CloudWatch Logs Insights query syntax
With CloudWatch Logs Insights, you use a query language to query your log groups. The query syntax supports different functions and operations that include but aren't limited to general functions, arithmetic and comparison operations, and regular expressions.
Important
To avoid incurring excessive charges by running large queries, keep in mind the following best practices:
Select only the necessary log groups for each query.
Always specify the narrowest possible time range for your queries.
When you use the console to run queries, cancel all your queries before you close the CloudWatch Logs Insights console page. Otherwise, queries continue to run until completion.
When you add a CloudWatch Logs Insights widget to a dashboard, ensure that the dashboard is not refreshing at a high frequency, because each refresh starts a new query.
To create queries that contain multiple commands, separate the commands with the pipe character (|).
To create queries that contain comments, set off the comments with the hash character (#).
Note
CloudWatch Logs Insights automatically discovers fields for different log types and generates fields that start with the @ character. For more information about these fields, see Supported logs and discovered fields in the Amazon CloudWatch User Guide.
The following table briefly describes each command. Following this table is a more comprehensive description of each command, with examples.
Note
All CloudWatch Logs Insights query commands are supported on log groups in the Standard log class. Log groups in the
Infrequent Access log class support all query commands except pattern
, diff
,
and unmask
.
Displays a specific field or fields in query results. |
|
Displays specific fields in query results and supports functions and operations you can use to modify field values and create new fields to use in your query. |
|
Filters the query to return only the log events that match one or more conditions. |
|
Forces a query to attempt to scan only the log groups that are both indexed on the field mentioned in a field index and also contain a value for the that field index. This educes scanned volume by attempting to scan only log events from these log groups that contain the value specified in the query for this field index. |
|
Automatically clusters your log data into patterns. A pattern is shared text structure that recurs among your log fields. CloudWatch Logs Insights provides ways for you to analyze the patterns found in your log events. For more information, see Pattern analysis. |
|
Compares the log events found in your requested time period with the log events from a previous time period of equal length, so that you can look for trends and find out if certain log events are new. |
|
Extracts data
from a log field
to create an extracted field
that you can process in your query. |
|
Displays the returned log events
in ascending ( |
|
Including |
|
Calculate aggregate statistics using values in the log fields. |
|
Specifies a maximum number of log events that you want your query to return. Useful
with |
|
Removes duplicate results based on specific values in fields that you specify. |
|
Displays all the content of a log event that has some content masked because of a data protection policy. For more information about data protection in log groups, see Help protect sensitive log data with masking. |
|
CloudWatch Logs Insights also supports many comparison, arithmetic, datetime, numeric, string, IP address, and general functions and operations. |
The following sections provide more details about the CloudWatch Logs Insights query commands.