Lightweight cron-friendly log monitoring utility with regex rules and per-rule shell actions
Project description
pylogsentinel
A lightweight, zero-dependency (standard library only) log monitoring sentinel intended
to be invoked periodically (e.g. once per minute via cron). It incrementally scans
configured log files for user-defined regular expression rules and triggers shell
actions with rich contextual environment variables.
pylogsentinel is intentionally simple: no daemons, no background threads, no
long-running processes. Each run processes just the new bytes appended since the
previous run (tracked per-file, per-inode) and then exits.
Key Features
- INI-style configuration (
pylogsentinel.conf). - Multiple named log sets (e.g. [logs.default], [logs.errors]) with per-set discovery via static paths or shell command
- Per-rule regular expressions with optional flags (
/pattern/istyle). - Per-rule or actions executed as shell commands with rich contextual environment variables.
- Reliable state tracking via inode-based files (
<inode>instate_dir). - Safe handling of truncation & rotation (offset reset if file shrinks).
- Strict lock file (
LOCK) prevents concurrent overlapping runs. - Skip-actions mode (
--skip-actions) processes new data but skips executing actions (use on the first run to avoid firing on historical log lines). - Human-friendly size option for
max_block_size(e.g.512K,10M). - Automatic configuration file discovery when -c/--config is not supplied.
- Directory path monitoring uses the system 'file' command; only paths whose description contains 'text' are monitored (explicit file paths are always processed).
- Python 3.9+ (only standard library imports).
Installation
pip install pylogsentinel
Quick Start
-
Write a configuration in a standard location:
touch /etc/pylogsentinel.conf chmod 600 /etc/pylogsentinel.conf -
Edit paths, rules, and actions to your needs.
-
First build state without executing actions (initial run with --skip-actions):
python -m pylogsentinel -c /etc/pylogsentinel.conf --skip-actionsIf you omit the
-coption (or the specified file does not exist), pylogsentinel will look for a configuration file in this order:~/.pylogsentinel.conf~/.config/pylogsentinel.conf/etc/pylogsentinel.conf/usr/local/etc/pylogsentinel.conf.
-
Add a cron entry (run every minute):
* * * * * /usr/bin/env python3 -m pylogsentinel -c /etc/pylogsentinel.conf
Configuration File Reference
The configuration is an INI-style file. An example:
[system]
state_dir = /var/run/pylogsentinel
max_block_size = 10M
[logs.default]
paths = /var/log /custom/app/logs/app.log
[logs.other]
cmd = find /var/log -type f -name '*.log'
[action.default]
cmd = echo -e "Matched $RULE_ID in $FILE at line $LINE, context:\n\n$CONTEXT" | mail -s "Sentinel alert" root
[action.another]
cmd = echo "Another action"
[rule.error]
description = Error-like conditions
pattern = /(error|fatal|exception|kill|crash)/i
action = another
logs = default other
[system] Section
| Option | Required | Description | Default |
|---|---|---|---|
state_dir |
Yes | Directory storing lock + per-inode state files. Must be writable. (Defined under [system].) |
(none) |
max_block_size |
No | Maximum newly appended bytes to read per file per run. Supports suffixes K, M, G (in [system]). |
10M |
Log Sets ([logs.<id>])
Define one or more log sets; each [logs.<id>] specifies exactly one of paths or cmd. The default set must be named [logs.default]. A bare [logs] section is not allowed.
paths: Space-separated file and/or directory paths. Directories are traversed recursively; only files whosefile -boutput contains 'text' are monitored. Explicit file paths are always processed.cmd: Shell command producing one path per line on stdout.
Rules may reference multiple log sets using a whitespace-separated logs field.
[rule.<rule_id>] Sections
| Field | Required | Description |
|---|---|---|
pattern |
Yes | Regular expression in /pattern/flags form. Supported flag: i (IGNORECASE). |
description |
No | Human-readable description for environment variable RULE_DESCRIPTION. |
action |
No | Action id to invoke; defaults to default if omitted. |
logs |
No | Whitespace-separated list of log set ids (e.g. default errors access). Defaults to default if omitted. |
At least one rule is required.
Pattern Forms Examples
| Pattern | Meaning |
|---|---|
/error/i |
Case-insensitive match of "error" |
/^panic:.+/ |
Match lines starting with "panic:" (case-sensitive) |
/^panic:.+/i |
Same, case-insensitive |
/\b(?:CRIT|FATAL)\b/ |
Word boundary critical terms |
If you supply an invalid regex or an unsupported flag, startup will fail with a configuration error.
[action.<action_id>] Sections
Each action defines a shell cmd executed when a matching rule triggers. The special action id default must exist; it is used as a fallback when a rule references it explicitly or omits action.
Environment variables available to the command:
| Variable | Description |
|---|---|
RULE_ID |
The rule identifier (e.g. error). |
RULE_PATTERN |
The normalized pattern string (e.g. /error/i). |
RULE_DESCRIPTION |
Description text or placeholder string if not provided. |
FILE |
Absolute path of the log file where the match occurred. |
LINE |
1-based absolute line number within the file at time of scan. |
CONTEXT |
Concatenated lines around the match (default radius 2 before & after). |
Your cmd can reference these with typical shell expansion, for example:
[action.notify]
cmd = printf "%s\n%s\n" "$RULE_DESCRIPTION" "$CONTEXT" | mail -s "Alert $RULE_ID: $FILE:$LINE" ops@example.com
State Tracking
For each processed file:
- The file's inode (
st_ino) is determined. - A state file named
<inode>insidestate_dirstores:<byte_offset> <line_number> - On the next run only new bytes (up to
max_block_size) beyond<byte_offset>are read. - If the file shrinks (truncation), the stored offset is treated as invalid and scanning restarts from the beginning with line numbers reset.
This scheme tolerates typical log rotation patterns.
Lock File
A lock file named LOCK in state_dir prevents overlapping runs. If it exists the process exits immediately. Remove a stale lock only after verifying no instance is active.
Dry Run
--skip-actions processes new data but does not run the actions (recommended for the very first run to prevent alert storms from historical data).
Exit Codes
| Code | Meaning |
|---|---|
| 0 | Success |
| 2 | Configuration error |
| 130 | Interrupted (Ctrl+C) |
| 1 | Other runtime error |
License
MIT License (see LICENSE).
Project details
Download files
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Source Distribution
Built Distribution
Filter files by name, interpreter, ABI, and platform.
If you're not sure about the file name format, learn more about wheel file names.
Copy a direct link to the current filters
File details
Details for the file pylogsentinel-0.3.0.tar.gz.
File metadata
- Download URL: pylogsentinel-0.3.0.tar.gz
- Upload date:
- Size: 15.3 kB
- Tags: Source
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.7.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
e11c5dcdcfdce666ea73b0bd8f1a406d7f11f3b41448ea4f73c579a21dcd63cb
|
|
| MD5 |
eca1b016f6e2c3f0a5b08025a96de902
|
|
| BLAKE2b-256 |
26e12ea8fee26151788c132fbb081700a27fa753db569e2ba5cf9e215666c09f
|
File details
Details for the file pylogsentinel-0.3.0-py3-none-any.whl.
File metadata
- Download URL: pylogsentinel-0.3.0-py3-none-any.whl
- Upload date:
- Size: 13.5 kB
- Tags: Python 3
- Uploaded using Trusted Publishing? No
- Uploaded via: uv/0.7.3
File hashes
| Algorithm | Hash digest | |
|---|---|---|
| SHA256 |
bc4d1bd75b611f1660b42eea63dc46428625fab2197de36d0632ebce71fbe72e
|
|
| MD5 |
83e888e1a5ec2a6589c08b576f1e667d
|
|
| BLAKE2b-256 |
7c966d46f0f4ec1f81e205561e7db02b8f18a4dd349e77049b0f4f6605aca95c
|