Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Save psa-jforestier/1401f21fa7dbc7b3b95f48500be59fcf to your computer and use it in GitHub Desktop.
Save psa-jforestier/1401f21fa7dbc7b3b95f48500be59fcf to your computer and use it in GitHub Desktop.
A lambda function to stream CloudFront logs dropped in S3 to CloudWatch Logs
'''
This function send CloudFront logs to CloudWatch Logs. So you can use CloudWatch tools, like Insight or custom metrics.
By default, CloudFront log its access in gz file in S3, and there is no way yo send the log directly to a Log Group / Log Stream.
This lambda function is triggered on S3 "PUT" action (when CloudFront write its log file). It then download the file localy, unzip it, sort it, and stream it to a CloudWatch log groups.
Installation
Activate CloudWatch logs, and indicate the S3 bucket and the prefix for the log files. Enable, on the bucket, the deletion of old log files
(because log files will be now in Cloudwatch, it is not necessary to keep them in S3).
Install the Lambda function on the region of your S3 bucket. Grant permission of this function to read the S3 and to create Log group and stream.
Lambda settings :
Runtime : Python 3.7
Environment variables :
"CloudWatch_LogFormat" : indicate log format in CloudWatch Logs.
"cloudfront" : keep original CloudFront log format (https://docs.aws.amazon.com/AmazonCloudFront/latest/DeveloperGuide/AccessLogs.html#LogFileFormat)
"combined" : similar to Apache Combined log format. Filter pattern for CloudWatch Logs : [edge, bytes, ip, method, statusCode, uri, qs, edgeresult, other]
"simplified" : only important information
"json" : full CloudFront log in JSON
"jsonsimplified" : only important info
"CloudWatch_LogGroup" : name of your CloudWatch Log Groups (like "/appli/production/cdn"). It will be created if not exists. On this group, a stream is created by day.
Memory : depending of the log files, at least 384MB is enough to handle 20.000 lines of log on each request.
Timeout : 1mn
Add a trigger ("ObjectCreated:Put") on the S3 where GZipped log files are sent by CloudFront. They are send every 5mn.
Monitoring : monitor Lambda execution code, memory and error. If the lambda cant handle a full log file, you may have incomplete log in CloudWatch. Retriggering the
action will result in duplicate log lines in CloudWatch.
What you can do with the CloudFront log in CloudWatch logs :
- count number of cache satus (hit, miss, error) to see if your caching directive are efficient
- track the IP of your client
'''
import json
import pprint
import boto3
import urllib.parse
import tempfile
import os
import subprocess
import gzip
import datetime
from botocore.exceptions import ClientError
def createLogGroupAndStream(loggroup, logstream):
print("Working with CloudWatch Logs group " + loggroup + " and stream "+logstream)
try:
GLOBAL_CWL.create_log_group(
logGroupName=loggroup
)
except ClientError as e:
if e.response['Error']['Code'] != 'ResourceAlreadyExistsException':
raise
try:
GLOBAL_CWL.create_log_stream(
logGroupName=loggroup,
logStreamName=logstream
)
except ClientError as e:
if e.response['Error']['Code'] != 'ResourceAlreadyExistsException':
raise
return True
# GLOBAL SECTION
# initialized when a cold start occur
GLOBAL_S3 = boto3.resource('s3')
GLOBAL_CWL = boto3.client('logs')
def streamlines(line, number):
# Ignore line start with #
if (line.startswith('#') == False):
fields = line.split("\t")
print(fields[0])
#print(number," ")
return
def streamevents(events, sequenceToken,loggroup, logstream):
kwargs = {
'logGroupName':loggroup,
'logStreamName':logstream,
'logEvents':events,
}
if (sequenceToken != None):
kwargs.update({'sequenceToken': sequenceToken})
return GLOBAL_CWL.put_log_events(**kwargs)
def lambda_handler(event, context):
s3info = event['Records'][0]['s3']
s3bucket = s3info['bucket']['name']
s3objectkey = urllib.parse.unquote(s3info['object']['key'])
s3objectsize = s3info['object']['size']
now = datetime.datetime.now()
loggroup = os.environ.get('CloudWatch_LogGroup', 'CloudFrontS3Logs')
logformat = os.environ.get('CloudWatch_LogFormat', 'cloudfront')
logstream = now.strftime("%Y-%m-%d")
createLogGroupAndStream(loggroup, logstream)
localfile_fd, localfile_unzipped = tempfile.mkstemp()
os.close(localfile_fd)
localfile_gzipped = localfile_unzipped+".gz"
print(" Bucket : " + s3bucket)
print(" key : " + s3objectkey)
print(" size : " + str(s3objectsize))
print(" local : " + localfile_unzipped)
# Copy S3 to local
try:
GLOBAL_S3.Bucket(s3bucket).download_file(s3objectkey, localfile_gzipped)
except botocore.exceptions.ClientError as e:
if e.response['Error']['Code'] == "404":
print("The object does not exist.")
else:
raise
# Gunzip local file
print(subprocess.check_output(['gunzip', '-f', localfile_gzipped])) # gzip command create .gz file
print("Unzipped file :")
print(subprocess.check_output(['ls','-la', localfile_unzipped])) # gzip command create .gz file
