@webframp/aws/logs
v2026.04.22.1
Query and analyze CloudWatch Logs for operational visibility and incident investigation.
Authentication
Uses the default AWS credential chain. Requires CloudWatch Logs permissions.
Required IAM Permissions
logs:DescribeLogGroupslogs:StartQuerylogs:GetQueryResultslogs:FilterLogEvents
Usage
# Create logs model
swamp model create @webframp/aws/logs aws-logs --global-arg region=us-east-1
# List log groups
swamp model method run aws-logs list_log_groups --input prefix=/aws/lambda
# Run a Logs Insights query
swamp model method run aws-logs query \
--input 'logGroupNames=["/aws/lambda/my-function"]' \
--input 'queryString=fields @timestamp, @message | filter @message like /error/i | limit 50' \
--input startTime=1h
# Find error patterns
swamp model method run aws-logs find_errors \
--input 'logGroupNames=["/aws/lambda/my-function"]' \
--input startTime=2h
# Get recent events with filter
swamp model method run aws-logs get_recent_events \
--input logGroupName=/aws/lambda/my-function \
--input filterPattern=ERRORTime Formats
The startTime and endTime parameters accept:
- Relative times:
30m,1h,2d(minutes, hours, days ago) - ISO 8601 dates:
2026-03-30T12:00:00Z
Methods
- list_log_groups - Discover log groups by prefix
- query - Run CloudWatch Logs Insights queries
- find_errors - Analyze error patterns with keyword detection
- get_recent_events - Filter recent log events
Repository
https://github.com/webframp/swamp-extensions
Labels
Contents
Quality score
How well-documented and verifiable this extension is.
Grade A
- Has README or module doc2/2earned
- README has a code example1/1earned
- README is substantive1/1earned
- Most symbols documented1/1earned
- No slow types1/1earned
- Has description1/1earned
- At least one platform tag (or universal)1/1earned
- Two or more platform tags (or universal)1/1earned
- License declared1/1earned
- Verified public repository2/2earned
Install
$ swamp extension pull @webframp/aws/logs| Argument | Type | Description |
|---|---|---|
| logGroupName | string | Log group name |
Resources
Query and analyze CloudWatch Logs for operational visibility and incident investigation. ## Authentication Uses the default AWS credential chain. Requires CloudWatch Logs permissions. ## Required IAM Permissions - `logs:DescribeLogGroups` - `logs:StartQuery` - `logs:GetQueryResults` - `logs:FilterLogEvents` ## Usage ```bash # Create logs model swamp model create @webframp/aws/logs aws-logs --global-arg region=us-east-1 # List log groups swamp model method run aws-logs list_log_groups --input prefix=/aws/lambda # Run a Logs Insights query swamp model method run aws-logs query \ --input 'logGroupNames=["/aws/lambda/my-function"]' \ --input 'queryString=fields @timestamp, @message | filter @message like /error/i | limit 50' \ --input startTime=1h # Find error patterns swamp model method run aws-logs find_errors \ --input 'logGroupNames=["/aws/lambda/my-function"]' \ --input startTime=2h # Get recent events with filter swamp model method run aws-logs get_recent_events \ --input logGroupName=/aws/lambda/my-function \ --input filterPattern=ERROR ``` ## Time Formats The `startTime` and `endTime` parameters accept: - Relative times: `30m`, `1h`, `2d` (minutes, hours, days ago) - ISO 8601 dates: `2026-03-30T12:00:00Z` ## Methods - **list_log_groups** - Discover log groups by prefix - **query** - Run CloudWatch Logs Insights queries - **find_errors** - Analyze error patterns with keyword detection - **get_recent_events** - Filter recent log events
Query and analyze CloudWatch Logs for operational visibility and incident investigation. ## Authentication Uses the default AWS credential chain. Requires CloudWatch Logs permissions. ## Required IAM Permissions - `logs:DescribeLogGroups` - `logs:StartQuery` - `logs:GetQueryResults` - `logs:FilterLogEvents` ## Usage ```bash # Create logs model swamp model create @webframp/aws/logs aws-logs --global-arg region=us-east-1 # List log groups swamp model method run aws-logs list_log_groups --input prefix=/aws/lambda # Run a Logs Insights query swamp model method run aws-logs query \ --input 'logGroupNames=["/aws/lambda/my-function"]' \ --input 'queryString=fields @timestamp, @message | filter @message like /error/i | limit 50' \ --input startTime=1h # Find error patterns swamp model method run aws-logs find_errors \ --input 'logGroupNames=["/aws/lambda/my-function"]' \ --input startTime=2h # Get recent events with filter swamp model method run aws-logs get_recent_events \ --input logGroupName=/aws/lambda/my-function \ --input filterPattern=ERROR ``` ## Time Formats The `startTime` and `endTime` parameters accept: - Relative times: `30m`, `1h`, `2d` (minutes, hours, days ago) - ISO 8601 dates: `2026-03-30T12:00:00Z` ## Methods - **list_log_groups** - Discover log groups by prefix - **query** - Run CloudWatch Logs Insights queries - **find_errors** - Analyze error patterns with keyword detection - **get_recent_events** - Filter recent log events
Query and analyze CloudWatch Logs for operational visibility and incident investigation. ## Authentication Uses the default AWS credential chain. Requires CloudWatch Logs permissions. ## Required IAM Permissions - `logs:DescribeLogGroups` - `logs:StartQuery` - `logs:GetQueryResults` - `logs:FilterLogEvents` ## Usage ```bash # Create logs model swamp model create @webframp/aws/logs aws-logs --global-arg region=us-east-1 # List log groups swamp model method run aws-logs list_log_groups --input prefix=/aws/lambda # Run a Logs Insights query swamp model method run aws-logs query \ --input 'logGroupNames=["/aws/lambda/my-function"]' \ --input 'queryString=fields @timestamp, @message | filter @message like /error/i | limit 50' \ --input startTime=1h # Find error patterns swamp model method run aws-logs find_errors \ --input 'logGroupNames=["/aws/lambda/my-function"]' \ --input startTime=2h # Get recent events with filter swamp model method run aws-logs get_recent_events \ --input logGroupName=/aws/lambda/my-function \ --input filterPattern=ERROR ``` ## Time Formats The `startTime` and `endTime` parameters accept: - Relative times: `30m`, `1h`, `2d` (minutes, hours, days ago) - ISO 8601 dates: `2026-03-30T12:00:00Z` ## Methods - **list_log_groups** - Discover log groups by prefix - **query** - Run CloudWatch Logs Insights queries - **find_errors** - Analyze error patterns with keyword detection - **get_recent_events** - Filter recent log events