请输入您要查询的百科知识:

 

词条 Syslog
释义

  1. History

  2. Syslog message components

     Facility  Severity level  Message 

  3. Logger

  4. Network protocol

  5. Limitations

  6. Outlook

  7. Internet standard documents

  8. Tools

  9. See also

  10. References

  11. External links

{{lowercase title}}

In computing, syslog is a standard for message logging. It allows separation of the software that generates messages, the system that stores them, and the software that reports and analyzes them. Each message is labeled with a facility code, indicating the software type generating the message, and assigned a severity level.

Computer system designers may use syslog for system management and security auditing as well as general informational, analysis, and debugging messages. A wide variety of devices, such as printers, routers, and message receivers across many platforms use the syslog standard. This permits the consolidation of logging data from different types of systems in a central repository. Implementations of syslog exist for many operating systems.

History

Syslog was developed in the 1980s by Eric Allman as part of the Sendmail project.[1] It was readily adopted by other applications and has since become the standard logging solution on Unix-like systems. A variety of implementations also exist on other operating systems and it is commonly found in network devices, such as routers.

Syslog originally functioned as a de facto standard, without any authoritative published specification, and many implementations existed, some of which were incompatible. The Internet Engineering Task Force documented the status quo in RFC 3164. It was standardized by RFC 5424.[2]

Various companies have attempted to claim patents for syslog implementations.[3][4] This has had little effect on the use and standardization of the protocol.{{cn|date=August 2016}}

Syslog message components

The information provided by the originator of a syslog message includes the facility code and the severity level. The syslog software adds information to the information header before passing the entry to the syslog receiver. Such components include an originator process ID, a timestamp, and the hostname or IP address of the device.

Facility

A facility code is used to specify the type of program that is logging the message. Messages with different facilities may be handled differently.[5] The list of facilities available is defined by the standard:[2]{{rp|9}}

Facility code Keyword Description
0 kern Kernel messages
1 user User-level messages
2 mail Mail system
3 daemon System daemons
4 auth Security/authentication messages
5 syslog Messages generated internally by syslogd
6 lpr Line printer subsystem
7 news Network news subsystem
8 uucp UUCP subsystem
9 cron Clock daemon
10 authpriv Security/authentication messages
11 ftp FTP daemon
12 ntp NTP subsystem
13 security Log audit
14 console Log alert
15 solaris-cron Scheduling daemon
16–23 local0 – local7 Locally used facilities

The mapping between facility code and keyword is not uniform in different operating systems and syslog implementations.[6]

Severity level

The list of severities is also defined by the standard:[2]{{rp|10}}

Value Severity Keyword Deprecated keywords Description Condition
0 Emergency emerg panic[7] System is unusable A panic condition.[8]
1 Alert alert Action must be taken immediately A condition that should be corrected immediately, such as a corrupted system database.[8]
2 Critical crit Critical conditions Hard device errors.[8]
3 Error err error[7] Error conditions
4 Warning warning warn[7] Warning conditions
5 Notice notice Normal but significant conditions Conditions that are not error conditions, but that may require special handling.[8]
6 Informational info Informational messages
7 Debug debug Debug-level messages Messages that contain information normally of use only when debugging a program.[8]

The meaning of severity levels other than Emergency and Debug are relative to the application. For example, if the purpose of the system is to process transactions to update customer account balance information, an error in the final step should be assigned Alert level. However, an error occurring in an attempt to display the ZIP code of the customer may be assigned Error or even Warning level.

The server process which handles display of messages usually includes all lower (more severe) levels when display of less severe levels is requested. That is, if messages are separated by individual severity, a Warning level entry will also be included when filtering for Notice, Info and Debug messages.

Message

In RFC 3164, the message component (known as MSG) was specified as having these fields: TAG, which should be the name of the program or process that generated the message, and CONTENT which contains the details of the message.

Described in RFC 5424,[9] "MSG is what was called CONTENT in RFC 3164. The TAG is now part of the header, but not as a single field. The TAG has been split into APP-NAME, PROCID, and MSGID. This does not totally resemble the usage of TAG, but provides the same functionality for most of the cases." Popular syslog tools such as Rsyslog conform to this new standard.

The content field should be encoded in a UTF-8 character set and octet values in the traditional ASCII control character range should be avoided.

Logger

Generated log messages may be directed to various destinations including console, files, remote syslog servers, or relays. Most implementations provide a command line utility, often called logger, as well as a software library, to send messages to the log. Some implementations include reporting programs for filtering and displaying of syslog messages.

Network protocol

When operating over a network, syslog uses a client-server architecture where the server listens on a well-known or registered port for protocol requests from clients. Historically the most common transport layer protocol for network logging has been User Datagram Protocol (UDP), with the server listening on port 514. As UDP lacks congestion control mechanisms, support for Transport Layer Security is required in implementations and recommended for general use[10] on Transmission Control Protocol (TCP) port 6514.[11]

Limitations

Since each process, application and operating system was written independently, there is little uniformity to the payload of the log message. For this reason, no assumption is made about its formatting or contents. A syslog message is formatted (RFC 5424 gives the Augmented Backus–Naur form (ABNF) definition), but its MSG field is not.

The network protocol is simplex communication, with no means of acknowledging the delivery to the originator.

