In This Document
Was this document useful?
Have a suggestion for the Armor Knowledge Base? Send a message to email@example.com.
You can use the Cloud Connections screen to add your public cloud environment into the Armor Management Portal (AMP).
You can use this screen to collect CloudTrail logs and EC2 instance logs
To collect CloudTrail logs, you must have the Log Depot add-on product enabled. To learn how to enable Log Depot, see Log Depot.
Access the Cloud Connections screen
- In the Armor Management Portal (AMP), in the left side navigation, click Account.
- Click Cloud Connections.
- Account > Under Overivew > Cloud Connections
- Account Name, Provider (should only be AWS for now), Account ID
|Account ID||The account ID for your public cloud provider|
you must have the correct permission
In the Armor Management Portal (AMP), in the left side navigation, click Account.
Click Cloud Connections.
Account > Under Overivew > Cloud Connections
Account Name, Provider (should only be AWS for now), Account ID
See your cloud connections that you have established
Account ID can list multiple AWS accounts
Click plus button to create a new one on a screen Cloud Connection Detail
EC2 Meta data
You must have Log Depot enabled to collect CloudTrail
“Need help setting up an AWS – I can review it (or put into the external KB)
This is in the VM page,
Date created “ when your AWS feature was created inAWS
Security groups from AWS
Update VM page; new columns for both complete and anywhere
Ellipses includes AWS name
Ec2 does not require log depot, but cloud trail does not