Hello Reader,
In a recent Sunday Funday discussion, I asked about the actual log delay across the major cloud providers. By log delay, I mean the time it takes for an event to appear in a cloud provider’s audit log after it has occurred.
Chris Eng did a solid job documenting this behavior for Azure, but didn’t cover AWS or Google Cloud. So, this post kicks off a new blog series where I’ll be digging into the log delays for those platforms—starting with AWS, and then moving on to Google Cloud.
First Test: AWS ConsoleLogin Event
For this initial test, I focused on the ConsoleLogin
event in AWS. This is a CloudTrail-logged event that captures when a user successfully signs into the AWS web console.
The first time I ran the test, I unknowingly logged in through the us-east-2
region but was searching for logs in us-east-1
. Since CloudTrail logs are region-specific, this led to confusion. Whether you’re using the Event History view or checking the S3 bucket where logs are stored, you need to ensure you're looking in the correct region if you want to see the expected log appear.
I knew something was off when my stopwatch hit 17 minutes without any sign of the login event—even though AWS provides a 15-minute SLA for log delivery. Once I switched my search to us-east-2
, I immediately found the ConsoleLogin
event and realized I needed to redo the test.
Results
After logging out and back in (confirming again that my login URL showed us-east-2
), I monitored CloudTrail for the event. The ConsoleLogin
event showed up within 90 seconds of clicking the “Sign in” button.
That’s not only faster than the 15-minute SLA, but also quicker than AWS’s targeted 5-minute delivery time for critical events.
Coming Up
In tomorrow’s blog post, I’ll test the log delay for API key creation. Stay tuned!