purl.obolibrary.org
purl.obolibrary.org copied to clipboard
Document proper log analysis
Now that there are rotating apache logs in an S3 bucket, how does the average operator get at them and use them?
- [ ] Have proper AWS permissions, including API keys
- [ ] Get AWS client tools
- [ ] Get logs in
obo-service-logs; currently obo/purl/355fea0db941/2022/03/ would be most useful for what we want
For example:aws s3 sync s3://DESIRED_LOGS . --include "*" --exclude "*error*" - [ ] Decompress
pigz -d purl.obolibrary.org.access.log.202203*.gz && cat purl.obolibrary.org.access.log.202203* > all-log.txt - [ ] Use your favorite apache2 log tool; for example
goaccess all-log.txt --log-format=COMBINED
Tagging @cmungall