Caylent Catalysts™
IoT
Connect, understand, and act on data from industrial devices at scale to improve uptime, efficiency, and reliability across manufacturing, energy, and utilities.
Learn how to synthesize an (almost) identical payload using Amazon EventBridge rules.
This blog was originally written and published by Trek10, which is now part of Caylent.
When AWS released suffix filtering for Amazon EventBridge rules in Nov 2022, EventBridge rules for Amazon S3 events reached feature parity with the original Amazon S3 Event Notifications feature except for the cost.
Of course, the event formats aren’t the same which, while understandable, is very unfortunate.
There are situations where you might want to use the flexibility of the newly styled CloudTrail events but with the payload format of the old SNS/SQS events. For instance, you might:
If you ever find yourself in a situation like this you can use an EventBridge Rule Input Transformation to synthesize the “old style” event. I’ll show you how in this post.
Eliminate Overhead of Your AWS Environment with Serverless on AWS
Here is an S3 Notification Event and an S3 Event for the same PutObject operation for comparison.
Old Style S3 Event:
{
"Records": [\
{\
"eventVersion": "2.1",\
"eventSource": "aws:s3",\
"awsRegion": "us-east-1",\
"eventTime": "2023-09-02T02:10:23.087Z",\
"eventName": "ObjectCreated:Put",\
"userIdentity": {\
"principalId": "AWS:AROAX7U2EUGEQA7NG7PQI:ts"\
},\
"requestParameters": {\
"sourceIPAddress": "52.2.140.103"\
},\
"responseElements": {\
"x-amz-request-id": "TQS46783602DMSZC",\
"x-amz-id-2": "6YvW5sWDx/RpLX+g31EPoctLVaEtuxbXVaXoBRmQHjwjL31gwHW1nSn9X31W98CbGZ7cfri42Y/z5ThTu7Sy1gWtnnyMdMeD"\
},\
"s3": {\
"s3SchemaVersion": "1.0",\
"configurationId": "e41037ac-1090-4900-996c-c3fd5a8e7428",\
"bucket": {\
"name": "trek10-joel-s3-event",\
"ownerIdentity": {\
"principalId": "A37I0H6V1UEIUZ"\
},\
"arn": "arn:aws:s3:::trek10-joel-s3-event"\
},\
"object": {\
"key": "test.txt",\
"size": 2451,\
"eTag": "94137ea995d2c4dc3d0936e3c142d4f8",\
"sequencer": "0064F2998F02963CC8"\
}\
}\
}\
]
}New Style S3 Event:
{
"version": "0",
"id": "4455b4bd-3eb0-9c2f-622c-465a95c07b65",
"detail-type": "AWS API Call via CloudTrail",
"source": "aws.s3",
"account": "549005336969",
"time": "2023-09-02T02:10:23Z",
"region": "us-east-1",
"resources": [],
"detail": {
"eventVersion": "1.09",
"userIdentity": {
"type": "AssumedRole",
"principalId": "AROAX7U2EUGEQA7NG7PQI:ts",
"arn": "arn:aws:sts::549005336969:assumed-role/trek10-kernel/ts",
"accountId": "549005336969",
"accessKeyId": "ASIAX7U2EUGERE23RNSU",
"sessionContext": {
"sessionIssuer": {
"type": "Role",
"principalId": "AROAX7U2EUGEQA7NG7PQI",
"arn": "arn:aws:iam::549005336969:role/trek10-kernel",
"accountId": "549005336969",
"userName": "trek10-kernel"
},
"attributes": {
"creationDate": "2023-09-02T02:07:40Z",
"mfaAuthenticated": "true"
}
}
},
"eventTime": "2023-09-02T02:10:23Z",
"eventSource": "s3.amazonaws.com",
"eventName": "PutObject",
"awsRegion": "us-east-1",
"sourceIPAddress": "52.2.140.103",
"userAgent": "[aws-cli/1.27.153 Python/3.10.5 Darwin/22.6.0 botocore/1.29.153]",
"requestParameters": {
"bucketName": "trek10-joel-s3-event",
"Host": "trek10-joel-s3-event.s3.amazonaws.com",
"key": "test.txt"
},
"responseElements": {
"x-amz-server-side-encryption": "AES256"
},
"additionalEventData": {
"SignatureVersion": "SigV4",
"CipherSuite": "ECDHE-RSA-AES128-GCM-SHA256",
"bytesTransferredIn": 2451,
"SSEApplied": "Default_SSE_S3",
"AuthenticationMethod": "AuthHeader",
"x-amz-id-2": "BzIPOMEZzd0m43KS9YZEbxY5BsXKwaUbaPL2FjMLtnDkDWO37FJLn8q2CtdKHTnftSD5/mFmApM=",
"bytesTransferredOut": 0
},
"requestID": "TQS46783602DMSZC",
"eventID": "4215be81-289b-456a-b322-856449bc1029",
"readOnly": false,
"resources": [\
{\
"type": "AWS::S3::Object",\
"ARN": "arn:aws:s3:::trek10-joel-s3-event/test.txt"\
},\
{\
"accountId": "549005336969",\
"type": "AWS::S3::Bucket",\
"ARN": "arn:aws:s3:::trek10-joel-s3-event"\
}\
],
"eventType": "AwsApiCall",
"managementEvent": false,
"recipientAccountId": "549005336969",
"eventCategory": "Data",
"tlsDetails": {
"tlsVersion": "TLSv1.2",
"cipherSuite": "ECDHE-RSA-AES128-GCM-SHA256",
"clientProvidedHostHeader": "trek10-joel-s3-event.s3.amazonaws.com"
}
}
}The newer event is a CloudTrail event. The older version follows the pattern of many other events such as SNS, SQS, etc.