print("Removing comment line")
print(subprocess.check_output(['sed', '-i', '/^#/ d', localfile_unzipped])) # Remove line with comment ()
print("Sorting file")
print(subprocess.check_output(['sort', '-k2,3', '-o', localfile_unzipped, localfile_unzipped])) # Sort by date time
print("Get next sequence token")
response = GLOBAL_CWL.describe_log_streams(
logGroupName=loggroup,
logStreamNamePrefix=logstream,
orderBy='LogStreamName'
)
nextToken = response['logStreams'][0].get('uploadSequenceToken', None)
# Read event line by line, create a buffer, send the buffer every 500 log
events = []
f = open(localfile_unzipped, 'rt')
i = 0
for line in f:
i = i + 1
fields = line.strip().split("\t")
if (logformat == 'cloundfront'):
message = '\t'.join(fields[2:])
elif (logformat == 'simplified'):
message = '\t'.join([
# user <--> cloudfront <--> origin
# c s
fields[2], # x-edge-location
fields[22], # x-edge-response-result-type
fields[4], # c-ip
fields[5], # cs-method
fields[7] + ( ("?"+fields[11]) if fields[11] != "" else "" ), # cs-uri-stem + cs-uri-query
fields[3], # response length
fields[18], # response time
fields[23], # cs-protocol-version
fields[9], # cs-referer
urllib.parse.unquote(urllib.parse.unquote(fields[10])), # cs-user-agent
fields[15], # x-host-header
fields[17], # query length
]
)
elif (logformat == 'combined'):
message = ' '.join([
fields[4], # c-ip
'-', # user (anonymous)
fields[2], # x-edge-location,
'[' + fields[0] + 'T' + fields[1] + ']', # date time,
"\"" + fields[5] + " " + fields[7] + ( ("?"+fields[11]) if fields[11] != "" else "" ) + " " + fields[23] +"\"", # cs-method cs-uri-stem[?cs-uri-query] cs-protocol-version
fields[8], # sc-status
fields[3], # sc-bytes
"\"" + fields[9]+"\"", # cs(Referer)
"\"" + urllib.parse.unquote(urllib.parse.unquote(fields[10]))+"\"", # cs(User-Agent)
])
elif (logformat == 'json'):
message = json.dumps({
'x-edge-location':fields[2],
'sc-bytes':fields[3],
'c-ip':fields[4],
'cs-method':fields[5],
'cs-host':fields[6],
'cs-uri-stem':fields[7],
'cs-uri-query':fields[11],
'sc-status':fields[8],
'cs-referer':fields[9],
'cs-user-agent':urllib.parse.unquote(urllib.parse.unquote(fields[10])),
'cs-cookie':fields[12],
'x-edge-result-type':fields[13],
'x-edge-request-id':fields[14],
'x-host-header':fields[15],
'cs-protocol':fields[16],
'cs-bytes':fields[17],
'time-taken':fields[18],
'x-forwarded-for':fields[19],
'ssl-protocol':fields[20],
'ssl-cipher':fields[21],
'x-edge-response-result-type':fields[22],
'cs-protocol-version':fields[23],
'fle-status':fields[24],
'fle-encrypted-fields':fields[25],
})
elif (logformat == 'jsonsimplified'):
message = json.dumps({
'edge':fields[2],
'edge-response':fields[22],
'ip':fields[4],
'method':fields[5],
'uri':fields[7] + ( ("?"+fields[11]) if fields[11] != "" else "" ),
'rlen':fields[3], # response length
'rtime':fields[18], # response time
'proto':fields[23],
'ref':fields[9],
'ua':urllib.parse.unquote(urllib.parse.unquote(fields[10])),
'host':fields[15],
'qlen':fields[17], # query length
})
timestamp = 1000*int(datetime.datetime.strptime(fields[0]+' '+fields[1], '%Y-%m-%d %H:%M:%S').timestamp()) # todo : find a more efficient way to convert date/time in log file (string) to a timestamp (int)
ev = {'timestamp' : timestamp, 'message' : message}
events.append(ev)
if (i == 1):
print("First event : ")
print(line)
if (i % 500 == 0): # a higher value may result of a buffer overflow from Boto3 because you cant send more than 1MB of events in one call
print("Send events " + str(i))
response = streamevents(events, nextToken, loggroup, logstream)
nextToken = response['nextSequenceToken']
events = []
streamevents(events, nextToken, loggroup, logstream)
print("Last event : ")
print(line)
print(str(i) + " events sent to CloudWatch Logs")
if os.path.exists(localfile_unzipped):
os.remove(localfile_unzipped)
if os.path.exists(localfile_gzipped):
os.remove(localfile_gzipped)
return True
@bhimpel-mediware
Copy link

I have this working for my s3 bucket but it is not executing against 2 of the files in my folder. There are both js files but they are ~17mb & 34mb in size. Other js files in that same directory are being successfully compressed. I can't find anything in your code that excludes zipping files that are a certain size. Can't seem to find any obvious error in the logs. Any idea on the issue?

@psa-jforestier
Copy link
Author

Hello. I dont understand what you want to do. This code is supposed to be triggered on PUT event of S3, when a new log file is generated by CloudFront. If incomming file is not in Gzip format, the gunzip command (line #122) will fail, and the original file will not be deleted from the bucket.

@bhimpel-mediware
Copy link

Sorry I left this comment on the wrong piece of code. I am having the issue with this lambda function https://gist.github.com/psa-jforestier/1c74330df8e0d1fd6028e75e210e5042

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment