nano SIEM
Search Commands

cloud

cloud

Create a cloud investigation view with faceted summaries of cloud activity, grouped by provider, account, region, service, or resource.

Description

The cloud command builds an interactive investigation view for cloud infrastructure activity. It groups and summarizes cloud events across providers (AWS, GCP, Azure) and lets you drill down by account, region, service, or individual resource. Optionally includes MFA usage analysis.

Syntax

... | cloud [by=<dimension>] [show_mfa=<true|false>]

Optional Arguments

by Syntax: by=<dimension> Description: Primary grouping dimension for the cloud view. Values: provider, account, region, service, resource Default: service

show_mfa Syntax: show_mfa=<true|false> Description: Include an MFA usage analysis panel in the view. Default: false

Grouping Dimensions

DimensionGroups byCloud Field
providerCloud provider (AWS, GCP, Azure)cloud_provider
accountCloud account IDcloud_account_id
regionCloud regioncloud_region
serviceCloud service (IAM, EC2, S3, etc.)cloud_service
resourceIndividual resourceresource_id, resource_name, resource_type

Cloud View

The cloud view displays:

  1. Summary Cards — Event counts, unique accounts/regions/services, top activity types
  2. Activity Breakdown — Faceted summary grouped by the selected dimension
  3. Top Activities — Most common cloud actions within each group
  4. MFA Panel (optional) — MFA usage statistics across accounts and users

Examples

Investigate all AWS activity

cloud_provider=aws | cloud

Group by account

cloud_provider=aws | cloud by=account

Group by region

cloud_provider=gcp | cloud by=region

Investigate a specific service

cloud_service=iam | cloud by=account

Include MFA analysis

cloud_service=iam | cloud by=account show_mfa=true

Group by resource

cloud_service=s3 | cloud by=resource

Investigate cross-provider activity

* | cloud by=provider

Narrow to a specific account and investigate services

cloud_account_id="123456789012" | cloud

Usage Notes

Filter first: Narrow your search to relevant cloud events before piping to cloud. The command works best when scoped to a provider, account, or service.

Cloud fields: The command relies on UDM cloud fields (cloud_provider, cloud_account_id, cloud_region, cloud_service, resource_id, resource_name, resource_type). Ensure your log sources populate these fields.

MFA panel: The show_mfa=true option adds an MFA usage analysis panel, useful for IAM investigations. It works best when filtered to authentication-related services (e.g., cloud_service=iam).

  • asset - Asset investigation view with identity resolution
  • stats - Aggregate data with functions like count, sum, avg
  • timechart - Time-based aggregations for activity over time
On this page

On this page