Now that there are rotating apache logs in an S3 bucket, how does the average operator get at them and use them?
[ ] Have proper AWS permissions, including API keys
[ ] Get AWS client tools
[ ] Get logs in obo-service-logs; currently obo/purl/355fea0db941/2022/03/ would be most useful for what we want For example: aws s3 sync s3://DESIRED_LOGS . --include "*" --exclude "*error*"
Now that there are rotating apache logs in an S3 bucket, how does the average operator get at them and use them?
obo-service-logs
; currently obo/purl/355fea0db941/2022/03/ would be most useful for what we wantFor example:
aws s3 sync s3://DESIRED_LOGS . --include "*" --exclude "*error*"
pigz -d purl.obolibrary.org.access.log.202203*.gz && cat purl.obolibrary.org.access.log.202203* > all-log.txt
goaccess all-log.txt --log-format=COMBINED