The best way to tail AWS CloudWatch Logs from your terminal.
Author - Luca Grulla - https://www.lucagrulla.com
- Features
- Installation
- Commands and options
- Examples
- AWS credentials and configuration
- Miscellaneous
- Release notes
- No external dependencies
- cw is a native executable targeting your OS. No pip, npm, rubygems.
- Fast.
- cw is written in golang and compiled against your architecture.
- Flexible date and time parser.
- Work with either
Localtimezone orUTC(default). - Flexible parsing.
- Human friendly formats, i.e.
2d1h20mto indicate 2 days, 1 hour and 20 minutes ago. - a specific hour, i.e.
13:10to indicate 13:10 of today. - a full timestamp
2018-10-20T8:53.
- Human friendly formats, i.e.
- Work with either
- Multi log groups tailing
- tail multiple log groups in parallel:
cw tail my-auth-service my-web.
- tail multiple log groups in parallel:
- Powerful built-in grep (
--grep) and grepv (--grepv). - JMESPath support for JSON queries (matching the AWS CLI
--queryflag) - Pipe operator supported
echo my-group | cw tailandcat groups.txt | cw tail.
- Redirection operator >> supported
cw tail -f my-stream >> myfile.txt.
- Coloured output
--no-colorflag to disable if needed.
- Flexible credentials control.
- By default the AWS .aws/credentials and .aws/profile files are used. Overrides can be achieved with the
--profileand--regionflags.
- By default the AWS .aws/credentials and .aws/profile files are used. Overrides can be achieved with the
using Homebrew
brew tap lucagrulla/tap
brew install cwusing Linuxbrew
brew tap lucagrulla/tap
brew install cwDownload the .deb or .rpm from the releases page and install with dpkg -i and rpm -i respectively.
using Snapcraft.io
Note: If you upgrade to 3.3.0 please note the new alias command. This is required to comply with snapcraft new release rules.
snap install cw-sh
sudo snap connect cw-sh:dot-aws-config-credentials
sudo snap alias cw-sh.cw cwcw runs with strict confinement; the dot-aws-config-credentials interface connection is required to have access to .aws/config and .aws/credentials files
using Scoop.sh
scoop bucket add cw https://github.com/lucagrulla/cw-scoop-bucket.git
scoop install cwgo get github.com/lucagrulla/cw--profile=profile-nameOverride the AWS profile used for connection.--region=aws-regionOverride the target AWS region.--no-colorDisable coloured output.--endpointThe target AWS endpoint url. By default cw will use the default aws endpoints.--no-version-checkIgnore checks if a newer version of the module is available.
-
cw lslist all the log groups/log streams within a groupUsage: cw ls <command> show an entity Flags: -h, --help Show context-sensitive help. --endpoint=URL The target AWS endpoint url. By default cw will use the default aws endpoints. NOTE: v4.0.0 dropped the flag short version. --profile=PROFILE The target AWS profile. By default cw will use the default profile defined in the .aws/credentials file. NOTE: v4.0.0 dropped the flag short version. --region=REGION The target AWS region. By default cw will use the default region defined in the .aws/credentials file. NOTE: v4.0.0 dropped the flag short version. --no-color Disable coloured output.NOTE: v4.0.0 dropped the flag short version. --version Print version information and quit --no-version-check Ignore checks if a newer version of the module is available. Commands: ls groups Show all groups. ls streams <group> Show all streams in a given log group. cw: error: expected one of "groups", "streams"
-
