25% off on first invoice for all services*

SPRING SALE

Use coupon

*Offer valid for new customers only

25% off on first invoice for all services*

SPRING SALE

Use coupon

*Offer valid for new customers only

Need help?

Our experts have had an average response time of 11.43 minutes in March 2024 to fix urgent issues.

We will keep your servers stable, secure, and fast at all times for one fixed price.

Create a Custom Event Pattern for CloudWatch Event Rule

by | Aug 25, 2021

We may fail to create a custom event pattern for the CloudWatch event rule when we try to capture certain events for AWS services with an Amazon CloudWatch event rule.

Here, at Bobcares, we assist our customers with several AWS queries as part of our AWS Support Services.

Today, let us see how to create a custom CloudWatch event pattern.

 

Create a custom event pattern for the CloudWatch event rule

In order to begin, our Support Techs recommend the most recent AWS CLI version.

Generally, events generate in a predefined JSON format and sent to Amazon CloudWatch Events by AWS services.

We can create rules that use event patterns to filter incoming events and then trigger a target.

 

Determine the JSON format of the incoming event

1. Initially, we create a CloudWatch Events rule with a simple event pattern. It must match all events for a specific service.

For Event Source, we can select Event Pattern.

For example, we can see all events by Amazon EC2 service using:

{
"source": [ "aws.ec2" ]
}

2. We attach a target to the rule, either with an SNS topic or CloudWatch Logs. As a result, we will receive all matched events through the SNS topic or CloudWatch Logs.

We receive the exact JSON event that was sent by a particular AWS service.  With it, we can create a custom event pattern.

In addition, we need to ensure we use the default setting for the input transformer of the CloudWatch Rule.

 

Create an event pattern in the same JSON format as the incoming event

In order to create a valid matching event pattern, we need to apply the following rules:

  1. Any fields that we don’t specify in the event pattern will match automatically.
  2. To match fields that are one level down in the JSON structure, we use curly brackets { }.
  3. The string to match from the JSON event must be in square brackets [ ].

For example, here’s how to trigger an event based on every event sent by Amazon EC2 or Amazon DynamoDB:

{
"source": [ "aws.ec2", "aws.dynamodb" ]
}

To notify when a Type A record is created for a specific Amazon Route 53 hosted zone, we run:

The event sent by Route 53 to CloudWatch Events:

{
"version": "0",
"id": "d857ae5c-cc83-3742-ab88-d825311ee4e9",
"detail-type": "AWS API Call via CloudTrail",
"source": "aws.route53",
"account": "756022511916",
"time": "2019-12-05T16:50:53Z",
"region": "us-east-1",
"resources": [

],
"detail": {
"eventVersion": "1.05",
"userIdentity": {
"type": "AssumedRole",
"principalId": "AROAIVOJE6CTAWGSJQUP2:patsusha-Isengard",
"arn": "arn:aws:sts::756022511916:assumed-role/Admin/patsusha-Isengard",
"accountId": "756022511916",
"accessKeyId": "ASIA3ABTUBEWCHWLUGFI",
"sessionContext": {
"sessionIssuer": {
"type": "Role",
"principalId": "AROAIVOJE6CTAWGSJQUP2",
"arn": "arn:aws:iam::756022511916:role/Admin",
"accountId": "756022511916",
"userName": "Admin"
},
"webIdFederationData": {

