https://docs.aws.amazon.com/ja_jp/AmazonCloudWatch/latest/logs/SubscriptionFilters.html
-- 1. コマンド等のインストール
-- 1.1 aws cli version 2 インストール
curl "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "awscliv2.zip"
unzip awscliv2.zip
sudo ./aws/install
aws --version
-- 1.2 jqインストール
sudo yum -y install jq
-- 2. CloudWatchロググループの作成
aws logs create-log-group --log-group-name app01/test.log
aws logs describe-log-groups --log-group-name-prefix app01/test.log
aws logs put-retention-policy \
--log-group-name app01/test.log \
--retention-in-days 1
-- 3. CloudWatchログストリームの作成
aws logs create-log-stream \
--log-group-name app01/test.log \
--log-stream-name stream01
aws logs describe-log-streams \
--log-group-name app01/test.log
-- 4. Lambda用IAMロール作成
vim role01.json
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal": {
"Service": "lambda.amazonaws.com"
},
"Action": "sts:AssumeRole"
}
]
}
aws iam create-role \
--role-name role01 \
--assume-role-policy-document file://role01.json
-- 5. ポリシーをロールにアタッチ
aws iam attach-role-policy \
--policy-arn arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole \
--role-name role01
-- 6. Lambda関数作成
vim test.js
var zlib = require('zlib');
exports.handler = function(input, context) {
var payload = Buffer.from(input.awslogs.data, 'base64');
zlib.gunzip(payload, function(e, result) {
if (e) {
context.fail(e);
} else {
result = JSON.parse(result.toString());
console.log("Event Data:", JSON.stringify(result, null, 2));
context.succeed();
}
});
};
chmod 755 test.js
zip -r test.zip test.js
aws lambda create-function \
--function-name func01 \
--zip-file fileb://test.zip \
--role arn:aws:iam::999999999999:role/role01 \
--handler test.handler \
--runtime nodejs12.x
aws lambda list-functions
aws lambda list-functions | jq -c '.Functions | [ .FunctionName ]'
aws lambda get-function --function-name func01
-- 7. Lambda関数からCloudWatch Logsへ権限を追加する
aws lambda add-permission \
--function-name func01 \
--statement-id logs \
--action lambda:InvokeFunction \
--principal logs.ap-northeast-1.amazonaws.com \
--source-arn "arn:aws:logs:ap-northeast-1:999999999999:log-group:app01/test.log:*" \
--source-account 999999999999
aws lambda get-policy \
--function-name func01 | jq -r .Policy | jq .
-- 8. サブスクリプションフィルタ作成
aws logs put-subscription-filter \
--log-group-name "app01/test.log" \
--filter-name "filter01" \
--filter-pattern "Error" \
--destination-arn arn:aws:lambda:ap-northeast-1:999999999999:function:func01
-- 9. 動作確認
aws logs put-log-events \
--log-group-name app01/test.log \
--log-stream-name stream01 \
--log-events timestamp=1646547311000,message="Error01"
aws logs put-log-events \
--log-group-name app01/test.log \
--log-stream-name stream01 \
--log-events timestamp=1646547322000,message="OK01" \
--sequence-token 49627360455607896919191468131756578502118736367878320674
aws logs put-log-events \
--log-group-name app01/test.log \
--log-stream-name stream01 \
--log-events timestamp=1646547333000,message="Error02" \
--sequence-token 49626639087225653629133351675288445902236213960979873810
"OK01"は/aws/lambda/func01のログに出力されていないことを確認
-- 10. クリーンアップ
-- サブスクリプションフィルターの削除
aws logs describe-subscription-filters \
--log-group-name app01/test.log
aws logs delete-subscription-filter \
--log-group-name "app01/test.log" \
--filter-name "filter01"
-- Lambda関数の削除
aws lambda list-functions | jq -c '.Functions | [ .FunctionName ]'
aws lambda delete-function --function-name func01
-- ロールの削除
aws iam list-roles | grep role01
aws iam detach-role-policy \
--role-name role01 \
--policy-arn arn:aws:iam::aws:policy/service-role/AWSLambdaBasicExecutionRole
aws iam delete-role --role-name role01
-- CloudWatchログストリームの削除
aws logs describe-log-streams \
--log-group-name app01/test.log
aws logs delete-log-stream \
--log-group-name app01/test.log \
--log-stream-name stream01
-- CloudWatchロググループの削除
aws logs describe-log-groups --log-group-name-prefix app01/test.log
aws logs delete-log-group --log-group-name app01/test.log