Investigating Suspicious AccessKey Activity with Alibaba Cloud Observability MCP
This guide walks through a real‑world AccessKey security incident, showing how to configure the Alibaba Cloud Observability MCP server, import JSON settings into Cherry Studio, and use natural‑language queries to audit logs, identify risky operations, monitor root account usage, and summarize overall system activity.
Environment Preparation
Operation audit logs are streamed to Alibaba Cloud Log Service (SLS), which records fields such as AccessKey usage, user identity, event type, and timestamps. The MCP-Server-Aliyun-Observability component enables natural‑language queries over SLS and ARMS data. It supports two execution modes:
stdio mode : the client launches the server as a subprocess and communicates via standard input/output.
SSE mode : the server runs independently and listens on a port for client connections.
Common MCP clients include Claude Desktop, Cursor, Cherry Studio, and VSCode extensions (Cline/Continue).
JSON Configuration for stdio Mode
{
"mcpServers": {
"aliyun_observability": {
"command": "uvx",
"args": [
"mcp-server-aliyun-observability",
"--access-key-id", "YOUR_AK_ID",
"--access-key-secret", "YOUR_AK_SECRET"
]
}
}
}AK Auditing Scenarios
Trace a suspicious AK : query SLS for all events of a specific AccessKey and list operation type and timestamp.
Identify high‑risk operations : find users who performed delete or update actions in the last week, returning user, service, and event name.
Monitor Root account usage : retrieve all root AccessKey usage in the past 30 days with user information and event names.
System activity overview : list the ten most recent cloud‑service access events.
Logstore and Field Dictionary
# Logstore information
- Region: cn-heyuan
- Project: aliyun-product-data-155xxxxx2981-cn-heyuan
- Logstore: actiontrail_security-actiontrail-1743562654649
# Field list
- __topic__: log topic (actiontrail_event)
- __time__: event timestamp
- owner_id: Alibaba Cloud account ID
- event.eventId: unique event identifier
- event.eventName: name of the operation
- event.eventSource: source service
- event.eventType: type of event
- event.serviceName: service name
- event.resourceName: resource identifier
- event.resourceType: resource type
- event.userIdentity.accessKeyId: AccessKey ID used
- event.userIdentity.accountId: requester account ID
- event.userIdentity.principalId: credential ID
- event.userIdentity.type: credential type
- event.userIdentity.userName: user name
- event.errorCode: error code if the event failed
- event.errorMessage: error message if the event failed
- addionalEventData.isMFAChecked: MFA status of the login
- addionalEventData.loginAccount: login account nameExample Natural‑Language Queries
“Show me what AK ‘LN…7’ has done recently, including operation types and times.”
“Who performed dangerous delete or update operations in the last week? List the user, service, and event name.”
“Show me every use of the root AK in the past month, with user info and event names.”
“Give me the latest 10 cloud service access events.”
Integrating operation audit logs with the MCP server allows security teams to conduct interactive, real‑time investigations, dramatically reducing response time and turning log analysis into a proactive, dialogue‑driven process.
Signed-in readers can open the original source through BestHub's protected redirect.
This article has been distilled and summarized from source material, then republished for learning and reference. If you believe it infringes your rights, please contactand we will review it promptly.
Alibaba Cloud Native
We publish cloud-native tech news, curate in-depth content, host regular events and live streams, and share Alibaba product and user case studies. Join us to explore and share the cloud-native insights you need.
How this landed with the community
Was this worth your time?
0 Comments
Thoughtful readers leave field notes, pushback, and hard-won operational detail here.
