activity_dashboard_client_error_countactivity_dashboard_redirect_countactivity_dashboard_requests_by_bucketactivity_dashboard_requests_by_dayactivity_dashboard_requests_by_erroractivity_dashboard_requests_by_operationactivity_dashboard_requests_by_requesteractivity_dashboard_requests_by_source_ipactivity_dashboard_requests_by_status_categoryactivity_dashboard_server_error_countactivity_dashboard_success_countactivity_dashboard_top_10_error_urisactivity_dashboard_top_10_keysactivity_dashboard_top_10_successful_urisactivity_dashboard_total_requestss3_bucket_accessed_using_insecure_tls_versions3_object_accessed_outside_business_hourss3_object_accessed_using_insecure_tls_versions3_object_accessed_using_suspicious_user_agents3_object_accessed_with_large_request_sizes3_object_accessed_with_large_response_size
Query: s3_object_accessed_with_large_response_size
Usage
powerpipe query aws_s3_server_access_log_detections.query.s3_object_accessed_with_large_response_size
Tailpipe Tables
SQL
select tp_timestamp as timestamp, operation, bucket as resource, requester as actor, tp_source_ip as source_ip, tp_index as account_id, tp_id as source_id, http_status, error_code, *from aws_s3_server_access_logwhere operation = 'REST.GET.OBJECT' and bytes_sent > 100000000order by tp_timestamp desc;
Detections
The query is being used by the following detections: