If you want to query events that are generated more than 90 days ago in multiple regions, you can configure filtering conditions or SQL statements to perform custom event queries. This topic describes how to perform custom event queries in the ActionTrail console.
Prerequisites
A trail is created, and events are delivered to Simple Log Service. For more information, see Create a single-account trail or Create a multi-account trail.
Scenarios
You can perform custom event queries in simple query mode or SQL query mode. In simple query mode, you can query events in a visual manner. In SQL query mode, you can query events based on SQL statements that are converted from conditions in simple query mode.
Mode | Query method | Description | Example |
Simple query | Single-condition query | You can query events by using filter conditions such as the service name, region, event name, account type, read/write type, resource name, resource type, and operator. | To query all events of Key Management Service (KMS) within a specific period of time, set Service Name to Key Management Service (Kms). |
Multi-condition query | You can specify multiple services or regions for one service to query events. | To query KMS events that are generated in the China (Hangzhou) and China (Shanghai) regions, set Service Name to Key Management Service (Kms) and Region to China (Hangzhou) and China (Shanghai). | |
SQL query | Keyword-based query | You can enter a keyword in the text box based on your business requirements. | To query all write events, enter |
Single-condition query | You can specify a filter condition in the Who, What, Which, Where, or Other category to query events. | To query all events of KMS within a specific period of time, enter | |
Multi-condition query | You can specify multiple filter conditions in the Who, What, Which, Where, and Other categories to query events. | To query events that are generated for operations performed by User Alex in ActionTrail, enter | |
NOT operator-based query | You can specify multiple filter conditions and change the operator in front of a filter condition that you want to exclude to NOT. | To query events that are generated for operations performed by all users except Alex in ActionTrail, enter |
Procedure
Log on to the ActionTrail console.
In the left-side navigation pane, choose
.In the Query Range section, select the created trail from the Trail drop-down list.
On the Default tab of the Custom Template page, configure query conditions.
Simple query
In Simple Mode, configure query conditions as prompted.
SQL query
Turn off Simple Mode and specify a SQL statement.
NoteFor more information about the SQL syntax for advanced event queries and sample queries, see SQL statements in advanced event queries.
If the simple query mode cannot meet your business requirements, use the SQL query mode. In this case, you can configure query conditions as prompted in Simple Mode and turn off Simple Mode. The configured query conditions in Simple Mode are automatically converted into an SQL statement. Then, you can configure a custom SQL statement.
Specify a time range to query events and click Run.
NoteBy default, ActionTrail queries the events within seven days.
You can click Event Alert on the right side of the tab to configure an alert for the current event. For more information, see Create a custom alert rule.
You can modify the default SQL statement in the system template and click Save to save the template as a custom template for reuse in subsequent tasks.
View the query results.
Raw log
On the Raw Log tab, find the event that you want to view and click View Event Details in the Actions column to view the basic information and JSON format of the event.
Histogram
On the Query Histogram tab, view the histograms of events.
References
You can use a system template to query account-related or AccessKey pair-related events, Center for Internet Security (CIS)-related events, or resource lifecycle-related events. For more information, see Query events of an Alibaba Cloud account or an AccessKey pair, Query events related to CIS benchmarks, and Query resource lifecycle events.
You can query events that are generated more than 90 days ago. For more information, see Query events in the Simple Log Service or OSS console.