Syslog
Collect logs sent via Syslog
Configuration
Example configurations
{
"sources": {
"my_source_id": {
"type": "syslog",
"address": "0.0.0.0:9000",
"mode": "tcp",
"path": "/path/to/socket"
}
}
}
[sources.my_source_id]
type = "syslog"
address = "0.0.0.0:9000"
mode = "tcp"
path = "/path/to/socket"
sources:
my_source_id:
type: syslog
address: 0.0.0.0:9000
mode: tcp
path: /path/to/socket
{
"sources": {
"my_source_id": {
"type": "syslog",
"address": "0.0.0.0:9000",
"max_length": 102400,
"mode": "tcp",
"path": "/path/to/socket",
"permit_origin": [
"192.168.0.0/16"
]
}
}
}
[sources.my_source_id]
type = "syslog"
address = "0.0.0.0:9000"
max_length = 102_400
mode = "tcp"
path = "/path/to/socket"
permit_origin = [ "192.168.0.0/16" ]
sources:
my_source_id:
type: syslog
address: 0.0.0.0:9000
max_length: 102400
mode: tcp
path: /path/to/socket
permit_origin:
- 192.168.0.0/16
address
required string literalThe socket address to listen for connections on, or systemd{#N}
to use the Nth socket passed by
systemd socket activation.
If a socket address is used, it must include a port.
mode = "tcp" or mode = "udp"
connection_limit
optional uintmode = "tcp"
host_key
optional string literalOverrides the name of the log field used to add the peer host to each event.
If using TCP or UDP, the value is the peer host’s address, including the port. For example, 1.2.3.4:9000
. If using
UDS, the value is the socket path itself.
By default, the global log_schema.host_key
option is used.
keepalive
optional objectkeepalive.time_secs
optional uintmode = "tcp"
max_length
optional uintThe maximum buffer size of incoming messages, in bytes.
Messages larger than this are truncated.
102400
(bytes)mode
required string literal enumOption | Description |
---|---|
tcp | Listen on TCP. |
udp | Listen on UDP. |
unix | Listen on UDS (Unix domain socket). This only supports Unix stream sockets. For Unix datagram sockets, use the |
path
required string literalThe Unix socket path.
This should be an absolute path.
mode = "unix"
permit_origin
optional [string]mode = "tcp"
receive_buffer_bytes
optional uintThe size of the receive buffer used for each connection.
This should not typically needed to be changed.
mode = "tcp" or mode = "udp"
socket_file_mode
optional uintUnix file mode bits to be applied to the unix socket file as its designated file permissions.
The file mode value can be specified in any numeric format supported by your configuration language, but it is most intuitive to use an octal number.
mode = "unix"
tls
optional objectsources
, adding metadata from the client certificate.tls.alpn_protocols
optional [string]Sets the list of supported ALPN protocols.
Declare the supported ALPN protocols, which are used during negotiation with peer. They are prioritized in the order that they are defined.
tls.ca_file
optional string literalAbsolute path to an additional CA certificate file.
The certificate must be in the DER or PEM (X.509) format. Additionally, the certificate can be provided as an inline string in PEM format.
tls.client_metadata_key
optional string literaltls.crt_file
optional string literalAbsolute path to a certificate file used to identify this server.
The certificate must be in DER, PEM (X.509), or PKCS#12 format. Additionally, the certificate can be provided as an inline string in PEM format.
If this is set, and is not a PKCS#12 archive, key_file
must also be set.
tls.enabled
optional boolWhether or not to require TLS for incoming or outgoing connections.
When enabled and used for incoming connections, an identity certificate is also required. See tls.crt_file
for
more information.
tls.key_file
optional string literalAbsolute path to a private key file used to identify this server.
The key must be in DER or PEM (PKCS#8) format. Additionally, the key can be provided as an inline string in PEM format.
tls.key_pass
optional string literalPassphrase used to unlock the encrypted key file.