},
"attributes": {
"mfaAuthenticated": "false",
"creationDate": "2019-12-05T16:28:27Z"
}
}
},
"eventTime": "2019-12-05T16:50:53Z",
"eventSource": "route53.amazonaws.com",
"eventName": "ChangeResourceRecordSets",
"awsRegion": "us-east-1",
"sourceIPAddress": "72.21.196.66",
"userAgent": "console.amazonaws.com",
"requestParameters": {
"hostedZoneId": "Z1RP9G2VYLRY8V",
"changeBatch": {
"changes": [
{
"action": "CREATE",
"resourceRecordSet": {
"type": "A",
"tTL": 300,
"resourceRecords": [
{
"value": "4.4.4.4"
}
],
"name": "test4.sushantpatil.us."
}
}
]
}
},
"responseElements": {
"changeInfo": {
"status": "PENDING",
"id": "/change/C271P4WIKN511J",
"submittedAt": "Dec 5, 2019 4:50:53 PM"
}
},
"additionalEventData": {
"Note": "Do not use to reconstruct hosted zone"
},
"requestID": "bbbf9847-96cb-45ef-b617-d535b9fe83d8",
"eventID": "74e2d2c8-7497-4292-94d0-348272dbc4f7",
"eventType": "AwsApiCall",
"apiVersion": "2013-04-01"
}
}

Event filter pattern to notify when a Type A record is created for the hosted zone:

{
"source": ["aws.route53"],
"detail": {
"eventSource": ["route53.amazonaws.com"],
"eventName": ["ChangeResourceRecordSets"],
"requestParameters": {
"hostedZoneId": ["Z1RP9G2VYLRY8V"],
"changeBatch": {
"changes":
{
"action": ["CREATE"],
"resourceRecordSet": {
"type": ["A"]
}
}
}
}
}
}

 

Test the event pattern using the AWS CLI

We can confirm the event pattern matches if the result is true when we run the test-event-pattern command.

Hence, we can identify the JSON events sent by the AWS service and facilitate the custom event pattern to capture specific events.

[Need help with the fix? We are here for you]

 

Conclusion

In short, we saw how our Support Techs go about creating a custom event pattern.

PREVENT YOUR SERVER FROM CRASHING!

Never again lose customers to poor server speed! Let us help you.

Our server experts will monitor & maintain your server 24/7 so that it remains lightning fast and secure.

GET STARTED

var google_conversion_label = "owonCMyG5nEQ0aD71QM";

0 Comments

Submit a Comment

Your email address will not be published. Required fields are marked *

Privacy Preference Center

Necessary

Necessary cookies help make a website usable by enabling basic functions like page navigation and access to secure areas of the website. The website cannot function properly without these cookies.

PHPSESSID - Preserves user session state across page requests.

gdpr[consent_types] - Used to store user consents.

gdpr[allowed_cookies] - Used to store user allowed cookies.

PHPSESSID, gdpr[consent_types], gdpr[allowed_cookies]
PHPSESSID
WHMCSpKDlPzh2chML

Statistics

Statistic cookies help website owners to understand how visitors interact with websites by collecting and reporting information anonymously.

_ga - Preserves user session state across page requests.

_gat - Used by Google Analytics to throttle request rate

_gid - Registers a unique ID that is used to generate statistical data on how you use the website.

smartlookCookie - Used to collect user device and location information of the site visitors to improve the websites User Experience.

_ga, _gat, _gid
_ga, _gat, _gid
smartlookCookie
_clck, _clsk, CLID, ANONCHK, MR, MUID, SM

Marketing

Marketing cookies are used to track visitors across websites. The intention is to display ads that are relevant and engaging for the individual user and thereby more valuable for publishers and third party advertisers.

IDE - Used by Google DoubleClick to register and report the website user's actions after viewing or clicking one of the advertiser's ads with the purpose of measuring the efficacy of an ad and to present targeted ads to the user.

test_cookie - Used to check if the user's browser supports cookies.

1P_JAR - Google cookie. These cookies are used to collect website statistics and track conversion rates.

NID - Registers a unique ID that identifies a returning user's device. The ID is used for serving ads that are most relevant to the user.

DV - Google ad personalisation

IDE, test_cookie, 1P_JAR, NID, DV, NID
IDE, test_cookie
1P_JAR, NID, DV
NID
hblid

Security

These are essential site cookies, used by the google reCAPTCHA. These cookies use an unique identifier to verify if a visitor is human or a bot.

SID, APISID, HSID, NID, PREF
SID, APISID, HSID, NID, PREF