-
Notifications
You must be signed in to change notification settings - Fork 582
/
cloudwatch-logs-cleanup.sh
executable file
·330 lines (298 loc) · 9.03 KB
/
cloudwatch-logs-cleanup.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
#!/usr/bin/env bash
# This script will delete all CloudWatch Log Groups with a Last Event that is older than the Retention Policy in all regions available
# Requires the AWS CLI and jq
# Set Variables
# Optionally limit to a single AWS Region
Region="ALL"
# Debug Mode
DEBUGMODE="0"
# Functions
# Check Command
function check_command {
type -P $1 &>/dev/null || fail "Unable to find $1, please install it and run this script again."
}
# Completed
function completed(){
echo
HorizontalRule
tput setaf 2; echo "Completed!" && tput sgr0
HorizontalRule
echo
}
# Fail
function fail(){
tput setaf 1; echo "Failure: $*" && tput sgr0
exit 1
}
# Error
function error(){
tput setaf 1; echo "Error: $*" && tput sgr0
}
# Horizontal Rule
function HorizontalRule(){
echo "============================================================"
}
# Pause
function pause(){
# read -n 1 -s -p "Press any key to continue..."
echo
}
# Verify AWS CLI Credentials are setup
# http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html
if ! grep -q aws_access_key_id ~/.aws/config; then
if ! grep -q aws_access_key_id ~/.aws/credentials; then
fail "AWS config not found or CLI not installed. Please run \"aws configure\"."
fi
fi
# Check for AWS CLI profile argument passed into the script
# http://docs.aws.amazon.com/cli/latest/userguide/cli-chap-getting-started.html#cli-multiple-profiles
if [ $# -eq 0 ]; then
scriptname=`basename "$0"`
echo "Usage: ./$scriptname profile"
echo "Where profile is the AWS CLI profile name"
echo "Using default profile"
echo
profile=default
else
profile=$1
fi
# Check required commands
check_command "aws"
check_command "jq"
# Warning
function Warning(){
tput setaf 1
echo
HorizontalRule
echo "Warning: This script will DELETE all CloudWatch Log Groups with a Last Event Timestamp"
echo "that is older than the Retention Policy set on the Log Group in all regions available."
echo
read -r -p "Are you sure you understand and want to continue? (y/n) " CONTINUE
HorizontalRule
if ! [[ $CONTINUE =~ ^([yY][eE][sS]|[yY])$ ]]; then
echo "Canceled."
tput sgr0
exit 1
fi
tput sgr0
echo
}
# Limit region
if [[ "$Region" == "ALL" ]]; then
read -r -p "Enter a single Region name or press return to search all regions: " Region
fi
# Get list of all regions (using EC2)
function GetRegions(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin GetRegions Function"
fi
AWSregions=$(aws ec2 describe-regions --output=json --profile $profile 2>&1)
if echo "$AWSregions" | egrep -iq "error|not"; then
fail "$AWSregions"
else
ParseRegions=$(echo "$AWSregions" | jq '.Regions | .[] | .RegionName'| cut -d \" -f2 | sort)
fi
TotalRegions=$(echo "$ParseRegions" | wc -l | rev | cut -d " " -f1 | rev)
if [[ $DEBUGMODE = "1" ]]; then
echo "Regions:"
echo "$AWSregions"
echo "$ParseRegions"
echo "TotalRegions: $TotalRegions"
pause
fi
LogGroupsInRegion
}
# Get list of all CloudWatch Log Groups in all regions
function LogGroupsInRegion(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin LogGroupsInRegion Function"
fi
LogGroupsInRegionStart=1
for (( LogGroupsInRegionCount=$LogGroupsInRegionStart; LogGroupsInRegionCount<=$TotalRegions; LogGroupsInRegionCount++ ))
do
Region=$(echo "$ParseRegions" | nl | grep -w [^0-9][[:space:]]$LogGroupsInRegionCount | cut -f2)
if [[ $DEBUGMODE = "1" ]]; then
echo "Debug Region: $Region"
fi
HorizontalRule
ListLogGroups
echo
done
}
# Get list of all CloudWatch Log Groups in one region
function ListLogGroups(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin ListLogGroups Function"
fi
ListLogGroups=$(aws logs describe-log-groups --region=$Region --output=json --profile $profile 2>&1)
if [ ! $? -eq 0 ]; then
fail "$ListLogGroups"
# if echo "$ListLogGroups" | egrep -iq "error|not"; then
# fail "$ListLogGroups"
else
ParseLogGroups=$(echo "$ListLogGroups" | jq '.logGroups | .[] | .logGroupName' | cut -d \" -f2)
fi
if [ -z "$ParseLogGroups" ]; then
echo "No Log Groups found in $Region."
