feat(aws-observability): add aws-observability power#60
feat(aws-observability): add aws-observability power#60gcacace wants to merge 5 commits intokirodotdev:mainfrom
Conversation
| ### Priority 1: CloudTrail Lake (Preferred) | ||
| Check first for CloudTrail Lake event data stores using the CloudTrail MCP server: | ||
| - Use `list_event_data_stores` to check for enabled event data stores | ||
| - If available, use `query_event_data_store` for SQL-based analysis |
There was a problem hiding this comment.
I dont know much about CloudTrail's MCP Server. So, I'll leave that to you to figure it out. But, this is what I found as well
query_event_data_store does not exist in the awslabs.cloudtrail-mcp-server.
The 5 real tools in the CloudTrail MCP server are:
lookup_events— event lookup (last 90 days)lake_query— SQL queries against CloudTrail Lakelist_event_data_stores— list available Lake data storesget_query_status— check Lake query statusget_query_results— get Lake query results
Source: cloudtrail-mcp-server README
This same issue also appears on line 111 of this file.
| - Status = ENABLED | ||
| - Management events enabled in AdvancedEventSelectors | ||
| 3. If found, use CloudTrail Lake for queries | ||
| - Use query_event_data_store for SQL-based analysis |
There was a problem hiding this comment.
query_event_data_store is not a real tool. This also appears on line 137 of this file.
| ```json | ||
| "env": { | ||
| "AWS_PROFILE": "your-profile-name", // ← Change to your AWS profile | ||
| "AWS_REGION": "us-east-1", // ← Change to your region |
There was a problem hiding this comment.
nit: The cloudwatch-applicationsignals-mcp-server also supports an AUDITOR_LOG_PATH environment variable (defaults to /tmp) that controls where audit tools write their log files. Might be worth documenting alongside the other env vars in the configuration section.
Description of changes:
This PR introduces the AWS Observability Power, a comprehensive observability platform that integrates CloudWatch Logs, Metrics, Alarms, Application Signals (APM), CloudTrail security auditing, and AWS Documentation access into a unified Kiro power.
Key Components:
Power Configuration (POWER.md)
MCP Server Configuration (mcp.json)
Steering Files (8 comprehensive guides):
incident-response.md- Complete incident response framework with 6 phases (detection, investigation, mitigation, recovery, RCA, postmortem)alerting-setup.md- Intelligent alarm configuration with recommended thresholds and best practicesapplication-signals-setup.md- Application Signals enablement guide and setup workflowslog-analysis.md- CloudWatch Logs Insights query patterns and syntax referenceperformance-monitoring.md- Application Signals APM monitoring, SLO management, and trace analysissecurity-auditing.md- CloudTrail security monitoring, compliance auditing, and incident investigationobservability-gap-analysis.md- Automated codebase analysis to identify observability gaps across logging, metrics, tracing, and error handling with multi-language supportcloudtrail-data-source-selection.md- Decision tree and priority strategy for CloudTrail data source selection (CloudTrail Lake → CloudWatch Logs → Lookup Events API), including query translation examples across all three sourcesFeatures:
By submitting this pull request, I confirm that you can use, modify, copy, and redistribute this contribution, under the terms of your choice.