This has no effect unless key_file
is set.
tls.server_name
optional string literalServer name to use when using Server Name Indication (SNI).
Only relevant for outgoing connections.
tls.verify_certificate
optional boolEnables certificate verification. For components that create a server, this requires that the client connections have a valid client certificate. For components that initiate requests, this validates that the upstream has a valid certificate.
If enabled, certificates must not be expired and must be issued by a trusted issuer. This verification operates in a hierarchical manner, checking that the leaf certificate (the certificate presented by the client/server) is not only valid, but that the issuer of that certificate is also valid, and so on until the verification process reaches a root certificate.
Do NOT set this to false
unless you understand the risks of not verifying the validity of certificates.
tls.verify_hostname
optional boolEnables hostname verification.
If enabled, the hostname used to connect to the remote host must be present in the TLS certificate presented by the remote host, either as the Common Name or as an entry in the Subject Alternative Name extension.
Only relevant for outgoing connections.
Do NOT set this to false
unless you understand the risks of not verifying the remote hostname.
mode = "tcp"
Outputs
<component_id>
Output Data
Logs
Warning
Line
hello world
app-name
1
hostname
if that field is set, or the IP address of the peer otherwise.my.host.com
127.0.0.1
hostname
field extracted from the Syslog line. If a hostname
field is found, host
is also set to this value.my.host.com
Hello world
ID47
8710
notice
mode
= "unix"
the socket path will be used.127.0.0.1
syslog
2020-10-10T17:07:36.452332Z
1
Telemetry
Metrics
linkcomponent_discarded_events_total
counterfilter
transform, or false if due to an error.component_errors_total
countercomponent_received_bytes
histogramcomponent_received_bytes_total
countercomponent_received_event_bytes_total
countercomponent_received_events_count
histogramA histogram of the number of events passed in each internal batch in Vector’s internal topology.
Note that this is separate than sink-level batching. It is mostly useful for low level debugging performance issues in Vector due to small internal batches.
component_received_events_total
countercomponent_sent_event_bytes_total
countercomponent_sent_events_total
counterconnection_read_errors_total
countersource_lag_time_seconds
histogramutf8_convert_errors_total
counterExamples
Syslog Event
Given this event...<13>1 2020-03-13T20:45:38.119Z dynamicwireless.name non 2426 ID931 [exampleSDID@32473 iut="3" eventSource="Application" eventID="1011"] Try to override the THX port, maybe it will reboot the neural interface!
sources:
my_source_id:
type: syslog
[sources.my_source_id]
type = "syslog"
{
"sources": {
"my_source_id": {
"type": "syslog"
}
}
}
{
"appname": "non",
"exampleSDID@32473": {
"eventID": "1011",
"eventSource": "Application",
"iut": "3"
},
"facility": "user",
"host": "my-host.local",
"hostname": "dynamicwireless.name",
"message": "Try to override the THX port, maybe it will reboot the neural interface!",
"msgid": "ID931",
"procid": "2426",
"severity": "notice",
"source_ip": "34.33.222.212",
"source_type": "syslog",
"timestamp": "2020-03-13T20:45:38.119Z"
}
How it works
Parsing
Vector makes a best effort to parse the various Syslog formats out in the wild. This includes RFC 6587, RFC 5424, RFC 3164, and other common variations (such as the Nginx Syslog style). It’s unfortunate that the Syslog specification isn’t more accurately followed, but we hope that Vector insulates you from these deviations.
If parsing fails, Vector will raise an error. If you find this happening often,
we recommend using the socket
source combined with
regex parsing to implement your own custom
ingestion and parsing scheme, or syslog parsing and
manually handle any errors. Alternatively, you can open an
issue to request support for your specific format.
Transport Layer Security (TLS)
tls.*
options and/or via an
OpenSSL configuration file. The file location defaults to
/usr/local/ssl/openssl.cnf
or can be specified with the OPENSSL_CONF
environment variable.