HAProxy log analyzer
This Python package is a HAProxy log parser. It analyzes HAProxy log files in multiple ways (see commands section below).
Currently only the HTTP log format is supported.
Tests and coverage
No project is trustworthy if does not have tests and a decent coverage!
See the documentation and API at ReadTheDocs.
--help looks like this:
usage: haproxy_log_analysis [-h] [-l LOG] [-s START] [-d DELTA] [-c COMMAND] [-f FILTER] [-n] [--list-commands] [--list-filters] [--json] Analyze HAProxy log files and outputs statistics about it optional arguments: -h, --help show this help message and exit -l LOG, --log LOG HAProxy log file to analyze -s START, --start START Process log entries starting at this time, in HAProxy date format (e.g. 11/Dec/2013 or 11/Dec/2013:19:31:41). At least provide the day/month/year. Values not specified will use their base value (e.g. 00 for hour). Use in conjunction with -d to limit the number of entries to process. -d DELTA, --delta DELTA Limit the number of entries to process. Express the time delta as a number and a time unit, e.g.: 1s, 10m, 3h or 4d (for 1 second, 10 minutes, 3 hours or 4 days). Use in conjunction with -s to only analyze certain time delta. If no start time is given, the time on the first line will be used instead. -c COMMAND, --command COMMAND List of commands, comma separated, to run on the log file. See --list-commands to get a full list of them. -f FILTER, --filter FILTER List of filters to apply on the log file. Passed as comma separated and parameters within square brackets, e.g ip[192.168.1.1],ssl,path[/some/path]. See --list- filters to get a full list of them. -n, --negate-filter Make filters passed with -f work the other way around, i.e. if the ``ssl`` filter is passed instead of showing only ssl requests it will show non-ssl traffic. If the ``ip`` filter is used, then all but that ip passed to the filter will be used. --list-commands Lists all commands available. --list-filters Lists all filters available. --json Output results in json. --invalid Print the lines that could not be parsed. Be aware that mixing it with the print command will mix their output.
Commands are small purpose specific programs in themselves that report specific statistics about the log file being analyzed.
See them all with
--list-commands or online at https://haproxy-log-analyzer.readthedocs.io/modules.html#module-haproxy.commands.
Filters, contrary to commands, are a way to reduce the amount of log lines to be processed.
-n command line argument allows to reverse filters output.
This helps when looking for specific traces, like a certain IP, a path...
See them all with
--list-filters or online at https://haproxy-log-analyzer.readthedocs.io/modules.html#module-haproxy.filters.
After installation you will have a console script haproxy_log_analysis:
$ pip install haproxy_log_analysis
- add more commands: (help appreciated)
- reports on servers connection time
- reports on termination state
- reports around connections (active, frontend, backend, server)
- your ideas here
- think of a way to show the commands output in a meaningful way
- be able to specify an output format. For any command that makes sense (slow requests for example) output the given fields for each log line (i.e. acceptance date, path, downstream server, load at that time...)
- your ideas