Outlook

Various groups are working on draft standards detailing the use of syslog for more than just network and security event logging, such as its proposed application within the healthcare environment.[12]

Regulations, such as the Sarbanes-Oxley Act, PCI DSS, HIPAA, and many others, require organizations to implement comprehensive security measures, which often include collecting and analyzing logs from many different sources. The syslog format has proven effective in consolidating logs, as there are many open-source and proprietary tools for reporting and analysis of these logs. Utilities exist for conversion from Windows Event Log and other log formats to syslog.

Managed Security Service Providers attempt to apply analytical techniques and artificial intelligence algorithms to detect patterns and alert customers to problems.

Internet standard documents

The Syslog protocol is defined by Request for Comments (RFC) documents published by the Internet Engineering Task Force (Internet standards). The following is a list of RFCs that define the syslog protocol:[13]

  • RFC 3164 The BSD syslog Protocol (obsoleted by RFC 5424)
  • RFC 3195 Reliable Delivery for syslog
  • RFC 5424 The Syslog Protocol
  • RFC 5425 TLS Transport Mapping for Syslog
  • RFC 5426 Transmission of Syslog Messages over UDP
  • RFC 5427 Textual Conventions for Syslog Management
  • RFC 5848 Signed Syslog Messages
  • RFC 6012 Datagram Transport Layer Security (DTLS) Transport Mapping for Syslog
  • RFC 6587 Transmission of Syslog Messages over TCP

Tools

To display and monitor the collected logs one need to use a client application or access the log file directly on the system. The log servers can be configured to send the logs over the network (in addition to the local files).

The basic command line tools are tail and grep.

See also

{{div col|colwidth=20em}}
  • Audit trail
  • Console server
  • Data logging
  • Netconf
  • Server log
  • Simple Network Management Protocol (SNMP)
  • Security Event Manager
  • Log management and intelligence
  • Web log analysis software
  • Web counter
  • Common Log Format
  • Rsyslog
  • syslog-ng
  • Pantheios
  • LogParser
{{div col end}}

References

1. ^{{cite web |url=https://www.internethalloffame.org/inductees/eric-allman |title=Eric Allman |publisher=Internet Hall of Fame |access-date=2017-10-30}}
2. ^{{Cite IETF |rfc=5424 |last=Gerhards |first=Rainer |title=The Syslog Protocol}}
3. ^{{cite web|url=http://lxer.com/module/newswire/view/64026/index.html|title=LXer: Patent jeopardizes IETF syslog standard}}
4. ^{{cite web|url=http://datatracker.ietf.org/public/ipr_detail_show.cgi?ipr_id=724|title=IETF IPR disclosure on HUAWEI's patent claims}}
5. ^{{cite web|url=http://linux.die.net/man/3/syslog|accessdate=22 November 2012|title=Syslog Facility}}
6. ^{{cite web |url=http://www.sans.org/reading_room/whitepapers/logging/ins-outs-system-logging-syslog_1168 |title=The Ins and Outs of System Logging Using Syslog |publisher=SANS Institute}}
7. ^{{cite web|url=https://linux.die.net/man/5/syslog.conf |title=syslog.conf(5) - Linux man page |accessdate=2017-03-29}}
8. ^{{cite web |url=http://pubs.opengroup.org/onlinepubs/009695399/functions/syslog.html |title=closelog, openlog, setlogmask, syslog - control system log |accessdate=2017-03-29}}
9. ^{{cite web | url =https://tools.ietf.org/html/rfc5424#appendix-A.1 | title = RFC 5424 - The Syslog Protocol | last=Gerhards |first=Rainer | date = March 2009 | quote = This document describes a layered architecture for syslog. The goal of this architecture is to separate message content from message transport while enabling easy extensibility for each layer.}}
10. ^{{cite web|url=https://tools.ietf.org/html/rfc5424#section-8.6|title=RFC 5424 - The Syslog Protocol}}
11. ^{{cite web|url=https://tools.ietf.org/html/rfc5425#section-7.1|title=RFC 5425 - TLS Transport Mapping for Syslog}}
12. ^{{cite web |url=https://healthcaresecprivacy.blogspot.com/2011/12/atna-syslog-is-good-enough.html |title=ATNA + SYSLOG is good enough |publisher=Healthcare Exchange Standards |access-date=2018-06-06}}
13. ^{{cite web | title = Security Issues in Network Event Logging (syslog) | url = http://datatracker.ietf.org/wg/syslog/ | publisher = IETF}}

External links

  • Internet Engineering Task Force: Datatracker: syslog Working Group (concluded)
  • SANS Institute: "The Ins and Outs of System Logging Using Syslog" (white paper)
  • National Institute of Standards and Technology: "Guide to Computer Security Log Management" (Special Publication 800-92) (white paper)
  • Network Management Software: "Understanding Syslog: Servers, Messages & Security"
  • [https://www.paessler.com/it-explained/syslog Paessler IT Explained - Syslog]
  • [https://sites.google.com/a/lbl.gov/netlogger/ NetLogger]
  • Syslserve
  • MonitorWare: All about Syslog
  • Syslog Servers for Windows & Linux

5 : Internet protocols|Internet Standards|Network management|Log file formats|System administration

随便看

 

开放百科全书收录14589846条英语、德语、日语等多语种百科知识,基本涵盖了大多数领域的百科知识,是一部内容自由、开放的电子版国际百科全书。

 

Copyright © 2023 OENC.NET All Rights Reserved
京ICP备2021023879号 更新时间:2024/11/12 3:14:06