Monitoring the performance of your content delivery network (CDN) is critical, and logs can provide essential performance metrics for in-depth analysis. CDN monitoring allows you to proactively detect and troubleshoot issues. By monitoring key metrics such as the number of cache hits/misses and HTTP response codes for cached objects, and receiving alerts for anomalies or errors, you can quickly identify and address issues before they affect end-users. This helps minimize downtime, resolve performance problems, and maintain a positive user experience.
To monitor and analyze the performance of your CDN using Amazon CloudFront, you can use real-time logs to get detailed information about every request that CloudFront receives. Real-time logs are delivered to a data stream and can be forwarded to your favorite observability platform, New Relic, where you can use the power of log patterns, log filtering with selected properties, and alerts.
This guide will show you how to set up real-time log forwarding for Amazon CloudFront CDN. You will use access logs of a CloudFront CDN that's hosting a simple single-page application. You’ll then forward the access logs using the Amazon Kinesis Data Stream and the Kinesis Data Firehose delivery stream. This will enable you to create real-time alerts and live dashboards, investigate anomalies, or quickly respond to deteriorating events.
Prerequisites
To successfully follow this guide, you’ll need these prerequisites:
- An active account on Amazon Web Services.
- A basic understanding of Amazon Kinesis Data Streams.
- A New Relic account. If you don't have one yet, sign up for free. Your account includes up to 100 GB/month of free data ingest, one full-platform user, and unlimited basic users.
- New Relic ingest license key. You can get your license key from https://one.newrelic.com/api-keys.
How to forward CloudFront logs to New Relic
You’ll follow three steps to forward Amazon CloudFront logs to New Relic:
- Create a Kinesis Data Stream for your CloudFront logs.
- Create a delivery stream with Kinesis Data Firehose to consume and forward log data to New Relic.
- Enable real-time logging for CloudFront and connect to the Kinesis Data Stream.
Step 1: Create the Kinesis Data Stream
Start by logging into your AWS account, and then navigate to services and select Amazon Kinesis. Within the Amazon Kinesis service, locate and select Data streams, then select the Create data stream button to start setting up your data stream. You’ll see the same configuration screen that’s shown in the next image.
Within the form, give your data stream a name and choose the data stream capacity mode that suits your requirements. The capacity mode you select will depend on factors such as the volume of your logs and the desired throughput.
When you’ve finished filling out the form, select the Create data stream button.
Step 2: Configure the delivery stream
To deliver data from your Kinesis Data Stream to the New Relic platform, you need to set up a delivery stream. Watch the next video, or read the following instructions:
- With the Kinesis Data Steam you just created, locate the Consumers section and select the Process with the delivery stream option. This will open a configuration screen to create a Kinesis Data Firehose delivery stream that will consume the data from the Kinesis Data Stream and deliver it to the New Relic platform.
- Within the Choose source and destination section, for Destination, search for and select New Relic.
- Within the Delivery stream name section, input a name for your delivery stream.
- Within the Destination settings section:
- Specify the appropriate HTTP endpoint URL for New Relic logs. You can choose either New Relic logs - US (https://aws-api.newrelic.com/firehose/v1) or New Relic logs - EU (https://aws-api.eu.newrelic.com/firehose/v1) based on your location.
- For API key, input your ingest license key. You can find and copy your ingest license key in New Relic at https://one.newrelic.com/api-keys.
- Select Add parameter to create a new parameter with Key as logtype and Value as CDN-rtl. This will help to filter down the logs in New Relic.
- Within Backup settings, you can configure an S3 bucket as a backup destination for the Kinesis Data Firehose delivery stream in case of delivery failures. Choose between backing up All data or Only failed data according to your preferences.
Step 3: Enable real-time logging for CloudFront
To create a real-time configuration for CloudFront logs and associate it with the data stream you created, watch the next video, or read the following instructions:
- Go to the CloudFront service and select the Logs option under the Telemetry section.
- Select the Real-time configurations tab, then select Create configuration. This will open up a new form.
- Within the configuration form, you’ll need to fill out five fields:
- Name: Simply give a name for this real-time logging configuration.
- Sampling rate: This determines the percentage of requests that will be sent to Kinesis Data Streams as real-time log records. The value can be between 1-100%. For this example, set it to 100%.
- Fields for the logs: choose which fields to include in your real-time logs, consider your requirements and the type of analysis you plan to perform. For simplicity, select all fields.
- Endpoint for data stream: Choose the Kinesis Data Stream you created earlier.
- Distributions and cache: Choose the specific CloudFront distributions and caches that you want to monitor.
4. When you are done filling out the form, select Create configuration.
New Relic log parsing
CDN logs that flow in are unstructured, unformatted, and difficult to make sense of without any associated identifiers. This is the default log format that CloudFront writes in.
This is where New Relic logs UI capabilities come to the rescue. You’re going to use the log parser capability in the logs UI and apply a Grok pattern to enrich these logs.
