cloud resources. This information is beneficial for the operations related to security analysis, change tracking, and compliance audits. It tracks all the API call records, which are even triggered from the console throughout your infrastructure. These records are stored in OSS buckets as per your customized settings and later can be archived using OSS provided archiving and data management features.

There are primarily two types of actions that happen in Alibaba Cloud for your subscription:

  1. Read-only events
  2. Write events

We will study the differences in these event types as well as their overall impact of these two types on our infrastructure.

All your actions are being recorded and documented daily to provide you with a thorough history of actions of your Alibaba Cloud resources. These records can be fetched using multiple parameters such as resource type, operation location, time, username, etc.

ActionTrail provides visibility and detailed information about all your Alibaba Cloud services. This information plays an integral role when there is a need for service roll-back and state restoration. You can view, search, store, and analyze the action trail logs related to the activities made across your Alibaba Cloud infrastructure. For instance, you can know who took what action and what are the responses by your services over the event.

ActionTrail keeps your actions in their own regions, so they are not grouped together in a single portal. You must visit the ActionTrail instance for each of the groups and review the actions being there. For example, actions taken for the resources in the Singapore region will not show up in the China region, and so on.

1

Working Insights of Alibaba Cloud ActionTrail

By default, you can view and query records for the last 30 days. However, if you require records for a more extended period, then you can create and specify either log service or OSS bucket intending to store your actions and records for a longer period.

2

Creation is simple and follows many handy steps. After creating a trail, you specify the region (by default the selected region becomes the home region for the created trail) then you need to select either you want to store records in the Log Service or in the OSS bucket (which can be created on the go or you can use your existing bucket). Log service stores logs in a JSON format while in OSS buckets as compressed JSON records.

Almost all the major resources are supported by the ActionTrail; ECS, CDN, ApsaraDB RDS, Resources Access Management, and Server Load Balancer. If any instance stops working, you can refer to ActionTrail logs to track whether the reason was due to any human intervention. If ApsaraDB RDS instance is down; you can view which action is responsible; furthermore, you can know if that was an intentional action or happened mistakenly by investigating action IP, location, and username.

Here is a list of the actions that had taken place in my own subscription over the previous 30 days¡ªI have not added the Trail buckets to store the logs and actions so I am limited by 30 days, you can extend this to more days¡ªand that shows all the list of the actions.

3

A couple of things to note are that these are only the write events. Write events are the type of events that change your infrastructure in any way. Read events are the kind of events that show when someone was reading about your infrastructure¡ªit might be a security risk if the user is not an intended user, you can read their username to see if they are. The read-only events can help you check who reviewed your products and services. For example, in the following list, you can see that the events returned are the type of service description and reviews.

4

Expanding these individual items can further express the details about each action.

5

You can even further dig down and explore the event details by clicking on the button, "View event".

Moreover, you can audit your members' profiles using detailed records provided by ActionTrail and see each member who is either managed using Alibaba Cloud Resource Access Management or otherwise.

Restoring Services using Alibaba Cloud ActionTrail

In the time of service failure, especially after some changes or upgrades by humans¡ªtypically an error involves human intervention¡ªthe very first step to take is reverting the production environment back to its previously functional point. In such events, having detailed and managed action logs are crucial to know the exact step, after which the instance crashed or fell in an abnormal state.

At times of disaster and service breakdown, one of the significant concerns which come into question is the system security; that if the responsible action has been taken by a privileged member or someone from outside the organization. If log says the contrary, then instead of fixing the issue, investigation about the security breach becomes the highest priority to ignore any further downplay this is one of the most important roles of ActionTrail.

One thing to note here is that ActionTrail itself does not perform any reverts for the actions, as ActionTrail only saves the logs for actions as they happen. It will be your responsibility to revert the actions, such as removing or creating the resource instances again. In this manner, ActionTrail is a perfect tool for post-mortem, but cannot prevent the actions from being taken¡ªfor which, RAM would be a great resource, and I will write about it in a later article.

Alibaba Cloud ActionTrail: Benefits and Features

To summarize quickly, here are all the top-tier features and benefits provided by Alibaba Cloud ActionTrail:

  • ActionTrail provides easy integration and troubleshooting. It can easily be integrated with OSS buckets; otherwise, you can use Log Service. ActionTrails records action details thoroughly and provides instant information and access to actions as they happen in your infrastructure, which can be queried using multiple different paraments and dimensions.
  • ActionTrail offers secured compliance auditing. Source IP address, location, and other user-related information, which helps teams during a compliance audit or a potential post-mortem analysis for a solution or infrastructure.
  • The streamlined recording process provided by Alibaba Cloud ActionTrail can collect logs for actions that are either performed using Alibaba Cloud portal (in-browser console), Cloud APIs, or resource access manager.
  • The Alibaba Cloud ActionTrail provides you with an instant recording of your operations happening in real-time and stores them for 30 days without requiring any configurations for it; you can further expand these durations using OSS.
  • You can authorize other applications to use ActionTrail, use it right from the specified location within seconds. Moreover, the logs stored in the OSS buckets or the log service can be used and linked easily to work with other services¡ªAlibaba Cloud data related products can help further optimize the experience.
  • These authorized apps can access the records and perform base actions such as enabling alert rules, retrieving information, archiving, etc.
  • ActionTrail records operations in an easy to manage way. Quick operations for analysis and retrieval can be used to query your records. Multi-dimensional queries are also supported; you can search for records by time, date, activity, username, location, service instance name, etc.

Although ActionTrail is just about the collection of the actions that take place in your infrastructure, they can still be helpful in several cases where you might want to explore how your infrastructure is being used.

From my personal experience, I can enlist a scenario where the client of one of my friends was using a cloud-hosted solution for their infrastructure needs. They discovered that their cloud infrastructure bill was at least 5-8 times more than what they were billed previously each week. They used a similar tool on that platform to identify the source IPs being used as well as the user accounts whose credentials have been exposed and were being used by the hackers to create resources on the cloud and causing them extra charges. Cloud vendor was happy to wave off the charges, and they were able to do so only because the client had the proof of the source IP addresses¡ªthat were not one of their own. In a similar fashion, you can also be saved from such actions that can cost you money or can potentially cause problems for your business.

0 0 0
Share on

afzaalvirgoboy

9 posts | 1 followers

You may also like

Comments

afzaalvirgoboy

9 posts | 1 followers

Related Products