Event Bridge Rule Input Transformations let you select attributes of the incoming event using JSONPath expressions and then substitute these values into a string to create a new event (the new string can also be a stringified JSON object).
Not all of the attributes from the new event style are present in the old, but the important ones are. Here is my best attempt to create this transformation:
The EventBridge Rule defined by CloudFormation:
LambdaFunctionNewEventS3Eb:
Type: AWS::Events::Rule
Properties:
EventPattern:
source:
- aws.s3
detail:
eventSource:
- s3.amazonaws.com
eventName:
- CopyObject
- PutObject
- CompleteMultipartUpload
requestParameters:
bucketName:
- !Ref 'S3Bucket'
State: ENABLED
Targets:
- Arn: !GetAtt 'LambdaFunctionNewEvent.Arn'
Id: LambdaFunctionNewEventS3EbLambdaTarget
InputTransformer:
InputTemplate: |
{
"Records": [\
{\
"eventVersion": "2.1",\
"eventSource": "aws:s3",\
"awsRegion": "<awsRegion>",\
"eventTime": "<time>",\
"userIdentity": {\
"principalId": "AWS:<principalId>"\
},\
"requestParameters": {\
"sourceIPAddress": "<sourceIpAddress>"\
},\
"responseElements": {\
"x-amz-request-id": "<requestId>",\
"x-amz-id-2": "<xAmzId2>"\
},\
"s3": {\
"s3SchemaVersion": "1.0",\
"bucket": {\
"name": "<bucketName>",\
"arn": "arn:aws:s3:::<bucketName>"\
},\
"object": {\
"key": "<s3Key>",\
"size": <size>\
}\
}\
}\
]
}
InputPathsMap:
awsRegion: '$.detail.awsRegion'
time: '$.time'
principalId: '$.detail.userIdentity.principalId'
sourceIpAddress: $.detail.sourceIPAddress
requestId: $.detail.requestID
xAmzId2: $.detail.additionalEventData.x-amz-id-2
bucketName: $.detail.requestParameters.bucketName
s3Key: $.detail.requestParameters.key
size: $.detail.additionalEventData.bytesTransferredInHere is a comparison of the old-style event for the same S3 action and the synthesized event:
A few attributes are present in the old style event that are missing in the new event, namely the bucket ownerIdentity, configurationId, the eventTime are slightly different, and the eventName is also different. Unfortunately, there is currently no way to do more complicated logic directly in an Event Rule Input Transformation.
I hope you’ve found this example demonstrating some of the power of the Event Rule Input Transforms to be useful.
Additional reading:
Founded in 2013, Trek10 helped organizations migrate to and maximize the value of AWS by designing, building, and supporting cloud-native workloads with deep technical expertise. In 2025, Trek10 joined Caylent, forming one of the most comprehensive AWS-only partners in the ecosystem, delivering end-to-end services across strategy, migration and modernization, product innovation, and managed services.
View Trek10's articlesBuild a crypto price tracker with AWS Lambda, Kraken's API, and Datadog—monitor Bitcoin, Chainlink, or any cryptocurrency with custom dashboards.
A fresh perspective on the capabilities of serverless technologies and what that means in terms of cost, services, and required knowledge for your business.
Reduce AWS VPC costs with these tips on data transfer pricing, NAT Gateway optimization, and using VPC Gateway Endpoints for S3 and DynamoDB.