else
tput setaf 2; echo "Reviewing Log Groups in Region $Region..." && tput sgr0
HorizontalRule
# echo "$ParseLogGroups"
CheckRetentionPolicy
fi
}
# Check Retention Policy
function CheckRetentionPolicy(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin CheckRetentionPolicy Function"
fi
TotalLogGroups=$(echo "$ParseLogGroups" | wc -l | rev | cut -d " " -f1 | rev)
if [[ $DEBUGMODE = "1" ]]; then
echo "~~~~"
echo "Region: $Region"
echo "TotalLogGroups: $TotalLogGroups"
echo "~~~~"
pause
fi
CheckRetentionPolicyStart=1
for (( CheckRetentionPolicyCount=$CheckRetentionPolicyStart; CheckRetentionPolicyCount<=$TotalLogGroups; CheckRetentionPolicyCount++ ))
do
LogGroup=$(echo "$ParseLogGroups" | nl | grep -w [^0-9][[:space:]]$CheckRetentionPolicyCount | cut -f2)
if [[ $DEBUGMODE = "1" ]]; then
echo "o0o0o0o"
echo "Count: $CheckRetentionPolicyCount"
echo "LogGroup: $LogGroup"
echo "o0o0o0o"
pause
fi
CheckRetentionPolicy=$(aws logs describe-log-groups --region $Region --log-group-name-prefix $LogGroup --output=json --profile $profile 2>&1)
if [ ! $? -eq 0 ]; then
fail "$CheckRetentionPolicy"
fi
# if echo "$CheckRetentionPolicy" | egrep -iq "error|not"; then
# fail "$CheckRetentionPolicy"
# fi
countLogGroups=$(echo "$CheckRetentionPolicy" | jq '.logGroups | length')
if [ $countLogGroups -gt 1 ]; then
error "Multiple Log Groups Match this Prefix: $LogGroup in Region: $Region"
else
retentionInDays=$(echo "$CheckRetentionPolicy" | jq '.logGroups | .[] | .retentionInDays' | cut -d \" -f2)
if [[ $DEBUGMODE = "1" ]]; then
echo "start test"
echo "retentionInDays: $retentionInDays"
echo "end test"
echo "$CheckRetentionPolicy" | jq .
fi
if [ -z "$retentionInDays" ]; then
error "Error checking Retention Policy for Log Group $LogGroup in Region: $Region"
else
if [[ "$retentionInDays" == "null" ]]; then
error "No Retention Policy set for Log Group $LogGroup in Region: $Region"
else
CheckLogStream
fi
fi
fi
done
}
# Check Log Stream
function CheckLogStream(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin CheckLogStream Function"
fi
CheckLogStream=$(aws logs describe-log-streams --region $Region --log-group-name $LogGroup --max-items 1 --order-by LastEventTime --descending --output=json --profile $profile 2>&1)
if [ ! $? -eq 0 ]; then
fail "$CheckLogStream"
fi
# if echo "$CheckLogStream" | egrep -iq "error|not"; then
# fail "$CheckLogStream"
# fi
lastEventTimestamp=$(echo "$CheckLogStream" | jq '.logStreams | .[] | .lastEventTimestamp' | cut -d \" -f2)
if [[ $DEBUGMODE = "1" ]]; then
echo "lastEventTimestamp: $lastEventTimestamp"
fi
CheckTimestamp
}
# Convert Retention Days to MS
function convertDaystoMS(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin convertDaystoMS Function"
fi
if [ $retentionInDays -eq 1 ]; then
retentionInDaysToMS=86400000
elif [ $retentionInDays -eq 3 ]; then
retentionInDaysToMS=259200000
elif [ $retentionInDays -eq 5 ]; then
retentionInDaysToMS=432000000
elif [ $retentionInDays -eq 7 ]; then
retentionInDaysToMS=604800000
elif [ $retentionInDays -eq 14 ]; then
retentionInDaysToMS=1209600000
elif [ $retentionInDays -eq 30 ]; then
retentionInDaysToMS=2592000000
elif [ $retentionInDays -eq 60 ]; then
retentionInDaysToMS=5184000000
elif [ $retentionInDays -eq 90 ]; then
retentionInDaysToMS=7776000000
elif [ $retentionInDays -eq 120 ]; then
retentionInDaysToMS=10368000000
elif [ $retentionInDays -eq 150 ]; then
retentionInDaysToMS=12960000000
elif [ $retentionInDays -eq 180 ]; then
retentionInDaysToMS=15552000000
elif [ $retentionInDays -eq 365 ]; then
retentionInDaysToMS=31536000000
elif [ $retentionInDays -eq 400 ]; then
retentionInDaysToMS=34560000000
elif [ $retentionInDays -eq 545 ]; then
retentionInDaysToMS=47088000000
elif [ $retentionInDays -eq 731 ]; then
retentionInDaysToMS=63158400000
elif [ $retentionInDays -eq 1827 ]; then
retentionInDaysToMS=157852800000
elif [ $retentionInDays -eq 3653 ]; then
retentionInDaysToMS=315619200000
fi
}
# Milliseconds in a day
msInaDay="86400000"
# Check Timestamp
function CheckTimestamp(){
if [[ $DEBUGMODE = "1" ]]; then
echo "Begin CheckTimestamp Function"
fi
# retentionInDaysToMS=$(($retentionInDays * $msInaDay))
convertDaystoMS
now=$(date +%s000)
difference=$(($now - $lastEventTimestamp))
days=$(($difference / $msInaDay))
if [[ $DEBUGMODE = "1" ]]; then
echo "retentionInDaysToMS: $retentionInDaysToMS"
echo "now: $now"
echo "difference: $difference"
fi
# echo "Region: $Region"
if [ $difference -gt $retentionInDaysToMS ]; then
HorizontalRule
tput setaf 1; echo "PAST RETENTION TIME:"
echo "LogGroup: $LogGroup"
echo "Days Since Last Event: $days" && tput sgr0
DeleteLogGroup
HorizontalRule
fi
}
# Delete Log Group
function DeleteLogGroup(){
echo "Deleting Log Group..."
DeleteLogGroup=$(aws logs delete-log-group --region $Region --log-group-name $LogGroup --output=json --profile $profile 2>&1)
if [ ! $? -eq 0 ]; then
fail "$DeleteLogGroup"
fi
}
Warning
if [ -z "$Region" ]; then
GetRegions
else
ListLogGroups
fi
completed