Skip to main content

Analysis AWS WAF logs and generate a report

Project description

logo

Python Downloads License

🎻 Introduction


What is Accomapnist?

Accompanist is an AWS WAF log analysis tool and an "accompanist" of WAF operation.
It enables you to analyze AWS WAF logs and automatically generate instant analysis reports in just three simple steps.
If you're operating AWS WAF, this tool can be helpful for instant log analysis and help you understand the trends of blocked or counted accesses.

  • Reporting Items
    • Histgram of requests
      • Total number
      • Number by each WAF rule provider
    • Top 5 for the following categories:
      • Rule group
      • Rule
      • Paths name
      • User agent
      • IP addressws
      • Country codes
    • Hit count on specific paths
    • Comment
      • An optional field where you can write additional notes

Prerequisite

  • Requirement

    • WAF: AWS WAFv2 and/or Third Party WAF (using WebACL)
    • Logging Destination: CloudWatch Logs or S3
    • Support Action: BLOCK, COUNT or EXCLUDED_AS_COUNT
  • IAM Role/User policy

    • Example policies are noted in Appnedix, the last section of this page.

🚀 Get Started


Install

$ pip install accompanist

Usage

  1. First, configure the settings using the following command; this will generate a config.json file.
$ accompanist init
  • You must set the log group name using this command, or you can choose to edit the config.json file directly.
  1. Second, retrieve the query results with the following commnad.
  • For example, to retrieve the BLOCK log for the past three days
$ accompanist listen -a BLOCK -d 3
  • If the log destination is S3, you can use "hear" instead of the "listen".
  1. Finally, generate a report in PDF format.
$ accompanist play

Uninstall

$ pip uninstall accompanist

🌱 How to use

Convenient usage

  • The "listen" or "hear" with --json_log or -j option can be help to investigate the detail of WAF logs.
    • [Important] Please handle it carefully as it may include sensitive or confidential information.
    • If you want to confirm a specific access of log, you should re-run "play" with the option and open a json file generated in the current directory.
  • The report color is customizable for when you run "play" with the option, --color or -d .

Precaution

  • This tool works with AWS WAFv2 and does not support WAFv1.
  • For AWS Managed Rules, you need to append "AWS" to the prefix, or the histogram works wrong.
  • In COUNT action, as it is a well-known general mode of AWS WAF, COUNT or EXCLUDED_AS_COUNT is used.
  • Using the "COUNT" action, the results are double counted by each rule.
  • The logs may not be correctly calculated if you use the "Label" features in WAF.
  • If the log destination is S3, it will take some time to acquire the log (several minutes)
  • The analysis target period (days) can be set up to 40 days at most.

🔨 Subcommnads


init

  • Configure a CWL log group setting and more.

Usage:

accompanist init  # interactive inputting process

Options:

  -l, --log-group TEXT  Set a CloudWatch Logs Log group name.  [required]
  -p, --path TEXT       Set a URI path for counts that is blocked/counted.[required]
  -c, --comment TEXT    Set a comment for report.  [required]
  -h, --help            Show this message and exit.

listen

  • Get a WAF log file in CSV format.

Usage:

accompanist listen [OPTIONS]

Options:

  -a, --action [BLOCK|COUNT]  Chose an action type of AWS WAF. The default is
                              "BLOCK".  [required]
  -d, --days INTEGER          Set a number of the past days until today for
                              analysis target period.
  -s, --start_time INTEGER    Set a UNIX time of the oldest time for analysis
                              target period (instead of "--days").
  -e, --end_time INTEGER      Set a UNIX time of the latest time for analysis
                              target period (instead of "--days").
  -j, --json-log              Output a JSON log file. Please handle it with care.
                              for debugging.
  -h, --help                  Show this message and exit.

hear

Note: This is experimental feature.

  • Get a WAF log file in CSV format from S3.

Usage:

accompanist hear [OPTIONS]

Options:

  -a, --action [BLOCK|COUNT]  Chose an action type of AWS WAF. The default is
                              "BLOCK".  [required]
  -d, --days INTEGER          Set a number of the past days until today for
                              analysis target period.
  -s, --start_time INTEGER    Set a UNIX time of the oldest time for analysis
                              target period (instead of "--days").
  -e, --end_time INTEGER      Set a UNIX time of the latest time for analysis
                              target period (instead of "--days").
  -h, --help                  Show this message and exit.

play

  • Analysis WAF logs and generate a report.

Usage:

accompanist play [OPTIONS]

Options:

  -c, --colorful                  Set a random color of report theme (instead
                                  of color).
  -d, --color TEXT                Customize a color of report theme with color
                                  code,  (e.g.) #cccccc.
  -m, --mask-ip                   Mask IP addresses on pie chart.
  -u, --utc-offset INTEGER        Set a number of UTC offest. The defaut
                                  offset is UTC+9 (Asia/Tokyo).
  -y, --y-limit [10|20|30|50|100|500|1000]
                                  Adjust a Y-axis max limitation for
                                  histograms due to many requests.
  -er, --exclude-rule-group TEXT  Exclude a rule group from analysis target.
                                  This option can be added multiple.
  -h, --help                      Show this message and exit.

📚 Appendix


IAM Policy for CWL

Here is an example of IAM policy with restricted permissions.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": "logs:StartQuery",
            "Resource": [
                "arn:aws:logs:<region>:<aws-acount>:log-group:<log-group-name>:*"
            ]
        },
        {
            "Effect": "Allow",
            "Action": "logs:GetQueryResults",
            "Resource": "*"
        }
    ]
}

Note: The <region>, <aws-acount> and <log-group-name> in this sample policy should be replaced.

IAM Policy for S3

Here is an example of IAM policy with restricted permissions.

{
    "Version": "2012-10-17",
    "Statement": [
        {
            "Effect": "Allow",
            "Action": "s3:ListBucket",
            "Resource": "arn:aws:s3:::<waf-log-bucket>"
        },
        {
            "Effect": "Allow",
            "Action": "s3:GetObject",
            "Resource": "arn:aws:s3:::<waf-log-bucket>/*"
        }
    ]
}

Note: The <waf-log-bucket>in this sample policy should be replaced.

License

The MIT License

Copyright 2023 Itsuki Yutaka

Permission is hereby granted, free of charge, to any person obtaining a copy of this software and associated documentation files (the “Software”), to deal in the Software without restriction, including without limitation the rights to use, copy, modify, merge, publish, distribute, sublicense, and/or sell copies of the Software, and to permit persons to whom the Software is furnished to do so, subject to the following conditions:

The above copyright notice and this permission notice shall be included in all copies or substantial portions of the Software.

THE SOFTWARE IS PROVIDED “AS IS”, WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distributions

No source distribution files available for this release.See tutorial on generating distribution archives.

Built Distribution

accompanist-1.3.3-py3-none-any.whl (51.7 kB view details)

Uploaded Python 3

File details

Details for the file accompanist-1.3.3-py3-none-any.whl.

File metadata

  • Download URL: accompanist-1.3.3-py3-none-any.whl
  • Upload date:
  • Size: 51.7 kB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.13

File hashes

Hashes for accompanist-1.3.3-py3-none-any.whl
Algorithm Hash digest
SHA256 ac9aa1736170630eb6da45be72948d2df6b24c15c87a94591192eea946d38561
MD5 c84af5e95803aa87820a2d2dd90ed3df
BLAKE2b-256 290249a958a21d0c8208844df567a81bf3e4ba9d2ec4ffae4ad6c1cb9980ddc0

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page