Skip to content

Logging Configuration

FastAPI Guard includes powerful logging capabilities to help you monitor and track security-related events in your application.


Basic Logging Setup

FastAPI Guard uses a hierarchical logging namespace (fastapi_guard) with automatic console output and optional file logging:

config = SecurityConfig(
    # Optional: Enable file logging by providing a path
    custom_log_file="security.log"  # Creates file + console output
    # OR
    # custom_log_file=None  # Console output only (default)
)

Key Features:

  • Console output is always enabled for visibility
  • File logging is optional and only enabled when custom_log_file is set
  • All FastAPI Guard components use the fastapi_guard.* namespace

Configurable Log Levels

FastAPI Guard supports different log levels for normal and suspicious requests:

config = SecurityConfig(
    # Log normal requests as INFO (or set to None to disable)
    log_request_level="INFO",
    # Log suspicious activity as WARNING
    log_suspicious_level="WARNING"
)

Available log levels:

  • "INFO": Informational messages
  • "DEBUG": Detailed debug information
  • "WARNING": Warning messages (default for suspicious activity)
  • "ERROR": Error conditions
  • "CRITICAL": Critical errors
  • None: Disable logging completely

Performance Optimization

For high-traffic production environments, consider disabling normal request logging:

config = SecurityConfig(
    # Disable normal request logging (default)
    log_request_level=None,
    # Keep security event logging enabled
    log_suspicious_level="WARNING"
)

Custom Logger

The setup_custom_logging function is automatically called by the middleware during initialization:

from guard.utils import setup_custom_logging

# Manual setup (if needed outside of middleware)
# Console only (no file)
logger = setup_custom_logging(None)

# Console + file logging
logger = setup_custom_logging("security.log")

# The logger uses the "fastapi_guard" namespace
# All handlers automatically use sub-namespaces like:
# - "fastapi_guard.handlers.redis"
# - "fastapi_guard.handlers.cloud"
# - "fastapi_guard.handlers.ipban"

Note: The function is synchronous (not async) and handles directory creation automatically.


Logging

FastAPI Guard uses a unified logging approach with the log_activity function that handles different types of log events:

from guard.utils import log_activity

# Log a regular request
await log_activity(request, logger)

# Log suspicious activity
await log_activity(
    request,
    logger,
    log_type="suspicious",
    reason="Suspicious IP address detected"
)

# Log penetration attempt in passive mode
await log_activity(
    request,
    logger,
    log_type="suspicious",
    reason="SQL injection attempt detected",
    passive_mode=True,
    trigger_info="Detected pattern: ' OR 1=1 --"
)

# Log with specific level
await log_activity(
    request,
    logger,
    level="ERROR",
    reason="Authentication failure"
)

Logging Parameters

The log_activity function accepts the following parameters:

  • request: The FastAPI request object
  • logger: The logger instance to use
  • log_type: Type of log entry (default: "request", can also be "suspicious")
  • reason: Reason for flagging an activity
  • passive_mode: Whether to format log as passive mode detection
  • trigger_info: Details about what triggered detection
  • level: The logging level to use. If None, logging is disabled. Defaults to "WARNING".

Logger Namespace Hierarchy

FastAPI Guard uses a hierarchical namespace structure for organized logging:

fastapi_guard                    # Root logger for all FastAPI Guard components
├── fastapi_guard.handlers       # Handler components
│   ├── fastapi_guard.handlers.redis
│   ├── fastapi_guard.handlers.cloud
│   ├── fastapi_guard.handlers.ipinfo
│   ├── fastapi_guard.handlers.ipban
│   ├── fastapi_guard.handlers.ratelimit
│   ├── fastapi_guard.handlers.behavior
│   ├── fastapi_guard.handlers.suspatterns
│   └── fastapi_guard.handlers.dynamic_rule
├── fastapi_guard.decorators     # Decorator components
│   └── fastapi_guard.decorators.base
└── fastapi_guard.detection_engine  # Detection engine components

This namespace isolation ensures: - FastAPI Guard logs are separate from your application logs - You can configure log levels for specific components - Test frameworks can capture logs via propagation - No interference with user-defined loggers


Log Format

By default, logs include the following information:

  • Timestamp
  • Logger name (showing the component namespace)
  • Log level
  • Client IP address
  • HTTP method
  • Request path
  • Request headers
  • Request body (if available)
  • Reason for logging (for suspicious activities)
  • Detection trigger details (for penetration attempts)

Complete Examples

Example 1: Production Setup with File Logging

from fastapi import FastAPI
from guard import SecurityConfig, SecurityMiddleware

app = FastAPI()

# Production configuration
config = SecurityConfig(
    # File + console logging for audit trail
    custom_log_file="/var/log/fastapi-guard/security.log",

    # Disable normal request logging to reduce noise
    log_request_level=None,

    # Keep security events at WARNING level
    log_suspicious_level="WARNING",

    # Other security settings...
    enable_redis=True,
    enable_penetration_detection=True,
)

app.add_middleware(SecurityMiddleware, config=config)

Example 2: Development Setup with Console Only

from fastapi import FastAPI
from guard import SecurityConfig, SecurityMiddleware

app = FastAPI()

# Development configuration
config = SecurityConfig(
    # Console-only output for development
    custom_log_file=None,  # No file logging

    # Enable all logging for debugging
    log_request_level="INFO",
    log_suspicious_level="WARNING",

    # Other settings...
    passive_mode=True,  # Log-only mode for testing
)

app.add_middleware(SecurityMiddleware, config=config)

Example 3: Custom Component-Level Configuration

import logging
from guard import SecurityConfig

# Configure specific component log levels
logging.getLogger("fastapi_guard.handlers.redis").setLevel(logging.DEBUG)
logging.getLogger("fastapi_guard.handlers.ipban").setLevel(logging.INFO)
logging.getLogger("fastapi_guard.detection_engine").setLevel(logging.WARNING)

# This works because FastAPI Guard uses hierarchical namespaces
config = SecurityConfig(
    custom_log_file="security.log",
    # ... other settings
)

Example 4: Integration with Application Logging

import logging
from fastapi import FastAPI
from guard import SecurityConfig, SecurityMiddleware

# Configure your application logging
app_logger = logging.getLogger("myapp")
app_logger.setLevel(logging.INFO)

# FastAPI Guard logs are isolated under "fastapi_guard" namespace
# No interference with your app logs
app = FastAPI()

config = SecurityConfig(
    custom_log_file="security.log",  # Separate security log file
)

app.add_middleware(SecurityMiddleware, config=config)

# Your app logs and FastAPI Guard logs remain separate
app_logger.info("Application started")  # Goes to "myapp" logger
# Security events go to "fastapi_guard" logger