Skip to main content

Simple library to emit json formatted logs to stdout

Project description

https://img.shields.io/pypi/v/sanic-json-logging.svg https://travis-ci.com/terrycain/sanic-json-logging.svg?branch=master Code coverage Updates

The other day I was running some containers on Amazon’s ECS and logging to cloudwatch. I then learnt cloudwatch parses JSON logs so obviously I then wanted Sanic to log out JSON.

Ideally this’ll be useful to people but if it isn’t, raise an issue and we’ll make it better :)

To install:

pip install sanic-json-logging

Look at examples/simple.py for a full working example, but this will essentially get you going

import sanic
from sanic_json_logging import setup_json_logging

app = sanic.Sanic(name="somename")
setup_json_logging(app)

setup_json_logging does the following:

  • changes the default log formatters to JSON ones

  • also filters out no Keepalive warnings

  • unless told otherwise, will change the asyncio task factory, to implement some rudimentary task-local storage.

  • installs pre and post request middleware. Pre-request middleware to time tasks and generate a uuid4 request id. Post-request middleware to emit access logs.

  • will use AWS X-Forwarded-For IPs in the access logs if present

If setup_json_logging changed the task factory, all tasks created from the request’s task will contain the request ID. You can pass disable_json_access_log=True to the setup function which will disable the configuration of JSON access logging. Setting configure_task_local_storage to false will disable storing request IDs inside the task object which will

Currently I have it outputting access logs like

{
  "timestamp": "2018-06-09T17:42:52.195701Z",
  "level": "INFO",
  "method": "GET",
  "path": "/endpoint1",
  "remote": "127.0.0.1:33468",
  "user_agent": "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/67.0.3396.62 Safari/537.36",
  "host": "localhost:8000",
  "response_time": 0.0,
  "req_id": "795617c7-b514-4ed9-bb63-cc4fcd883c3d",
  "logger": "sanic.access",
  "status_code": 200,
  "length": 0,
  "type": "access"
}

And if you log to the root logger, inside a request, it’ll look like this.

{
  "timestamp": "2018-06-09T17:42:52.195326Z",
  "level": "INFO",
  "message": "some informational message",
  "type": "log",
  "logger": "root",
  "filename": "simple.py",
  "lineno": 16,
  "req_id": "795617c7-b514-4ed9-bb63-cc4fcd883c3d"
}

By default this package logs Exceptions with tracebacks as strings, you might want to render the traceback as JSON aswell. To achieve this simply provide an alternate formatter. First install this package with its optional dependencies:

pip install sanic-json-logging[extratb]

Then inject another Formatter:

from sanic_json_logging import LOGGING_CONFIG_DEFAULTS as cfg

cfg["formatters"]["generic"]["class"] = "sanic_json_logging.formatters.JSONTracebackJSONFormatter"
setup_json_logging(app, disable_json_access_log=True, config=cfg)

After all your tracebacks are formatted properly as JSON:

{
  "timestamp": "2021-08-26T23:19:49.412293Z",
  "level": "ERROR",
  "message": "Exception occurred while handling uri: 'http://127.0.0.1:8000/'",
  "type": "exception",
  "logger": "sanic.error",
  "worker": 31915,
  "filename": "handlers.py",
  "lineno": 146,
  "traceback": {
    "exc_type": "Exception",
    "exc_msg": "foo",
    "exc_tb": {
      "frames": [
        {
          "func_name": "handle_request",
          "lineno": 770,
          "module_name": "sanic.app",
          "module_path": "/python3.9/site-packages/sanic/app.py",
          "lasti": 182,
          "line": "                    response = await response"
        },
        {
          "func_name": "root",
          "lineno": 20,
          "module_name": "api.general",
          "module_path": "/api/general.py",
          "lasti": 6,
          "line": "    raise Exception(\"foo\")"
        }
      ]
    }
  },
  "req_id": "f128370f-b949-44e7-bb94-4635bbcad486"
}

Changelog

4.1.2

  • @digitalkaoz fixed more bugs with the traceback formatter

4.1.1

  • Updated tests for alternative traceback formatter

4.1.0

  • Added ability to set custom formatters

  • Added optional extensive traceback formatter

4.0.1

  • properly disable access logs

4.0.0

  • Added flake8, black, isort, mypy

  • Dropped Travis in favour of Github Actions

  • Switched from setup.py to using Poetry

  • Updated tests to use sanic-testing

3.2.0

  • Updated to use new request.ctx context dictionary

  • Added support for Python 3.7 asyncio changes

3.1.0

  • Stringify any LogRecord message if its not JSON serializable

3.0.0

  • Added option to disable task local storage

2.0.0

  • Removed NoAccessLogSanic subclass in favour of setup argument

1.3.0

  • Added Request ID to request dict

  • fixed move to travis.com

1.2.0

  • Fixed UA header bug, fixed tests

1.1.1

  • Pretty much first decent version

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

sanic-json-logging-4.1.2.tar.gz (12.2 kB view details)

Uploaded Source

Built Distribution

sanic_json_logging-4.1.2-py3-none-any.whl (11.5 kB view details)

Uploaded Python 3

File details

Details for the file sanic-json-logging-4.1.2.tar.gz.

File metadata

  • Download URL: sanic-json-logging-4.1.2.tar.gz
  • Upload date:
  • Size: 12.2 kB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: poetry/1.1.8 CPython/3.8.11 Linux/5.8.0-1040-azure

File hashes

Hashes for sanic-json-logging-4.1.2.tar.gz
Algorithm Hash digest
SHA256 c2eaf003a2cead2733addd02e1372f98038bf22374ac8d16e93dd1a8e0038583
MD5 10b2429c672d01132a76893eecb3c4fc
BLAKE2b-256 cebeb1b60fc12917fbfd9abada844012274a661891cc65ebb4ffce68c1300f0a

See more details on using hashes here.

File details

Details for the file sanic_json_logging-4.1.2-py3-none-any.whl.

File metadata

File hashes

Hashes for sanic_json_logging-4.1.2-py3-none-any.whl
Algorithm Hash digest
SHA256 05d2a83b2af41114f8d20be945dd77382f3ea99b476bfc1b67f518f3f5512fd9
MD5 15dc2989dda88cfa0221ac5e6baad129
BLAKE2b-256 000252b798ddb5087924a4ef65e49e23bce917292d47d7b4bf6b80e000488708

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page