< Back

Setup integration: Amazon CloudWatch Event

You need to set up an AWS SNS HTTPS endpoint for this integration!

CloudWatch Events announce important changes in your AWS account. An event can be an EBS Snapshot Notification, a Trusted Advisor Event, or much more.

Monitoring root user logins

Your AWS account’s root user should never be used. Instead, you create IAM users. If the root user logs in, this should be suspicious. With marbot, you can receive an alert when the root user logs in.

Before you can start to set up CloudWatch Events, you have to make one change to the SNS topic endpoint that is required for this integration. You have to allow CloudWatch Events to send messages to your topic.

Allowing AWS to send messages to your topic

  1. Visit https://console.aws.amazon.com/sns/?region=us-east-1
  2. Click on the Topics link on the left
  3. Select the topic that you created for marbot
  4. Click on the Actions button, where you click on the Edit topic policy link.
    Edit SNS topic policy
  5. Select the Advanced view tab

If this is the first time you edit the SNS topic policy, you should see a default entry like this:

"Version": "2008-10-17",
"Id": "__default_policy_ID",
"Statement": [
"Sid": "__default_statement_ID",
"Effect": "Allow",
"Principal": {
"AWS": "*"

You have to add an entry to the Statement array:

"Sid": "AmazonCloudWatchEvents",
"Effect": "Allow",
"Principal": {
"Service": "events.amazonaws.com"
"Action": "sns:Publish",
"Resource": "ARN"
  1. Replace ARN with your SNS topic ARN that you created for marbot.
  2. Click on the Update policy button to save the policy.

Save SNS topic policy

Now, AWS is allowed to send messages to your topic.

Creating a CloudWatch Event

CloudTrail only sends events to CloudWatch if a trail is created!

  1. Visit https://console.aws.amazon.com/cloudwatch/home?region=us-east-1#events:
  2. Click on the Create rule button
  3. In the Event Source section
    1. Set the Service Name to AWS Console Sign-in
    2. Set the Event Type to Sign-in Events
    3. Select Specific user(s) by ARN and insert arn:aws:iam::ACCOUNT_ID:root below.
    4. Replace ACCOUNT_ID with your AWS Account ID.
      Event Sourc
  4. In the Targets section
    1. Select SNS topic in the head
    2. Select the Topic marbot
  5. Continue by clicking the Configure Details button.
  6. Choose a Name
    Choose a Name
  7. Save by clicking the Create rule button.

Sample Alert

When you login to the AWS Management Console with the root user, you should receive an alert in Slack:

Budget Alert

More help needed? Or want to share feedback?

If you experience any issues, let us know.

E-mail icon
marbot teaser

Chatbot for AWS Monitoring

Configure monitoring for Amazon Web Services: CloudWatch, EC2, RDS, EB, Lambda, and more. Receive and manage alerts via Slack. Solve incidents as a team.

Add to Slack
Microsoft Teams
Add to Teams