cw tailtail a given log group/log streamUsage: cw tail <groupName[:logStreamPrefix]> ... Tail log groups/streams. Arguments: <groupName[:logStreamPrefix]> ... The log group and stream name, with group:prefix syntax. Stream name can be just the prefix. If no stream name is specified all stream names in the given group will be tailed. Multiple group/stream tuple can be passed. e.g. cw tail group1:prefix1 group2:prefix2 group3:prefix3. Flags: -h, --help Show context-sensitive help. --endpoint=URL The target AWS endpoint url. By default cw will use the default aws endpoints. NOTE: v4.0.0 dropped the flag short version. --profile=PROFILE The target AWS profile. By default cw will use the default profile defined in the .aws/credentials file. NOTE: v4.0.0 dropped the flag short version. --region=REGION The target AWS region. By default cw will use the default region defined in the .aws/credentials file. NOTE: v4.0.0 dropped the flag short version. --no-color Disable coloured output.NOTE: v4.0.0 dropped the flag short version. --version Print version information and quit --no-version-check Ignore checks if a newer version of the module is available. -f, --follow Don't stop when the end of streams is reached, but rather wait for additional data to be appended. -t, --timestamp Print the event timestamp. -i, --event-id Print the event Id. -s, --stream-name Print the log stream name this event belongs to. -n, --group-name Print the log group name this event belongs to. -r, --retry Keep trying to open a log group/log stream if it is inaccessible. -b, --start="2021-04-11T08:21:52" The UTC start time. Passed as either date/time or human-friendly format. The human-friendly format accepts the number of days, hours and minutes prior to the present. Denote days with 'd', hours with 'h' and minutes with 'm' i.e. 80m, 4h30m, 2d4h. If just time is used (format: hh[:mm]) it is expanded to today at the given time. Full available date/time format: 2017-02-27[T09[:00[:00]]. -e, --end=STRING The UTC end time. Passed as either date/time or human-friendly format. The human-friendly format accepts the number of days, hours and minutes prior to the present. Denote days with 'd', hours with 'h' and minutes with 'm' i.e. 80m, 4h30m, 2d4h. If just time is used (format: hh[:mm]) it is expanded to today at the given time. Full available date/time format: 2017-02-27[T09[:00[:00]]. -l, --local Treat date and time in Local timezone. -g, --grep=STRING Pattern to filter logs by. See http://docs.aws.amazon.com/AmazonCloudWatch/latest/logs/FilterAndPatternSyntax.html for syntax. -v, --grepv=STRING Equivalent of grep --invert-match. Invert match pattern to filter logs by. -q, --query=STRING Equivalent of the --query flag in AWS CLI. Takes a JMESPath expression to filter JSON logs by. If the query fails (e.g. the log message was not JSON) then the original line is returned.
-
list of the available log groups
cw ls groups
-
list of the log streams in a given log group
cw ls streams my-log-group
-
tail and follow given log groups/streams
cw tail -f my-log-groupcw tail -f my-log-group:my-log-stream-prefixcw tail -f my-log-group:my-log-stream-prefix my-log-group2cw tail -f my-log-group:my-log-stream-prefix -b2017-01-01T08:10:10 -e2017-01-01T08:05:00cw tail -f my-log-group:my-log-stream-prefix -b7dto start from 7 days ago.cw tail -f my-log-group:my-log-stream-prefix -b3hto start from 3 hours ago.cw tail -f my-log-group:my-log-stream-prefix -b100mto start from 100 minutes ago.cw tail -f my-log-group:my-log-stream-prefix -b2h30mto start from 2 hours and 30 minutes ago.cw tail -f my-log-group -b9:00 -e9:01
-
query JSON logs using JMESPath syntax
cw tail -f my-log-group --query "machines[?state=='running'].name"
Time and dates are treated as UTC by default.
Use the --local flag if you prefer to use Local zone.
cw uses the default credentials profile (stored in ./aws/credentials) for authentication and shared config (.aws/config) for identifying the target AWS region. Both profile and region are overridable via the profile and region global flags.
AWS SSO is supported if you:
- use a CLI profile (either
defaultor an alternate named profile) that includes the various SSO propertiessso_start_url,sso_account_id,sso_role_name, etc
- have a valid, active SSO session
- via
aws sso login
- via
If you get an error message that includes ...failed to sign request: failed to retrieve credentials: the SSO session has expired or is invalid... then you should renew your SSO session via aws sso login (and specify the named profile, if appropriate).
Please use HTTP_PROXY environment variable as required by AWS cli:
https://docs.aws.amazon.com/cli/latest/userguide/cli-configure-proxy.html
Read here