Research
Security News
Malicious npm Package Targets Solana Developers and Hijacks Funds
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
aws-cloudwatch-log
Advanced tools
Fast & Simple Logging to AWS CloudWatch. It logs in the background without blocking. By default, it will immediately send the log to your configured AWS LogStream. You can also easily configure it so that the logs are buffered for a specific period of time before being sent as a batch to AWS LogStream. This is the recommended way.
For a quick recap on how logging on AWS CloudWatch works, refer to the Annex below.
npm install aws-cloudwatch-log --save
IMPORTANT: In the example below, it is expected that both the logGroupName and the logStreamName have already been created in AWS CloudWatch. aws-cloudwatch-log provides an extra api to create a new logStreamName.
const { Logger } = require('aws-cloudwatch-log')
const config = {
logGroupName: 'YourGroupName',
logStreamName: 'YourLogStream',
region: 'ap-southeast-2',
accessKeyId: 'BLABLABLABLABLABLA',
secretAccessKey: 'some-very-long-secret',
uploadFreq: 10000, // Optional. Send logs to AWS LogStream in batches after 10 seconds intervals.
local: false // Optional. If set to true, the log will fall back to the standard 'console.log'.
}
const logger = new Logger(config)
logger.log('Hello World')
logger.log(`I'm`, `aws-cloudwatch-log.`, `I can log many things at once, as well as objects as follow:`)
logger.log({ type: 'this-is-important', details: 'something has happened!' })
logger.log({ category: 'info', details: `I'm fast and lean. I don't block, and everything happens in the background!` })
Notice that the configuration option uploadFreq is set to 10,000 milliseconds. This option is optional. It it is not specified, it's default value is 0, which means that each log action will immediately send the log to AWS LogStream.
When testing your code locally, you can disable logging to AWS LogStream by setting the local configuration to true.
AWS deprecates the usage of the same LogStream by multiple concurrent machine. The recommended method is that each machine creates its own unique LogStream inside a specific LogGroup. To create a LogStream, you can proceed as follow:
const { createLogStream } = require('aws-cloudwatch-log')
const config = {
logGroupName: 'YourGroupName',
region: 'ap-southeast-2',
accessKeyId: 'BLABLABLABLABLABLA',
secretAccessKey: 'some-very-long-secret',
local: false // Optional. If set to true, no LogStream will be created.
}
createLogStream('your-new-unique-logstream', config)
.then(data => console.log('Do whatever you want when it works.'))
.catch(err => console.log('Do whatever you want when it does not work.'))
Logs and events can't simply being added to CloudWatch. Instead, they are added to a LogStream which belongs to a LogGroup. That means that before being able to log an event to CloudWatch, you need to have created both a LogStream and a LogGroup. You can either do this within the AWS Web Console inside CloudWatch, or you can programmatically do this (aws-cloudwatch-log allows to create a new LogStream here).
AWS deprecates the usage of the same LogStream by multiple concurrent machine. The recommended method is that each machine creates its own unique LogStream inside a specific LogGroup.
We are Neap, an Australian Technology consultancy powering the startup ecosystem in Sydney. We simply love building Tech and also meeting new people, so don't hesitate to connect with us at https://neap.co.
Our other open-sourced projects:
Copyright (c) 2018, Neap Pty Ltd. All rights reserved.
Redistribution and use in source and binary forms, with or without modification, are permitted provided that the following conditions are met:
THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL NEAP PTY LTD BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
0.1.6 (2024-01-05)
<a name="0.1.5"></a>
FAQs
Fast & Simple Logging to AWS CloudWatch
The npm package aws-cloudwatch-log receives a total of 1,040 weekly downloads. As such, aws-cloudwatch-log popularity was classified as popular.
We found that aws-cloudwatch-log demonstrated a healthy version release cadence and project activity because the last version was released less than a year ago. It has 1 open source maintainer collaborating on the project.
Did you know?
Socket for GitHub automatically highlights issues in each pull request and monitors the health of all your open source dependencies. Discover the contents of your packages and block harmful activity before you install or update your dependencies.
Research
Security News
A malicious npm package targets Solana developers, rerouting funds in 2% of transactions to a hardcoded address.
Security News
Research
Socket researchers have discovered malicious npm packages targeting crypto developers, stealing credentials and wallet data using spyware delivered through typosquats of popular cryptographic libraries.
Security News
Socket's package search now displays weekly downloads for npm packages, helping developers quickly assess popularity and make more informed decisions.