athena_query_events
Query AWS CloudTrail logs using Athena to filter by event names, time ranges, and optional parameters like IP address, user ARN, or bucket name. Store results in an S3 bucket for detailed analysis and troubleshooting.
Instructions
Copy
Input Schema
Name | Required | Description | Default |
---|---|---|---|
aws_region | Yes | ||
bucket_name | No | ||
database | Yes | ||
end_time | Yes | ||
event_names | Yes | ||
ip_address | No | ||
limit | No | ||
output_bucket | Yes | ||
principal_id | No | ||
role_name | No | ||
start_time | Yes | ||
user_arn | No | ||
user_name | No |
Input Schema (JSON Schema)
You must be authenticated.
Other Tools from AWS‑IReveal‑MCP
- accessanalyzer_get_analyzer
- accessanalyzer_get_finding
- accessanalyzer_list_analyzers
- accessanalyzer_list_findings
- athena_create_cloudtrail_table
- athena_query_events
- cloudtrail_describe_trails
- cloudtrail_lookup_events
- cloudwatch_describe_log_groups
- cloudwatch_filter_log_events
- cloudwatch_list_log_streams
- config_describe_compliance_by_resource
- config_describe_config_rules
- config_describe_recorder_status
- config_get_resource_config_history
- config_list_discovered_resources
- ec2_describe_flow_logs
- guardduty_get_findings
- guardduty_get_finding_statistics
- guardduty_list_detectors
- guardduty_list_findings
- networkinsights_get_findings
- networkinsights_list_analyses
- networkinsights_list_scopes
- networkinsights_start_analysis
Related Tools
- @Brucedh/aws-ireveal-mcp
- @lishenxydlgzs/aws-athena-mcp
- @Brucedh/aws-ireveal-mcp
- @lishenxydlgzs/aws-athena-mcp
- @Brucedh/aws-ireveal-mcp
- @Brucedh/aws-ireveal-mcp