Here’s how to create a new parsing rule in the New Relic logs UI:
- Open New Relic.
- Select Logs from the left-most menu.
- Select Parsing from the Logs menu.
- Select Create parsing rule, which will open a new form.
- Within the form, specify the following values:
- Name: name your parsing rule.
- Filter logs based on NRQL: input the parameter key (
logtype
) and value (the parameter valueCDN-rtl
that you added earlier while creating Kinesis Firehose). - In the Parsing rule and output section, you can use the query
logtype='CDN-rtl'
in the "Filter logs based on NRQL" field. Alternatively, you can paste a log sample in the "Choose your matching log" section and add the following pattern in the "Parsing rule" section. This Grok pattern assumes that you have selected all fields for your real-time logs and parses them by identifying the spaces and adding individual identifiers to your log fields.
When you are finished filling out the form, select Create rule.
^%{NOTSPACE:timestamp}.\\d{3}%{SPACE}%{NOTSPACE:c_ip}%{SPACE}%{NUMBER:time_to_first_byte:INT}%{SPACE}%{NUMBER:sc_status:INT}%{SPACE}%{NUMBER:sc_bytes:INT}%{SPACE}%{WORD:cs_method}%{SPACE}%{NOTSPACE:cs_protocol}%{SPACE}%{NOTSPACE:cs_host}%{SPACE}%{NOTSPACE:cs_uri_stem}%{SPACE}%{NUMBER:cs_bytes:INT}%{SPACE}%{NOTSPACE:x_edge_location}%{SPACE}%{NOTSPACE:x_edge_request_id}%{SPACE}%{NOTSPACE:x_host_header}%{SPACE}%{NUMBER:time_taken:INT}%{SPACE}%{NOTSPACE:cs_protocol_version}%{SPACE}%{NOTSPACE:cs_ip_version}%{SPACE}%{NOTSPACE:cs_user_agent}%{SPACE}%{NOTSPACE:cs_referer}%{SPACE}%{NOTSPACE:cs_cookie}%{SPACE}%{NOTSPACE:cs_uri_query}%{SPACE}%{NOTSPACE:x_edge_response_result_type}%{SPACE}%{NOTSPACE:x_forwarded_for}%{SPACE}%{NOTSPACE:ssl_protocol}%{SPACE}%{NOTSPACE:ssl_cipher}%{SPACE}%{NOTSPACE:x_edge_result_type}%{SPACE}%{NOTSPACE:fle_encrypted_fields}%{SPACE}%{NOTSPACE:fle_status}%{SPACE}%{NOTSPACE:sc_content_type}%{SPACE}%{NOTSPACE:sc_content_len}%{SPACE}%{NOTSPACE:sc_range_start}%{SPACE}%{NOTSPACE:sc_range_end}%{SPACE}%{NUMBER:c_port:INT}%{SPACE}%{NOTSPACE:x_cache_status}%{SPACE}%{NOTSPACE:c_country}%{SPACE}%{NOTSPACE:cs_accept_encoding}%{SPACE}%{NOTSPACE:cs_accept}%{SPACE}%{NOTSPACE:cache_behavior_path_pattern}%{SPACE}%{NOTSPACE:cs_headers}%{SPACE}%{NOTSPACE:cs_header_names}%{SPACE}%{NOTSPACE:cs_headers_count}
Once your parsing rule takes effect, all new incoming logs will be parsed and formatted according to the specified Grok pattern. Here's what your logs will look like now:
Now not only can you view parsed results on the UI, but you can also query your logs with NRQL using specific attributes from the logs. For example, you can query just on one property `x_cache_status`
as seen in the screenshot below
Étapes suivantes
You’ve learned how to use AWS data streaming services to send real-time CloudFront CDN logs straight to New Relic, where you can analyze the logs to make informed decisions as the logs are being ingested. This proactive approach enables you to troubleshoot issues and optimize performance, before they affect your customers. To continue learning how to manage your logs in New Relic, start with these resources:
- Explore Instant observability options for Amazon CloudFront web logs with a quick start and a pre-built dashboard.
- Use regular expressions to extract data from your logs.
- Drop log attributes with drop filter rules.
Don’t have New Relic? Sign up for free. Your account includes up to 100 GB/month of free data ingest, one full-platform user, and unlimited basic users.
Les opinions exprimées sur ce blog sont celles de l'auteur et ne reflètent pas nécessairement celles de New Relic. Toutes les solutions proposées par l'auteur sont spécifiques à l'environnement et ne font pas partie des solutions commerciales ou du support proposés par New Relic. Veuillez nous rejoindre exclusivement sur l'Explorers Hub (discuss.newrelic.com) pour toute question et assistance concernant cet article de blog. Ce blog peut contenir des liens vers du contenu de sites tiers. En fournissant de tels liens, New Relic n'adopte, ne garantit, n'approuve ou n'approuve pas les informations, vues ou produits disponibles sur ces sites.